Introduction
Introduction
• Define: Network
• Examine human versus network communication and see the parallels between them.
• Be introduced to the two major models used to plan and implement networks: OSI and TCP/IP
• Examine the OSI and TCP/IP layers in detail to understand their functions and services.
• Become familiar with the various network devices and network addressing schemes.
Network Vs Internet
• Services
Cont’d.
•
Terminologies
• A NIC, or LAN adapter, provides the physical connection to the network at the PC or other
end device. The media that are connecting the PC to the networking device, plug directly
into the NIC (Figure 2).
• Physical Port -
• Interface -
ISPs provide a variety of types of network access to the end systems, including residential
broadband access such as cable modem or DSL, high-speed local area network access,
wireless access, and 56 kbps dial-up modem access.
• How end systems can communicate with each other over the internet
• End systems, packet switches, and other pieces of the Internet run protocols that
control the sending and receiving of information within the Internet.
• Transmission Control Protocol (TCP) and Internet Protocol (IP)
The exact amount of traffic being carried in the Internet now a days?
Examples of Topology
A topology defines how the devices are connected.
When you are cabling up your computers and networking devices, various types of topologies
can be used.
Topologies
two devices can directly communicate without interference from other devices.
These types of connections are not common when many devices need to be connected
together.
For example, if one of the devices fails in the ring, the ring can wrap itself to provide a single,
functional, ring.
Topologies
star topology
When connecting devices together, you connect your computers to a hub or switch (the
center of the star).
An extended star topology is basically multiple star topologies interconnected.
Topologies
A bus topology
Certain media types, like 10Base5 and 10Base2 Ethernet, use a bus topology.
A point-to-point topology
• partial and full mesh can be seen from both a physical view and a logical one.
• Example physical bus topology. Is it Partial or full meshed topology ?
Topologies
• WANs, on the other hand, because of their cost, commonly use partially meshed topologies to
reduce the cost of connected devices.
• Drawbacks
• Fully meshed –cost
• Partial meshed--delay
• Advantages ?
Topologies
Meshing
Meshing generically describes how devices are connected together.
partial and
full.
Topologies
The two most prominent types in packet switches in today’s Internet are
Access Network- the network that physically connects an end system to the first router (also
known as the “edge router”) on a path from the end system to any
other distant end system.
Core Network- the mesh of packet switches and links that interconnects the Internet’s end
systems.
Network Types
• LANs(Local Area Networks)
• WANs (Wide Area Networks)
• Metropolitan area networks (MANs)
• Storage area networks (SANs)
• Content networks (CNs)
• Intranets and extranets
• VPNs and others
Network Types
• LANs
• Local area networks (LANs) are used to connect networking devices that are in a
very close geographic area, such as a floor of a building, a building itself, or a campus
environment.
• In a LAN, you’ll find PCs, file servers, hubs, bridges, switches, routers, multilayer switches,
voice gateways, firewalls, and other devices.
• Ethernet, Fast Ethernet (FE), Gigabit Ethernet (GE), Token Ring, and FDDI.
Network Types
• WANs
• Wide area networks (WANs) are used to connect LANs together.
• Typically, WANs are used when the LANs that must be connected are separated by a large
distance.
MANs
A metropolitan area network (MAN) is a hybrid between a LAN and a WAN.
Like a WAN, it connects two or more LANs in the same geographic area.
connect two different buildings or offices in the same city.
SANs
Storage area networks (SANs) provide a high-speed infrastructure to move data
between storage devices and file servers.
The advantages of separating the storage device from the file services are more
flexibility and centralization of storage, which eases management.
Network Types
CNs are aware of layers 4–7 of the OSI Reference Model and use this information
to make intelligent decisions about how to obtain the information for the user or
users.
For the first item, CNs are used to reduce the amount of bandwidth that you need for your
users’ Internet connections.
When users download content, it is cached on a local server. And then when a user make
another request, that request is first checked with the local server to determine if the content
exists there.
If it does, the local server sends the information to the user, thus providing higher data rates,
since the client is acquiring its information from the LAN instead of having to download it
again from the Internet.
CNs are also used to reduce the overhead for external users that want to access internal
resources in your network.
With the introduction of CNs, you can distribute the traffic load from external users across
multiple internal servers, thus reducing network congestion to the servers and reducing the
resources required to handle the external users’ requests.
What would be your solution if your web server was overwhelmed with requests from
external users ?
ISPs also commonly use CNs in their LANs to help reduce some congestion by providing
users from within this company can find all of their resources without having to go outside of
the company.
An intranet can include LANs, private WANs and MANs, and SANs
An extranet is an extended intranet, where certain internal services are made available to
known external users or external business partners at remote locations.
The connections between these external users and the internal resource are typically secured
via a firewall and a VPN
Network Types
your company might have a web site that sells various products, and you want any external
user to be able to access this service.
The lowercase internet refers to any type of network connection where external users access
publicly available resources.
The Internet is the main public network that most companies and people use when accessing
external resources.
Typically, a firewall is used to secure your internal resources from external users.
Network Types
Confidentiality provides encryption of the data to keep it private from prying eyes.
Integrity is used to ensure that the data sent between the two devices or sites has not been
tampered with.
Assignment: (20)
Networks in Our Daily Lives (how networks affects the way we learn, communicate, work, play
and others. Support with practical examples. )
Identify the components used to established a VPN network and explain how these components can be used to
established the network & the network works ?