SlideShare a Scribd company logo
1 of 25
By Siddharth Singh
Technical Presentation
Internetworking Models
 In 1977, the International Organization for
standardization (ISO)
 created the Open Systems Interconnection (OSI)
Reference Model.
 OSI Layer is meant for Networking manufacturers and
developers to provide them a standard based on which
they can make their products.
 All OSI Layers are independent from each other,
which makes introducing changes easier as no other
layers are effected.
Advantages of Reference Models
 Advantages of using the OSI layered model include, but
are not limited to, the following:
 Allows multiple-vendor development through
standardization of network components.
 Allows various types of network hardware and
software to communicate.
 Prevents changes in one layer from affecting other layers,
so it does not hamper development.
The OSI Reference Model
The Seven Layers of OSI
Application Layer WWW, Telnet, FTP, TFTP, E-mail,
SNMP, DNS
Presentation Layer PICT, TIFF, JPEG, MIDI, MPEG,
GIFF etc.
Session Layer RPC, SQL, NFS and NetBIOS
Transport Layer TCP, UDP and SCTP
Network Layer IP, ARP and RARP
Datalink Layer LLC (Logical Link Contol)
MAC (Media Access Control)
Physical Layer DCE and DTE
IP Subnetting
 There are loads of reasons in favor of subnetting.
Some of the benefits include:
 Reduced network traffic:- We all appreciate less traffic of
any kind. Networks are no different. Without trusty
routers, packet traffic could grind the entire network down
to a near standstill.
 Optimized network performance:- This is a result of
reduced network traffic.
 Simplified management:- It’s easier to identify and
isolate network problems in a group of smaller
connected networks than within one gigantic network.
 Facilitated spanning of large geographical distances:-
Because WAN links are considerably slower and more
expensive than LAN links, a single large network that
spans long distances can create problems in every arena
listed above.
How to Create Subnets
 To create subnetworks, you take bits from the host portion of
the IP address and reserve them to define the subnet
address.
 To determine your current requirements as well as plan for
future conditions. Follow these steps:
 Determine the number of required network IDs:
 One for each subnet
 One for each wide area network connection
 Determine the number of required host IDs per subnet:
 One for each TCP/IP host
 One for each router interface
 Based on the above requirement, create the following:
 One subnet mask for your entire network
 A unique subnet ID for each physical segment
 A range of host IDs for each subnet
Subnet Masks
 A subnet mask is a 32-bit value that allows the
recipient of IP packets to distinguish the network ID
portion of the IP address from the host ID portion of
the IP address.
 The default subnet masks for Classes A, B, and C.
These default masks cannot change.
 Default Subnet Mask
Class Format Default Subnet Mask
A network.node.node.node 255.0.0.0
B network.network.node.node 255.255.0.0
C network.network.network.node 255.255.255.0
Classless Inter-Domain Routing
(CIDR)
 It’s basically the method that ISPs (Internet
Service Providers) use to allocate an amount of
addresses to a company, a home—a customer.
 They provide addresses in a certain block size which
looks something like this: 192.168.10.32/28. This tell
you what is your subnet mask.
 For example a Class A default subnet mask is 255.0.0.0.
This means that the first byte of the subnet mask is all
ones (1s) or 11111111.
RAID Systems
 Redundant Array of Inexpensive Disks
 Basic idea is to connect multiple disks together to
provide
 large storage capacity
 faster access to reading data
 redundant data
 Many different levels of RAID systems
 differing levels of redundancy, error checking,
capacity, and cost
RAID Level-0 (Striping)
• Take file data and map it to different
disks
• Allows for reading data in parallel
file data block 1block 0 block 2 block 3
Disk 0 Disk 1 Disk 2 Disk 3
Parity
 Way to do error checking and correction
 Add up all the bits that are 1
 if even number, set parity bit to 0
 if odd number, set parity bit to 1
 To actually implement this, do an exclusive OR of
all the bits being considered
 Consider the following 2 bytes
byte parity
10110011 1
01101010 0
 If a single bit is bad, it is possible to correct it
Mirroring
 Keep to copies of data on two separate disks
 Gives good error recovery
 if some data is lost, get it from the other source
 Expensive
 requires twice as many disks
 Write performance can be slow
 have to write data to two different spots
 Read performance is enhanced
 can read data from file in parallel
RAID Level-1
 A complete file is stored on a single disk
 A second disk contains an exact copy of the
file
 Provides complete redundancy of data
 Read performance can be improved
 file data can be read in parallel
 Write performance suffers
 must write the data out twice
 Most expensive RAID implementation
 requires twice as much storage space
RAID Level-2
 Stripes data across disks similar to Level-0
 difference is data is bit interleaved instead of block
interleaved
 Uses ECC to monitor correctness of information
on disk
 Multiple disks record the ECC information to
determine which disk is in fault
 A parity disk is then used to reconstruct corrupted
or lost data
RAID Level-3
 One big problem with Level-2 are the disks
needed to detect which disk had an error
 Modern disks can already determine if there is an
error
 using ECC codes with each sector
 So just need to include a parity disk
 if a sector is bad, the disk itself tells us, and use the
parity disk to correct it
RAID Level-4
 Still use a single disk for parity
 Now the parity is calculated over data from
multiple blocks
 Level-2,3 calculate it over a single block
 If an error detected, need to read other blocks on
other disks to reconstruct data
RAID Level-5
 Level-5 stripes file data and check data over all
the disks
 no longer a single check disk
 no more write bottleneck
 Drastically improves the performance of multiple
writes
 they can now be done in parallel
 Slightly improves reads
 one more disk to use for reading
Active Directory (AD)
 Active Directory (AD) is a Microsoft technology
used to manage computers and other devices on
a network. It is a primary feature of Windows
Server, an operating system that runs both local
and Internet-based servers.
Benefits of Active Directory
 Hierarchical organizational structure.
 Multimaster Authentication & Multimaster
replication (the ability to access and modify AD
DS from multiple
points of administration)
 A single point of access to network resources.
 Ability to create trust relationships with external
networks running previous versions of Active
Directory and even Unix.
DNS
 The “Domain Name System”
 What Internet users use to reference anything by
name on the Internet
 The mechanism by which Internet software
translates names to attributes such as addresses
 DNS Port No 53
The Name Space
 The name space is the structure of the DNS database
 An inverted tree with the root node at the top
 Each node has a label
 The root node has a null label, written as “”
third-level node
second-level node second-level node
top-level node
third-level node third-level node
second-level node
top-level node
second-level node second-level node
top-level node
The root node
""
Domain Names
 A domain name is the sequence of labels from a node to the root,
separated by dots (“.”s), read left to right
 The name space has a maximum depth of 127 levels
 Domain names are limited to 255 characters in length
 A node’s domain name identifies its position in the name space
dakota
west
tornado
east www
nominum metainfo
com
berkeley nwu
edu gov
nato
int
army
mil
uu
net org
""
DHCP
 Dynamic Host Configuration Protocol
 Used for dynamic allocation of IP addresses
 used for hosts that run only client applications
 Allows for host-specific configuration parameters to
be delivered from a DHCP server to a host
 DHCP can also be used to convey permanent
IP address assignments to hosts
 Server interfaces need permanent addresses
because clients need to be able to reach them
 Also, router interfaces should have permanent
addresses for stability of routing data
IOPS (input/output operations per
second)
 IOPS is frequently referenced by storage vendors
to characterize performance in solid-state drives
(SSD), hard disk drives (HDD) and storage area
networks. However, an IOPS number is not an
actual benchmark, and numbers promoted by
vendors may not correspond to real-world
performance.
Regards, Siddharth Singh
Email ID : siddharth.3@yahoo.com
Thank You

More Related Content

What's hot

basic linux command (questions)
basic linux command (questions)basic linux command (questions)
basic linux command (questions)Sukhraj Singh
 
Soft skill-( ICT)part-1
Soft skill-( ICT)part-1Soft skill-( ICT)part-1
Soft skill-( ICT)part-1balvant1973
 
12 introduction to Linux OS
12 introduction to Linux OS12 introduction to Linux OS
12 introduction to Linux OSHameda Hurmat
 
Presentation on nfs,afs,vfs
Presentation on nfs,afs,vfsPresentation on nfs,afs,vfs
Presentation on nfs,afs,vfsPrakriti Dubey
 
Linux fundamentals
Linux fundamentalsLinux fundamentals
Linux fundamentalsRaghu nath
 
Driver Programming Report
Driver Programming ReportDriver Programming Report
Driver Programming ReportShivek Khurana
 
linux file sysytem& input and output
linux file sysytem& input and outputlinux file sysytem& input and output
linux file sysytem& input and outputMythiliA5
 
It04 roshan basnet
It04 roshan basnetIt04 roshan basnet
It04 roshan basnetrosu555
 
From Drives to URLs
From Drives to URLsFrom Drives to URLs
From Drives to URLsadil raja
 
Chapter09 -- networking with unix and linux
Chapter09  -- networking with unix and linuxChapter09  -- networking with unix and linux
Chapter09 -- networking with unix and linuxRaja Waseem Akhtar
 
Dynamic Domain Name System
Dynamic Domain Name SystemDynamic Domain Name System
Dynamic Domain Name SystemRajan Kumar
 
Presentation1 linux os
Presentation1 linux osPresentation1 linux os
Presentation1 linux osjoycoronado
 
Samsung DeepSort
Samsung DeepSortSamsung DeepSort
Samsung DeepSortRyo Jin
 

What's hot (20)

basic linux command (questions)
basic linux command (questions)basic linux command (questions)
basic linux command (questions)
 
Soft skill-( ICT)part-1
Soft skill-( ICT)part-1Soft skill-( ICT)part-1
Soft skill-( ICT)part-1
 
12 introduction to Linux OS
12 introduction to Linux OS12 introduction to Linux OS
12 introduction to Linux OS
 
Presentation on nfs,afs,vfs
Presentation on nfs,afs,vfsPresentation on nfs,afs,vfs
Presentation on nfs,afs,vfs
 
Linux fundamentals
Linux fundamentalsLinux fundamentals
Linux fundamentals
 
Interview Questions
Interview QuestionsInterview Questions
Interview Questions
 
Ch01
Ch01Ch01
Ch01
 
Driver Programming Report
Driver Programming ReportDriver Programming Report
Driver Programming Report
 
linux file sysytem& input and output
linux file sysytem& input and outputlinux file sysytem& input and output
linux file sysytem& input and output
 
It04 roshan basnet
It04 roshan basnetIt04 roshan basnet
It04 roshan basnet
 
From Drives to URLs
From Drives to URLsFrom Drives to URLs
From Drives to URLs
 
Presentation on linux
Presentation on linuxPresentation on linux
Presentation on linux
 
Chapter09 -- networking with unix and linux
Chapter09  -- networking with unix and linuxChapter09  -- networking with unix and linux
Chapter09 -- networking with unix and linux
 
Dynamic Domain Name System
Dynamic Domain Name SystemDynamic Domain Name System
Dynamic Domain Name System
 
Presentation1 linux os
Presentation1 linux osPresentation1 linux os
Presentation1 linux os
 
Case study
Case studyCase study
Case study
 
Samsung DeepSort
Samsung DeepSortSamsung DeepSort
Samsung DeepSort
 
Unix ppt
Unix pptUnix ppt
Unix ppt
 
Linux seminar
Linux seminarLinux seminar
Linux seminar
 
prateekporwal
prateekporwalprateekporwal
prateekporwal
 

Similar to Technical presentation

Syllabus for interview
Syllabus for  interviewSyllabus for  interview
Syllabus for interviewSwapnil Kapate
 
Mcse notes
Mcse notesMcse notes
Mcse notesvrammn
 
Oracle Real Application Cluster ( RAC )
Oracle Real Application Cluster ( RAC )Oracle Real Application Cluster ( RAC )
Oracle Real Application Cluster ( RAC )varasteh65
 
Ctive directory interview question and answers
Ctive directory interview question and answersCtive directory interview question and answers
Ctive directory interview question and answerssankar palla
 
My top 22-windows-server-interview-questions
My top 22-windows-server-interview-questionsMy top 22-windows-server-interview-questions
My top 22-windows-server-interview-questionsRishi Shrivastava
 
Desktop interview qestions & answer
Desktop interview qestions & answerDesktop interview qestions & answer
Desktop interview qestions & answermandarshetye45
 
I/O System and Case study
I/O System and Case studyI/O System and Case study
I/O System and Case studyLavanya G
 
Lecture 4 -_internet_infrastructure_2_updated_2011
Lecture 4 -_internet_infrastructure_2_updated_2011Lecture 4 -_internet_infrastructure_2_updated_2011
Lecture 4 -_internet_infrastructure_2_updated_2011Serious_SamSoul
 
Server interview[1]
Server interview[1]Server interview[1]
Server interview[1]sourav nanda
 
Osi & ip presentation
Osi & ip presentationOsi & ip presentation
Osi & ip presentationMonika Vijay
 

Similar to Technical presentation (20)

Mcse notes
Mcse notesMcse notes
Mcse notes
 
Syllabus for interview
Syllabus for  interviewSyllabus for  interview
Syllabus for interview
 
Mcse notes
Mcse notesMcse notes
Mcse notes
 
Raid
Raid Raid
Raid
 
Raid and its levels
Raid and its levelsRaid and its levels
Raid and its levels
 
Oracle Real Application Cluster ( RAC )
Oracle Real Application Cluster ( RAC )Oracle Real Application Cluster ( RAC )
Oracle Real Application Cluster ( RAC )
 
Ctive directory interview question and answers
Ctive directory interview question and answersCtive directory interview question and answers
Ctive directory interview question and answers
 
Operation System
Operation SystemOperation System
Operation System
 
My top 22-windows-server-interview-questions
My top 22-windows-server-interview-questionsMy top 22-windows-server-interview-questions
My top 22-windows-server-interview-questions
 
Desktop interview qestions & answer
Desktop interview qestions & answerDesktop interview qestions & answer
Desktop interview qestions & answer
 
Raid
RaidRaid
Raid
 
I/O System and Case study
I/O System and Case studyI/O System and Case study
I/O System and Case study
 
Operating system ppt
Operating system pptOperating system ppt
Operating system ppt
 
Operating system ppt
Operating system pptOperating system ppt
Operating system ppt
 
Operating system ppt
Operating system pptOperating system ppt
Operating system ppt
 
Operating system ppt
Operating system pptOperating system ppt
Operating system ppt
 
Lecture 4 -_internet_infrastructure_2_updated_2011
Lecture 4 -_internet_infrastructure_2_updated_2011Lecture 4 -_internet_infrastructure_2_updated_2011
Lecture 4 -_internet_infrastructure_2_updated_2011
 
os
osos
os
 
Server interview[1]
Server interview[1]Server interview[1]
Server interview[1]
 
Osi & ip presentation
Osi & ip presentationOsi & ip presentation
Osi & ip presentation
 

Recently uploaded

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 

Technical presentation

  • 2. Internetworking Models  In 1977, the International Organization for standardization (ISO)  created the Open Systems Interconnection (OSI) Reference Model.  OSI Layer is meant for Networking manufacturers and developers to provide them a standard based on which they can make their products.  All OSI Layers are independent from each other, which makes introducing changes easier as no other layers are effected.
  • 3. Advantages of Reference Models  Advantages of using the OSI layered model include, but are not limited to, the following:  Allows multiple-vendor development through standardization of network components.  Allows various types of network hardware and software to communicate.  Prevents changes in one layer from affecting other layers, so it does not hamper development.
  • 4. The OSI Reference Model The Seven Layers of OSI Application Layer WWW, Telnet, FTP, TFTP, E-mail, SNMP, DNS Presentation Layer PICT, TIFF, JPEG, MIDI, MPEG, GIFF etc. Session Layer RPC, SQL, NFS and NetBIOS Transport Layer TCP, UDP and SCTP Network Layer IP, ARP and RARP Datalink Layer LLC (Logical Link Contol) MAC (Media Access Control) Physical Layer DCE and DTE
  • 5. IP Subnetting  There are loads of reasons in favor of subnetting. Some of the benefits include:  Reduced network traffic:- We all appreciate less traffic of any kind. Networks are no different. Without trusty routers, packet traffic could grind the entire network down to a near standstill.  Optimized network performance:- This is a result of reduced network traffic.  Simplified management:- It’s easier to identify and isolate network problems in a group of smaller connected networks than within one gigantic network.  Facilitated spanning of large geographical distances:- Because WAN links are considerably slower and more expensive than LAN links, a single large network that spans long distances can create problems in every arena listed above.
  • 6. How to Create Subnets  To create subnetworks, you take bits from the host portion of the IP address and reserve them to define the subnet address.  To determine your current requirements as well as plan for future conditions. Follow these steps:  Determine the number of required network IDs:  One for each subnet  One for each wide area network connection  Determine the number of required host IDs per subnet:  One for each TCP/IP host  One for each router interface  Based on the above requirement, create the following:  One subnet mask for your entire network  A unique subnet ID for each physical segment  A range of host IDs for each subnet
  • 7. Subnet Masks  A subnet mask is a 32-bit value that allows the recipient of IP packets to distinguish the network ID portion of the IP address from the host ID portion of the IP address.  The default subnet masks for Classes A, B, and C. These default masks cannot change.  Default Subnet Mask Class Format Default Subnet Mask A network.node.node.node 255.0.0.0 B network.network.node.node 255.255.0.0 C network.network.network.node 255.255.255.0
  • 8. Classless Inter-Domain Routing (CIDR)  It’s basically the method that ISPs (Internet Service Providers) use to allocate an amount of addresses to a company, a home—a customer.  They provide addresses in a certain block size which looks something like this: 192.168.10.32/28. This tell you what is your subnet mask.  For example a Class A default subnet mask is 255.0.0.0. This means that the first byte of the subnet mask is all ones (1s) or 11111111.
  • 9. RAID Systems  Redundant Array of Inexpensive Disks  Basic idea is to connect multiple disks together to provide  large storage capacity  faster access to reading data  redundant data  Many different levels of RAID systems  differing levels of redundancy, error checking, capacity, and cost
  • 10. RAID Level-0 (Striping) • Take file data and map it to different disks • Allows for reading data in parallel file data block 1block 0 block 2 block 3 Disk 0 Disk 1 Disk 2 Disk 3
  • 11. Parity  Way to do error checking and correction  Add up all the bits that are 1  if even number, set parity bit to 0  if odd number, set parity bit to 1  To actually implement this, do an exclusive OR of all the bits being considered  Consider the following 2 bytes byte parity 10110011 1 01101010 0  If a single bit is bad, it is possible to correct it
  • 12. Mirroring  Keep to copies of data on two separate disks  Gives good error recovery  if some data is lost, get it from the other source  Expensive  requires twice as many disks  Write performance can be slow  have to write data to two different spots  Read performance is enhanced  can read data from file in parallel
  • 13. RAID Level-1  A complete file is stored on a single disk  A second disk contains an exact copy of the file  Provides complete redundancy of data  Read performance can be improved  file data can be read in parallel  Write performance suffers  must write the data out twice  Most expensive RAID implementation  requires twice as much storage space
  • 14. RAID Level-2  Stripes data across disks similar to Level-0  difference is data is bit interleaved instead of block interleaved  Uses ECC to monitor correctness of information on disk  Multiple disks record the ECC information to determine which disk is in fault  A parity disk is then used to reconstruct corrupted or lost data
  • 15. RAID Level-3  One big problem with Level-2 are the disks needed to detect which disk had an error  Modern disks can already determine if there is an error  using ECC codes with each sector  So just need to include a parity disk  if a sector is bad, the disk itself tells us, and use the parity disk to correct it
  • 16. RAID Level-4  Still use a single disk for parity  Now the parity is calculated over data from multiple blocks  Level-2,3 calculate it over a single block  If an error detected, need to read other blocks on other disks to reconstruct data
  • 17. RAID Level-5  Level-5 stripes file data and check data over all the disks  no longer a single check disk  no more write bottleneck  Drastically improves the performance of multiple writes  they can now be done in parallel  Slightly improves reads  one more disk to use for reading
  • 18. Active Directory (AD)  Active Directory (AD) is a Microsoft technology used to manage computers and other devices on a network. It is a primary feature of Windows Server, an operating system that runs both local and Internet-based servers.
  • 19. Benefits of Active Directory  Hierarchical organizational structure.  Multimaster Authentication & Multimaster replication (the ability to access and modify AD DS from multiple points of administration)  A single point of access to network resources.  Ability to create trust relationships with external networks running previous versions of Active Directory and even Unix.
  • 20. DNS  The “Domain Name System”  What Internet users use to reference anything by name on the Internet  The mechanism by which Internet software translates names to attributes such as addresses  DNS Port No 53
  • 21. The Name Space  The name space is the structure of the DNS database  An inverted tree with the root node at the top  Each node has a label  The root node has a null label, written as “” third-level node second-level node second-level node top-level node third-level node third-level node second-level node top-level node second-level node second-level node top-level node The root node ""
  • 22. Domain Names  A domain name is the sequence of labels from a node to the root, separated by dots (“.”s), read left to right  The name space has a maximum depth of 127 levels  Domain names are limited to 255 characters in length  A node’s domain name identifies its position in the name space dakota west tornado east www nominum metainfo com berkeley nwu edu gov nato int army mil uu net org ""
  • 23. DHCP  Dynamic Host Configuration Protocol  Used for dynamic allocation of IP addresses  used for hosts that run only client applications  Allows for host-specific configuration parameters to be delivered from a DHCP server to a host  DHCP can also be used to convey permanent IP address assignments to hosts  Server interfaces need permanent addresses because clients need to be able to reach them  Also, router interfaces should have permanent addresses for stability of routing data
  • 24. IOPS (input/output operations per second)  IOPS is frequently referenced by storage vendors to characterize performance in solid-state drives (SSD), hard disk drives (HDD) and storage area networks. However, an IOPS number is not an actual benchmark, and numbers promoted by vendors may not correspond to real-world performance.
  • 25. Regards, Siddharth Singh Email ID : siddharth.3@yahoo.com Thank You