Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

CSS Reviewer

Download as pdf or txt
Download as pdf or txt
You are on page 1of 11

Lesson 1: Basic Concepts of Networking

Types of Network

COMPUTER NETWORKS

• is defined as the interconnection of two or more computers. It is done to enable the computers to
communicate and share available resources.

Applications:

i. Sharing of resources such as printers


ii. Sharing of expensive software's and database
iii. Communication from one computer to another computer
iv. Exchange of data and information among users via network
v. Sharing of information over geographically wide areas.

Networking Characteristic

• Cost - Includes the cost of the network components, their installation, and their ongoing maintenance.
• Security - Includes the protection of the network components and the data they contain and/or the data
transmitted between them.
• Speed - Includes how fast data is transmitted between network end points (the data rate).
• Topology - Describes the physical cabling layout and the logical way data moves between components.
• Scalability - Defines how well the network can adapt to new growth, including new users, applications, and
network components.
• Reliability - Defines the reliability of the network components and the connectivity between them. Mean
time between failures (MTBF) is a measurement commonly used to indicate the likelihood of a component
failing.
• Availability - Measures the likelihood of the network being available to the users, where downtime occurs
when the network is not available because of an outage or scheduled maintenance. Availability is typically
measured in a percentage based on the number of minutes that exist in a year. Therefore, uptime would be
the number of minutes the network is available divided by the number of minutes in a year.

Components of Computer Network

• Two or more computers


• Cables as links between the computers
• A network interface card(NIC) on each computer
• Switches
• Software called operating system(OS)

Sharing of Resources

Types of resources are:

Hardware: A network allows users to share many hardware devices such as printers, modems, fax machines, CD
ROM, players, etc.

Software: sharing software resources reduces the cost of software installation, saves space on hard disk.

Benefit of Computer Network

• Increased speed
• Reduced cost
• Improved security
• Centralized software managements
• Electronic mail
• Flexible access

Disadvantage of Networks

• High cost of installation


• Requires time for administration
• Failure of server
• Cable faults
Classification of Area by their Geography

NETWORK

PAN LAN WAN MAN CAN

Local Area Network

• is a network which is designed to operate over a small physical area such as an


office, factory or a group of buildings.
• LAN’s are easy to design and troubleshoot
• Exchange of information and sharing of resources becomes easy because of LAN.
• In LAN all machines are connected to a single cable.
• Different types of topologies such as star, tree, bus, ring, etc. can be used
• It is usually a privately-owned network.

Personal Area Network

• A personal area network is a computer network organized around an individual


person.
• It generally consists of a mobile computer, a cell phone or personal digital
assistant. PAN enables the communication among these devices.
• It can also be used for communication among personal devices themselves for
connecting to a digital level network and internet.
• The PANs can be constructed using wireless or cables.

Campus Area Network

• The campus area network is made up of an interconnection of LAN with limited


geographical area.
• Network equipments such as switches, routers and the transmission media i.e.
optical fiber etc. are almost entirely owned by the campus owner.

Wide Area Network

• When network spans over a large distance or when the computers to be


connected to each other are at widely separated locations a local area network
cannot be used. A wide area network(WAN) is installed.
• The communication between different users of WAN is established using leased
telephone lines, satellite links and similar channels.
• It is cheaper and more efficient to use the phone network for the link.
• Most WAN networks are used to transfer large blocks of data between its users.

Metropolitan Area Network

• It is in between LAN & WAN technology that covers the entire city.
• It uses similar technology as LAN.
• It can be a single network such as cable TV network, or a measure of connecting a
number of LAN’s o a large network so that resources can be shared LAN to LAN as
well as device to device.

DISTUINGUISH BETWEEN LAN, WAN, MAN


NETWORK CLASSIFICATION BY THEIR COMPONENT ROLE

• PEER TO PEER NETWORK


• CLIENT SERVER NETWORK

PEER TO PEER NETWORK

• In peer to peer network each computer is responsible for making its own resources
available to other computers on the network.
• Each computer is responsible for setting up and maintaining its own security for these
resources.
• Also, each computer is responsible for accessing the required network resources from
peer to peer relationships.
• Peer to peer network is useful for a small network containing less than 10 computers on
a single LAN.
• In peer to peer network each computer can function as both client and server.
• Peer to peer networks do not have a central control system. There are no servers in peer networks.
• Peer networks are amplified into home group.

ADVANTAGES & DISADVANTAGES OF PEER TO PEER NETWORK

Advantages: Disadvantages:

- Use less expensive computer hardware - Not very secure


- Easy to administer - No central point of storage or file archiving
- No NOS required - Additional load on computer because of resource sharing
- More built in redundancy - Hard to maintain version control
- Easy setup & low cost

CLIENT SERVER NETWORK

• In client-server network relationships, certain computers act as server and other act as
clients. A server is simply a computer, that available the network resources and provides
service to other computers when they request it. A client is the computer running a
program that requests the service from a server.
• Local area network (LAN) is based on client server network relationship.
• A client-server network is one in which all available network resources such as files,
directories, applications and shared devices, are centrally managed and hosted and then
are accessed by client.
• Client server network are defined by the presence of servers on a network that provide security and
administration of the network.

ADVANTAGES & DISADVANTAGES OF CLIENT-SERVER NETWORK

Advantages: Disadvantages:

- Very secure - Requires professional administration


- Better performance - More hardware-intensive
- Centralized Backup - More software-intensive
- Very Reliable - Expensive dedicated software

Types of Servers

• File server - These servers provide the services for storing, retrieving and moving the data. A user can read,
write, exchange and manage the files with the help of file servers.
• Print server - is used for controlling and managing printing on the network. It also offers the fax service to the
network users.
• Application server - The expensive software and additional computing power can be shared by the computers in
a network with the help of application servers.
• Message server - It is used to co-ordinate the interaction between users, documents and applications. The data
can be used in the form of audio, video, binary, text or graphics.
• Database server - It is a type of application server. It allows the user to access the centralized strong database.
Lesson 2: Introduction to Networks

Networking Devices

What are Network Devices and Their Types?

• There are different types of electronic devices used in networking which are known as network devices or
network equipment In a computer network, network devices are mainly used for transmitting and receiving the
data quickly and securely in between computers, fax machines, printers, etc These devices may be intra network
or internetwork There are some devices that are installed on the device such as RJ 45 connector otherwise NIC
card, whereas some devices are part of the network namely switch, router, etc These devices are specific
devices, handles digital or electrical connections to perform their exclusive roles very efficiently

Network Devices

• The devices which are used for communication between different hardwares used in the computer network are
known as network devices. These devices are also known as physical devices, networking hardware, and
network equipment otherwise computer networking devices.
• In a computer network, each network device plays a key role based on their functionality, and also works for
different purposes at different segments.

Types of Network Devices

• Network Hub
• Network Switch
• Modem
• Network Router
• Bridge
• Repeater
• Access Point (AP)

Network Hub - Multi-port repeaters are often called hubs. Hubs


are very common internetworking devices. Generally speaking,
the term hub is used instead of repeater when referring to the
device that serves as the center of a star topology network.

Network Switch - generally have a more intelligent role than


hubs. A switch is a multiport device that improves network
efficiency. The switch maintains limited routing information about
nodes in the internal network, and it allows connections to systems
like hubs or routers Strands of LANs are usually connected using
switches Generally, switches can read the hardware addresses of
incoming packets to transmit them to the appropriate destination

Modem - is the most important network device and it is used daily in


our life If we notice the internet connection to homes was given with
the help of a wire then wire carries internet data from one place to
another. But, every computer gives digital or binary data in the form
of zeros ones.

Network Router - is one kind of network device in a computer


network and it is used for routing traffic from one network to
another These two networks could be private to a public company
network For example, here a router is considered as traffic police at
the junction, he directs dissimilar traffic networks to dissimilar
directions.

Bridge - A Bridge in the computer network is used to unite two or


more network segments The main function of a bridge in network
architecture is to store as well as transmit frames among the
various segments Bridges use MAC (Media Access Control)
hardware for transferring frames.
Repeater - The main function of this device is to reproduce the
signal on a similar network before the signal gets weak otherwise
damaged. The significant point to be noted regarding these devices
is that they do not strengthen the signal Whenever the signal gets
weak, then they reproduce it at the actual strength A repeater is a
two port device.

Access Points - While an access point (AP) can technically involve


either a wired or wireless connection, it commonly means a wireless
device. It can operate either as a bridge connecting a standard wired
network to wireless devices or as a router passing data
transmissions from one access point to another.

Lesson 2.1: Exploring the Networks

Networking Today

Networks in Our Past and Daily Lives

Interconnecting Our Lives

Networking Impacts in Our Daily Lives

• Networks support the way we learn.


• Networks support the way we communicate.
• Networks support the way we work.
• Networks support the way we play.

Providing Resources in a Network


Networks of Many Sizes

Providing Resources in a Network


Clients and Servers

Peer to Peer
1.2 LANs, WANs, and Internets
Components of a Network
There are three categories of network components:

• Devices
• Media
• Services

Components of a Network
End Devices
Some examples of end devices are:

• Computers (work stations, laptops, file servers, web servers)


• Network printers VoIP
• phones TelePresence
• endpoint
• Security cameras
• file servers, web servers)
• Mobile handheld devices (such as smart phones, tablets, PDAs, wireless debit / credit card readers and
barcode scanners)

Network Infrastructure Devices

Examples of intermediary network devices are:

• Network Access Devices (switches, and wireless access points)


• Internetworking Devices (routers)
• Security Devices (firewalls)

Network Media Network Representations Topology Diagrams

LANs, WANs, and the Internet

The Internet Intranet and Extranet

Connecting to the Internet

Connecting Remote Users to the Internet


1.3 The Network as a Platform

Converged Networks
The Converging Network Planning for the Future

Reliable Network
Supporting Network Architecture
As networks evolve, we are discovering that there are four basic characteristics that the underlying architectures need
to address in order to meet user expectations:
• Fault Tolerance
• Scalability
• Quality of Service (QoS)
• Security

Fault Tolerance in Circuit Switched Network Packet-Switched Networks

Scalable Networks

Providing QoS
Examples of priority decisions for an organization might include:
• Time-sensitive communication - increase priority for services like telephony or video distribution.
• Non time-sensitive communication - decrease priority for web page retrieval or email.
• High importance to organization - increase priority for production control or business transaction data.
• Undesirable communication - decrease priority or block like peer to peer file sharing or live entertainment.
Providing Network Security

1.4 The Changing Network Environment


Network Trends
New trends

Some of the top trends include:


• Bring Your Own Device (BYOD) -
• Online collaboration
• Video communication
• Cloud computing

Bring Your Own Device (BYOD) - The concept of any device, to any content, in anyway is a major global trend that
requires significant changes to the way devices are used. This trend is known as Bring Your Own Device (BYOD).

Online Collaboration Video Communication

Cloud Computing
Cloud computing offers the following potential benefits:
• Organizational flexibility
• Agility and rapid deployment
• Reduced cost of infrastructure
• Refocus of IT resources
• Creation of new business models
Data Centers
A data center is a facility used to house computer systems and associated components including:
• Redundant data communications connections
• High-speed virtual servers (sometimes referred to as server farms or server clusters)
• Redundant storage systems (typically uses SAN technology)
• Redundant or backup power supplies
• Environmental controls (e.g., air conditioning, fire suppression)
• Security devices

Networking Technologies for the Home


Technology Trends in the Home Powerline Networking Wireless Broadband

Network Security Future of Networking


Security Threats Network Security
The most common external threats to networks include:
• Viruses, worms, and Trojan horses
• Spyware and adware
• Zero-day attacks, also called zero-hour attacks
• Hacker attacks
• Denial of service (DoS) attacks
• Data interception and theft
• Identity theft
Security Solutions
Network security components often include:
• Antivirus and antispyware
• Firewall filtering
• Dedicated firewall systems
• Access control lists (ACL)
• Intrusion prevention systems (IPS)
• Virtual Private Networks (VPNs)

Exploring the Networking


Summary
• Networks and the Internet have changed the way we communicate, learn, work, and even play.
• Networks come in all sizes. They can range from simple networks consisting of two computers, to networks
connecting millions of devices.
• The Internet is the largest network in existence. In fact, the term Internet means a ‘network of networks. The
Internet provides the services that enable us to connect and communicate with our families, friends, work, and
interests.
• The network infrastructure is the platform that supports the network. It provides the stable and reliable channel
over which communication can occur. It is made up of network components including end devices, intermediate
devices, and network media.
• Network must be reliable
• Network security is an integral part of computer networking, regardless of whether the network is limited to a
home environment with a single connection to the Internet, or as a large as a corporation with thousands of
users.
• The network infrastructure can vary greatly in terms of size, number of users, and number and types of services
that are supported on it. The network infrastructure must grow and adjust to support the way the network is
used. The routing and switching platform is the foundation of any network infrastructure.

Lesson 3: Network Models


Models
• Whenever we encounter highly complex technologies, we need to simplify the overall process by breaking it into
discrete, simple, individual processes. We do this using models.
• These models acts as guidelines and break down how a network functions into discrete parts called Layers. Also
these models provide two tools that make them critical for networking technician:
1. The OSI and TCP/IP model provide powerful mental tools for diagnosing problems.
2. These models provide a common language to describe networks.

Two methods to conceptualize parts of a network:

• The OSI Model


• The TCP/IP Model

OSI MODEL (Open Systems Interconnection) Model

It has been developed by ISO ‘International Organization of Standardization ‘, in the year 1984. It is a 7-layer
architecture with each layer having specific functionality to perform. All these 7 layers work collaboratively to transmit
the data from one person to another across the globe.

Application Layer

• Which is implemented by the network applications.


• These applications produce the data, which has to be transferred over the network.
• This layer also serves as a window for the application services to access the network and for displaying the
received information to the user.

EX. Application - Browsers Skype, Messenger, etc

Presentation Layer

• also called the Translation layer.


• The data from the application layer is extracted here and manipulated as per the required format to transmit
over the network.
The functions of the presentation layer are

1. Translation: For example, ASCII to EBCDIC.


2. Encryption/Decryption Data: encryption translates the data into another form or code. The encrypted data
is known as the cipher text and the decrypted data is known as plain text A key value is used for encrypting
as well as decrypting data.
3. Compression: Reduces the number of bits that need to be transmitted on the network.

Session Layer

• This layer is responsible for establishment of connection, maintenance of sessions, authentication and also
ensures security

The functions of the session layer are:

1. Session establishment, maintenance and termination: The layer allows the two processes to establish, use
and terminate a connection.
2. Synchronization: This layer allows a process to add checkpoints which are considered as synchronization
points into the data These synchronization point help to identify the error so that the data is re synchronized
properly, and ends of the messages are not cut prematurely and data loss is avoided.
3. Dialog Controller: The session layer allows two systems to start communication with each other in half
duplex or full duplex

Transport Layer

• provides services to application layer and takes services from network layer.
• The data in the transport layer is referred to as Segments.
• It is responsible for the End to End delivery of the complete message.
• Transport layer also provides the acknowledgment of the successful data transmission and re-transmits the data
if an error is found.
• Transport Layer is also called the HEART of OSI MODEL.

Network Layer

• Works for the transmission of data from one host to the other located in different networks.
• It also takes care of packet routing i.e. selection of the shortest path to transmit the packet, from the number of
routes available.
• The sender receiver’s IP address are placed in the header by network layer.

The functions of the Network layer are

1. Routing: The network layer protocols determine which route is suitable from source to destination This
function of network layer is known as routing
2. Logical Addressing: In order to identify each device on internetwork uniquely, network layer defines an
addressing scheme. The sender receiver’s IP address are placed in the header by network layer Such an
address distinguishes each device uniquely and universally.
• Segments in Network layer is referred as Packet
• Network layer is implemented by networking devices such as routers

Data Link Layer

• is responsible for the node to node delivery of the message.


• The main function of this layer is to make sure data transfer is error free from one node to another, over the
physical layer.
• When a packet arrives in a network, it is the responsibility of DLL to transmit it to the Host using its MAC
address.

Data Link Layer is divided into two sub layers:

1. Logical Link Control (LLC)


2. Media Access Control (MAC)

The packet received from Network layer is further divided into frames depending on the frame size of NIC(Network
Interface Card). DLL also encapsulates Sender and Receiver’s MAC address in the header.
One of the major functions of the data link layer is to provide a physical MAC address so that requested information
can find its destination. Without a physical address, our pizza delivery man would not be able to complete his
delivery.

Physical Layer

• The lowest layer of the OSI reference model.


• It is responsible for the actual physical connection between the devices. The physical layer contains information
in the form of bits.
• It is responsible for the actual physical connection between the devices.
• When receiving data, this layer will get the signal received and convert it into 0 s and 1 s and send them to the
Data Link layer, which will put the frame back together.

The functions of the physical layer are:

1. Bit synchronization: The physical layer provides the synchronization of the bits by providing a clock. This
clock controls both sender and receiver thus providing synchronization at bit level.
2. Bit rate control: The Physical layer also defines the transmission rate i.e. the number of bits sent per second.
3. Physical topologies: Physical layer specifies the way in which the different, devices/nodes are arranged in a
network i.e. bus, star or mesh topology.
4. Transmission mode: Physical layer also defines the way in which the data flows between the two connected
devices. The various transmission modes possible are: Simplex, half duplex and full duplex.

You might also like