SlideShare a Scribd company logo
1 of 114
The Internet is the largest computer
network in the world, connecting millions of
computers. A network is a group of two or
more computer systems linked together.
• In 1969, the US Department of Defense started
  a project to allow researchers and military
  personnel to communicate with each other in
  an emergency.
• The project was called DARPAnet (Defence
  Advanced Research Projects Agency) and it is
  the foundation of the Internet.
• Later its also called ARPAnet (Advanced
  Research Projects Agency)
• Throughout the 1970's, what would later
  become the Internet was developed. While
  mostly military personnel and scientists used it
  in its early days, the advent of the World Wide
  Web in the early 1990's changed all that.

• Current amount over 1.9 billion users around
  the world
• The overall responsibility for managing Internet Protocol address
  or domain names at upper levels is vested in the Internet
  Assigned Numbers Authority (IANA), which delegates the actual
  administration of most functions to other bodies.
• At global regional levels, the principal bodies providing allocation
  and registration services that support the operation of the
  Internet globally are:
• RIPE NCC (Réseaux IP Européens Network Coordination Centre)
• ARIN (American Registry for Internet Numbers)
• APNIC (Asia Pacific Network Information Centre)
• LACNIC (Latin American and Caribbean IP address Regional
  Registry)
• AfriNIC (African Regional Registry for Internet Number Resources)
• Dial-up-connections : speed 56kbps
• ISDN : speed 128 Kbps
• Broadband
 ▫ ADSL(Asymmetrical Digital Subscriber Line)
    Speed 2mbps
 ▫ Cable : speed 42 Mbps
• Lease lines : up to 12mbps
• FTTH- Fiber to the Home
• Wireless
 ▫ Wi-Fi
 ▫ Wi-max
 ▫ Satellite
As you now know, the Internet is the
physical   computer    network     (computer,
monitor, modem, cables, phone lines, etc).
• Tim Berners-Lee, a software engineer, invented the
  World Wide Web in 1991.
• The Web is a system of Internet servers that
  support specially-formatted documents.
• These specially formatted documents are text
  documents created in HTML, a formatting
  language. In conjunction with the World Wide
  Web, your web browser interprets these text
  documents so they become web pages.
• Web pages contain formatted text, graphics,
  sound, animation, and video, allowing point and
  click navigation.
• “An address that points to a particular
  document or other resource on the Internet,
  used most frequently on the World Wide Web
  (WWW)”.
• A computer user can visit an Internet document
  by typing its URL into a Web browser or similar
  application used to access the Internet.
• Eg:
 http://www.infortec-international.com/index.html
http://www.infortec-international.com/index.html

protocol      host name/domain        path/filename
              (network location)
http://www.infortec-international.com/home/about.html


•   Protocol: http://
•   Host computer name: www
•   Domain name: infortec-international
•   Domain type: .com
•   Path: /home
•   File name: about.html
Domain names
• An internet web site address.

• Domain names are used in URLs to identify
  particular Web pages.

• The first-level set of domain names are the top-
  level domains (TLDs), including the generic
  top-level domains (gTLDs), such as the
  prominent domains com, net and org, and the
  country code top-level domains (ccTLDs).
root


  Generic                                 Country
  Domains                                 Domains


.com   (commercial)      .lk   (Sri lanka)
.net   (network)         .uk   (United Kingdom)
.org   (organization)    .au   (Australia)
.biz   (business)        .us   (United States)
.edu   (education)       .ca   (Canada)
.mil   (military)        .in    (India)
.gov   (government)      .sg    (Singapore)
• "Interconnection, collection of computers for
  the purpose of sharing resources &
  Communication that we can take as a
  Network”.
• Resources we can divide in to three categories,
  Information such as files & folders, Hardware
  such as printers and software such as MS
  office.
•   Is a method for communication
•   File/Data sharing
•   Sharing of printers and other resources
•   Can centralize administration and support
•   Can reduce the cost involved in communication
    & information gathering
Different types of computer network
  designs is by their scope or scale.
• LAN (Local Area Network)
• WAN (Wide Area Network)
• MAN (Metropolitan Area Network)

• WLAN (Wireless Local Area Network)
• PAN(Personal Area Network)
• CAN(Campus Area Network)
• LAN (Local Area Network):
     “A computer network that connect two or
  more electrical or electronic devices or
  equipments in a single network”

Eg: SLT
• WAN (Wide Area Network):
         “Connect two    or   more   different
   networks together”

 Eg: Internet
• MAN (Metropolitan Area Network):
•          “A data network designed for a town
  or city”. In terms of geographic breath, MANs
  are larger than local-area networks (LANs), but
  smaller than wide-area networks (WANs). MANs
  are usually characterized by very high-speed
  connections using fiber optical cable or other
  digital media.
• Wireless Local Area Network
           “A LAN based on (Wi-Fi) wireless
  network technology”
• Peer-to-peer Architecture: (Workgroup)

• Client/Server Architectures: (Domain)
• A type of network in which each workstation
  has equivalent capabilities and responsibilities.
  This differs from client/server architectures, in
  which some computers are dedicated to serving
  the others. Peer-to-peer networks are generally
  simpler, but they usually do not offer the same
  performance under heavy loads.
• A network architecture in which each computer
  or process on the network is either a client or a
  server. Servers are powerful computers or
  processes dedicated to managing disk drives
  (file servers), printers (print servers), or
  network traffic (network servers).Clients are
  PCs or workstations on which users run
  applications. Clients rely on servers for
  resources, such as files, devices, and even
  processing power.
• Intranet: A network based on TCP/IP protocols
  (an internet) belonging to an organization,
  usually a corporation, accessible only by the
  organization's members, employees, or others
  with authorization. An intranet's Web sites look
  and act just like any other Web sites, but the
  firewall surrounding an intranet fends off
  unauthorized access.
• Extranet: A buzzword that refers to an intranet
  that is partially accessible to authorized
  outsiders. Whereas an intranet resides behind a
  firewall and is accessible only to people who
  are members of the same company or
  organization, an extranet provides various
  levels of accessibility to outsiders. You can
  access an extranet only if you have a valid
  username and password, and your identity
  determines which parts of the extranet you can
  view.
Data Communication
• Data Communication is the process of moving
  data & information from one place to another
  through a transmission system.
• The communication media is the matter or
  substance that carries voice or data.
• Different types of transmission media are
  currently in use. All these types can be group
  two categories as Guided and Unguided media.
• The Guided media are follows through physical
  media and unguided media are those in which
  is the data is broadcast through air.
• Transmission media
        Guided                 Unguided
     Media(wired)           Media(wireless)
 Twisted pair          Radio waves
 Coaxial cable         Microwaves
 Fiber optics          Satellite
                       Infrared
                       Bluetooth
Guided Media:
• Cable is the medium through which information
  usually moves from one network device to
  another.
• There are several types of cable which are
  commonly used with LANs. In some cases, a
  network will utilize only one type of cable,
  other networks will use a variety of cable
  types.
Twisted Pair Cable
• Unshielded Twisted Pair (UTP) Cable




• Shielded Twisted Pair (STP) Cable
Twisted pair
•   Is the common medium
•   Is mainly used in star topology networks
•   Cheap and easy to work with
•   There are several categories available in Twisted
    pairs
    ▫ CAT1, CAT2, CAT5, CAT5E
Categories of Unshielded Twisted
Pair
   Type                           Use
Category 1   Voice Only (Telephone Wire)
Category 2   Data to 4 Mbps (Local Talk)
Category 3   Data to 10 Mbps (Ethernet)
Category 4   Data to 20 Mbps (16 Mbps Token Ring)
Category 5   Data to 100 Mbps (Fast Ethernet)
Unshielded Twisted Pair Connector
RJ-45(Registered Jack)
Coaxial Cable
Coaxial cable
• Is mainly used in BUT topology networks
• Television
  ▫ Ariel to TV
  ▫ Cable TV
• Coaxial cable are in two categories :
  ▫ Thin Coaxial
  ▫ Thick Coaxial
• Difficult to handle
Fiber Optic Cable
Fiber optics
• Signals are sent as light beams and transmitted
  over a glass fiber.
• Fiber optic technology offers high bandwidth
• Optical fibers come in two types
 ▫ Single mode
 ▫ Multi mode
glass


 cladding




            Working with light or rays
Ethernet Cable Summary
 Specification          Cable Type         Maximum
                                            length

10BaseT          Twisted Pair(STP/UTP)   100 meters
10Base2          Thin Coaxial            185 meters
10Base5          Thick Coaxial           500 meters
10BaseF          Fiber Optic             2000 meters
Specificati    Cable Type     Max. length   Nodes/seg     Advantage
 on name

10BaseT       Twisted Pair    100 m         1024        Cheapest
                                                        system
10Base2       Thin Coaxial    185 m         30          No hub needed

10Base5       Thick Coaxial   500 m         100         Original cable,
                                                        now obsolete
10BaseF       Fiber Optic     2000 m        1024        Best between
                                                        buildings
Unguided Media
• Radio Waves
 ▫ Omni directional
 ▫ Suffers from interferences
 ▫ Use to TV, Radio, Cell phone
• Microwave
 ▫   Microwaves travel nearly in a straight line
 ▫   Tall building is a barrier
 ▫   100 meter high towers, repeaters for every 80km
 ▫   Is widely used for mobile phone, television etc.
• Satellite
  ▫   Used for long distance telephone
  ▫   Television
  ▫   Private business network
  ▫   Mostly used with Microwave
  ▫   Using in long distance communications
  ▫   Used for weather forecasting, television
      broadcast, amateur radio communications,
      Internet communications, and the Global
      Positioning System,
• Infrared
 ▫ Is limited for a small area (eg: for a room)
 ▫ Walls/barriers will block the signals
 ▫ Mainly used for TV remote control, IRD port.
• Bluetooth(802.15)
 ▫ Founding members are Ericsson, IBM, Intel, Nokia
   and Toshiba.
 ▫ Short range wireless communication technology.
 ▫ Used to data synchronization between 2 devices
 ▫ Is limited for a small area
 ▫ Mainly used in Mobile phones, digital cameras,
   headsets, scanners, keyboards, mouse and other
   devices to connect to a computer.
Network Topologies
• Topology refers to the shape of a network, or
  the network's layout. How different nodes in a
  network are connected to each other and how
  they communicate is determined by the
  network's topology. Topologies are either
  physical or logical.

• BUS, RING, STAR, MESH etc.
BUS Topology
RING Topology
STAR Topology
TREE Topology
MESH Topology
Considerations When Choosing a
Topology:
•   Money.
•   Length of cable needed
•   Future growth.
•   Cable type.
• “A Protocol is a set of rules(standards) that
  governs the communications between
  computers on a network.”
• Most common network protocol is TCP/IP


• Eg: http, ftp, smtp, telnet, ssh, https, etc.
Properties of Protocol
• Detection of the underlying physical connection
  (wired or wireless),
• Handshaking
• How to start and end a message
• How to format a message
• What to do with corrupted or improperly
  formatted messages (error correction)
• How to detect unexpected loss of the
  connection, and what to do next
• Termination of the session and or connection.
Internetworking Models
• When networks fist come in to being,
  computers could typically communicate with
  computers from the same manufacturer. In the
  late     1970s,      the      Open        System
  Interconnection(OSI) reference model was
  created by the International Organization for
  Standardization(ISO) to break this barrier.
• It is describes how data and network
  information are communicated.
• A reference model is a conceptual blue print of
  how communications should takes place.
• These processes divide into logical groups
  called layers.
Provides the user interface to
7. Application    communicate to the computer. Eg HTTP
                  -----------------------------------------------------
                  Presents data to the 7th layer and data
6. Presentation   translation like encryption, conversion
                  -----------------------------------------------------
                  Manage presentation layers entities. (keep
  5. Session      different application data separately)
                  -----------------------------------------------------
                  Performs error correction before
 4. Transport     retransmit.[Segments]
                  -----------------------------------------------------
                  Manages the device addressing.(IP
  3. Network      addressing) , Routes data. [Packets]
                  -----------------------------------------------------
                  Combines packets in to bytes and error
 2. Data Link     detection. [Frames]
                  -----------------------------------------------------
                  Moves bits between devices(physical
  1. Physical     connection/cabling, electronic singnals)
                  [Bits]
Networking Hardware
•   Servers
•   Workstations
•   Network Interface Cards
•   Switches
•   Repeaters
•   Bridges
•   Routers
Servers
A network server
• A network server is a computer designed to
  process requests and deliver data to other (client)
  computers over a local network or the Internet.
  Network servers typically are configured with
  additional processing, memory and storage capacity
  to handle the load of servicing clients. Common
  types of network servers include:
  ▫   Web servers
  ▫   proxy servers
  ▫   FTP servers
  ▫   online game servers
  ▫   Mail servers
Workstations
Network Interface Cards
Switch
Modem
• Short for modulator-demodulator. A modem is
  a device or program that enables a computer to
  transmit data over, for example, telephone or
  cable lines. Computer information is stored
  digitally, whereas information transmitted over
  telephone lines is transmitted in the form of
  analog waves. A modem converts between
  these two forms.
Repeater
Bridge
Router
Firewall
Firewall
Encryption
Wi-fi
Wi-max
MAC Address
• A MAC address, or Media Access Control address, is
  a 48- or 64-bit address associated with a network
  adapter.
• While IP addresses are associated with software,
  MAC addresses are linked to the hardware of
  network adapters.
• For this reason, the MAC address is sometimes
  called the hardware address, the burned-in address
  (BIA), or the physical address. MAC addresses are
  expressed in hexadecimal notation in the following
  format: 01-23-45-67-89-AB, in the case of a 48-bit
  address.
• “An identifier for a computer or device on a
  TCP/IP network”. Networks using the TCP/IP
  protocol route messages based on the IP
  address of the destination.
• The format of an IP address is a 32-bit numeric
  address written as four numbers separated by
  periods. Each number can be zero to 255.
• For example 192.160.10.240 could be an IP
  address.
What is an IP address
A way to identify machines on a network

A unique identifier
IP usage
Used to connect to another computer

Allows transfers of files and e-mail
IP structure
IP addresses consist of four sections

Each section is 8 bits long

Each section can range from 0 to 255

Written, for example, 128.35.0.72
IP structure
These four sections represent the machine itself
 and the network it is on

The network portion is assigned.

The host section is determined by the network
 administrator
IP structure
5 Classes of IP address A B C D and E

Class A reserved for governments

Class B reserved for medium companies

Class C reserved for small companies
IP structure
Class D are reserved for multicasting

Class E are reserved for future use
IP structure


               Class A begins 1 to 126

               Class B begins 128 to
                191

               Class C begins 192 to
                223
Reserved addresses
Addresses beginning 127 are reserved for
 loopback and internal testing

xxx.0.0.0 reserved for network address

xxx.255.255.255 reserved for broadcast
IP Addresses
IP addresses are:

 Unique

 Global and Standardised

 Essential
• Class A :     1.0.0.1 – 126.255.255.254

• Class B :     128.1.0.1 – 191.254.255.254

• Class C :     192.0.1.1 – 223.255.254.254

• Class D :     224.x.x.x (multicasting &
  research purposes)

• Class E :     240.x.x.x (for future use)
Current Private IP addresses as
follows
• Class A
     10.0.0.0 through 10.255.255.255
• Class B
     172.16.0.0 through 172.31.255.255
• Class C
     192.168.0.0 through 192.168.255.255
• IPv4 addresses have 32 bits in them and so allow
  a maximum of four billion addresses
• IPv6 stands for Internet Protocol version 6. It is
  the second version of the Internet Protocol to be
  used generally across the virtual world.

• IPv6 addresses have 128 bits.

• IPv6 is the future of Internet addressing, mainly
  because industry experts believe that they are
  close to running out of available addresses
  altogether.
• 128 bits - written as eight 16-bit hex numbers.

  5f1b:df00:ce3e:e200:0020:0800:2078:e3e3
How to Determine your IP Address?
• Go to the start menu and select Run.... Then
  type cmd in the box and click OK.
• At the C:> prompt type ipconfig. Then press
  Enter. Your IP address, subnet mask and
  default gateway will be printed on the window.
• If you want more detailed information about
  your network connection, type ipconfig /all at
  the prompt. Here you can get additional
  information about your IP configuration.
• For Domain Name System (or Service or
  Server), an Internet service that translates
  domain names into IP addresses.
• Every time you use a domain name, therefore,
  a DNS service must translate the name into the
  corresponding IP address.

Domain                    IP Address
www.example.com       > 198.105.232.4
DNS has a table of Domain names and IP
addresses. It’s map the domain name with the IP
address and its route to the particular server.



Domain                  IP Address
www.yahoo.com           104.102.1.103
mail.yahoo.com          104.102.2.107
ISP                       Country         Regional        Root             .net
                            02                      03               04


01                          11                      10               09
                                                                                      05
     12
                                                                                 08
                                                                                           .com                   yahoo
www.yahoo.com
                                                                                                  06

                      104.10                                                                      07
                             2.1.10   3

                       13
                                                         yahoo server                      .org        Domain           IP Address
                                                                                                       www.yahoo.com    104.102.1.103
                                                                                                       mail.yahoo.com   104.102.2.107
• Short for Dynamic Host Configuration
  Protocol, a protocol for assigning dynamic IP
  addresses to devices on a network.

• With dynamic addressing, a device can have a
  different IP address every time it connects to
  the network.
How DHCP works?

More Related Content

What's hot

What's hot (20)

Networking concepts
Networking conceptsNetworking concepts
Networking concepts
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
 
Information Networks - (Covered all the Important Topics)
Information Networks - (Covered all the Important Topics) Information Networks - (Covered all the Important Topics)
Information Networks - (Covered all the Important Topics)
 
Chapter01 -- introduction to networking
Chapter01  -- introduction to networkingChapter01  -- introduction to networking
Chapter01 -- introduction to networking
 
Fg c
Fg cFg c
Fg c
 
03 basic computer_network
03 basic computer_network03 basic computer_network
03 basic computer_network
 
Internet
InternetInternet
Internet
 
Network & internet presentation
Network & internet presentationNetwork & internet presentation
Network & internet presentation
 
Networking
NetworkingNetworking
Networking
 
viddu Network
 viddu Network viddu Network
viddu Network
 
A seminar on networks and networking
A seminar on networks and networkingA seminar on networks and networking
A seminar on networks and networking
 
Networking Terminology
Networking TerminologyNetworking Terminology
Networking Terminology
 
E-Tourism - Networks
E-Tourism - NetworksE-Tourism - Networks
E-Tourism - Networks
 
How Internet Works
How Internet WorksHow Internet Works
How Internet Works
 
Type of internet connectivity
Type of internet connectivityType of internet connectivity
Type of internet connectivity
 
Computer networks short note (version 8)
Computer networks short note (version 8)Computer networks short note (version 8)
Computer networks short note (version 8)
 
Networking concepts and terms
Networking concepts and termsNetworking concepts and terms
Networking concepts and terms
 
Data communication and network Chapter -1
Data communication and network Chapter -1Data communication and network Chapter -1
Data communication and network Chapter -1
 
Fundamentals of Networking
Fundamentals of NetworkingFundamentals of Networking
Fundamentals of Networking
 
Chapter 08 communication and network csc
Chapter 08 communication and network cscChapter 08 communication and network csc
Chapter 08 communication and network csc
 

Viewers also liked

Bi cultural n language
Bi cultural n languageBi cultural n language
Bi cultural n languageadnan011091
 
Marketing szeptany - marketing rekomendacji. Czyli zmierzch reklamy i narodzi...
Marketing szeptany - marketing rekomendacji. Czyli zmierzch reklamy i narodzi...Marketing szeptany - marketing rekomendacji. Czyli zmierzch reklamy i narodzi...
Marketing szeptany - marketing rekomendacji. Czyli zmierzch reklamy i narodzi...Grupa Adweb
 
Dharati skills of leadership
Dharati skills of leadershipDharati skills of leadership
Dharati skills of leadershipSarath Nair
 
M Training Deltecs
M Training DeltecsM Training Deltecs
M Training DeltecsAkash Shah
 

Viewers also liked (6)

GATE 2011 CS (GA)
GATE 2011 CS (GA)GATE 2011 CS (GA)
GATE 2011 CS (GA)
 
Bi cultural n language
Bi cultural n languageBi cultural n language
Bi cultural n language
 
Marketing szeptany - marketing rekomendacji. Czyli zmierzch reklamy i narodzi...
Marketing szeptany - marketing rekomendacji. Czyli zmierzch reklamy i narodzi...Marketing szeptany - marketing rekomendacji. Czyli zmierzch reklamy i narodzi...
Marketing szeptany - marketing rekomendacji. Czyli zmierzch reklamy i narodzi...
 
Dharati skills of leadership
Dharati skills of leadershipDharati skills of leadership
Dharati skills of leadership
 
Kenya prep
Kenya prepKenya prep
Kenya prep
 
M Training Deltecs
M Training DeltecsM Training Deltecs
M Training Deltecs
 

Similar to Networking lesson

Networkinglesson 120115093046-phpapp01
Networkinglesson 120115093046-phpapp01Networkinglesson 120115093046-phpapp01
Networkinglesson 120115093046-phpapp01Sour Summer
 
interconnected_network_of_internets.pptx
interconnected_network_of_internets.pptxinterconnected_network_of_internets.pptx
interconnected_network_of_internets.pptxGaganaP13
 
Mis jaiswal-chapter-03
Mis jaiswal-chapter-03Mis jaiswal-chapter-03
Mis jaiswal-chapter-03Amit Fogla
 
info technology.pptx
info technology.pptxinfo technology.pptx
info technology.pptxssuser07362a
 
Network Security and its applications in
Network Security and its applications inNetwork Security and its applications in
Network Security and its applications inssuser6478a8
 
Networking Bridge course_PPT.pptx
Networking Bridge course_PPT.pptxNetworking Bridge course_PPT.pptx
Networking Bridge course_PPT.pptxakshataharage
 
Computer Networking.pptx
Computer Networking.pptxComputer Networking.pptx
Computer Networking.pptxAnkita Shirke
 
Computer networks basic network_hardware_1
Computer networks basic network_hardware_1Computer networks basic network_hardware_1
Computer networks basic network_hardware_1Aneesh Nelavelly
 
Data Communication and Networking
Data Communication and NetworkingData Communication and Networking
Data Communication and NetworkingUtkarshaManpiya1
 
Computer Networks: Evolution of Computer Networks.pptx
Computer Networks: Evolution of Computer Networks.pptxComputer Networks: Evolution of Computer Networks.pptx
Computer Networks: Evolution of Computer Networks.pptxVishwaTej10
 
Networking Basic Refresh.pdf
Networking Basic Refresh.pdfNetworking Basic Refresh.pdf
Networking Basic Refresh.pdfCS Knowledge
 
Networks-Internet-and-Internet-Protocols.pptx
Networks-Internet-and-Internet-Protocols.pptxNetworks-Internet-and-Internet-Protocols.pptx
Networks-Internet-and-Internet-Protocols.pptxHaythanSunday
 

Similar to Networking lesson (20)

Networkinglesson 120115093046-phpapp01
Networkinglesson 120115093046-phpapp01Networkinglesson 120115093046-phpapp01
Networkinglesson 120115093046-phpapp01
 
interconnected_network_of_internets.pptx
interconnected_network_of_internets.pptxinterconnected_network_of_internets.pptx
interconnected_network_of_internets.pptx
 
Mis jaiswal-chapter-03
Mis jaiswal-chapter-03Mis jaiswal-chapter-03
Mis jaiswal-chapter-03
 
info technology.pptx
info technology.pptxinfo technology.pptx
info technology.pptx
 
Network Security and its applications in
Network Security and its applications inNetwork Security and its applications in
Network Security and its applications in
 
Networking Bridge course_PPT.pptx
Networking Bridge course_PPT.pptxNetworking Bridge course_PPT.pptx
Networking Bridge course_PPT.pptx
 
Computer Networking.pptx
Computer Networking.pptxComputer Networking.pptx
Computer Networking.pptx
 
IP ADDRESSING.pptx
IP ADDRESSING.pptxIP ADDRESSING.pptx
IP ADDRESSING.pptx
 
Cct203 lesson 10
Cct203 lesson 10Cct203 lesson 10
Cct203 lesson 10
 
final NEtworking.pptx
final  NEtworking.pptxfinal  NEtworking.pptx
final NEtworking.pptx
 
COMPUTER APPLICATIONS Module 3.pptx
COMPUTER APPLICATIONS Module 3.pptxCOMPUTER APPLICATIONS Module 3.pptx
COMPUTER APPLICATIONS Module 3.pptx
 
computer network 2
computer network 2computer network 2
computer network 2
 
Computer networks basic network_hardware_1
Computer networks basic network_hardware_1Computer networks basic network_hardware_1
Computer networks basic network_hardware_1
 
Data Communication and Networking
Data Communication and NetworkingData Communication and Networking
Data Communication and Networking
 
Computer Networks .pdf
Computer Networks .pdfComputer Networks .pdf
Computer Networks .pdf
 
Computer Networks: Evolution of Computer Networks.pptx
Computer Networks: Evolution of Computer Networks.pptxComputer Networks: Evolution of Computer Networks.pptx
Computer Networks: Evolution of Computer Networks.pptx
 
Networking Basic Refresh.pdf
Networking Basic Refresh.pdfNetworking Basic Refresh.pdf
Networking Basic Refresh.pdf
 
Vision
VisionVision
Vision
 
Networks-Internet-and-Internet-Protocols.pptx
Networks-Internet-and-Internet-Protocols.pptxNetworks-Internet-and-Internet-Protocols.pptx
Networks-Internet-and-Internet-Protocols.pptx
 
lecture1.ppt
lecture1.pptlecture1.ppt
lecture1.ppt
 

Recently uploaded

SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 

Recently uploaded (20)

SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 

Networking lesson

  • 1.
  • 2. The Internet is the largest computer network in the world, connecting millions of computers. A network is a group of two or more computer systems linked together.
  • 3.
  • 4. • In 1969, the US Department of Defense started a project to allow researchers and military personnel to communicate with each other in an emergency. • The project was called DARPAnet (Defence Advanced Research Projects Agency) and it is the foundation of the Internet. • Later its also called ARPAnet (Advanced Research Projects Agency)
  • 5. • Throughout the 1970's, what would later become the Internet was developed. While mostly military personnel and scientists used it in its early days, the advent of the World Wide Web in the early 1990's changed all that. • Current amount over 1.9 billion users around the world
  • 6.
  • 7. • The overall responsibility for managing Internet Protocol address or domain names at upper levels is vested in the Internet Assigned Numbers Authority (IANA), which delegates the actual administration of most functions to other bodies. • At global regional levels, the principal bodies providing allocation and registration services that support the operation of the Internet globally are: • RIPE NCC (Réseaux IP Européens Network Coordination Centre) • ARIN (American Registry for Internet Numbers) • APNIC (Asia Pacific Network Information Centre) • LACNIC (Latin American and Caribbean IP address Regional Registry) • AfriNIC (African Regional Registry for Internet Number Resources)
  • 8.
  • 9.
  • 10. • Dial-up-connections : speed 56kbps • ISDN : speed 128 Kbps • Broadband ▫ ADSL(Asymmetrical Digital Subscriber Line)  Speed 2mbps ▫ Cable : speed 42 Mbps • Lease lines : up to 12mbps • FTTH- Fiber to the Home • Wireless ▫ Wi-Fi ▫ Wi-max ▫ Satellite
  • 11.
  • 12.
  • 13. As you now know, the Internet is the physical computer network (computer, monitor, modem, cables, phone lines, etc).
  • 14. • Tim Berners-Lee, a software engineer, invented the World Wide Web in 1991. • The Web is a system of Internet servers that support specially-formatted documents. • These specially formatted documents are text documents created in HTML, a formatting language. In conjunction with the World Wide Web, your web browser interprets these text documents so they become web pages. • Web pages contain formatted text, graphics, sound, animation, and video, allowing point and click navigation.
  • 15. • “An address that points to a particular document or other resource on the Internet, used most frequently on the World Wide Web (WWW)”. • A computer user can visit an Internet document by typing its URL into a Web browser or similar application used to access the Internet. • Eg: http://www.infortec-international.com/index.html
  • 16. http://www.infortec-international.com/index.html protocol host name/domain path/filename (network location)
  • 17. http://www.infortec-international.com/home/about.html • Protocol: http:// • Host computer name: www • Domain name: infortec-international • Domain type: .com • Path: /home • File name: about.html
  • 18. Domain names • An internet web site address. • Domain names are used in URLs to identify particular Web pages. • The first-level set of domain names are the top- level domains (TLDs), including the generic top-level domains (gTLDs), such as the prominent domains com, net and org, and the country code top-level domains (ccTLDs).
  • 19. root Generic Country Domains Domains .com (commercial) .lk (Sri lanka) .net (network) .uk (United Kingdom) .org (organization) .au (Australia) .biz (business) .us (United States) .edu (education) .ca (Canada) .mil (military) .in (India) .gov (government) .sg (Singapore)
  • 20.
  • 21. • "Interconnection, collection of computers for the purpose of sharing resources & Communication that we can take as a Network”. • Resources we can divide in to three categories, Information such as files & folders, Hardware such as printers and software such as MS office.
  • 22. Is a method for communication • File/Data sharing • Sharing of printers and other resources • Can centralize administration and support • Can reduce the cost involved in communication & information gathering
  • 23. Different types of computer network designs is by their scope or scale. • LAN (Local Area Network) • WAN (Wide Area Network) • MAN (Metropolitan Area Network) • WLAN (Wireless Local Area Network) • PAN(Personal Area Network) • CAN(Campus Area Network)
  • 24. • LAN (Local Area Network): “A computer network that connect two or more electrical or electronic devices or equipments in a single network” Eg: SLT
  • 25. • WAN (Wide Area Network): “Connect two or more different networks together” Eg: Internet
  • 26. • MAN (Metropolitan Area Network): • “A data network designed for a town or city”. In terms of geographic breath, MANs are larger than local-area networks (LANs), but smaller than wide-area networks (WANs). MANs are usually characterized by very high-speed connections using fiber optical cable or other digital media.
  • 27. • Wireless Local Area Network “A LAN based on (Wi-Fi) wireless network technology”
  • 28. • Peer-to-peer Architecture: (Workgroup) • Client/Server Architectures: (Domain)
  • 29. • A type of network in which each workstation has equivalent capabilities and responsibilities. This differs from client/server architectures, in which some computers are dedicated to serving the others. Peer-to-peer networks are generally simpler, but they usually do not offer the same performance under heavy loads.
  • 30.
  • 31. • A network architecture in which each computer or process on the network is either a client or a server. Servers are powerful computers or processes dedicated to managing disk drives (file servers), printers (print servers), or network traffic (network servers).Clients are PCs or workstations on which users run applications. Clients rely on servers for resources, such as files, devices, and even processing power.
  • 32.
  • 33. • Intranet: A network based on TCP/IP protocols (an internet) belonging to an organization, usually a corporation, accessible only by the organization's members, employees, or others with authorization. An intranet's Web sites look and act just like any other Web sites, but the firewall surrounding an intranet fends off unauthorized access.
  • 34. • Extranet: A buzzword that refers to an intranet that is partially accessible to authorized outsiders. Whereas an intranet resides behind a firewall and is accessible only to people who are members of the same company or organization, an extranet provides various levels of accessibility to outsiders. You can access an extranet only if you have a valid username and password, and your identity determines which parts of the extranet you can view.
  • 35. Data Communication • Data Communication is the process of moving data & information from one place to another through a transmission system.
  • 36. • The communication media is the matter or substance that carries voice or data. • Different types of transmission media are currently in use. All these types can be group two categories as Guided and Unguided media. • The Guided media are follows through physical media and unguided media are those in which is the data is broadcast through air.
  • 37. • Transmission media Guided Unguided Media(wired) Media(wireless) Twisted pair Radio waves Coaxial cable Microwaves Fiber optics Satellite Infrared Bluetooth
  • 38. Guided Media: • Cable is the medium through which information usually moves from one network device to another. • There are several types of cable which are commonly used with LANs. In some cases, a network will utilize only one type of cable, other networks will use a variety of cable types.
  • 39. Twisted Pair Cable • Unshielded Twisted Pair (UTP) Cable • Shielded Twisted Pair (STP) Cable
  • 40. Twisted pair • Is the common medium • Is mainly used in star topology networks • Cheap and easy to work with • There are several categories available in Twisted pairs ▫ CAT1, CAT2, CAT5, CAT5E
  • 41. Categories of Unshielded Twisted Pair Type Use Category 1 Voice Only (Telephone Wire) Category 2 Data to 4 Mbps (Local Talk) Category 3 Data to 10 Mbps (Ethernet) Category 4 Data to 20 Mbps (16 Mbps Token Ring) Category 5 Data to 100 Mbps (Fast Ethernet)
  • 42. Unshielded Twisted Pair Connector RJ-45(Registered Jack)
  • 44. Coaxial cable • Is mainly used in BUT topology networks • Television ▫ Ariel to TV ▫ Cable TV • Coaxial cable are in two categories : ▫ Thin Coaxial ▫ Thick Coaxial • Difficult to handle
  • 45.
  • 46.
  • 48. Fiber optics • Signals are sent as light beams and transmitted over a glass fiber. • Fiber optic technology offers high bandwidth • Optical fibers come in two types ▫ Single mode ▫ Multi mode
  • 49. glass cladding Working with light or rays
  • 50.
  • 51. Ethernet Cable Summary Specification Cable Type Maximum length 10BaseT Twisted Pair(STP/UTP) 100 meters 10Base2 Thin Coaxial 185 meters 10Base5 Thick Coaxial 500 meters 10BaseF Fiber Optic 2000 meters
  • 52. Specificati Cable Type Max. length Nodes/seg Advantage on name 10BaseT Twisted Pair 100 m 1024 Cheapest system 10Base2 Thin Coaxial 185 m 30 No hub needed 10Base5 Thick Coaxial 500 m 100 Original cable, now obsolete 10BaseF Fiber Optic 2000 m 1024 Best between buildings
  • 53. Unguided Media • Radio Waves ▫ Omni directional ▫ Suffers from interferences ▫ Use to TV, Radio, Cell phone
  • 54. • Microwave ▫ Microwaves travel nearly in a straight line ▫ Tall building is a barrier ▫ 100 meter high towers, repeaters for every 80km ▫ Is widely used for mobile phone, television etc.
  • 55. • Satellite ▫ Used for long distance telephone ▫ Television ▫ Private business network ▫ Mostly used with Microwave ▫ Using in long distance communications ▫ Used for weather forecasting, television broadcast, amateur radio communications, Internet communications, and the Global Positioning System,
  • 56.
  • 57. • Infrared ▫ Is limited for a small area (eg: for a room) ▫ Walls/barriers will block the signals ▫ Mainly used for TV remote control, IRD port.
  • 58. • Bluetooth(802.15) ▫ Founding members are Ericsson, IBM, Intel, Nokia and Toshiba. ▫ Short range wireless communication technology. ▫ Used to data synchronization between 2 devices ▫ Is limited for a small area ▫ Mainly used in Mobile phones, digital cameras, headsets, scanners, keyboards, mouse and other devices to connect to a computer.
  • 59.
  • 60. Network Topologies • Topology refers to the shape of a network, or the network's layout. How different nodes in a network are connected to each other and how they communicate is determined by the network's topology. Topologies are either physical or logical. • BUS, RING, STAR, MESH etc.
  • 66. Considerations When Choosing a Topology: • Money. • Length of cable needed • Future growth. • Cable type.
  • 67. • “A Protocol is a set of rules(standards) that governs the communications between computers on a network.” • Most common network protocol is TCP/IP • Eg: http, ftp, smtp, telnet, ssh, https, etc.
  • 68. Properties of Protocol • Detection of the underlying physical connection (wired or wireless), • Handshaking • How to start and end a message • How to format a message • What to do with corrupted or improperly formatted messages (error correction) • How to detect unexpected loss of the connection, and what to do next • Termination of the session and or connection.
  • 69. Internetworking Models • When networks fist come in to being, computers could typically communicate with computers from the same manufacturer. In the late 1970s, the Open System Interconnection(OSI) reference model was created by the International Organization for Standardization(ISO) to break this barrier. • It is describes how data and network information are communicated.
  • 70. • A reference model is a conceptual blue print of how communications should takes place. • These processes divide into logical groups called layers.
  • 71. Provides the user interface to 7. Application communicate to the computer. Eg HTTP ----------------------------------------------------- Presents data to the 7th layer and data 6. Presentation translation like encryption, conversion ----------------------------------------------------- Manage presentation layers entities. (keep 5. Session different application data separately) ----------------------------------------------------- Performs error correction before 4. Transport retransmit.[Segments] ----------------------------------------------------- Manages the device addressing.(IP 3. Network addressing) , Routes data. [Packets] ----------------------------------------------------- Combines packets in to bytes and error 2. Data Link detection. [Frames] ----------------------------------------------------- Moves bits between devices(physical 1. Physical connection/cabling, electronic singnals) [Bits]
  • 72.
  • 73.
  • 74. Networking Hardware • Servers • Workstations • Network Interface Cards • Switches • Repeaters • Bridges • Routers
  • 76. A network server • A network server is a computer designed to process requests and deliver data to other (client) computers over a local network or the Internet. Network servers typically are configured with additional processing, memory and storage capacity to handle the load of servicing clients. Common types of network servers include: ▫ Web servers ▫ proxy servers ▫ FTP servers ▫ online game servers ▫ Mail servers
  • 80. Modem • Short for modulator-demodulator. A modem is a device or program that enables a computer to transmit data over, for example, telephone or cable lines. Computer information is stored digitally, whereas information transmitted over telephone lines is transmitted in the form of analog waves. A modem converts between these two forms.
  • 81.
  • 88. Wi-fi
  • 90. MAC Address • A MAC address, or Media Access Control address, is a 48- or 64-bit address associated with a network adapter. • While IP addresses are associated with software, MAC addresses are linked to the hardware of network adapters. • For this reason, the MAC address is sometimes called the hardware address, the burned-in address (BIA), or the physical address. MAC addresses are expressed in hexadecimal notation in the following format: 01-23-45-67-89-AB, in the case of a 48-bit address.
  • 91.
  • 92. • “An identifier for a computer or device on a TCP/IP network”. Networks using the TCP/IP protocol route messages based on the IP address of the destination. • The format of an IP address is a 32-bit numeric address written as four numbers separated by periods. Each number can be zero to 255. • For example 192.160.10.240 could be an IP address.
  • 93. What is an IP address A way to identify machines on a network A unique identifier
  • 94. IP usage Used to connect to another computer Allows transfers of files and e-mail
  • 95. IP structure IP addresses consist of four sections Each section is 8 bits long Each section can range from 0 to 255 Written, for example, 128.35.0.72
  • 96. IP structure These four sections represent the machine itself and the network it is on The network portion is assigned. The host section is determined by the network administrator
  • 97. IP structure 5 Classes of IP address A B C D and E Class A reserved for governments Class B reserved for medium companies Class C reserved for small companies
  • 98. IP structure Class D are reserved for multicasting Class E are reserved for future use
  • 99. IP structure Class A begins 1 to 126 Class B begins 128 to 191 Class C begins 192 to 223
  • 100. Reserved addresses Addresses beginning 127 are reserved for loopback and internal testing xxx.0.0.0 reserved for network address xxx.255.255.255 reserved for broadcast
  • 101. IP Addresses IP addresses are: Unique Global and Standardised Essential
  • 102.
  • 103. • Class A : 1.0.0.1 – 126.255.255.254 • Class B : 128.1.0.1 – 191.254.255.254 • Class C : 192.0.1.1 – 223.255.254.254 • Class D : 224.x.x.x (multicasting & research purposes) • Class E : 240.x.x.x (for future use)
  • 104. Current Private IP addresses as follows • Class A 10.0.0.0 through 10.255.255.255 • Class B 172.16.0.0 through 172.31.255.255 • Class C 192.168.0.0 through 192.168.255.255
  • 105.
  • 106. • IPv4 addresses have 32 bits in them and so allow a maximum of four billion addresses
  • 107. • IPv6 stands for Internet Protocol version 6. It is the second version of the Internet Protocol to be used generally across the virtual world. • IPv6 addresses have 128 bits. • IPv6 is the future of Internet addressing, mainly because industry experts believe that they are close to running out of available addresses altogether.
  • 108. • 128 bits - written as eight 16-bit hex numbers. 5f1b:df00:ce3e:e200:0020:0800:2078:e3e3
  • 109. How to Determine your IP Address? • Go to the start menu and select Run.... Then type cmd in the box and click OK. • At the C:> prompt type ipconfig. Then press Enter. Your IP address, subnet mask and default gateway will be printed on the window. • If you want more detailed information about your network connection, type ipconfig /all at the prompt. Here you can get additional information about your IP configuration.
  • 110. • For Domain Name System (or Service or Server), an Internet service that translates domain names into IP addresses. • Every time you use a domain name, therefore, a DNS service must translate the name into the corresponding IP address. Domain IP Address www.example.com > 198.105.232.4
  • 111. DNS has a table of Domain names and IP addresses. It’s map the domain name with the IP address and its route to the particular server. Domain IP Address www.yahoo.com 104.102.1.103 mail.yahoo.com 104.102.2.107
  • 112. ISP Country Regional Root .net 02 03 04 01 11 10 09 05 12 08 .com yahoo www.yahoo.com 06 104.10 07 2.1.10 3 13 yahoo server .org Domain IP Address www.yahoo.com 104.102.1.103 mail.yahoo.com 104.102.2.107
  • 113. • Short for Dynamic Host Configuration Protocol, a protocol for assigning dynamic IP addresses to devices on a network. • With dynamic addressing, a device can have a different IP address every time it connects to the network.

Editor's Notes

  1. http://info.cern.ch
  2. www.rootservers.org