SlideShare a Scribd company logo
1 of 50
Introduction to Information Technology
6.2. Networking & Communications: Network basics
Introduction to Information Technology
INT-1010
Prof C
Luis R Castellanos
1
06.2
Networking & Communications:
Network basics
Introduction to Information Technology
6.2. Networking & Communications: Network basics
2
Introduction Network
Basics
Resources in
Networks
Internet
Connections
Network
trends
Network
Security
Summary
Introduction to Information Technology
6.2. Networking & Communications: Network basics
3
IP Addresses URL & Ports
Network
Basics
Hosting &
Domains
Introduction to Information Technology
6.2. Networking & Communications: Network basics
4
IP Addresses
Networking &
Communications
Introduction to Information Technology
6.2. Networking & Communications: Network basics
5
An IP (Internet Protocol) address is a
unique code that identifies a piece of
equipment connected to a network.
These addresses are used in messages
between network devices like the
network or wireless card in your
computer, the equipment from your
ISP (internet service provider), and all
pieces of equipment between your
machine and the one your computer
needs to talk to.
Introduction to Information Technology
6.2. Networking & Communications: Network basics
6
Introduction to Information Technology
6.2. Networking & Communications: Network basics
7
We can hide (or mask) our IP Address with 3
tools:
✓ VPN (Virtual Private Network): establishes
a protected network connection when using
public networks. It encrypts your internet
traffic and disguises your online identity.
✓ Proxy Server: provides a gateway between
users and the internet. It helps prevent
cyber attackers from entering a private
network.
✓ TOR browser (The Onion Router):
anonymizes your web traffic using the Tor
network, making it easy to protect your
identity online.
Introduction to Information Technology
6.2. Networking & Communications: Network basics
8
IP Addresses live in the network layer, which is
one of seven layers in the protocol suite defined
in the OSI Model.
The OSI model stands for Open Systems
Interconnection, and was created by the
International Standardization Organization
(ISO), an international non-governmental group
of professionals who strive to establish standards
and best practices in a variety of fields.
The OSI Model for networking breaks the system
of transmitting data into the layers shown (left) in
an attempt to delineate where certain actions
should take place.
Introduction to Information Technology
6.2. Networking & Communications: Network basics
9
Introduction to Information Technology
6.2. Networking & Communications: Network basics
10
The seven layers depicted to the right
make up the OSI body’s recommended
protocol suite.
In the diagram, transmission of data
crosses two routers and over the
Internet to reach its destination.
By following the data along the arrows,
we see it pass through various layers of
communication and processing as it
crosses the internal network, through
the first router, across the public
network (internet connection), into the
recipient’s router, and then is
reassembled into its original form.
7
6
5
4
3
2
1
Introduction to Information Technology
6.2. Networking & Communications: Network basics
11
Until recently, most network equipment
has operated on IPv4, the fourth standard
released for IP addresses, which has been
in place for about thirty years.
Addresses in this format are typically
represented as a pattern of four blocks of
up to three digits separated by periods,
with no block of numbers exceeding 255
such as 127.0.0.1 or 24.38.1.251.
This is referred to as dot-decimal
representation, and although it is not the
only way to express an IPv4 address it is
the most recognized form.
Introduction to Information Technology
6.2. Networking & Communications: Network basics
12
Some IPv4 addresses are:
Apple → 10.0.1.1
Dell → 192.168.1.1
Google → 192.168.86.1
Microsoft → 192.168.2.1
Motorola → 192.168.0.1
Zoom → 192.168.1.1
Introduction to Information Technology
6.2. Networking & Communications: Network basics
13
Segments of the addresses within the
ranges of 192.168.xxx.xxx,
172.16.xxx.xxx to 172.31.xxx.xxx, and
10.0.xxx.xxx to 10.255.xxx.xxx are
reserved for private networks, meaning
they are used within a network in your
house, at work, or anywhere else where
a group of computers share a
connection to the internet.
Each of these networks uses one or
more of these blocks of numbers for
devices on that network.
Introduction to Information Technology
6.2. Networking & Communications: Network basics
14
Only the equipment connecting that
local network to the Internet needs a
unique address from the rest of the
world.
That equipment will track which
computer inside the network to send
data to and from by reading packets—
the individual pieces of messages that
are sent across networks.
This means your computer might be
192.168.1.25 at home, and so might
your computer at work, according to
your home and work networks.
Introduction to Information Technology
6.2. Networking & Communications: Network basics
15
The connection between your house and
office will have a different, unique number
assigned to them.
This separation of networks was done to
reduce the speed at which unique addresses
were consumed.
Although this scheme allows for almost 4.3
billion addresses, the last one was officially
assigned on February 4th, 2012.
To sustain today’s growing number of
devices, IPv6 was created, which is depicted
as eight blocks of four hexadecimal digits now
separated by colons.
Introduction to Information Technology
6.2. Networking & Communications: Network basics
16
These new addresses might look
like
2001:0db8:85a3:0042:1000:8a2e
:0370:7334, and can support
roughly 4 billion unique
addresses.
Since the new range is so
staggeringly large, additional
protocols were created that
specify when certain values or
ranges are used in addresses.
This allows additional
information about the device to be
conveyed just from the address.
Introduction to Information Technology
6.2. Networking & Communications: Network basics
17
The actual messages sent between
machines are broken down into multiple
pieces.
These pieces, called packets, are sent
piece by piece from sender to recipient.
Each packet is sent the fastest way
possible, which means some packets may
take different routes—picture a short cut,
or getting off a congested road to take a
different one.
This helps to ensure that the message gets
from sender to receiver as fast as possible,
but also means packets may arrive in a
different order than they were sent.
Introduction to Information Technology
6.2. Networking & Communications: Network basics
18
Additional Notes
Hexadecimal is a number scheme that
allows 0 through 9 and A through F as
unique values, which means we can
count to 15 with one character.
To account for this, each piece of the
message, or payload, is wrapped in a
header—additional information that
describes how many other pieces there
are, what protocol is being used, where
the packet came from and is headed to,
along with some other related
information.
Introduction to Information Technology
6.2. Networking & Communications: Network basics
19
Introduction to Information Technology
6.2. Networking & Communications: Network basics
20
After the packets are reassembled, the
receiving computer sends any
necessary responses, and the process
repeats.
This all takes place in fractions of a
second, beginning with the “hello,” or
handshake packet to announce a
communication request, to the last
piece of the packet.
Introduction to Information Technology
6.2. Networking & Communications: Network basics
21
IP Addresses URL & Ports
Network
Basics
Hosting &
Domains
Introduction to Information Technology
6.2. Networking & Communications: Network basics
22
URL & Ports
Networking &
Communications
Introduction to Information Technology
6.2. Networking & Communications: Network basics
23
URL
Seeing as most of us would have a hard time
remembering what IP address is needed to get to,
say, Facebook (173.252.100.16) or the Weather
Channel (96.8.80.132) we instead use URLs, uniform
resource locators.
This allows us to use www.facebook.com and
www.weather.com to get to where we want to go
without referring to a long list of IP addresses.
Specialized servers (called name servers) all around
the world are responsible for responding to requests
from computers for this information.
Introduction to Information Technology
6.2. Networking & Communications: Network basics
24
When you type facebook.com into your address
bar, if your router does not have a note of its
own as to where that is, it will “ask” a name
server, which will look it up in its records and
reply.
There are three parts to a network address: the
protocol, name, and resource id. The protocol
represents how we want to send and receive
messages, for example we can use http:// for
accessing websites and ftp:// for moving files.
The name is what we associate with the site, like
www.facebook.com, and the resource id, or
URI, is everything after that, which points to
the particular file we want to see.
Introduction to Information Technology
6.2. Networking & Communications: Network basics
25
Ports
While an IP address and a URL will
bring you to a particular web
server, there may be more than one
way you want to interact with it, or
more than one thing you want it to
do.
Maybe you also want the server to
provide email services, or you want
to use FTP to update your files.
These ports act as different doors
into your server, so different
applications can communicate
without getting in each other’s way.
Introduction to Information Technology
6.2. Networking & Communications: Network basics
26
Certain ports are typically used for certain
activities, for example port 80 is the
standard port for web traffic (your browser
viewing a page), as opposed to ftp, which
typically uses port 21.
Using standard ports is not a rule, as
applications can be configured to use any
available port number, but it is
recommended in most cases as firewalls
and other security devices may require
additional configuring to keep them from
blocking wanted traffic because it is
arriving at an unusual, firewalled, or
“locked” port.
Introduction to Information Technology
6.2. Networking & Communications: Network basics
27
IP Addresses URL & Ports
Network
Basics
Hosting &
Domains
Introduction to Information Technology
6.2. Networking & Communications: Network basics
28
Hosting &
Domains
Networking &
Communications
Introduction to Information Technology
6.2. Networking & Communications: Network basics
29
Hosting Facilities
If you are using a server that is not under
your physical care, and is managed by an
off-site third party, then you likely have an
agreement with a hosting facility.
Hosting facilities are typically for-profit
companies that manage the physical
equipment necessary to provide access to
websites for a number of clients.
Many offer web development and
management services as well, but if you are
still reading, then that tidbit is probably of
little interest as you are here to build it
yourself.
Introduction to Information Technology
6.2. Networking & Communications: Network basics
30
Introduction to Information Technology
6.2. Networking & Communications: Network basics
31
Introduction to Information Technology
6.2. Networking & Communications: Network basics
32
Introduction to Information Technology
6.2. Networking & Communications: Network basics
33
Hosting companies
Introduction to Information Technology
6.2. Networking & Communications: Network basics
34
Up Time is the average amount of time that
all services on a server are operational and
accessible to end users.
It is a typical measurement of a hosting
company’s ability to provide the services they
promise.
The benefit of using a hosting service falls
under the same principles as other cloud
computing services.
You are paying to rent equipment and/or
services in place of investing in equipment
and managing the server and Internet
connection yourself.
Introduction to Information Technology
6.2. Networking & Communications: Network basics
35
Additionally, hosting facilities are equipped
with backup power sources as well as
redundant connections to the internet, and
may even have multiple facilities that are
physically dispersed, ensuring their clients
have the best up time as possible.
Ads like the one on the right are common to
these services and often emphasize their
best features.
Price competition makes for relatively
affordable hosting for those who are not
looking for dedicated servers and are
comfortable with sharing their (virtual)
server resources with other customers.
Introduction to Information Technology
6.2. Networking & Communications: Network basics
36
Introduction to Information Technology
6.2. Networking & Communications: Network basics
37
Domain Registrar
Domain registrars coordinate the name servers
that turn URLs into the IP addresses that get us
to our destinations.
These companies are where you register
available names in order to allow others to find
your site.
One of the most recognized registrars right now
is GoDaddy—you may know them from their
ads, which feature racecar driver Danica Patrick.
Like many registrars, GoDaddy also offers other
services like web and email hosting as well as
web development in an effort to solve all of your
website needs.
Introduction to Information Technology
6.2. Networking & Communications: Network basics
38
Domain registrar companies
Introduction to Information Technology
6.2. Networking & Communications: Network basics
39
Introduction to Information Technology
6.2. Networking & Communications: Network basics
40
Introduction to Information Technology
6.2. Networking & Communications: Network basics
41
Introduction to Information Technology
6.2. Networking & Communications: Network basics
42
Which is the actual
standard for IP addresses?
1. IPv4
2. IPv6
3. IPv7
4. IPv8
Introduction to Information Technology
6.2. Networking & Communications: Network basics
43
How many layers does the
OSI Model has?
(Open Systems Interconnection)
1. 6
2. 7
3. 8
4. 10
Introduction to Information Technology
6.2. Networking & Communications: Network basics
44
Which are the components of an URL?
http://www.google.com
Introduction to Information Technology
6.2. Networking & Communications: Network basics
45
To which businesses or
organizations correspond
these TLD extensions:
1. .edu
2. .com
3. .gov
4. .mil
Introduction to Information Technology
6.2. Networking & Communications: Network basics
46
Introduction to Information Technology
6.2. Networking & Communications: Network basics
Introduction to Information Technology
6.2. Networking & Communications: Network basics
Textbook
48
https://eng.libretexts.org/Courses/Prince_
Georges_Community_College/INT_1010%
3A_Concepts_in_Computing
Purchase of a book is not
required.
Introduction to Information Technology
6.2. Networking & Communications: Network basics
Professor C
49
castellr@pgcc.edu
eLearning Expert
BS in Systems Engineering
MS in Systems Engineering
HC Dr in Education
IT Professor | Spanish Instructor
LCINT1010.wordpress.com
Presentation created in 01/2022.
Slides last updated on 10/2023
Introduction to Information Technology
6.2. Networking & Communications: Network basics
Introduction to Information Technology
INT-1010
Prof C
Luis R Castellanos
50
06.2
Networking & Communications:
Network basics

More Related Content

What's hot

Computer Networks Lecture Notes 01
Computer Networks Lecture Notes 01Computer Networks Lecture Notes 01
Computer Networks Lecture Notes 01Sreedhar Chowdam
 
Cyber security by Anushka Jha
Cyber security by Anushka JhaCyber security by Anushka Jha
Cyber security by Anushka JhaAnushka Jha
 
Cyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat LandscapeCyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat LandscapeAaron White
 
The Osi Model And Layers
The Osi Model And LayersThe Osi Model And Layers
The Osi Model And LayersKathleenSSmith
 
Jaringan Komputer dan Internet
Jaringan Komputer dan InternetJaringan Komputer dan Internet
Jaringan Komputer dan InternetLuvennaNathania
 
wireless communication security PPT, presentation
wireless communication security PPT, presentationwireless communication security PPT, presentation
wireless communication security PPT, presentationNitesh Dubey
 
Temuduga Mengenai Internet of Things (IoT)
Temuduga Mengenai Internet of Things (IoT)Temuduga Mengenai Internet of Things (IoT)
Temuduga Mengenai Internet of Things (IoT)Dr. Mazlan Abbas
 

What's hot (10)

Computer Networks Lecture Notes 01
Computer Networks Lecture Notes 01Computer Networks Lecture Notes 01
Computer Networks Lecture Notes 01
 
Cyber security by Anushka Jha
Cyber security by Anushka JhaCyber security by Anushka Jha
Cyber security by Anushka Jha
 
Chapter 25
Chapter 25Chapter 25
Chapter 25
 
Program utiliti
Program utilitiProgram utiliti
Program utiliti
 
Cyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat LandscapeCyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat Landscape
 
The Osi Model And Layers
The Osi Model And LayersThe Osi Model And Layers
The Osi Model And Layers
 
Jaringan Komputer dan Internet
Jaringan Komputer dan InternetJaringan Komputer dan Internet
Jaringan Komputer dan Internet
 
wireless communication security PPT, presentation
wireless communication security PPT, presentationwireless communication security PPT, presentation
wireless communication security PPT, presentation
 
Temuduga Mengenai Internet of Things (IoT)
Temuduga Mengenai Internet of Things (IoT)Temuduga Mengenai Internet of Things (IoT)
Temuduga Mengenai Internet of Things (IoT)
 
Jaringan multimedia
Jaringan multimediaJaringan multimedia
Jaringan multimedia
 

Similar to INT 1010 06-2.pdf

Ip, subnet, gateway and routers
Ip, subnet, gateway and routersIp, subnet, gateway and routers
Ip, subnet, gateway and routersAdrian Suarez
 
Lecture 2 -_understanding_networks_with_presenter_notes
Lecture 2 -_understanding_networks_with_presenter_notesLecture 2 -_understanding_networks_with_presenter_notes
Lecture 2 -_understanding_networks_with_presenter_notesSerious_SamSoul
 
Networking concept with chat server programming
Networking concept with chat server programming Networking concept with chat server programming
Networking concept with chat server programming Kanishk Raj
 
Report on ip addresses
Report on ip addressesReport on ip addresses
Report on ip addressesAmandeep Kaur
 
Computer Networks 3
Computer Networks 3Computer Networks 3
Computer Networks 3Mr Smith
 
Networking-basics
Networking-basicsNetworking-basics
Networking-basicsRaj Alam
 
Networking Related
Networking RelatedNetworking Related
Networking RelatedZunAib Ali
 
Automation and Robotics 20ME51I_Week_3_Practicals.pdf
Automation and Robotics 20ME51I_Week_3_Practicals.pdfAutomation and Robotics 20ME51I_Week_3_Practicals.pdf
Automation and Robotics 20ME51I_Week_3_Practicals.pdfGandhibabu8
 
Data Communication
Data Communication Data Communication
Data Communication MSSadeq
 
Final networks lab manual
Final networks lab manualFinal networks lab manual
Final networks lab manualJaya Prasanna
 
07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.pptssuserf7cd2b
 

Similar to INT 1010 06-2.pdf (20)

Ip, subnet, gateway and routers
Ip, subnet, gateway and routersIp, subnet, gateway and routers
Ip, subnet, gateway and routers
 
Lecture 2 -_understanding_networks_with_presenter_notes
Lecture 2 -_understanding_networks_with_presenter_notesLecture 2 -_understanding_networks_with_presenter_notes
Lecture 2 -_understanding_networks_with_presenter_notes
 
Iap final
Iap finalIap final
Iap final
 
Networking concept with chat server programming
Networking concept with chat server programming Networking concept with chat server programming
Networking concept with chat server programming
 
Cisco doc
Cisco docCisco doc
Cisco doc
 
Report on ip addresses
Report on ip addressesReport on ip addresses
Report on ip addresses
 
IP Address
IP AddressIP Address
IP Address
 
Computer Networks 3
Computer Networks 3Computer Networks 3
Computer Networks 3
 
Networking-basics
Networking-basicsNetworking-basics
Networking-basics
 
Week 6 osi-tcp
Week 6    osi-tcpWeek 6    osi-tcp
Week 6 osi-tcp
 
Dist 03-4
Dist 03-4Dist 03-4
Dist 03-4
 
Networking Related
Networking RelatedNetworking Related
Networking Related
 
Internet Protocols
Internet ProtocolsInternet Protocols
Internet Protocols
 
Automation and Robotics 20ME51I_Week_3_Practicals.pdf
Automation and Robotics 20ME51I_Week_3_Practicals.pdfAutomation and Robotics 20ME51I_Week_3_Practicals.pdf
Automation and Robotics 20ME51I_Week_3_Practicals.pdf
 
Linux Internals - Interview essentials 2.0
Linux Internals - Interview essentials 2.0Linux Internals - Interview essentials 2.0
Linux Internals - Interview essentials 2.0
 
Tcp/ip
Tcp/ipTcp/ip
Tcp/ip
 
Data Communication
Data Communication Data Communication
Data Communication
 
7 layer OSI model
7 layer OSI model7 layer OSI model
7 layer OSI model
 
Final networks lab manual
Final networks lab manualFinal networks lab manual
Final networks lab manual
 
07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt
 

More from Luis R Castellanos (20)

INT 1010 08-4.pdf
INT 1010 08-4.pdfINT 1010 08-4.pdf
INT 1010 08-4.pdf
 
INT 1010 08-3.pdf
INT 1010 08-3.pdfINT 1010 08-3.pdf
INT 1010 08-3.pdf
 
INT 1010 08-1.pdf
INT 1010 08-1.pdfINT 1010 08-1.pdf
INT 1010 08-1.pdf
 
INT 1010 04-2.pdf
INT 1010 04-2.pdfINT 1010 04-2.pdf
INT 1010 04-2.pdf
 
INT 1010 04-3.pdf
INT 1010 04-3.pdfINT 1010 04-3.pdf
INT 1010 04-3.pdf
 
INT 1010 04-1.pdf
INT 1010 04-1.pdfINT 1010 04-1.pdf
INT 1010 04-1.pdf
 
INT 1010 04-4.pdf
INT 1010 04-4.pdfINT 1010 04-4.pdf
INT 1010 04-4.pdf
 
INT 1010 04-5.pdf
INT 1010 04-5.pdfINT 1010 04-5.pdf
INT 1010 04-5.pdf
 
INT 1010 03.pdf
INT 1010 03.pdfINT 1010 03.pdf
INT 1010 03.pdf
 
INT 1010 02.pdf
INT 1010 02.pdfINT 1010 02.pdf
INT 1010 02.pdf
 
INT 1010 01.pdf
INT 1010 01.pdfINT 1010 01.pdf
INT 1010 01.pdf
 
INT 1010 10-1.pdf
INT 1010 10-1.pdfINT 1010 10-1.pdf
INT 1010 10-1.pdf
 
INT 1010 10-3.pdf
INT 1010 10-3.pdfINT 1010 10-3.pdf
INT 1010 10-3.pdf
 
INT 1010 10-2.pdf
INT 1010 10-2.pdfINT 1010 10-2.pdf
INT 1010 10-2.pdf
 
INT 1010 09-2.pdf
INT 1010 09-2.pdfINT 1010 09-2.pdf
INT 1010 09-2.pdf
 
INT 1010 08-2.pdf
INT 1010 08-2.pdfINT 1010 08-2.pdf
INT 1010 08-2.pdf
 
INT 1010 07-4.pdf
INT 1010 07-4.pdfINT 1010 07-4.pdf
INT 1010 07-4.pdf
 
INT 1010 07-3.pdf
INT 1010 07-3.pdfINT 1010 07-3.pdf
INT 1010 07-3.pdf
 
INT 1010 07-1.pdf
INT 1010 07-1.pdfINT 1010 07-1.pdf
INT 1010 07-1.pdf
 
INT 1010 07-6.pdf
INT 1010 07-6.pdfINT 1010 07-6.pdf
INT 1010 07-6.pdf
 

Recently uploaded

A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 

Recently uploaded (20)

A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 

INT 1010 06-2.pdf

  • 1. Introduction to Information Technology 6.2. Networking & Communications: Network basics Introduction to Information Technology INT-1010 Prof C Luis R Castellanos 1 06.2 Networking & Communications: Network basics
  • 2. Introduction to Information Technology 6.2. Networking & Communications: Network basics 2 Introduction Network Basics Resources in Networks Internet Connections Network trends Network Security Summary
  • 3. Introduction to Information Technology 6.2. Networking & Communications: Network basics 3 IP Addresses URL & Ports Network Basics Hosting & Domains
  • 4. Introduction to Information Technology 6.2. Networking & Communications: Network basics 4 IP Addresses Networking & Communications
  • 5. Introduction to Information Technology 6.2. Networking & Communications: Network basics 5 An IP (Internet Protocol) address is a unique code that identifies a piece of equipment connected to a network. These addresses are used in messages between network devices like the network or wireless card in your computer, the equipment from your ISP (internet service provider), and all pieces of equipment between your machine and the one your computer needs to talk to.
  • 6. Introduction to Information Technology 6.2. Networking & Communications: Network basics 6
  • 7. Introduction to Information Technology 6.2. Networking & Communications: Network basics 7 We can hide (or mask) our IP Address with 3 tools: ✓ VPN (Virtual Private Network): establishes a protected network connection when using public networks. It encrypts your internet traffic and disguises your online identity. ✓ Proxy Server: provides a gateway between users and the internet. It helps prevent cyber attackers from entering a private network. ✓ TOR browser (The Onion Router): anonymizes your web traffic using the Tor network, making it easy to protect your identity online.
  • 8. Introduction to Information Technology 6.2. Networking & Communications: Network basics 8 IP Addresses live in the network layer, which is one of seven layers in the protocol suite defined in the OSI Model. The OSI model stands for Open Systems Interconnection, and was created by the International Standardization Organization (ISO), an international non-governmental group of professionals who strive to establish standards and best practices in a variety of fields. The OSI Model for networking breaks the system of transmitting data into the layers shown (left) in an attempt to delineate where certain actions should take place.
  • 9. Introduction to Information Technology 6.2. Networking & Communications: Network basics 9
  • 10. Introduction to Information Technology 6.2. Networking & Communications: Network basics 10 The seven layers depicted to the right make up the OSI body’s recommended protocol suite. In the diagram, transmission of data crosses two routers and over the Internet to reach its destination. By following the data along the arrows, we see it pass through various layers of communication and processing as it crosses the internal network, through the first router, across the public network (internet connection), into the recipient’s router, and then is reassembled into its original form. 7 6 5 4 3 2 1
  • 11. Introduction to Information Technology 6.2. Networking & Communications: Network basics 11 Until recently, most network equipment has operated on IPv4, the fourth standard released for IP addresses, which has been in place for about thirty years. Addresses in this format are typically represented as a pattern of four blocks of up to three digits separated by periods, with no block of numbers exceeding 255 such as 127.0.0.1 or 24.38.1.251. This is referred to as dot-decimal representation, and although it is not the only way to express an IPv4 address it is the most recognized form.
  • 12. Introduction to Information Technology 6.2. Networking & Communications: Network basics 12 Some IPv4 addresses are: Apple → 10.0.1.1 Dell → 192.168.1.1 Google → 192.168.86.1 Microsoft → 192.168.2.1 Motorola → 192.168.0.1 Zoom → 192.168.1.1
  • 13. Introduction to Information Technology 6.2. Networking & Communications: Network basics 13 Segments of the addresses within the ranges of 192.168.xxx.xxx, 172.16.xxx.xxx to 172.31.xxx.xxx, and 10.0.xxx.xxx to 10.255.xxx.xxx are reserved for private networks, meaning they are used within a network in your house, at work, or anywhere else where a group of computers share a connection to the internet. Each of these networks uses one or more of these blocks of numbers for devices on that network.
  • 14. Introduction to Information Technology 6.2. Networking & Communications: Network basics 14 Only the equipment connecting that local network to the Internet needs a unique address from the rest of the world. That equipment will track which computer inside the network to send data to and from by reading packets— the individual pieces of messages that are sent across networks. This means your computer might be 192.168.1.25 at home, and so might your computer at work, according to your home and work networks.
  • 15. Introduction to Information Technology 6.2. Networking & Communications: Network basics 15 The connection between your house and office will have a different, unique number assigned to them. This separation of networks was done to reduce the speed at which unique addresses were consumed. Although this scheme allows for almost 4.3 billion addresses, the last one was officially assigned on February 4th, 2012. To sustain today’s growing number of devices, IPv6 was created, which is depicted as eight blocks of four hexadecimal digits now separated by colons.
  • 16. Introduction to Information Technology 6.2. Networking & Communications: Network basics 16 These new addresses might look like 2001:0db8:85a3:0042:1000:8a2e :0370:7334, and can support roughly 4 billion unique addresses. Since the new range is so staggeringly large, additional protocols were created that specify when certain values or ranges are used in addresses. This allows additional information about the device to be conveyed just from the address.
  • 17. Introduction to Information Technology 6.2. Networking & Communications: Network basics 17 The actual messages sent between machines are broken down into multiple pieces. These pieces, called packets, are sent piece by piece from sender to recipient. Each packet is sent the fastest way possible, which means some packets may take different routes—picture a short cut, or getting off a congested road to take a different one. This helps to ensure that the message gets from sender to receiver as fast as possible, but also means packets may arrive in a different order than they were sent.
  • 18. Introduction to Information Technology 6.2. Networking & Communications: Network basics 18 Additional Notes Hexadecimal is a number scheme that allows 0 through 9 and A through F as unique values, which means we can count to 15 with one character. To account for this, each piece of the message, or payload, is wrapped in a header—additional information that describes how many other pieces there are, what protocol is being used, where the packet came from and is headed to, along with some other related information.
  • 19. Introduction to Information Technology 6.2. Networking & Communications: Network basics 19
  • 20. Introduction to Information Technology 6.2. Networking & Communications: Network basics 20 After the packets are reassembled, the receiving computer sends any necessary responses, and the process repeats. This all takes place in fractions of a second, beginning with the “hello,” or handshake packet to announce a communication request, to the last piece of the packet.
  • 21. Introduction to Information Technology 6.2. Networking & Communications: Network basics 21 IP Addresses URL & Ports Network Basics Hosting & Domains
  • 22. Introduction to Information Technology 6.2. Networking & Communications: Network basics 22 URL & Ports Networking & Communications
  • 23. Introduction to Information Technology 6.2. Networking & Communications: Network basics 23 URL Seeing as most of us would have a hard time remembering what IP address is needed to get to, say, Facebook (173.252.100.16) or the Weather Channel (96.8.80.132) we instead use URLs, uniform resource locators. This allows us to use www.facebook.com and www.weather.com to get to where we want to go without referring to a long list of IP addresses. Specialized servers (called name servers) all around the world are responsible for responding to requests from computers for this information.
  • 24. Introduction to Information Technology 6.2. Networking & Communications: Network basics 24 When you type facebook.com into your address bar, if your router does not have a note of its own as to where that is, it will “ask” a name server, which will look it up in its records and reply. There are three parts to a network address: the protocol, name, and resource id. The protocol represents how we want to send and receive messages, for example we can use http:// for accessing websites and ftp:// for moving files. The name is what we associate with the site, like www.facebook.com, and the resource id, or URI, is everything after that, which points to the particular file we want to see.
  • 25. Introduction to Information Technology 6.2. Networking & Communications: Network basics 25 Ports While an IP address and a URL will bring you to a particular web server, there may be more than one way you want to interact with it, or more than one thing you want it to do. Maybe you also want the server to provide email services, or you want to use FTP to update your files. These ports act as different doors into your server, so different applications can communicate without getting in each other’s way.
  • 26. Introduction to Information Technology 6.2. Networking & Communications: Network basics 26 Certain ports are typically used for certain activities, for example port 80 is the standard port for web traffic (your browser viewing a page), as opposed to ftp, which typically uses port 21. Using standard ports is not a rule, as applications can be configured to use any available port number, but it is recommended in most cases as firewalls and other security devices may require additional configuring to keep them from blocking wanted traffic because it is arriving at an unusual, firewalled, or “locked” port.
  • 27. Introduction to Information Technology 6.2. Networking & Communications: Network basics 27 IP Addresses URL & Ports Network Basics Hosting & Domains
  • 28. Introduction to Information Technology 6.2. Networking & Communications: Network basics 28 Hosting & Domains Networking & Communications
  • 29. Introduction to Information Technology 6.2. Networking & Communications: Network basics 29 Hosting Facilities If you are using a server that is not under your physical care, and is managed by an off-site third party, then you likely have an agreement with a hosting facility. Hosting facilities are typically for-profit companies that manage the physical equipment necessary to provide access to websites for a number of clients. Many offer web development and management services as well, but if you are still reading, then that tidbit is probably of little interest as you are here to build it yourself.
  • 30. Introduction to Information Technology 6.2. Networking & Communications: Network basics 30
  • 31. Introduction to Information Technology 6.2. Networking & Communications: Network basics 31
  • 32. Introduction to Information Technology 6.2. Networking & Communications: Network basics 32
  • 33. Introduction to Information Technology 6.2. Networking & Communications: Network basics 33 Hosting companies
  • 34. Introduction to Information Technology 6.2. Networking & Communications: Network basics 34 Up Time is the average amount of time that all services on a server are operational and accessible to end users. It is a typical measurement of a hosting company’s ability to provide the services they promise. The benefit of using a hosting service falls under the same principles as other cloud computing services. You are paying to rent equipment and/or services in place of investing in equipment and managing the server and Internet connection yourself.
  • 35. Introduction to Information Technology 6.2. Networking & Communications: Network basics 35 Additionally, hosting facilities are equipped with backup power sources as well as redundant connections to the internet, and may even have multiple facilities that are physically dispersed, ensuring their clients have the best up time as possible. Ads like the one on the right are common to these services and often emphasize their best features. Price competition makes for relatively affordable hosting for those who are not looking for dedicated servers and are comfortable with sharing their (virtual) server resources with other customers.
  • 36. Introduction to Information Technology 6.2. Networking & Communications: Network basics 36
  • 37. Introduction to Information Technology 6.2. Networking & Communications: Network basics 37 Domain Registrar Domain registrars coordinate the name servers that turn URLs into the IP addresses that get us to our destinations. These companies are where you register available names in order to allow others to find your site. One of the most recognized registrars right now is GoDaddy—you may know them from their ads, which feature racecar driver Danica Patrick. Like many registrars, GoDaddy also offers other services like web and email hosting as well as web development in an effort to solve all of your website needs.
  • 38. Introduction to Information Technology 6.2. Networking & Communications: Network basics 38 Domain registrar companies
  • 39. Introduction to Information Technology 6.2. Networking & Communications: Network basics 39
  • 40. Introduction to Information Technology 6.2. Networking & Communications: Network basics 40
  • 41. Introduction to Information Technology 6.2. Networking & Communications: Network basics 41
  • 42. Introduction to Information Technology 6.2. Networking & Communications: Network basics 42 Which is the actual standard for IP addresses? 1. IPv4 2. IPv6 3. IPv7 4. IPv8
  • 43. Introduction to Information Technology 6.2. Networking & Communications: Network basics 43 How many layers does the OSI Model has? (Open Systems Interconnection) 1. 6 2. 7 3. 8 4. 10
  • 44. Introduction to Information Technology 6.2. Networking & Communications: Network basics 44 Which are the components of an URL? http://www.google.com
  • 45. Introduction to Information Technology 6.2. Networking & Communications: Network basics 45 To which businesses or organizations correspond these TLD extensions: 1. .edu 2. .com 3. .gov 4. .mil
  • 46. Introduction to Information Technology 6.2. Networking & Communications: Network basics 46
  • 47. Introduction to Information Technology 6.2. Networking & Communications: Network basics
  • 48. Introduction to Information Technology 6.2. Networking & Communications: Network basics Textbook 48 https://eng.libretexts.org/Courses/Prince_ Georges_Community_College/INT_1010% 3A_Concepts_in_Computing Purchase of a book is not required.
  • 49. Introduction to Information Technology 6.2. Networking & Communications: Network basics Professor C 49 castellr@pgcc.edu eLearning Expert BS in Systems Engineering MS in Systems Engineering HC Dr in Education IT Professor | Spanish Instructor LCINT1010.wordpress.com Presentation created in 01/2022. Slides last updated on 10/2023
  • 50. Introduction to Information Technology 6.2. Networking & Communications: Network basics Introduction to Information Technology INT-1010 Prof C Luis R Castellanos 50 06.2 Networking & Communications: Network basics