SlideShare a Scribd company logo
1 of 30
1
Introduction to NetworkingIntroduction to Networking
2
What is a Network?
A network consists of 2 or more computers
connected together, and they can communicate and
share resources (e.g. information)
3
Why Networking?
• Sharing information — i.e. data communication
• Do you prefer these?
• Or this?
4
• Sharing hardware or software
• Centralize administration and support
• E.g. print document
• E.g. Internet-based, so everyone can access the same
administrative or support application from their PCs
5
How many kinds of Networks?
• Depending on one’s perspective, we can classify
networks in different ways
• Based on transmission media: Wired (UTP, coaxial
cables, fiber-optic cables) and Wireless
• Based on network size: LAN and WAN (and MAN)
• Based on management method: Peer-to-peer and
Client/Server
• Based on topology (connectivity): Bus, Star, Ring …
6
Two main categories:
◦ Guided ― wires, cables
◦ Unguided ― wireless transmission, e.g. radio,
microwave, infrared, sound, sonar
We will concentrate on guided media here:
◦ Twisted-Pair cables:
Unshielded Twisted-Pair (UTP) cables
Shielded Twisted-Pair (STP) cables
◦ Coaxial cables
◦ Fiber-optic cables
6
Transmission Media
8
If the pair of wires are not twisted, electromagnetic
noises from, e.g., motors, will affect the closer wire more
than the further one, thereby causing errors
8
Twisted-Pair Cables
9
Unshielded Twisted-Pair (UTP)
Typically wrapped inside a plastic cover (for mechanical
protection)
A sample UTP cable with 5 unshielded twisted pairs of wires
9
MetalInsulator
10
Shielded Twisted-Pair
(STP)
STP cables are similar to UTP cables, except
there is a metal foil or braided-metal-mesh
cover that encases each pair of insulated
wires
10
11
Categories of UTP Cables
EIA classifies UTP cables according to the quality:
 Category 1 ― the lowest quality, only good for voice,
mainly found in very old buildings, not recommended
now
 Category 2 ― good for voice and low data rates (up to
4Mbps for low-speed token ring networks)
 Category 3 ― at least 3 twists per foot, for up to 10
Mbps (common in phone networks in residential
buildings)
 Category 4 ― up to 16 Mbps (mainly for token rings)
 Category 5 (or 5e) ― up to 100 Mbps (common for
networks targeted for high-speed data
communications)
 Category 6 ― more twists than Cat 5, up to 1 Gbps
11
12
Coaxial Cables
In general, coaxial cables, or coax, carry
signals of higher freq (100KHz–500MHz)
than UTP cables
Outer metallic wrapping serves both as a
shield against noise and as the second
conductor that completes the circuit
12
13
Fiber-Optic Cables
Light travels at 3×108
ms-1
in free space and is
the fastest possible speed in the Universe
Light slows down in denser media, e.g. glass
Refraction occurs at interface, with light
bending away from the normal when it enters
a less dense medium
Beyond the critical angle ⇒ total internal
reflection
13
14
 An optical fiber consists of a core (denser
material) and a cladding (less dense material)
 Simplest one is a multimode step-index optical
fiber
 Multimode = multiple paths, whereas step-index
= refractive index follows a step-function profile
(i.e. an abrupt change of refractive index
between the core and the cladding)
 Light bounces back and forth along the core
 Common light sources: LEDs and lasers
14
15
Advantages and
Disadvantages
 Noise resistance ― external light is blocked by
outer jacket
 Less signal attenuation ― a signal can run for
miles without regeneration (currently, the lowest
measured loss is about ~4% or 0.16dB per km)
 Higher bandwidth ― currently, limits on data rates
come from the signal generation/reception
technology, not the fiber itself
 Cost ― Optical fibers are expensive
 Installation/maintenance ― any crack in the core
will degrade the signal, and all connections must
be perfectly aligned 15
16
LAN and WAN
• Local Area Network (LAN)
• Small network, short distance
• A room, a floor, a building
• Limited by no. of computers and distance covered
• Usually one kind of technology throughout the LAN
• Serve a department within an organization
• Examples:
• Network inside the Student Computer Room
• Network inside your home
17
• Wide Area Network (WAN)
• A network that uses long-range telecommunication links
to connect 2 or more LANs/computers housed in different
places far apart.
• Towns, states, countries
• Examples:
• Network of our Campus
• Internet
WAN
Student
Computer Centre
Your home
USA
18
• Example WAN technologies:
• ISDN – Integrated Service Digital Network
• Basic rate: 192 Kbps Primary rate: 1.544Mbps
• T-Carriers ― basically digital phone lines
• T1: 1.544Mbps T3: 28×T1
• Frame relay
• Each link offers 1.544Mbps or even higher
• ATM – Asynchronous Transfer Mode
• Support B-ISDN: 155Mbps or 622Mbps or higher
• SONET – Synchronous Optical Network
• Basic rate OC1: 51.84Mbps
• Support OC12 and up to OC192 (9953.28Mbps) or
even higher in the future
19
• Example of WAN: Broadband Cable Network
• Cable TV services have been extensively developed in most
modern cities
• Cable TV companies try to make use of their coaxial cable
installed (that are supposed to carry TV signals) to deliver
broadband data services
• Many cable network wiring has been replaced with hybrid
fiber-coax (HFC) ― i.e. use of fiber-optic cable to connect
to the subscribers’ buildings, and then the original coaxial
cable to connect to each household
20
The connection is shared by a
number of subscribers, hence
may raise performance and
security problems
Fiber-optic cable
Cable companyCoaxial
Cable
TV
PC
Cable
Drop
21
• Cable is an asymmetrical technology
• Downstream: max 36 Mbps
• Upstream: max 10 Mbps
• May be reduced to 3 – 10 Mbps downstream and 2
Mbps upstream, depending on no. of subscribers
• Need a special cable modem Ethernet
link to PC
Coaxial link
from cable TV
socket
Teryon Cable Modem
22
Peer-to-Peer Networks
• Peer-to-peer network is also called workgroup
• No hierarchy among computers ⇒ all are equal
• No administrator responsible for the network
Peer-to-peer
23
• Advantages of peer-to-peer networks:
• Low cost
• Simple to configure
• User has full accessibility of the computer
• Disadvantages of peer-to-peer networks:
• May have duplication in resources
• Difficult to uphold security policy
• Difficult to handle uneven loading
• Where peer-to-peer network is appropriate:
• 10 or less users
• No specialized services required
• Security is not an issue
• Only limited growth in the foreseeable future
24
Clients and Servers
• Network ClientsClients (WorkstationWorkstation)
• Computers that request network resources or services
• Network ServersServers
• Computers that manage and provide network resources
and services to clients
• Usually have more processing power, memory and
hard disk space than clients
• Run Network Operating System that can manage not
only data, but also users, groups, security, and
applications on the network
• Servers often have a more stringent requirement on its
performance and reliability
25
• Advantages of client/server networks
• Facilitate resource sharing – centrally administrate and
control
• Facilitate system backup and improve fault tolerance
• Enhance security – only administrator can have access
to Server
• Support more users – difficult to achieve with peer-to-
peer networks
• Disadvantages of client/server networks
• High cost for Servers
• Need expert to configure the network
• Introduce a single point of failure to the system
26
Topology ― 3 basic types
• How so many computers are connected together?
Bus Topology Ring Topology
Star Topology
Hub
27
• Bus Topology
• Simple and low-cost
• A single cable called a trunk (backbone, segment)
• Only one computer can send messages at a time
• Passive topology - computer only listen for, not
regenerate data
• Star Topology
• Each computer has a cable connected to a single point
• More cabling, hence higher cost
• All signals transmission through the hub; if down, entire
network down
• Depending on the intelligence of hub, two or more
computers may send message at the same time
28
How to construct a network
with Bus / Star Topology?
Star Topology
Bus Topology
BNC T-Connector
Coaxial
cable
Network Card
29
• Ring Topology
• Every computer serves as
a repeater to boost signals
• Typical way to send data:
• Token passing
• only the computer who
gets the token can send
data
• Disadvantages
• Difficult to add computers
• More expensive
• If one computer fails, whole network fails
T
T
T
dat
a
T
dat
a
T
dat
a
T dat
a
T dat
a
T dat
a
T Ac
k
T Ac
k
T Ac
k
TAc
k
T
Introduction to Networking

More Related Content

What's hot

Subentting, Supernetting and VLSM presentation
Subentting, Supernetting and VLSM presentationSubentting, Supernetting and VLSM presentation
Subentting, Supernetting and VLSM presentationZakaria Hossain
 
Types of Networks,Network Design Issues,Design Tools
Types of Networks,Network Design Issues,Design ToolsTypes of Networks,Network Design Issues,Design Tools
Types of Networks,Network Design Issues,Design ToolsSurabhi Gosavi
 
Build internet infrastructure LO1
Build internet infrastructure LO1Build internet infrastructure LO1
Build internet infrastructure LO1Abenezer Abiti
 
CS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSCS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSKathirvel Ayyaswamy
 
CCNA Course Training Presentation
CCNA Course Training PresentationCCNA Course Training Presentation
CCNA Course Training PresentationRohit Singh
 
Rajesh basics of networking and routing
Rajesh basics of networking and routingRajesh basics of networking and routing
Rajesh basics of networking and routingr123027
 
CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4Nil Menon
 
Wi-Fi For Beginners - Module 3 - Access Points (APs)
Wi-Fi For Beginners - Module 3 - Access Points (APs)Wi-Fi For Beginners - Module 3 - Access Points (APs)
Wi-Fi For Beginners - Module 3 - Access Points (APs)Nigel Bowden
 
0 lecture 5 wp wireless protocol
0 lecture 5 wp wireless protocol0 lecture 5 wp wireless protocol
0 lecture 5 wp wireless protocolumardanjumamaiwada
 
Chapter 10 : Application layer
Chapter 10 : Application layerChapter 10 : Application layer
Chapter 10 : Application layerteknetir
 
Types of Ethernet Cable
Types of Ethernet CableTypes of Ethernet Cable
Types of Ethernet CableJoanalyn Vidal
 
Network topology and media presentation
Network topology and media presentationNetwork topology and media presentation
Network topology and media presentationhassaanashraf1
 

What's hot (20)

Subentting, Supernetting and VLSM presentation
Subentting, Supernetting and VLSM presentationSubentting, Supernetting and VLSM presentation
Subentting, Supernetting and VLSM presentation
 
Unified MPLS
Unified MPLSUnified MPLS
Unified MPLS
 
Ccna notes
Ccna notesCcna notes
Ccna notes
 
Types of Networks,Network Design Issues,Design Tools
Types of Networks,Network Design Issues,Design ToolsTypes of Networks,Network Design Issues,Design Tools
Types of Networks,Network Design Issues,Design Tools
 
Build internet infrastructure LO1
Build internet infrastructure LO1Build internet infrastructure LO1
Build internet infrastructure LO1
 
CS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSCS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKS
 
CCNA Course Training Presentation
CCNA Course Training PresentationCCNA Course Training Presentation
CCNA Course Training Presentation
 
Network
NetworkNetwork
Network
 
Rajesh basics of networking and routing
Rajesh basics of networking and routingRajesh basics of networking and routing
Rajesh basics of networking and routing
 
Ospf
 Ospf Ospf
Ospf
 
CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4
 
Wi-Fi For Beginners - Module 3 - Access Points (APs)
Wi-Fi For Beginners - Module 3 - Access Points (APs)Wi-Fi For Beginners - Module 3 - Access Points (APs)
Wi-Fi For Beginners - Module 3 - Access Points (APs)
 
Peer to peer(p2 p)
Peer to peer(p2 p)Peer to peer(p2 p)
Peer to peer(p2 p)
 
UTP and STP
UTP and STPUTP and STP
UTP and STP
 
0 lecture 5 wp wireless protocol
0 lecture 5 wp wireless protocol0 lecture 5 wp wireless protocol
0 lecture 5 wp wireless protocol
 
Chapter 10 : Application layer
Chapter 10 : Application layerChapter 10 : Application layer
Chapter 10 : Application layer
 
Network cables
Network cablesNetwork cables
Network cables
 
Types of Ethernet Cable
Types of Ethernet CableTypes of Ethernet Cable
Types of Ethernet Cable
 
Network topology and media presentation
Network topology and media presentationNetwork topology and media presentation
Network topology and media presentation
 
200 301-ccna
200 301-ccna200 301-ccna
200 301-ccna
 

Similar to Introduction to Networking

presentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.pptpresentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.pptDrPreethiD1
 
presentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.pptpresentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.pptDrPreethiD1
 
presentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.pptpresentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.pptDrPreethiD1
 
Networking presentationNetworking presentation.pptNetworking presentation.ppt...
Networking presentationNetworking presentation.pptNetworking presentation.ppt...Networking presentationNetworking presentation.pptNetworking presentation.ppt...
Networking presentationNetworking presentation.pptNetworking presentation.ppt...nesarahmad37
 
Presentation On Computer Network
Presentation On Computer NetworkPresentation On Computer Network
Presentation On Computer NetworkAvinash Ranjan
 
01 coms 525 tcpip - networking concepts review
01   coms 525 tcpip - networking concepts review01   coms 525 tcpip - networking concepts review
01 coms 525 tcpip - networking concepts reviewPalanivel Kuppusamy
 
Cyber security training at ist apr-18
Cyber security training at ist apr-18Cyber security training at ist apr-18
Cyber security training at ist apr-18Sagar Walvekar
 
Communication and Network Concepts
Communication and Network ConceptsCommunication and Network Concepts
Communication and Network ConceptsDev Chauhan
 
Computer networks basic network_hardware_1
Computer networks basic network_hardware_1Computer networks basic network_hardware_1
Computer networks basic network_hardware_1Aneesh Nelavelly
 
Data communications_Network_Model (1).pdf
Data communications_Network_Model (1).pdfData communications_Network_Model (1).pdf
Data communications_Network_Model (1).pdfSujanTimalsina5
 
Networking devices
Networking devicesNetworking devices
Networking devicesRavi KC
 

Similar to Introduction to Networking (20)

presentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.pptpresentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.ppt
 
presentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.pptpresentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.ppt
 
presentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.pptpresentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.ppt
 
osi
osi osi
osi
 
Networking presentationNetworking presentation.pptNetworking presentation.ppt...
Networking presentationNetworking presentation.pptNetworking presentation.ppt...Networking presentationNetworking presentation.pptNetworking presentation.ppt...
Networking presentationNetworking presentation.pptNetworking presentation.ppt...
 
Basic networking
Basic networkingBasic networking
Basic networking
 
Networking
NetworkingNetworking
Networking
 
presentation on type of toplogy and network
presentation on type of toplogy and networkpresentation on type of toplogy and network
presentation on type of toplogy and network
 
Computer network
Computer networkComputer network
Computer network
 
Presentation On Computer Network
Presentation On Computer NetworkPresentation On Computer Network
Presentation On Computer Network
 
01 coms 525 tcpip - networking concepts review
01   coms 525 tcpip - networking concepts review01   coms 525 tcpip - networking concepts review
01 coms 525 tcpip - networking concepts review
 
Cyber security training at ist apr-18
Cyber security training at ist apr-18Cyber security training at ist apr-18
Cyber security training at ist apr-18
 
Communication and Network Concepts
Communication and Network ConceptsCommunication and Network Concepts
Communication and Network Concepts
 
computer network 2
computer network 2computer network 2
computer network 2
 
Computer networks basic network_hardware_1
Computer networks basic network_hardware_1Computer networks basic network_hardware_1
Computer networks basic network_hardware_1
 
Network in brief
Network in briefNetwork in brief
Network in brief
 
Networks
NetworksNetworks
Networks
 
Cct203 lesson 10
Cct203 lesson 10Cct203 lesson 10
Cct203 lesson 10
 
Data communications_Network_Model (1).pdf
Data communications_Network_Model (1).pdfData communications_Network_Model (1).pdf
Data communications_Network_Model (1).pdf
 
Networking devices
Networking devicesNetworking devices
Networking devices
 

More from Mohammed Adam

Android Penetration Testing - Day 3
Android Penetration Testing - Day 3Android Penetration Testing - Day 3
Android Penetration Testing - Day 3Mohammed Adam
 
Android Penetration testing - Day 2
 Android Penetration testing - Day 2 Android Penetration testing - Day 2
Android Penetration testing - Day 2Mohammed Adam
 
Android Penetration Testing - Day 1
Android Penetration Testing - Day 1Android Penetration Testing - Day 1
Android Penetration Testing - Day 1Mohammed Adam
 
Wireless Penetration Testing
Wireless Penetration TestingWireless Penetration Testing
Wireless Penetration TestingMohammed Adam
 
Network Penetration Testing
Network Penetration TestingNetwork Penetration Testing
Network Penetration TestingMohammed Adam
 
Basic Foundation For Cybersecurity
Basic Foundation For CybersecurityBasic Foundation For Cybersecurity
Basic Foundation For CybersecurityMohammed Adam
 
Golden Ticket Attack - AD - Domain Persistence
Golden Ticket Attack - AD - Domain PersistenceGolden Ticket Attack - AD - Domain Persistence
Golden Ticket Attack - AD - Domain PersistenceMohammed Adam
 
Evading Antivirus software for fun and profit
Evading Antivirus software for fun and profitEvading Antivirus software for fun and profit
Evading Antivirus software for fun and profitMohammed Adam
 
Introduction to Network Fundamentals
Introduction to Network FundamentalsIntroduction to Network Fundamentals
Introduction to Network FundamentalsMohammed Adam
 
Breaking out of crypto authentication
Breaking out of crypto authenticationBreaking out of crypto authentication
Breaking out of crypto authenticationMohammed Adam
 
Cybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamCybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamMohammed Adam
 
Career Guidance on Cybersecurity by Mohammed Adam
Career Guidance on Cybersecurity by Mohammed AdamCareer Guidance on Cybersecurity by Mohammed Adam
Career Guidance on Cybersecurity by Mohammed AdamMohammed Adam
 
Introduction to null villupuram community
Introduction to null villupuram communityIntroduction to null villupuram community
Introduction to null villupuram communityMohammed Adam
 
BugBounty Roadmap with Mohammed Adam
BugBounty Roadmap with Mohammed AdamBugBounty Roadmap with Mohammed Adam
BugBounty Roadmap with Mohammed AdamMohammed Adam
 
Webinar On Ethical Hacking & Cybersecurity - Day2
Webinar On Ethical Hacking & Cybersecurity - Day2Webinar On Ethical Hacking & Cybersecurity - Day2
Webinar On Ethical Hacking & Cybersecurity - Day2Mohammed Adam
 
OSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurityOSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurityMohammed Adam
 
Android Application Penetration Testing - Mohammed Adam
Android Application Penetration Testing - Mohammed AdamAndroid Application Penetration Testing - Mohammed Adam
Android Application Penetration Testing - Mohammed AdamMohammed Adam
 
Vulnerability assessment & Penetration testing Basics
Vulnerability assessment & Penetration testing Basics Vulnerability assessment & Penetration testing Basics
Vulnerability assessment & Penetration testing Basics Mohammed Adam
 
What is SSL ? The Secure Sockets Layer (SSL) Protocol
What is SSL ? The Secure Sockets Layer (SSL) ProtocolWhat is SSL ? The Secure Sockets Layer (SSL) Protocol
What is SSL ? The Secure Sockets Layer (SSL) ProtocolMohammed Adam
 

More from Mohammed Adam (20)

Android Penetration Testing - Day 3
Android Penetration Testing - Day 3Android Penetration Testing - Day 3
Android Penetration Testing - Day 3
 
Android Penetration testing - Day 2
 Android Penetration testing - Day 2 Android Penetration testing - Day 2
Android Penetration testing - Day 2
 
Android Penetration Testing - Day 1
Android Penetration Testing - Day 1Android Penetration Testing - Day 1
Android Penetration Testing - Day 1
 
Wireless Penetration Testing
Wireless Penetration TestingWireless Penetration Testing
Wireless Penetration Testing
 
Network Penetration Testing
Network Penetration TestingNetwork Penetration Testing
Network Penetration Testing
 
Basic Foundation For Cybersecurity
Basic Foundation For CybersecurityBasic Foundation For Cybersecurity
Basic Foundation For Cybersecurity
 
Golden Ticket Attack - AD - Domain Persistence
Golden Ticket Attack - AD - Domain PersistenceGolden Ticket Attack - AD - Domain Persistence
Golden Ticket Attack - AD - Domain Persistence
 
Evading Antivirus software for fun and profit
Evading Antivirus software for fun and profitEvading Antivirus software for fun and profit
Evading Antivirus software for fun and profit
 
Introduction to Network Fundamentals
Introduction to Network FundamentalsIntroduction to Network Fundamentals
Introduction to Network Fundamentals
 
Breaking out of crypto authentication
Breaking out of crypto authenticationBreaking out of crypto authentication
Breaking out of crypto authentication
 
Cybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamCybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by Adam
 
Career Guidance on Cybersecurity by Mohammed Adam
Career Guidance on Cybersecurity by Mohammed AdamCareer Guidance on Cybersecurity by Mohammed Adam
Career Guidance on Cybersecurity by Mohammed Adam
 
Introduction to null villupuram community
Introduction to null villupuram communityIntroduction to null villupuram community
Introduction to null villupuram community
 
Internet security
Internet securityInternet security
Internet security
 
BugBounty Roadmap with Mohammed Adam
BugBounty Roadmap with Mohammed AdamBugBounty Roadmap with Mohammed Adam
BugBounty Roadmap with Mohammed Adam
 
Webinar On Ethical Hacking & Cybersecurity - Day2
Webinar On Ethical Hacking & Cybersecurity - Day2Webinar On Ethical Hacking & Cybersecurity - Day2
Webinar On Ethical Hacking & Cybersecurity - Day2
 
OSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurityOSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurity
 
Android Application Penetration Testing - Mohammed Adam
Android Application Penetration Testing - Mohammed AdamAndroid Application Penetration Testing - Mohammed Adam
Android Application Penetration Testing - Mohammed Adam
 
Vulnerability assessment & Penetration testing Basics
Vulnerability assessment & Penetration testing Basics Vulnerability assessment & Penetration testing Basics
Vulnerability assessment & Penetration testing Basics
 
What is SSL ? The Secure Sockets Layer (SSL) Protocol
What is SSL ? The Secure Sockets Layer (SSL) ProtocolWhat is SSL ? The Secure Sockets Layer (SSL) Protocol
What is SSL ? The Secure Sockets Layer (SSL) Protocol
 

Recently uploaded

Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 

Recently uploaded (20)

Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 

Introduction to Networking

  • 2. 2 What is a Network? A network consists of 2 or more computers connected together, and they can communicate and share resources (e.g. information)
  • 3. 3 Why Networking? • Sharing information — i.e. data communication • Do you prefer these? • Or this?
  • 4. 4 • Sharing hardware or software • Centralize administration and support • E.g. print document • E.g. Internet-based, so everyone can access the same administrative or support application from their PCs
  • 5. 5 How many kinds of Networks? • Depending on one’s perspective, we can classify networks in different ways • Based on transmission media: Wired (UTP, coaxial cables, fiber-optic cables) and Wireless • Based on network size: LAN and WAN (and MAN) • Based on management method: Peer-to-peer and Client/Server • Based on topology (connectivity): Bus, Star, Ring …
  • 6. 6 Two main categories: ◦ Guided ― wires, cables ◦ Unguided ― wireless transmission, e.g. radio, microwave, infrared, sound, sonar We will concentrate on guided media here: ◦ Twisted-Pair cables: Unshielded Twisted-Pair (UTP) cables Shielded Twisted-Pair (STP) cables ◦ Coaxial cables ◦ Fiber-optic cables 6 Transmission Media
  • 7.
  • 8. 8 If the pair of wires are not twisted, electromagnetic noises from, e.g., motors, will affect the closer wire more than the further one, thereby causing errors 8 Twisted-Pair Cables
  • 9. 9 Unshielded Twisted-Pair (UTP) Typically wrapped inside a plastic cover (for mechanical protection) A sample UTP cable with 5 unshielded twisted pairs of wires 9 MetalInsulator
  • 10. 10 Shielded Twisted-Pair (STP) STP cables are similar to UTP cables, except there is a metal foil or braided-metal-mesh cover that encases each pair of insulated wires 10
  • 11. 11 Categories of UTP Cables EIA classifies UTP cables according to the quality:  Category 1 ― the lowest quality, only good for voice, mainly found in very old buildings, not recommended now  Category 2 ― good for voice and low data rates (up to 4Mbps for low-speed token ring networks)  Category 3 ― at least 3 twists per foot, for up to 10 Mbps (common in phone networks in residential buildings)  Category 4 ― up to 16 Mbps (mainly for token rings)  Category 5 (or 5e) ― up to 100 Mbps (common for networks targeted for high-speed data communications)  Category 6 ― more twists than Cat 5, up to 1 Gbps 11
  • 12. 12 Coaxial Cables In general, coaxial cables, or coax, carry signals of higher freq (100KHz–500MHz) than UTP cables Outer metallic wrapping serves both as a shield against noise and as the second conductor that completes the circuit 12
  • 13. 13 Fiber-Optic Cables Light travels at 3×108 ms-1 in free space and is the fastest possible speed in the Universe Light slows down in denser media, e.g. glass Refraction occurs at interface, with light bending away from the normal when it enters a less dense medium Beyond the critical angle ⇒ total internal reflection 13
  • 14. 14  An optical fiber consists of a core (denser material) and a cladding (less dense material)  Simplest one is a multimode step-index optical fiber  Multimode = multiple paths, whereas step-index = refractive index follows a step-function profile (i.e. an abrupt change of refractive index between the core and the cladding)  Light bounces back and forth along the core  Common light sources: LEDs and lasers 14
  • 15. 15 Advantages and Disadvantages  Noise resistance ― external light is blocked by outer jacket  Less signal attenuation ― a signal can run for miles without regeneration (currently, the lowest measured loss is about ~4% or 0.16dB per km)  Higher bandwidth ― currently, limits on data rates come from the signal generation/reception technology, not the fiber itself  Cost ― Optical fibers are expensive  Installation/maintenance ― any crack in the core will degrade the signal, and all connections must be perfectly aligned 15
  • 16. 16 LAN and WAN • Local Area Network (LAN) • Small network, short distance • A room, a floor, a building • Limited by no. of computers and distance covered • Usually one kind of technology throughout the LAN • Serve a department within an organization • Examples: • Network inside the Student Computer Room • Network inside your home
  • 17. 17 • Wide Area Network (WAN) • A network that uses long-range telecommunication links to connect 2 or more LANs/computers housed in different places far apart. • Towns, states, countries • Examples: • Network of our Campus • Internet WAN Student Computer Centre Your home USA
  • 18. 18 • Example WAN technologies: • ISDN – Integrated Service Digital Network • Basic rate: 192 Kbps Primary rate: 1.544Mbps • T-Carriers ― basically digital phone lines • T1: 1.544Mbps T3: 28×T1 • Frame relay • Each link offers 1.544Mbps or even higher • ATM – Asynchronous Transfer Mode • Support B-ISDN: 155Mbps or 622Mbps or higher • SONET – Synchronous Optical Network • Basic rate OC1: 51.84Mbps • Support OC12 and up to OC192 (9953.28Mbps) or even higher in the future
  • 19. 19 • Example of WAN: Broadband Cable Network • Cable TV services have been extensively developed in most modern cities • Cable TV companies try to make use of their coaxial cable installed (that are supposed to carry TV signals) to deliver broadband data services • Many cable network wiring has been replaced with hybrid fiber-coax (HFC) ― i.e. use of fiber-optic cable to connect to the subscribers’ buildings, and then the original coaxial cable to connect to each household
  • 20. 20 The connection is shared by a number of subscribers, hence may raise performance and security problems Fiber-optic cable Cable companyCoaxial Cable TV PC Cable Drop
  • 21. 21 • Cable is an asymmetrical technology • Downstream: max 36 Mbps • Upstream: max 10 Mbps • May be reduced to 3 – 10 Mbps downstream and 2 Mbps upstream, depending on no. of subscribers • Need a special cable modem Ethernet link to PC Coaxial link from cable TV socket Teryon Cable Modem
  • 22. 22 Peer-to-Peer Networks • Peer-to-peer network is also called workgroup • No hierarchy among computers ⇒ all are equal • No administrator responsible for the network Peer-to-peer
  • 23. 23 • Advantages of peer-to-peer networks: • Low cost • Simple to configure • User has full accessibility of the computer • Disadvantages of peer-to-peer networks: • May have duplication in resources • Difficult to uphold security policy • Difficult to handle uneven loading • Where peer-to-peer network is appropriate: • 10 or less users • No specialized services required • Security is not an issue • Only limited growth in the foreseeable future
  • 24. 24 Clients and Servers • Network ClientsClients (WorkstationWorkstation) • Computers that request network resources or services • Network ServersServers • Computers that manage and provide network resources and services to clients • Usually have more processing power, memory and hard disk space than clients • Run Network Operating System that can manage not only data, but also users, groups, security, and applications on the network • Servers often have a more stringent requirement on its performance and reliability
  • 25. 25 • Advantages of client/server networks • Facilitate resource sharing – centrally administrate and control • Facilitate system backup and improve fault tolerance • Enhance security – only administrator can have access to Server • Support more users – difficult to achieve with peer-to- peer networks • Disadvantages of client/server networks • High cost for Servers • Need expert to configure the network • Introduce a single point of failure to the system
  • 26. 26 Topology ― 3 basic types • How so many computers are connected together? Bus Topology Ring Topology Star Topology Hub
  • 27. 27 • Bus Topology • Simple and low-cost • A single cable called a trunk (backbone, segment) • Only one computer can send messages at a time • Passive topology - computer only listen for, not regenerate data • Star Topology • Each computer has a cable connected to a single point • More cabling, hence higher cost • All signals transmission through the hub; if down, entire network down • Depending on the intelligence of hub, two or more computers may send message at the same time
  • 28. 28 How to construct a network with Bus / Star Topology? Star Topology Bus Topology BNC T-Connector Coaxial cable Network Card
  • 29. 29 • Ring Topology • Every computer serves as a repeater to boost signals • Typical way to send data: • Token passing • only the computer who gets the token can send data • Disadvantages • Difficult to add computers • More expensive • If one computer fails, whole network fails T T T dat a T dat a T dat a T dat a T dat a T dat a T Ac k T Ac k T Ac k TAc k T