SlideShare a Scribd company logo
1 of 114
The Internet is the largest computer
network in the world, connecting millions of
computers. A network is a group of two or
more computer systems linked together.
• In 1969, the US Department of Defense started
a project to allow researchers and military
personnel to communicate with each other in
an emergency.
• The project was called DARPAnet (Defence
Advanced Research Projects Agency) and it is
the foundation of the Internet.
• Later its also called ARPAnet (Advanced
Research Projects Agency)
• Throughout the 1970's, what would later
become the Internet was developed. While
mostly military personnel and scientists used it
in its early days, the advent of the World Wide
Web in the early 1990's changed all that.
• Current amount over 1.9 billion users around
the world
• The overall responsibility for managing Internet Protocol address
or domain names at upper levels is vested in the Internet
Assigned Numbers Authority (IANA), which delegates the actual
administration of most functions to other bodies.
• At global regional levels, the principal bodies providing allocation
and registration services that support the operation of the
Internet globally are:
• RIPE NCC (Réseaux IP Européens Network Coordination Centre)
• ARIN (American Registry for Internet Numbers)
• APNIC (Asia Pacific Network Information Centre)
• LACNIC (Latin American and Caribbean IP address Regional
Registry)
• AfriNIC (African Regional Registry for Internet Number Resources)
• Dial-up-connections : speed 56kbps
• ISDN : speed 128 Kbps
• Broadband

▫ ADSL(Asymmetrical Digital Subscriber Line)
 Speed 2mbps

▫ Cable : speed 42 Mbps

• Lease lines : up to 12mbps
• FTTH- Fiber to the Home
• Wireless
▫ Wi-Fi
▫ Wi-max
▫ Satellite
As you now know, the Internet is the
physical
computer
network
(computer,
monitor, modem, cables, phone lines, etc).
• Tim Berners-Lee, a software engineer, invented the
World Wide Web in 1991.
• The Web is a system of Internet servers that
support specially-formatted documents.
• These specially formatted documents are text
documents created in HTML, a formatting
language. In conjunction with the World Wide
Web, your web browser interprets these text
documents so they become web pages.
• Web pages contain formatted text, graphics,
sound, animation, and video, allowing point and
click navigation.
• “An address that points to a particular
document or other resource on the Internet,
used most frequently on the World Wide Web
(WWW)”.
• A computer user can visit an Internet document
by typing its URL into a Web browser or similar
application used to access the Internet.
• Eg:
http://www.infortec-international.com/index.html
http://www.infortec-international.com/index.html
protocol

host name/domain
(network location)

path/filename
http://www.infortec-international.com/home/about.html

•
•
•
•
•
•

Protocol: http://
Host computer name: www
Domain name: infortec-international
Domain type: .com
Path: /home
File name: about.html
Domain names
• An internet web site address.
• Domain names are used in URLs to identify
particular Web pages.
• The first-level set of domain names are the toplevel domains (TLDs), including the generic
top-level domains (gTLDs), such as the
prominent domains com, net and org, and the
country code top-level domains (ccTLDs).
root
Country
Domains

Generic
Domains
.com

(commercial)

.lk

(Sri lanka)

.net

(network)

.uk

(United Kingdom)

.org

(organization)

.au

(Australia)

.biz

(business)

.us

(United States)

.edu

(education)

.ca

(Canada)

.mil

(military)

.in

(India)

.gov

(government)

.sg

(Singapore)
• "Interconnection, collection of computers for
the purpose of sharing resources &
Communication that we can take as a
Network”.
• Resources we can divide in to three categories,
Information such as files & folders, Hardware
such as printers and software such as MS
office.
•
•
•
•
•

Is a method for communication
File/Data sharing
Sharing of printers and other resources
Can centralize administration and support
Can reduce the cost involved in communication
& information gathering
Different types of computer network
designs is by their scope or scale.
• LAN (Local Area Network)
• WAN (Wide Area Network)
• MAN (Metropolitan Area Network)
• WLAN (Wireless Local Area Network)
• PAN(Personal Area Network)
• CAN(Campus Area Network)
• LAN (Local Area Network):
“A computer network that connect two or
more electrical or electronic devices or
equipments in a single network”
Eg: SLT
• WAN (Wide Area Network):
“Connect two
networks together”
Eg: Internet

or

more

different
• MAN (Metropolitan Area Network):
•
“A data network designed for a town
or city”. In terms of geographic breath, MANs
are larger than local-area networks (LANs), but
smaller than wide-area networks (WANs). MANs
are usually characterized by very high-speed
connections using fiber optical cable or other
digital media.
• Wireless Local Area Network
“A LAN based on (Wi-Fi) wireless
network technology”
• Peer-to-peer Architecture: (Workgroup)
• Client/Server Architectures: (Domain)
• A type of network in which each workstation
has equivalent capabilities and responsibilities.
This differs from client/server architectures, in
which some computers are dedicated to serving
the others. Peer-to-peer networks are generally
simpler, but they usually do not offer the same
performance under heavy loads.
• A network architecture in which each computer
or process on the network is either a client or a
server. Servers are powerful computers or
processes dedicated to managing disk drives
(file servers), printers (print servers), or
network traffic (network servers).Clients are
PCs or workstations on which users run
applications. Clients rely on servers for
resources, such as files, devices, and even
processing power.
• Intranet: A network based on TCP/IP protocols
(an internet) belonging to an organization,
usually a corporation, accessible only by the
organization's members, employees, or others
with authorization. An intranet's Web sites look
and act just like any other Web sites, but the
firewall surrounding an intranet fends off
unauthorized access.
• Extranet: A buzzword that refers to an intranet
that is partially accessible to authorized
outsiders. Whereas an intranet resides behind a
firewall and is accessible only to people who
are members of the same company or
organization, an extranet provides various
levels of accessibility to outsiders. You can
access an extranet only if you have a valid
username and password, and your identity
determines which parts of the extranet you can
view.
Data Communication
• Data Communication is the process of moving
data & information from one place to another
through a transmission system.
• The communication media is the matter or
substance that carries voice or data.
• Different types of transmission media are
currently in use. All these types can be group
two categories as Guided and Unguided media.
• The Guided media are follows through physical
media and unguided media are those in which
is the data is broadcast through air.
• Transmission media
Guided
Media(wired)
Twisted pair
Coaxial cable
Fiber optics

Unguided
Media(wireless)
Radio waves
Microwaves
Satellite
Infrared
Bluetooth
Guided Media:
• Cable is the medium through which information
usually moves from one network device to
another.
• There are several types of cable which are
commonly used with LANs. In some cases, a
network will utilize only one type of cable,
other networks will use a variety of cable
types.
Twisted Pair Cable
• Unshielded Twisted Pair (UTP) Cable

• Shielded Twisted Pair (STP) Cable
Twisted pair
•
•
•
•

Is the common medium
Is mainly used in star topology networks
Cheap and easy to work with
There are several categories available in Twisted
pairs
▫ CAT1, CAT2, CAT5, CAT5E
Categories of Unshielded Twisted
Pair
Type

Use

Category 1

Voice Only (Telephone Wire)

Category 2

Data to 4 Mbps (Local Talk)

Category 3
Category 4
Category 5

Data to 10 Mbps (Ethernet)
Data to 20 Mbps (16 Mbps Token Ring)
Data to 100 Mbps (Fast Ethernet)
Unshielded Twisted Pair Connector
RJ-45(Registered Jack)
Coaxial Cable
Coaxial cable
• Is mainly used in BUT topology networks
• Television
▫ Ariel to TV
▫ Cable TV

• Coaxial cable are in two categories :
▫ Thin Coaxial
▫ Thick Coaxial

• Difficult to handle
Fiber Optic Cable
Fiber optics
• Signals are sent as light beams and transmitted
over a glass fiber.
• Fiber optic technology offers high bandwidth
• Optical fibers come in two types
▫ Single mode
▫ Multi mode
glass
cladding

Working with light or rays
Ethernet Cable Summary
Specification

Cable Type

Maximum
length

10BaseT

Twisted Pair(STP/UTP)

100 meters

10Base2

Thin Coaxial

185 meters

10Base5

Thick Coaxial

500 meters

10BaseF

Fiber Optic

2000 meters
Specificati
on name

Cable Type

Max. length

Nodes/seg

10BaseT

Twisted Pair

100 m

1024

10Base2

Thin Coaxial

185 m

30

10Base5

Thick Coaxial

500 m

100

10BaseF

Fiber Optic

2000 m

1024

Advantage

Cheapest
system
No hub needed
Original cable,
now obsolete
Best between
buildings
Unguided Media
• Radio Waves
▫ Omni directional
▫ Suffers from interferences
▫ Use to TV, Radio, Cell phone
• Microwave
▫
▫
▫
▫

Microwaves travel nearly in a straight line
Tall building is a barrier
100 meter high towers, repeaters for every 80km
Is widely used for mobile phone, television etc.
• Satellite
▫
▫
▫
▫
▫
▫

Used for long distance telephone
Television
Private business network
Mostly used with Microwave
Using in long distance communications
Used for weather forecasting, television
broadcast, amateur radio communications,
Internet communications, and the Global
Positioning System,
• Infrared
▫ Is limited for a small area (eg: for a room)
▫ Walls/barriers will block the signals
▫ Mainly used for TV remote control, IRD port.
• Bluetooth(802.15)
▫ Founding members are Ericsson, IBM, Intel, Nokia
and Toshiba.
▫ Short range wireless communication technology.
▫ Used to data synchronization between 2 devices
▫ Is limited for a small area
▫ Mainly used in Mobile phones, digital cameras,
headsets, scanners, keyboards, mouse and other
devices to connect to a computer.
Network Topologies
• Topology refers to the shape of a network, or
the network's layout. How different nodes in a
network are connected to each other and how
they communicate is determined by the
network's topology. Topologies are either
physical or logical.

• BUS, RING, STAR, MESH etc.
BUS Topology
RING Topology
STAR Topology
TREE Topology
MESH Topology
Considerations When Choosing a
Topology:
•
•
•
•

Money.
Length of cable needed
Future growth.
Cable type.
• “A Protocol is a set of rules(standards) that
governs the communications between
computers on a network.”
• Most common network protocol is TCP/IP

• Eg: http, ftp, smtp, telnet, ssh, https, etc.
Properties of Protocol
• Detection of the underlying physical connection
(wired or wireless),
• Handshaking
• How to start and end a message
• How to format a message
• What to do with corrupted or improperly
formatted messages (error correction)
• How to detect unexpected loss of the
connection, and what to do next
• Termination of the session and or connection.
Internetworking Models
• When networks fist come in to being,
computers could typically communicate with
computers from the same manufacturer. In the
late
1970s,
the
Open
System
Interconnection(OSI) reference model was
created by the International Organization for
Standardization(ISO) to break this barrier.
• It is describes how data and network
information are communicated.
• A reference model is a conceptual blue print of
how communications should takes place.
• These processes divide into logical groups
called layers.
7. Application
6. Presentation
5. Session
4. Transport
3. Network
2. Data Link
1. Physical

Provides the user interface to
communicate to the computer. Eg HTTP
----------------------------------------------------Presents data to the 7th layer and data
translation like encryption, conversion
----------------------------------------------------Manage presentation layers entities. (keep
different application data separately)
----------------------------------------------------Performs error correction before
retransmit.[Segments]
----------------------------------------------------Manages the device addressing.(IP
addressing) , Routes data. [Packets]
----------------------------------------------------Combines packets in to bytes and error
detection. [Frames]
----------------------------------------------------Moves bits between devices(physical
connection/cabling, electronic singnals)
[Bits]
Networking Hardware
•
•
•
•
•
•
•

Servers
Workstations
Network Interface Cards
Switches
Repeaters
Bridges
Routers
Servers
A network server
• A network server is a computer designed to
process requests and deliver data to other (client)
computers over a local network or the Internet.
Network servers typically are configured with
additional processing, memory and storage capacity
to handle the load of servicing clients. Common
types of network servers include:
▫
▫
▫
▫
▫

Web servers
proxy servers
FTP servers
online game servers
Mail servers
Workstations
Network Interface Cards
Switch
Modem
• Short for modulator-demodulator. A modem is
a device or program that enables a computer to
transmit data over, for example, telephone or
cable lines. Computer information is stored
digitally, whereas information transmitted over
telephone lines is transmitted in the form of
analog waves. A modem converts between
these two forms.
Repeater
Bridge
Router
Firewall
Firewall
Encryption
Wi-fi
Wi-max
MAC Address
• A MAC address, or Media Access Control address, is
a 48- or 64-bit address associated with a network
adapter.
• While IP addresses are associated with software,
MAC addresses are linked to the hardware of
network adapters.
• For this reason, the MAC address is sometimes
called the hardware address, the burned-in address
(BIA), or the physical address. MAC addresses are
expressed in hexadecimal notation in the following
format: 01-23-45-67-89-AB, in the case of a 48-bit
address.
• “An identifier for a computer or device on a
TCP/IP network”. Networks using the TCP/IP
protocol route messages based on the IP
address of the destination.
• The format of an IP address is a 32-bit numeric
address written as four numbers separated by
periods. Each number can be zero to 255.
• For example 192.160.10.240 could be an IP
address.
What is an IP address
A way to identify machines on a network
A unique identifier
IP usage
Used to connect to another computer
Allows transfers of files and e-mail
IP structure
IP addresses consist of four sections
Each section is 8 bits long
Each section can range from 0 to 255
Written, for example, 128.35.0.72
IP structure
These four sections represent the machine itself
and the network it is on

The network portion is assigned.
The host section is determined by the network
administrator
IP structure
5 Classes of IP address A B C D and E
Class A reserved for governments
Class B reserved for medium companies
Class C reserved for small companies
IP structure
Class D are reserved for multicasting
Class E are reserved for future use
IP structure
Class A begins 1 to 126
Class B begins 128 to
191
Class C begins 192 to
223
Reserved addresses
Addresses beginning 127 are reserved for
loopback and internal testing

xxx.0.0.0 reserved for network address
xxx.255.255.255 reserved for broadcast
IP Addresses
IP addresses are:
Unique
Global and Standardised
Essential
• Class A :

1.0.0.1 – 126.255.255.254

• Class B :

128.1.0.1 – 191.254.255.254

• Class C :

192.0.1.1 – 223.255.254.254

• Class D :
224.x.x.x (multicasting &
research purposes)
• Class E :

240.x.x.x (for future use)
Current Private IP addresses as
follows
• Class A
10.0.0.0 through 10.255.255.255
• Class B
172.16.0.0 through 172.31.255.255
• Class C
192.168.0.0 through 192.168.255.255
• IPv4 addresses have 32 bits in them and so allow
a maximum of four billion addresses
• IPv6 stands for Internet Protocol version 6. It is
the second version of the Internet Protocol to be
used generally across the virtual world.
• IPv6 addresses have 128 bits.
• IPv6 is the future of Internet addressing, mainly
because industry experts believe that they are
close to running out of available addresses
altogether.
• 128 bits - written as eight 16-bit hex numbers.
5f1b:df00:ce3e:e200:0020:0800:2078:e3e3
How to Determine your IP Address?
• Go to the start menu and select Run.... Then
type cmd in the box and click OK.
• At the C:> prompt type ipconfig. Then press
Enter. Your IP address, subnet mask and
default gateway will be printed on the window.
• If you want more detailed information about
your network connection, type ipconfig /all at
the prompt. Here you can get additional
information about your IP configuration.
• For Domain Name System (or Service or
Server), an Internet service that translates
domain names into IP addresses.
• Every time you use a domain name, therefore,
a DNS service must translate the name into the
corresponding IP address.

Domain
www.example.com

IP Address
> 198.105.232.4
DNS has a table of Domain names and IP
addresses. It’s map the domain name with the IP
address and its route to the particular server.

Domain
www.yahoo.com
mail.yahoo.com

IP Address
104.102.1.103
104.102.2.107
Country

ISP

Regional

Root

02

10

.net

04

11

01

03

09

05
12

08
yahoo

.com
www.yahoo.com

06
104.10
2.1.10

07

3

13
yahoo server

.org

Domain
www.yahoo.com
mail.yahoo.com

IP Address
104.102.1.103
104.102.2.107
• Short for Dynamic Host Configuration
Protocol, a protocol for assigning dynamic IP
addresses to devices on a network.
• With dynamic addressing, a device can have a
different IP address every time it connects to
the network.
How DHCP works?

More Related Content

What's hot

Type of internet connectivity
Type of internet connectivityType of internet connectivity
Type of internet connectivityrahul kundu
 
NETWORK INTERNET and TYPES OF NETWORK
NETWORK INTERNET and TYPES OF NETWORKNETWORK INTERNET and TYPES OF NETWORK
NETWORK INTERNET and TYPES OF NETWORKimtiazalijoono
 
Lec 1(Introduction to Computer Networks & internet)
Lec 1(Introduction to Computer Networks & internet)Lec 1(Introduction to Computer Networks & internet)
Lec 1(Introduction to Computer Networks & internet)maamir farooq
 
Networking Terminology
Networking TerminologyNetworking Terminology
Networking TerminologySabinDhakal13
 
Network and internet fundamental
Network and internet fundamentalNetwork and internet fundamental
Network and internet fundamentalVTC_NeilaSofien
 
Presentation On Computer Network
Presentation On Computer NetworkPresentation On Computer Network
Presentation On Computer NetworkAvinash Ranjan
 
Skr+3200+chapter+1+(kweh)
Skr+3200+chapter+1+(kweh)Skr+3200+chapter+1+(kweh)
Skr+3200+chapter+1+(kweh)Ammar Shafiq
 
UNIT 1: Internet Technology T
UNIT 1: Internet Technology TUNIT 1: Internet Technology T
UNIT 1: Internet Technology TSujit Jha
 
Introduction to Networks & Networking Concepts
Introduction to Networks & Networking ConceptsIntroduction to Networks & Networking Concepts
Introduction to Networks & Networking Conceptszaisahil
 
Introduction to the Internet
Introduction to the InternetIntroduction to the Internet
Introduction to the InternetAdjeiKwadjo
 
How Internet Works
How Internet WorksHow Internet Works
How Internet WorksKae Hsu
 
Computer Networking 101
Computer Networking 101Computer Networking 101
Computer Networking 101Sameer Mahajan
 
Internet architecture protocol
Internet architecture protocolInternet architecture protocol
Internet architecture protocolGLIM Digital
 
Telecommunications, the Internet, and Wireless Technology
Telecommunications, the Internet, and Wireless TechnologyTelecommunications, the Internet, and Wireless Technology
Telecommunications, the Internet, and Wireless TechnologySyed Ali Roshaan Raza
 
Introduction to Computer Network
Introduction to Computer NetworkIntroduction to Computer Network
Introduction to Computer NetworkAdetula Bunmi
 

What's hot (20)

Type of internet connectivity
Type of internet connectivityType of internet connectivity
Type of internet connectivity
 
NETWORK INTERNET and TYPES OF NETWORK
NETWORK INTERNET and TYPES OF NETWORKNETWORK INTERNET and TYPES OF NETWORK
NETWORK INTERNET and TYPES OF NETWORK
 
Lec 1(Introduction to Computer Networks & internet)
Lec 1(Introduction to Computer Networks & internet)Lec 1(Introduction to Computer Networks & internet)
Lec 1(Introduction to Computer Networks & internet)
 
Networking Terminology
Networking TerminologyNetworking Terminology
Networking Terminology
 
Network and internet fundamental
Network and internet fundamentalNetwork and internet fundamental
Network and internet fundamental
 
Presentation On Computer Network
Presentation On Computer NetworkPresentation On Computer Network
Presentation On Computer Network
 
Skr+3200+chapter+1+(kweh)
Skr+3200+chapter+1+(kweh)Skr+3200+chapter+1+(kweh)
Skr+3200+chapter+1+(kweh)
 
UNIT 1: Internet Technology T
UNIT 1: Internet Technology TUNIT 1: Internet Technology T
UNIT 1: Internet Technology T
 
The basics of computer networking
The basics of computer networkingThe basics of computer networking
The basics of computer networking
 
Introduction to Networks & Networking Concepts
Introduction to Networks & Networking ConceptsIntroduction to Networks & Networking Concepts
Introduction to Networks & Networking Concepts
 
Computer networks
Computer networksComputer networks
Computer networks
 
Introduction to the Internet
Introduction to the InternetIntroduction to the Internet
Introduction to the Internet
 
viddu Network
 viddu Network viddu Network
viddu Network
 
How Internet Works
How Internet WorksHow Internet Works
How Internet Works
 
Networking
NetworkingNetworking
Networking
 
Computer Networking 101
Computer Networking 101Computer Networking 101
Computer Networking 101
 
Internet architecture protocol
Internet architecture protocolInternet architecture protocol
Internet architecture protocol
 
Telecommunications, the Internet, and Wireless Technology
Telecommunications, the Internet, and Wireless TechnologyTelecommunications, the Internet, and Wireless Technology
Telecommunications, the Internet, and Wireless Technology
 
Introduction to Computer Network
Introduction to Computer NetworkIntroduction to Computer Network
Introduction to Computer Network
 
Introduction to Internet
Introduction to Internet Introduction to Internet
Introduction to Internet
 

Similar to Networkinglesson 120115093046-phpapp01

interconnected_network_of_internets.pptx
interconnected_network_of_internets.pptxinterconnected_network_of_internets.pptx
interconnected_network_of_internets.pptxGaganaP13
 
Computer Networks: Evolution of Computer Networks.pptx
Computer Networks: Evolution of Computer Networks.pptxComputer Networks: Evolution of Computer Networks.pptx
Computer Networks: Evolution of Computer Networks.pptxVishwaTej10
 
Unit1_COMPUTER_COMMUNICATIONSSlides.pptx
Unit1_COMPUTER_COMMUNICATIONSSlides.pptxUnit1_COMPUTER_COMMUNICATIONSSlides.pptx
Unit1_COMPUTER_COMMUNICATIONSSlides.pptxNANDIKHATHARANIKUMAR1
 
Computer Networking_XII_CS_CBSE_OFKVS.ppt
Computer Networking_XII_CS_CBSE_OFKVS.pptComputer Networking_XII_CS_CBSE_OFKVS.ppt
Computer Networking_XII_CS_CBSE_OFKVS.pptmv9499596
 
Networks-Internet-and-Internet-Protocols.pptx
Networks-Internet-and-Internet-Protocols.pptxNetworks-Internet-and-Internet-Protocols.pptx
Networks-Internet-and-Internet-Protocols.pptxHaythanSunday
 
Mis jaiswal-chapter-03
Mis jaiswal-chapter-03Mis jaiswal-chapter-03
Mis jaiswal-chapter-03Amit Fogla
 
Unit - 1.pptx
Unit - 1.pptxUnit - 1.pptx
Unit - 1.pptxKavinD11
 
Computer Networking.pptx
Computer Networking.pptxComputer Networking.pptx
Computer Networking.pptxAnkita Shirke
 
Data Communications.pptx
Data Communications.pptxData Communications.pptx
Data Communications.pptxjepoy808
 
Data Communication and Networking
Data Communication and NetworkingData Communication and Networking
Data Communication and NetworkingUtkarshaManpiya1
 
14.-NETWORKS.pptx
14.-NETWORKS.pptx14.-NETWORKS.pptx
14.-NETWORKS.pptxandree45846
 
Modue 1 part 1 of computer networks for your university exams
Modue 1 part 1 of computer networks for your university examsModue 1 part 1 of computer networks for your university exams
Modue 1 part 1 of computer networks for your university examsvish21ainds
 
unit 1PPT.pptx
unit 1PPT.pptxunit 1PPT.pptx
unit 1PPT.pptxLokeshc28
 
info technology.pptx
info technology.pptxinfo technology.pptx
info technology.pptxssuser07362a
 
Data Communication-1.ppt
Data Communication-1.pptData Communication-1.ppt
Data Communication-1.pptssusere16bd9
 

Similar to Networkinglesson 120115093046-phpapp01 (20)

interconnected_network_of_internets.pptx
interconnected_network_of_internets.pptxinterconnected_network_of_internets.pptx
interconnected_network_of_internets.pptx
 
Computer Networks: Evolution of Computer Networks.pptx
Computer Networks: Evolution of Computer Networks.pptxComputer Networks: Evolution of Computer Networks.pptx
Computer Networks: Evolution of Computer Networks.pptx
 
Internet
InternetInternet
Internet
 
Unit1_COMPUTER_COMMUNICATIONSSlides.pptx
Unit1_COMPUTER_COMMUNICATIONSSlides.pptxUnit1_COMPUTER_COMMUNICATIONSSlides.pptx
Unit1_COMPUTER_COMMUNICATIONSSlides.pptx
 
Computer Networking_XII_CS_CBSE_OFKVS.ppt
Computer Networking_XII_CS_CBSE_OFKVS.pptComputer Networking_XII_CS_CBSE_OFKVS.ppt
Computer Networking_XII_CS_CBSE_OFKVS.ppt
 
Networks-Internet-and-Internet-Protocols.pptx
Networks-Internet-and-Internet-Protocols.pptxNetworks-Internet-and-Internet-Protocols.pptx
Networks-Internet-and-Internet-Protocols.pptx
 
Mis jaiswal-chapter-03
Mis jaiswal-chapter-03Mis jaiswal-chapter-03
Mis jaiswal-chapter-03
 
Unit - 1.pptx
Unit - 1.pptxUnit - 1.pptx
Unit - 1.pptx
 
Computer Networking.pptx
Computer Networking.pptxComputer Networking.pptx
Computer Networking.pptx
 
Vision
VisionVision
Vision
 
Data Communications.pptx
Data Communications.pptxData Communications.pptx
Data Communications.pptx
 
Data Communication and Networking
Data Communication and NetworkingData Communication and Networking
Data Communication and Networking
 
Tuk tuk
Tuk tukTuk tuk
Tuk tuk
 
14.-NETWORKS.pptx
14.-NETWORKS.pptx14.-NETWORKS.pptx
14.-NETWORKS.pptx
 
Modue 1 part 1 of computer networks for your university exams
Modue 1 part 1 of computer networks for your university examsModue 1 part 1 of computer networks for your university exams
Modue 1 part 1 of computer networks for your university exams
 
unit 1PPT.pptx
unit 1PPT.pptxunit 1PPT.pptx
unit 1PPT.pptx
 
info technology.pptx
info technology.pptxinfo technology.pptx
info technology.pptx
 
lecture1.ppt
lecture1.pptlecture1.ppt
lecture1.ppt
 
lecture1.ppt
lecture1.pptlecture1.ppt
lecture1.ppt
 
Data Communication-1.ppt
Data Communication-1.pptData Communication-1.ppt
Data Communication-1.ppt
 

Recently uploaded

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 

Recently uploaded (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 

Networkinglesson 120115093046-phpapp01

  • 1.
  • 2. The Internet is the largest computer network in the world, connecting millions of computers. A network is a group of two or more computer systems linked together.
  • 3.
  • 4. • In 1969, the US Department of Defense started a project to allow researchers and military personnel to communicate with each other in an emergency. • The project was called DARPAnet (Defence Advanced Research Projects Agency) and it is the foundation of the Internet. • Later its also called ARPAnet (Advanced Research Projects Agency)
  • 5. • Throughout the 1970's, what would later become the Internet was developed. While mostly military personnel and scientists used it in its early days, the advent of the World Wide Web in the early 1990's changed all that. • Current amount over 1.9 billion users around the world
  • 6.
  • 7. • The overall responsibility for managing Internet Protocol address or domain names at upper levels is vested in the Internet Assigned Numbers Authority (IANA), which delegates the actual administration of most functions to other bodies. • At global regional levels, the principal bodies providing allocation and registration services that support the operation of the Internet globally are: • RIPE NCC (Réseaux IP Européens Network Coordination Centre) • ARIN (American Registry for Internet Numbers) • APNIC (Asia Pacific Network Information Centre) • LACNIC (Latin American and Caribbean IP address Regional Registry) • AfriNIC (African Regional Registry for Internet Number Resources)
  • 8.
  • 9.
  • 10. • Dial-up-connections : speed 56kbps • ISDN : speed 128 Kbps • Broadband ▫ ADSL(Asymmetrical Digital Subscriber Line)  Speed 2mbps ▫ Cable : speed 42 Mbps • Lease lines : up to 12mbps • FTTH- Fiber to the Home • Wireless ▫ Wi-Fi ▫ Wi-max ▫ Satellite
  • 11.
  • 12.
  • 13. As you now know, the Internet is the physical computer network (computer, monitor, modem, cables, phone lines, etc).
  • 14. • Tim Berners-Lee, a software engineer, invented the World Wide Web in 1991. • The Web is a system of Internet servers that support specially-formatted documents. • These specially formatted documents are text documents created in HTML, a formatting language. In conjunction with the World Wide Web, your web browser interprets these text documents so they become web pages. • Web pages contain formatted text, graphics, sound, animation, and video, allowing point and click navigation.
  • 15. • “An address that points to a particular document or other resource on the Internet, used most frequently on the World Wide Web (WWW)”. • A computer user can visit an Internet document by typing its URL into a Web browser or similar application used to access the Internet. • Eg: http://www.infortec-international.com/index.html
  • 17. http://www.infortec-international.com/home/about.html • • • • • • Protocol: http:// Host computer name: www Domain name: infortec-international Domain type: .com Path: /home File name: about.html
  • 18. Domain names • An internet web site address. • Domain names are used in URLs to identify particular Web pages. • The first-level set of domain names are the toplevel domains (TLDs), including the generic top-level domains (gTLDs), such as the prominent domains com, net and org, and the country code top-level domains (ccTLDs).
  • 20.
  • 21. • "Interconnection, collection of computers for the purpose of sharing resources & Communication that we can take as a Network”. • Resources we can divide in to three categories, Information such as files & folders, Hardware such as printers and software such as MS office.
  • 22. • • • • • Is a method for communication File/Data sharing Sharing of printers and other resources Can centralize administration and support Can reduce the cost involved in communication & information gathering
  • 23. Different types of computer network designs is by their scope or scale. • LAN (Local Area Network) • WAN (Wide Area Network) • MAN (Metropolitan Area Network) • WLAN (Wireless Local Area Network) • PAN(Personal Area Network) • CAN(Campus Area Network)
  • 24. • LAN (Local Area Network): “A computer network that connect two or more electrical or electronic devices or equipments in a single network” Eg: SLT
  • 25. • WAN (Wide Area Network): “Connect two networks together” Eg: Internet or more different
  • 26. • MAN (Metropolitan Area Network): • “A data network designed for a town or city”. In terms of geographic breath, MANs are larger than local-area networks (LANs), but smaller than wide-area networks (WANs). MANs are usually characterized by very high-speed connections using fiber optical cable or other digital media.
  • 27. • Wireless Local Area Network “A LAN based on (Wi-Fi) wireless network technology”
  • 28. • Peer-to-peer Architecture: (Workgroup) • Client/Server Architectures: (Domain)
  • 29. • A type of network in which each workstation has equivalent capabilities and responsibilities. This differs from client/server architectures, in which some computers are dedicated to serving the others. Peer-to-peer networks are generally simpler, but they usually do not offer the same performance under heavy loads.
  • 30.
  • 31. • A network architecture in which each computer or process on the network is either a client or a server. Servers are powerful computers or processes dedicated to managing disk drives (file servers), printers (print servers), or network traffic (network servers).Clients are PCs or workstations on which users run applications. Clients rely on servers for resources, such as files, devices, and even processing power.
  • 32.
  • 33. • Intranet: A network based on TCP/IP protocols (an internet) belonging to an organization, usually a corporation, accessible only by the organization's members, employees, or others with authorization. An intranet's Web sites look and act just like any other Web sites, but the firewall surrounding an intranet fends off unauthorized access.
  • 34. • Extranet: A buzzword that refers to an intranet that is partially accessible to authorized outsiders. Whereas an intranet resides behind a firewall and is accessible only to people who are members of the same company or organization, an extranet provides various levels of accessibility to outsiders. You can access an extranet only if you have a valid username and password, and your identity determines which parts of the extranet you can view.
  • 35. Data Communication • Data Communication is the process of moving data & information from one place to another through a transmission system.
  • 36. • The communication media is the matter or substance that carries voice or data. • Different types of transmission media are currently in use. All these types can be group two categories as Guided and Unguided media. • The Guided media are follows through physical media and unguided media are those in which is the data is broadcast through air.
  • 37. • Transmission media Guided Media(wired) Twisted pair Coaxial cable Fiber optics Unguided Media(wireless) Radio waves Microwaves Satellite Infrared Bluetooth
  • 38. Guided Media: • Cable is the medium through which information usually moves from one network device to another. • There are several types of cable which are commonly used with LANs. In some cases, a network will utilize only one type of cable, other networks will use a variety of cable types.
  • 39. Twisted Pair Cable • Unshielded Twisted Pair (UTP) Cable • Shielded Twisted Pair (STP) Cable
  • 40. Twisted pair • • • • Is the common medium Is mainly used in star topology networks Cheap and easy to work with There are several categories available in Twisted pairs ▫ CAT1, CAT2, CAT5, CAT5E
  • 41. Categories of Unshielded Twisted Pair Type Use Category 1 Voice Only (Telephone Wire) Category 2 Data to 4 Mbps (Local Talk) Category 3 Category 4 Category 5 Data to 10 Mbps (Ethernet) Data to 20 Mbps (16 Mbps Token Ring) Data to 100 Mbps (Fast Ethernet)
  • 42. Unshielded Twisted Pair Connector RJ-45(Registered Jack)
  • 44. Coaxial cable • Is mainly used in BUT topology networks • Television ▫ Ariel to TV ▫ Cable TV • Coaxial cable are in two categories : ▫ Thin Coaxial ▫ Thick Coaxial • Difficult to handle
  • 45.
  • 46.
  • 48. Fiber optics • Signals are sent as light beams and transmitted over a glass fiber. • Fiber optic technology offers high bandwidth • Optical fibers come in two types ▫ Single mode ▫ Multi mode
  • 50.
  • 51. Ethernet Cable Summary Specification Cable Type Maximum length 10BaseT Twisted Pair(STP/UTP) 100 meters 10Base2 Thin Coaxial 185 meters 10Base5 Thick Coaxial 500 meters 10BaseF Fiber Optic 2000 meters
  • 52. Specificati on name Cable Type Max. length Nodes/seg 10BaseT Twisted Pair 100 m 1024 10Base2 Thin Coaxial 185 m 30 10Base5 Thick Coaxial 500 m 100 10BaseF Fiber Optic 2000 m 1024 Advantage Cheapest system No hub needed Original cable, now obsolete Best between buildings
  • 53. Unguided Media • Radio Waves ▫ Omni directional ▫ Suffers from interferences ▫ Use to TV, Radio, Cell phone
  • 54. • Microwave ▫ ▫ ▫ ▫ Microwaves travel nearly in a straight line Tall building is a barrier 100 meter high towers, repeaters for every 80km Is widely used for mobile phone, television etc.
  • 55. • Satellite ▫ ▫ ▫ ▫ ▫ ▫ Used for long distance telephone Television Private business network Mostly used with Microwave Using in long distance communications Used for weather forecasting, television broadcast, amateur radio communications, Internet communications, and the Global Positioning System,
  • 56.
  • 57. • Infrared ▫ Is limited for a small area (eg: for a room) ▫ Walls/barriers will block the signals ▫ Mainly used for TV remote control, IRD port.
  • 58. • Bluetooth(802.15) ▫ Founding members are Ericsson, IBM, Intel, Nokia and Toshiba. ▫ Short range wireless communication technology. ▫ Used to data synchronization between 2 devices ▫ Is limited for a small area ▫ Mainly used in Mobile phones, digital cameras, headsets, scanners, keyboards, mouse and other devices to connect to a computer.
  • 59.
  • 60. Network Topologies • Topology refers to the shape of a network, or the network's layout. How different nodes in a network are connected to each other and how they communicate is determined by the network's topology. Topologies are either physical or logical. • BUS, RING, STAR, MESH etc.
  • 66. Considerations When Choosing a Topology: • • • • Money. Length of cable needed Future growth. Cable type.
  • 67. • “A Protocol is a set of rules(standards) that governs the communications between computers on a network.” • Most common network protocol is TCP/IP • Eg: http, ftp, smtp, telnet, ssh, https, etc.
  • 68. Properties of Protocol • Detection of the underlying physical connection (wired or wireless), • Handshaking • How to start and end a message • How to format a message • What to do with corrupted or improperly formatted messages (error correction) • How to detect unexpected loss of the connection, and what to do next • Termination of the session and or connection.
  • 69. Internetworking Models • When networks fist come in to being, computers could typically communicate with computers from the same manufacturer. In the late 1970s, the Open System Interconnection(OSI) reference model was created by the International Organization for Standardization(ISO) to break this barrier. • It is describes how data and network information are communicated.
  • 70. • A reference model is a conceptual blue print of how communications should takes place. • These processes divide into logical groups called layers.
  • 71. 7. Application 6. Presentation 5. Session 4. Transport 3. Network 2. Data Link 1. Physical Provides the user interface to communicate to the computer. Eg HTTP ----------------------------------------------------Presents data to the 7th layer and data translation like encryption, conversion ----------------------------------------------------Manage presentation layers entities. (keep different application data separately) ----------------------------------------------------Performs error correction before retransmit.[Segments] ----------------------------------------------------Manages the device addressing.(IP addressing) , Routes data. [Packets] ----------------------------------------------------Combines packets in to bytes and error detection. [Frames] ----------------------------------------------------Moves bits between devices(physical connection/cabling, electronic singnals) [Bits]
  • 72.
  • 73.
  • 76. A network server • A network server is a computer designed to process requests and deliver data to other (client) computers over a local network or the Internet. Network servers typically are configured with additional processing, memory and storage capacity to handle the load of servicing clients. Common types of network servers include: ▫ ▫ ▫ ▫ ▫ Web servers proxy servers FTP servers online game servers Mail servers
  • 80. Modem • Short for modulator-demodulator. A modem is a device or program that enables a computer to transmit data over, for example, telephone or cable lines. Computer information is stored digitally, whereas information transmitted over telephone lines is transmitted in the form of analog waves. A modem converts between these two forms.
  • 81.
  • 88. Wi-fi
  • 90. MAC Address • A MAC address, or Media Access Control address, is a 48- or 64-bit address associated with a network adapter. • While IP addresses are associated with software, MAC addresses are linked to the hardware of network adapters. • For this reason, the MAC address is sometimes called the hardware address, the burned-in address (BIA), or the physical address. MAC addresses are expressed in hexadecimal notation in the following format: 01-23-45-67-89-AB, in the case of a 48-bit address.
  • 91.
  • 92. • “An identifier for a computer or device on a TCP/IP network”. Networks using the TCP/IP protocol route messages based on the IP address of the destination. • The format of an IP address is a 32-bit numeric address written as four numbers separated by periods. Each number can be zero to 255. • For example 192.160.10.240 could be an IP address.
  • 93. What is an IP address A way to identify machines on a network A unique identifier
  • 94. IP usage Used to connect to another computer Allows transfers of files and e-mail
  • 95. IP structure IP addresses consist of four sections Each section is 8 bits long Each section can range from 0 to 255 Written, for example, 128.35.0.72
  • 96. IP structure These four sections represent the machine itself and the network it is on The network portion is assigned. The host section is determined by the network administrator
  • 97. IP structure 5 Classes of IP address A B C D and E Class A reserved for governments Class B reserved for medium companies Class C reserved for small companies
  • 98. IP structure Class D are reserved for multicasting Class E are reserved for future use
  • 99. IP structure Class A begins 1 to 126 Class B begins 128 to 191 Class C begins 192 to 223
  • 100. Reserved addresses Addresses beginning 127 are reserved for loopback and internal testing xxx.0.0.0 reserved for network address xxx.255.255.255 reserved for broadcast
  • 101. IP Addresses IP addresses are: Unique Global and Standardised Essential
  • 102.
  • 103. • Class A : 1.0.0.1 – 126.255.255.254 • Class B : 128.1.0.1 – 191.254.255.254 • Class C : 192.0.1.1 – 223.255.254.254 • Class D : 224.x.x.x (multicasting & research purposes) • Class E : 240.x.x.x (for future use)
  • 104. Current Private IP addresses as follows • Class A 10.0.0.0 through 10.255.255.255 • Class B 172.16.0.0 through 172.31.255.255 • Class C 192.168.0.0 through 192.168.255.255
  • 105.
  • 106. • IPv4 addresses have 32 bits in them and so allow a maximum of four billion addresses
  • 107. • IPv6 stands for Internet Protocol version 6. It is the second version of the Internet Protocol to be used generally across the virtual world. • IPv6 addresses have 128 bits. • IPv6 is the future of Internet addressing, mainly because industry experts believe that they are close to running out of available addresses altogether.
  • 108. • 128 bits - written as eight 16-bit hex numbers. 5f1b:df00:ce3e:e200:0020:0800:2078:e3e3
  • 109. How to Determine your IP Address? • Go to the start menu and select Run.... Then type cmd in the box and click OK. • At the C:> prompt type ipconfig. Then press Enter. Your IP address, subnet mask and default gateway will be printed on the window. • If you want more detailed information about your network connection, type ipconfig /all at the prompt. Here you can get additional information about your IP configuration.
  • 110. • For Domain Name System (or Service or Server), an Internet service that translates domain names into IP addresses. • Every time you use a domain name, therefore, a DNS service must translate the name into the corresponding IP address. Domain www.example.com IP Address > 198.105.232.4
  • 111. DNS has a table of Domain names and IP addresses. It’s map the domain name with the IP address and its route to the particular server. Domain www.yahoo.com mail.yahoo.com IP Address 104.102.1.103 104.102.2.107
  • 113. • Short for Dynamic Host Configuration Protocol, a protocol for assigning dynamic IP addresses to devices on a network. • With dynamic addressing, a device can have a different IP address every time it connects to the network.

Editor's Notes

  1. http://info.cern.ch
  2. www.rootservers.org