SlideShare a Scribd company logo
1 of 31
1
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Introduction to
Networks
AlBaha University
Faculty of Computer Science and Information Technology
Department of computer Science
Prof. Rahmat Budiarto
Email: rahmat@bu.edu.sa
2
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Communicating in a Connected World
What is the Network?
• Are you Online?
• For most of us, the Internet has become a large part of everyday life.
 Who owns the Internet?
• No one owns the Internet.
• It is a worldwide collection of
interconnected networks exchanging
information using common standards
over telephone wires, fiber-optic
cables, wireless transmissions, and
satellite links.
2
3
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Networking Today
Technology Then and Now
•We live in a world we barely imagined 20 years ago.
•What wouldn’t we have without the Internet?
•What will be possible in the future using the network as the platform?
3
4
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Networking Today
No Boundaries
•Advancements in networking technologies are helping create a world without
boundaries.
•The immediate nature of communications over the Internet encourages global
communities.
4
5
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Networking Today
Networks Support the Way We Learn
 Do you remember sitting in a classroom, like this?
 You don't have to be in school anymore to take a class. You don't have to be in a
classroom to have a teacher.
5
6
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Networking Today
Networks Support the Way We Work
•The globalization of the Internet has empowered individuals to create
information that can be accessed globally.
• Forms of communication:
•Texting
•Instant Messaging (IM)
•Social Media
•Collaboration Tools
•Blogs
• Wiki
•Podcasting
• Data networks have evolved into helping support the way we work.
• Online learning opportunities decrease costly and time consuming
travel.
• Employee training is becoming more cost effective.
6
7
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Networking Today
Networks Support the Way We Play
•We listen to music, watch movies, read books, and download material
for future offline access.
•Networks allow online gaming in ways that were not possible 20 years
ago.
•Offline activities have also been enhanced by networks including global
communities for a wide range of hobbies and interests.
7
8
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
 All communication methods have three elements in common:
• Source or sender
• Destination or receiver
• Channel or media
 Rules or protocols govern all methods of communication.
The Rules
Communication Fundamentals
8
9
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
 Protocols are necessary for effective communication and include:
• An identified sender and receiver
• Common language and grammar
• Speed and timing of delivery
• Confirmation or acknowledgment requirements
 Protocols used in network communications also define:
• Message encoding
• Message Formatting and Encapsulation
• Message Size
• Message Timing
• Message delivery options
The Rules
Rule Establishment
9
10
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Providing Resources in a Network
Networks of Many Sizes (Scalable…)
•Small Home Networks – connect a
few computers to each other and the
Internet
•Small Office/Home Office – enables
computer within a home or remote
office to connect to a corporate
network
•Medium to Large Networks – many
locations with hundreds or thousands
of interconnected computers
•World Wide Networks – connects
hundreds of millions of computers
world-wide – such as the Internet 10
11
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
LANs and WANs
Types of Networks
Two most common types of networks:
•Local Area Network (LAN) – spans a
small geographic area owned or
operated by an individual or IT
department.
•Wide Area Network (WAN) – spans a
large geographic area typically
involving a telecommunications service
provider.
•Other types of networks:
•Metropolitan Area Network
(MAN)
•Wireless LAN (WLAN)
•Storage Area Network (SAN) 11
12
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
LANs and WANs
Local Area Networks
•Three characteristics of LANs:
•Spans a small geographic area
such as a home, school, office
building, or campus.
•Usually administered by a single
organization or individual.
•Provides high speed bandwidth to
end and intermediary devices
within the network.
13
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
LANs and WANs
Wide Area Networks
Three characteristics of WANs:
•WANs interconnect LANs over
wide geographical areas such as
between cities, states, or
countries.
•Usually administered by multiple
service providers.
•WANs typically provide slower
speed links between LANs.
14
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
The Internet, Intranets, and Extranets
The Internet
•The Internet is a worldwide collection
of interconnected LANs and WANs.
•LANs are connected to each other
using WANs.
•WANs are then connected to each
other using copper wires, fiber optic
cables, and wireless transmissions.
15
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
The Internet, Intranets, and Extranets
Intranets and Extranets
•Unlike the Internet, an intranet is a
private collection of LANs and WANs
internal to an organization that is meant
to be accessible only to the
organizations members or others with
authorization.
•An organization might use an extranet
to provide secure access to their
network for individuals who work for a
different organization that need access
to their data on their network.
16
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Internet Connections
Internet Access Technologies
There are many ways to connect users and
organizations to the Internet:
•Popular services for home users and
small offices include broadband cable,
broadband digital subscriber line
(DSL), wireless WANs, and mobile
services.
•Organizations need faster connections
to support IP phones, video
conferencing and data center storage.
•Business-class interconnections are
usually provided by service providers
(SP) and may include: business DSL,
leased lines, and Metro Ethernet.
17
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Internet Connections
Home and Small Office Internet Connections
•Cable – high bandwidth, always on,
Internet connection offered by cable
television service providers.
•DSL – high bandwidth, always on, Internet
connection that runs over a telephone line.
•Cellular – uses a cell phone network to
connect to the Internet; only available where
you can get a cellular signal.
•Satellite – major benefit to rural areas
without Internet Service Providers.
•Dial-up telephone – an inexpensive, low
bandwidth option using a modem.
18
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Network Components
Topology Diagrams
Note the key differences between the two topology diagrams (physical location of
devices vs. ports and network addressing schemes)
19
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Providing Resources in a Network
Clients and Servers
•Every computer connected to a network is called a
host or end device.
•Servers are computers that provide information to
end devices on the network. For example, email
servers, web servers, or file server
•Clients are computers that send requests to the
servers to retrieve information such as a web page
from a web server or email from an email server.
19
20
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Providing Resources in a Network
Peer-to-Peer
•Client and server software usually run on separate computers.
•However, in small businesses or homes, it is typical for a client to also
function as the server. These networks are called peer-to-peer networks.
•Peer-to-peer networking advantages: easy to set up, less complex, and
lower cost.
•Disadvantages: no centralized administration, not as secure, not scalable,
and slower performance.
20
21
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Network Components
Overview of Network Components
•A network can be as simple as a single cable connecting two computers or
as complex as a collection of networks that span the globe.
•Network infrastructure contains three broad categories of network
components:
•Devices
•Media
•Services
21
22
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Network Components
End Devices
•End Devices
•An end device is where a message originates from or where it is
received.
•Data originates with an end device, flows through the network, and
arrives at an end device
22
23
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Network Components
Intermediary Network Devices
•An intermediary device interconnects end devices in a network. Examples include:
switches, wireless access points, routers, and firewalls.
•The management of data as it flows through a network is also the role of an intermediary
device including:
•Regenerate and retransmit data signals.
•Maintain information about what pathways exist through the network and
internetwork.
•Notify other devices of errors and communication failures.
23
24
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Network Components
Intermediary Network Devices
•An intermediary device interconnects end devices in a network. Examples include:
switches, wireless access points, routers, and firewalls.
•The management of data as it flows through a network is also the role of an intermediary
device including:
•Regenerate and retransmit data signals.
•Maintain information about what pathways exist through the network and
internetwork.
•Notify other devices of errors and communication failures.
24
25
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Network Components
Network Media
•Communication across a network is carried
through a medium which allows a message to
travel from source to destination.
•Networks typically use three types of media:
•Metallic wires within cables, such as copper
•Glass, such as fiber optic cables
•Wireless transmission
25
26
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Network Components
Network Media
•Network diagrams, often called topology diagrams, use symbols to represent devices
within the network.
26
27
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Modern Telco Network
PLMN : Public Land to Mobile
UTRAN: UMTS Terrestrial Radio Access Network
UMTS : Universal Mobile Telecommunications System
GSM-BSS: Global System for Mobile communication-
Base Station Subsystem
GMSC: Gateway Mobile Switching Centre
GGSN: Gateway GPRS Support Node
MGW : Voice Gateway
MSC : Server: Mobile Switching Station (2G)
RBS : Radio Base Station
RNC : Radio Network Controller
BSC : Base Station controller
Network Convergence… to IP network
Voice, Data, Video
28
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Modern Broadcasting Network
CNN, BBC, NHK on Mobile Devices
29
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
4G Technology
- was introduced in 2011.
- Its major characteristics are −
• Speeds of 100 Mbps to 1 Gbps
• Mobile web access
• High definition mobile TV
• Cloud computing
• IP telephony
5G Technology
• Up to 10Gbps data rate - > 10 to 100x speed improvement
over 4G and 4.5G networks.
• 1-millisecond latency.
• 1000x bandwidth per unit area.
• Up to 100x number of connected devices per unit area
(compared with 4G LTE)
• 99.999% availability.
• 100% coverage.
• 90% reduction in network energy usage.
30
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
31
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
‫شكرا‬

More Related Content

Similar to Lecture-1.pptx

CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01Irsandi Hasan
 
ITN_Module_1.pptx
ITN_Module_1.pptxITN_Module_1.pptx
ITN_Module_1.pptxNguynVngQuc
 
Computer Networks - 01.pptx powerpoint presentation
Computer Networks - 01.pptx powerpoint presentationComputer Networks - 01.pptx powerpoint presentation
Computer Networks - 01.pptx powerpoint presentationmatsbultynck
 
Networking Today Chapter 1 Networking Today Chapter 1
Networking Today  Chapter 1 Networking Today  Chapter 1Networking Today  Chapter 1 Networking Today  Chapter 1
Networking Today Chapter 1 Networking Today Chapter 1TnNguyn57021
 
Hardware and Software requirements for Internet 2.pptx
Hardware and Software requirements for Internet 2.pptxHardware and Software requirements for Internet 2.pptx
Hardware and Software requirements for Internet 2.pptxRbalasubramani
 
Hardware and Software requirements for Internet 2.pptx
Hardware and Software requirements for Internet 2.pptxHardware and Software requirements for Internet 2.pptx
Hardware and Software requirements for Internet 2.pptxlisbala
 
CNv6_instructorPPT_Chapter1.pptx
CNv6_instructorPPT_Chapter1.pptxCNv6_instructorPPT_Chapter1.pptx
CNv6_instructorPPT_Chapter1.pptxEnockAnderson
 
CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11Irsandi Hasan
 
Networking Essentials jsdsdcjsdcdscdscsdc
Networking Essentials jsdsdcjsdcdscdscsdcNetworking Essentials jsdsdcjsdcdscdscsdc
Networking Essentials jsdsdcjsdcdscdscsdcmaneeshs10
 
M1-C17-Armando una red.pptx
M1-C17-Armando una red.pptxM1-C17-Armando una red.pptx
M1-C17-Armando una red.pptxAngel Garcia
 
17 - Building small network.pdf
17 - Building small network.pdf17 - Building small network.pdf
17 - Building small network.pdfPhiliphaHaldline
 
ITN_Module_17.pptx
ITN_Module_17.pptxITN_Module_17.pptx
ITN_Module_17.pptxssuserf7cd2b
 
computer networks
computer networkscomputer networks
computer networksdee_rosal
 
tia11e_ch07_ppt_author_revised.pptx
tia11e_ch07_ppt_author_revised.pptxtia11e_ch07_ppt_author_revised.pptx
tia11e_ch07_ppt_author_revised.pptxAryanBhargava7
 

Similar to Lecture-1.pptx (20)

ITN_Module_1.pdf
ITN_Module_1.pdfITN_Module_1.pdf
ITN_Module_1.pdf
 
CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01
 
Itn module 1
Itn module 1Itn module 1
Itn module 1
 
ITN_Module_1.pptx
ITN_Module_1.pptxITN_Module_1.pptx
ITN_Module_1.pptx
 
Computer Networks - 01.pptx powerpoint presentation
Computer Networks - 01.pptx powerpoint presentationComputer Networks - 01.pptx powerpoint presentation
Computer Networks - 01.pptx powerpoint presentation
 
Lecture 1.pptx
Lecture 1.pptxLecture 1.pptx
Lecture 1.pptx
 
ITE7_Chp5.pptx
ITE7_Chp5.pptxITE7_Chp5.pptx
ITE7_Chp5.pptx
 
Networking Today Chapter 1 Networking Today Chapter 1
Networking Today  Chapter 1 Networking Today  Chapter 1Networking Today  Chapter 1 Networking Today  Chapter 1
Networking Today Chapter 1 Networking Today Chapter 1
 
Hardware and Software requirements for Internet 2.pptx
Hardware and Software requirements for Internet 2.pptxHardware and Software requirements for Internet 2.pptx
Hardware and Software requirements for Internet 2.pptx
 
Hardware and Software requirements for Internet 2.pptx
Hardware and Software requirements for Internet 2.pptxHardware and Software requirements for Internet 2.pptx
Hardware and Software requirements for Internet 2.pptx
 
ITE7_Chp5.pptx
ITE7_Chp5.pptxITE7_Chp5.pptx
ITE7_Chp5.pptx
 
INT 1010 06-4.pdf
INT 1010 06-4.pdfINT 1010 06-4.pdf
INT 1010 06-4.pdf
 
CNv6_instructorPPT_Chapter1.pptx
CNv6_instructorPPT_Chapter1.pptxCNv6_instructorPPT_Chapter1.pptx
CNv6_instructorPPT_Chapter1.pptx
 
CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11
 
Networking Essentials jsdsdcjsdcdscdscsdc
Networking Essentials jsdsdcjsdcdscdscsdcNetworking Essentials jsdsdcjsdcdscdscsdc
Networking Essentials jsdsdcjsdcdscdscsdc
 
M1-C17-Armando una red.pptx
M1-C17-Armando una red.pptxM1-C17-Armando una red.pptx
M1-C17-Armando una red.pptx
 
17 - Building small network.pdf
17 - Building small network.pdf17 - Building small network.pdf
17 - Building small network.pdf
 
ITN_Module_17.pptx
ITN_Module_17.pptxITN_Module_17.pptx
ITN_Module_17.pptx
 
computer networks
computer networkscomputer networks
computer networks
 
tia11e_ch07_ppt_author_revised.pptx
tia11e_ch07_ppt_author_revised.pptxtia11e_ch07_ppt_author_revised.pptx
tia11e_ch07_ppt_author_revised.pptx
 

Recently uploaded

main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 

Recently uploaded (20)

main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 

Lecture-1.pptx

  • 1. 1 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Introduction to Networks AlBaha University Faculty of Computer Science and Information Technology Department of computer Science Prof. Rahmat Budiarto Email: rahmat@bu.edu.sa
  • 2. 2 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Communicating in a Connected World What is the Network? • Are you Online? • For most of us, the Internet has become a large part of everyday life.  Who owns the Internet? • No one owns the Internet. • It is a worldwide collection of interconnected networks exchanging information using common standards over telephone wires, fiber-optic cables, wireless transmissions, and satellite links. 2
  • 3. 3 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Networking Today Technology Then and Now •We live in a world we barely imagined 20 years ago. •What wouldn’t we have without the Internet? •What will be possible in the future using the network as the platform? 3
  • 4. 4 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Networking Today No Boundaries •Advancements in networking technologies are helping create a world without boundaries. •The immediate nature of communications over the Internet encourages global communities. 4
  • 5. 5 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Networking Today Networks Support the Way We Learn  Do you remember sitting in a classroom, like this?  You don't have to be in school anymore to take a class. You don't have to be in a classroom to have a teacher. 5
  • 6. 6 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Networking Today Networks Support the Way We Work •The globalization of the Internet has empowered individuals to create information that can be accessed globally. • Forms of communication: •Texting •Instant Messaging (IM) •Social Media •Collaboration Tools •Blogs • Wiki •Podcasting • Data networks have evolved into helping support the way we work. • Online learning opportunities decrease costly and time consuming travel. • Employee training is becoming more cost effective. 6
  • 7. 7 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Networking Today Networks Support the Way We Play •We listen to music, watch movies, read books, and download material for future offline access. •Networks allow online gaming in ways that were not possible 20 years ago. •Offline activities have also been enhanced by networks including global communities for a wide range of hobbies and interests. 7
  • 8. 8 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential  All communication methods have three elements in common: • Source or sender • Destination or receiver • Channel or media  Rules or protocols govern all methods of communication. The Rules Communication Fundamentals 8
  • 9. 9 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential  Protocols are necessary for effective communication and include: • An identified sender and receiver • Common language and grammar • Speed and timing of delivery • Confirmation or acknowledgment requirements  Protocols used in network communications also define: • Message encoding • Message Formatting and Encapsulation • Message Size • Message Timing • Message delivery options The Rules Rule Establishment 9
  • 10. 10 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Providing Resources in a Network Networks of Many Sizes (Scalable…) •Small Home Networks – connect a few computers to each other and the Internet •Small Office/Home Office – enables computer within a home or remote office to connect to a corporate network •Medium to Large Networks – many locations with hundreds or thousands of interconnected computers •World Wide Networks – connects hundreds of millions of computers world-wide – such as the Internet 10
  • 11. 11 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential LANs and WANs Types of Networks Two most common types of networks: •Local Area Network (LAN) – spans a small geographic area owned or operated by an individual or IT department. •Wide Area Network (WAN) – spans a large geographic area typically involving a telecommunications service provider. •Other types of networks: •Metropolitan Area Network (MAN) •Wireless LAN (WLAN) •Storage Area Network (SAN) 11
  • 12. 12 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential LANs and WANs Local Area Networks •Three characteristics of LANs: •Spans a small geographic area such as a home, school, office building, or campus. •Usually administered by a single organization or individual. •Provides high speed bandwidth to end and intermediary devices within the network.
  • 13. 13 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential LANs and WANs Wide Area Networks Three characteristics of WANs: •WANs interconnect LANs over wide geographical areas such as between cities, states, or countries. •Usually administered by multiple service providers. •WANs typically provide slower speed links between LANs.
  • 14. 14 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential The Internet, Intranets, and Extranets The Internet •The Internet is a worldwide collection of interconnected LANs and WANs. •LANs are connected to each other using WANs. •WANs are then connected to each other using copper wires, fiber optic cables, and wireless transmissions.
  • 15. 15 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential The Internet, Intranets, and Extranets Intranets and Extranets •Unlike the Internet, an intranet is a private collection of LANs and WANs internal to an organization that is meant to be accessible only to the organizations members or others with authorization. •An organization might use an extranet to provide secure access to their network for individuals who work for a different organization that need access to their data on their network.
  • 16. 16 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Internet Connections Internet Access Technologies There are many ways to connect users and organizations to the Internet: •Popular services for home users and small offices include broadband cable, broadband digital subscriber line (DSL), wireless WANs, and mobile services. •Organizations need faster connections to support IP phones, video conferencing and data center storage. •Business-class interconnections are usually provided by service providers (SP) and may include: business DSL, leased lines, and Metro Ethernet.
  • 17. 17 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Internet Connections Home and Small Office Internet Connections •Cable – high bandwidth, always on, Internet connection offered by cable television service providers. •DSL – high bandwidth, always on, Internet connection that runs over a telephone line. •Cellular – uses a cell phone network to connect to the Internet; only available where you can get a cellular signal. •Satellite – major benefit to rural areas without Internet Service Providers. •Dial-up telephone – an inexpensive, low bandwidth option using a modem.
  • 18. 18 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Network Components Topology Diagrams Note the key differences between the two topology diagrams (physical location of devices vs. ports and network addressing schemes)
  • 19. 19 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Providing Resources in a Network Clients and Servers •Every computer connected to a network is called a host or end device. •Servers are computers that provide information to end devices on the network. For example, email servers, web servers, or file server •Clients are computers that send requests to the servers to retrieve information such as a web page from a web server or email from an email server. 19
  • 20. 20 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Providing Resources in a Network Peer-to-Peer •Client and server software usually run on separate computers. •However, in small businesses or homes, it is typical for a client to also function as the server. These networks are called peer-to-peer networks. •Peer-to-peer networking advantages: easy to set up, less complex, and lower cost. •Disadvantages: no centralized administration, not as secure, not scalable, and slower performance. 20
  • 21. 21 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Network Components Overview of Network Components •A network can be as simple as a single cable connecting two computers or as complex as a collection of networks that span the globe. •Network infrastructure contains three broad categories of network components: •Devices •Media •Services 21
  • 22. 22 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Network Components End Devices •End Devices •An end device is where a message originates from or where it is received. •Data originates with an end device, flows through the network, and arrives at an end device 22
  • 23. 23 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Network Components Intermediary Network Devices •An intermediary device interconnects end devices in a network. Examples include: switches, wireless access points, routers, and firewalls. •The management of data as it flows through a network is also the role of an intermediary device including: •Regenerate and retransmit data signals. •Maintain information about what pathways exist through the network and internetwork. •Notify other devices of errors and communication failures. 23
  • 24. 24 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Network Components Intermediary Network Devices •An intermediary device interconnects end devices in a network. Examples include: switches, wireless access points, routers, and firewalls. •The management of data as it flows through a network is also the role of an intermediary device including: •Regenerate and retransmit data signals. •Maintain information about what pathways exist through the network and internetwork. •Notify other devices of errors and communication failures. 24
  • 25. 25 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Network Components Network Media •Communication across a network is carried through a medium which allows a message to travel from source to destination. •Networks typically use three types of media: •Metallic wires within cables, such as copper •Glass, such as fiber optic cables •Wireless transmission 25
  • 26. 26 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Network Components Network Media •Network diagrams, often called topology diagrams, use symbols to represent devices within the network. 26
  • 27. 27 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Modern Telco Network PLMN : Public Land to Mobile UTRAN: UMTS Terrestrial Radio Access Network UMTS : Universal Mobile Telecommunications System GSM-BSS: Global System for Mobile communication- Base Station Subsystem GMSC: Gateway Mobile Switching Centre GGSN: Gateway GPRS Support Node MGW : Voice Gateway MSC : Server: Mobile Switching Station (2G) RBS : Radio Base Station RNC : Radio Network Controller BSC : Base Station controller Network Convergence… to IP network Voice, Data, Video
  • 28. 28 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Modern Broadcasting Network CNN, BBC, NHK on Mobile Devices
  • 29. 29 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4G Technology - was introduced in 2011. - Its major characteristics are − • Speeds of 100 Mbps to 1 Gbps • Mobile web access • High definition mobile TV • Cloud computing • IP telephony 5G Technology • Up to 10Gbps data rate - > 10 to 100x speed improvement over 4G and 4.5G networks. • 1-millisecond latency. • 1000x bandwidth per unit area. • Up to 100x number of connected devices per unit area (compared with 4G LTE) • 99.999% availability. • 100% coverage. • 90% reduction in network energy usage.
  • 30. 30 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
  • 31. 31 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential ‫شكرا‬