SlideShare a Scribd company logo
1 of 33
NETWORKING




             Made By:
             Prashant Anand
             Ayush Gupta
             Shaswat Jain
             Shubham Goel     1
What is a Network?


A network consists of 2 or more computers
connected together, and they can communicate and
share resources (e.g. information)




                                               2
Why Networking?

Sharing information — i.e. data communication

• Do you prefer these?


• Or this?




                                                3
• Sharing hardware or software
• E.g. print document




• Centralize administration and support
• E.g. Internet-based, so everyone can access the same
  administrative or support application from their PCs




                                                         4
How many kinds of Networks?
• Depending on one’s perspective, we can classify
  networks in different ways
• Based on transmission media: Wired (UTP, coaxial
  cables, fiber-optic cables) and Wireless
• Based on network size: LAN and WAN (and MAN)
• Based on management method: Peer-to-peer and
  Client/Server
• Based on topology (connectivity): Bus, Star, Ring,Mesh


                                                           5
Transmission Media

 Two main categories:
   Guided ― wires, cables
   Unguided ― wireless transmission, e.g. radio,
    microwave, infrared, sound, sonar
 We will concentrate on guided media here:
   Twisted-Pair cables:
     Unshielded Twisted-Pair (UTP) cables
     Shielded Twisted-Pair (STP) cables
   Coaxial cables
   Fiber-optic cables

                                                    6
Twisted-Pair Cables
 If the pair of wires are not twisted, electromagnetic
  noises from, e.g., motors, will affect the closer wire
  more than the further one, thereby causing errors




                                                           7
Unshielded Twisted-Pair (UTP)
 Typically wrapped inside a plastic cover (for mechanical
  protection)
 A sample UTP cable with 5 unshielded twisted pairs of
  wires




                                      Insulator    Metal
                                                          8
Shielded Twisted-Pair (STP)
 STP cables are similar to UTP cables, except there is a
  metal foil or braided-metal-mesh cover that encases
  each pair of insulated wires




                                                            9
Fiber-Optic Cables
 Light travels at 3108 ms-1 in free space and is the fastest
  possible speed in the Universe
 Light slows down in denser media, e.g. glass
 Refraction occurs at interface, with light bending away
  from the normal when it enters a less dense medium




 Beyond the critical angle  total internal reflection

                                                            10
Advantages and Disadvantages
 Noise resistance ― external light is blocked by outer
  jacket
 Less signal attenuation ― a signal can run for miles
  without regeneration (currently, the lowest measured loss
  is about ~4% or 0.16dB per km)
 Higher bandwidth ― currently, limits on data rates come
  from the signal generation/reception technology, not the
  fiber itself
 Cost ― Optical fibers are expensive
 Installation/maintenance ― any crack in the core will
  degrade the signal, and all connections must be perfectly
  aligned

                                                          11
LAN and WAN
• Local Area Network (LAN)
  • Small network, short distance
     • A room, a floor, a building
     • Limited by no. of computers and distance covered
     • Usually one kind of technology throughout the
       LAN
     • Serve a department within an organization
  • Examples:
     • Network inside the Student Computer Room
     • Network inside CF502
     • Network inside your home
                                                      12
Wide Area Network (WAN)
• A network that uses long-range telecommunication links
  to connect 2 or more LANs/computers housed in
  different places far apart.
   • Towns, states, countries
• Examples:
   • Network of our Campus             Your home
   • Internet




                         WAN            USA

Student
Computer
Centre                                                13
Peer-to-Peer Networks

• Peer-to-peer network is also called workgroup
• No hierarchy among computers  all are equal
• No administrator responsible for the network



                            Peer-to-peer



                                                  14
• Advantages of peer-to-peer networks:
      • Low cost
      • Simple to configure
      • User has full accessibility of the computer

• Disadvantages of peer-to-peer networks:
  • May have duplication in resources
  • Difficult to uphold security policy
  • Difficult to handle uneven loading
• Where peer-to-peer network is appropriate:
  •   10 or less users
  •   No specialized services required
  •   Security is not an issue
  •   Only limited growth in the foreseeable future
                                                      15
Clients and Servers
• Network Clients (Workstation)
  • Computers that request network resources or services
• Network Servers
  • Computers that manage and provide network
    resources and services to clients
      • Usually have more processing power, memory and
        hard disk space than clients
      • Run Network Operating System that can manage
        not only data, but also users, groups, security, and
        applications on the network
      • Servers often have a more stringent requirement
        on its performance and reliability
                                                          16
• Advantages of client/server networks
   • Facilitate resource sharing – centrally administrate
     and control
   • Facilitate system backup and improve fault tolerance
   • Enhance security – only administrator can have access
     to Server
   • Support more users – difficult to achieve with peer-to-
     peer networks

• Disadvantages of client/server networks
   • High cost for Servers
   • Need expert to configure the network
   • Introduce a single point of failure to the system

                                                          17
Topology ― 3 basic types
• How so many computers are connected
  together?
  Bus Topology                  Ring
   Topology



  Star Topology
        Hub


                                        18
• Bus Topology
  •   Simple and low-cost
  •   A single cable called a trunk (backbone, segment)
  •   Only one computer can send messages at a time
  •   Passive topology - computer only listen for, not
      regenerate data

• Star Topology
  • Each computer has a cable connected to a single
    point
  • More cabling, hence higher cost
  • All signals transmission through the hub; if down,
    entire network down
  • Depending on the intelligence of hub, two or more
    computers may send message at the same time
                                                          19
• Ring Topology
  • Every computer serves as
    a repeater to boost signals
  • Typical way to send data: Ack    T T
     • Token passing                              T
         • only the computer who T data         T data
           gets the token can send
           data                     T
                                                       T
  • Disadvantages               T Ack             T data
                                                     Ack
     • Difficult to add computers
                                              T
     • More expensive
                                        T Ack
     • If one computer fails, whole network fails


                                                       20
What is VOIP ????
VoIP (Voice over Internet Protocol) is a quite recent
 advancement in telephony systems. It uses a packet
 switched network, like the internet, to pass digitized
 voice data from one point to another. This allows
 telecommunications companies to squeeze more
 conversations in the same amount of bandwidth.
 Even home users can use VoIP handsets, or through
 computers via software, to call other people who are
 online for free.
 Other terms commonly associated with VoIP are IP
 telephony, Internet telephony, voice over
 broadband (VoBB), broadband telephony,
 IP communications, and broadband phone.


                                                     21
Internet telephony refers to communications services —
voice, fax, SMS, and/or voice-messaging applications—
that are transported via the Internet, rather than
the public switched telephone network (PSTN).

The steps involved in originating a VoIP telephone call
are signaling and media channel setup, digitization of
the analog voice signal, encoding, packetization, and
transmission as Internet Protocol (IP) packets over
a packet-switched network. On the receiving side,
similar steps (usually in the reverse order) such as
reception of the IP packets, decoding of the packets and
digital-to-analog conversion reproduce the original
voice stream

                                                           22
Even though IP Telephony and VoIP are terms that
are used interchangeably, they are actually different;
IP telephony has to do with digital telephony systems
that use IP protocols for voice communication, while
VoIP is actually a subset of IP Telephony. VoIP is a
technology used by IP telephony as a means of
transporting phone calls.




                                                         23
PBX (Public Branch Exchange) is a miniature telephone
network that is set to work within a company while
providing several lines to an external phone company
where calls can go in or out. Companies utilize a PBX in
order to minimize cost. Instead of having a single telephone
line for every office or department which are only used for
a fraction of the time, the company can reduce this to a few
lines with the use of PBX while still having a telephone unit
in each office. All internal calls are routed internally while
calls to the outside take any of the available outside lines.

Most PBX systems are not equipped to handle VoIP calls
because they were created and perfected before the advent
of VoIP. But the advantages of implementing VoIP services
in a PBX system has motivated companies and
manufacturers to develop IP PBX systems.
                                                             24
Advantages of

Because of the bandwidth efficiency and low costs
that VoIP technology can provide, businesses are
migrating from traditional copper-wire telephone
systems to VoIP systems to reduce their monthly
phone costs.

Routing phone calls over existing data networks to
avoid the need for separate voice and data networks.

The ability to transmit more than one telephone call
over a single broadband connection.

                                                        25
Secure calls using standardized protocols . Most of
the difficulties of creating a secure
telephone connection over traditional phone lines,
such as digitizing and digital transmission, are
already in place with VoIP. It is only necessary
to encrypt and authenticate the existing data stream.




                                                        26
Li-Fi

It is the term some have used to label the fast and cheap wireless-communication
system, which is the optical version of Wi-Fi. Li-Fi has the advantage of being able to
be used in sensitive areas such as in aircraft without causing interference.          27
The Session Initiation Protocol (SIP)

It is an signaling protocol widely used for controlling communication sessions such as voice and
video calls over Internet Protocol (IP). The protocol can be used for creating, modifying and
terminating two-party (unicast) or multiparty (multicast) sessions. Sessions may consist of one or
several media streams. Other SIP applications include video conferencing, streaming multimedia
distribution, instant messaging, presence information, file transfer and online games.         28
Wimax (Worldwide Interoperability for Microwave Access)
Wireless metropolitan networks (MAN) such as WiMAX provide high-speed Internet access
at much greater distances than wireless LANs can. A MAN requires a transmitting tower and
a receiver and is typically operated by a government entity. It is a wireless communications
standard designed to provide 30 to 40 megabit-per-second data rates, with the 2011 update
providing up to 1 Gbit/s for fixed stations. WiMAX can be descriped as "a standards-based
technology enabling the delivery of last mile wireless broadband access as an alternative to 29
4G Services
Networks today are increasingly becoming more mobile, so you don't have to be at home or
at work to get connected. For example, most mobile broadband services simply require the
use of a card that allows users to access the Internet.
                                                                                           30
Virtual Network Computing (VNC)
It stands for Virtual Network Computing. It is, in essence, a remote display system which allows
you to view a computing 'desktop' environment not only on the machine where it is running, but
from anywhere on the Internet and from a wide variety of machine architectures.

                                                                                             31
It is the use of computing resources (hardware and software) that are delivered as a
service over a network (typically the Internet). The name comes from the use of a
cloud-shaped symbol as an abstraction for the complex infrastructure it contains in
system diagrams. Cloud computing entrusts remote services with a user's data, software
                                                                                     32
and computation.
33

More Related Content

What's hot

Introduction to Computer Networks and Data Communications
Introduction to Computer Networks and Data CommunicationsIntroduction to Computer Networks and Data Communications
Introduction to Computer Networks and Data CommunicationsAngel G Diaz
 
Access and use internet
Access and use internetAccess and use internet
Access and use internetJaleto Sunkemo
 
Data Communication and Computer Network Overview
Data Communication and Computer Network Overview Data Communication and Computer Network Overview
Data Communication and Computer Network Overview RANVIJAY GAUR
 
Chapter 08 communication and network csc
Chapter 08 communication and network cscChapter 08 communication and network csc
Chapter 08 communication and network cscHisyam Rosly
 
Fundamentals of Networking
Fundamentals of NetworkingFundamentals of Networking
Fundamentals of Networkingjashhad
 
Introduction to Networks & Networking Concepts
Introduction to Networks & Networking ConceptsIntroduction to Networks & Networking Concepts
Introduction to Networks & Networking Conceptszaisahil
 
Network and Types of Networks
Network and Types of NetworksNetwork and Types of Networks
Network and Types of NetworksUttar Tamang ✔
 
Chapter01 -- introduction to networking
Chapter01  -- introduction to networkingChapter01  -- introduction to networking
Chapter01 -- introduction to networkingRaja Waseem Akhtar
 
Introduction to networking
Introduction to networkingIntroduction to networking
Introduction to networkingZaeem Hassan
 
Computer Networks
Computer NetworksComputer Networks
Computer NetworksRaj vardhan
 
E-Management, Archival and Retrieval of documents/Office Networking System
E-Management, Archival and Retrieval of documents/Office Networking SystemE-Management, Archival and Retrieval of documents/Office Networking System
E-Management, Archival and Retrieval of documents/Office Networking SystemVaughan Olufemi ACIB, AICEN, ANIM
 
Data communication and network Chapter -1
Data communication and network Chapter -1Data communication and network Chapter -1
Data communication and network Chapter -1Zafar Ayub
 
How Internet Works
How Internet WorksHow Internet Works
How Internet WorksKae Hsu
 
Networking fundamentals
Networking fundamentalsNetworking fundamentals
Networking fundamentalsBesar Limani
 

What's hot (20)

What is soho network
What is soho networkWhat is soho network
What is soho network
 
Introduction to Computer Networks and Data Communications
Introduction to Computer Networks and Data CommunicationsIntroduction to Computer Networks and Data Communications
Introduction to Computer Networks and Data Communications
 
Access and use internet
Access and use internetAccess and use internet
Access and use internet
 
Data Communication and Computer Network Overview
Data Communication and Computer Network Overview Data Communication and Computer Network Overview
Data Communication and Computer Network Overview
 
Chapter 08 communication and network csc
Chapter 08 communication and network cscChapter 08 communication and network csc
Chapter 08 communication and network csc
 
Fundamentals of Networking
Fundamentals of NetworkingFundamentals of Networking
Fundamentals of Networking
 
Net works and types
Net works and typesNet works and types
Net works and types
 
Lesson 1 introduction
Lesson 1 introductionLesson 1 introduction
Lesson 1 introduction
 
Introduction to Networks & Networking Concepts
Introduction to Networks & Networking ConceptsIntroduction to Networks & Networking Concepts
Introduction to Networks & Networking Concepts
 
Network and Types of Networks
Network and Types of NetworksNetwork and Types of Networks
Network and Types of Networks
 
Fg c
Fg cFg c
Fg c
 
Chapter01 -- introduction to networking
Chapter01  -- introduction to networkingChapter01  -- introduction to networking
Chapter01 -- introduction to networking
 
Introduction to networking
Introduction to networkingIntroduction to networking
Introduction to networking
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
 
E-Management, Archival and Retrieval of documents/Office Networking System
E-Management, Archival and Retrieval of documents/Office Networking SystemE-Management, Archival and Retrieval of documents/Office Networking System
E-Management, Archival and Retrieval of documents/Office Networking System
 
Computer networks
Computer networksComputer networks
Computer networks
 
Lecture1
Lecture1Lecture1
Lecture1
 
Data communication and network Chapter -1
Data communication and network Chapter -1Data communication and network Chapter -1
Data communication and network Chapter -1
 
How Internet Works
How Internet WorksHow Internet Works
How Internet Works
 
Networking fundamentals
Networking fundamentalsNetworking fundamentals
Networking fundamentals
 

Viewers also liked

Wong tugasan 1 kpt 6044
Wong tugasan 1 kpt 6044Wong tugasan 1 kpt 6044
Wong tugasan 1 kpt 6044wongsheauwen2
 
Wong tugasan 1 ppt_kpt 6044
Wong tugasan 1 ppt_kpt 6044Wong tugasan 1 ppt_kpt 6044
Wong tugasan 1 ppt_kpt 6044wongsheauwen2
 
Expertise Area
Expertise AreaExpertise Area
Expertise Areakrkight
 
Antarctica
AntarcticaAntarctica
Antarcticadakij
 
Diane Walks 30 minutes a day
Diane Walks 30 minutes a dayDiane Walks 30 minutes a day
Diane Walks 30 minutes a daykrkight
 
Environment Change for Better Health Behavior
Environment Change for Better Health BehaviorEnvironment Change for Better Health Behavior
Environment Change for Better Health Behaviorkrkight
 

Viewers also liked (7)

Wong tugasan 1 kpt 6044
Wong tugasan 1 kpt 6044Wong tugasan 1 kpt 6044
Wong tugasan 1 kpt 6044
 
Wong tugasan 1 ppt_kpt 6044
Wong tugasan 1 ppt_kpt 6044Wong tugasan 1 ppt_kpt 6044
Wong tugasan 1 ppt_kpt 6044
 
Expertise Area
Expertise AreaExpertise Area
Expertise Area
 
Antarctica
AntarcticaAntarctica
Antarctica
 
Diane Walks 30 minutes a day
Diane Walks 30 minutes a dayDiane Walks 30 minutes a day
Diane Walks 30 minutes a day
 
NY 2013
NY 2013NY 2013
NY 2013
 
Environment Change for Better Health Behavior
Environment Change for Better Health BehaviorEnvironment Change for Better Health Behavior
Environment Change for Better Health Behavior
 

Similar to Networking

Introduction to Networking
Introduction to NetworkingIntroduction to Networking
Introduction to NetworkingMohammed Adam
 
presentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.pptpresentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.pptDrPreethiD1
 
presentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.pptpresentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.pptDrPreethiD1
 
presentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.pptpresentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.pptDrPreethiD1
 
Presentation On Computer Network
Presentation On Computer NetworkPresentation On Computer Network
Presentation On Computer NetworkAvinash Ranjan
 
Networking presentationNetworking presentation.pptNetworking presentation.ppt...
Networking presentationNetworking presentation.pptNetworking presentation.ppt...Networking presentationNetworking presentation.pptNetworking presentation.ppt...
Networking presentationNetworking presentation.pptNetworking presentation.ppt...nesarahmad37
 
Ch 15 .networks and communications
Ch 15 .networks and communicationsCh 15 .networks and communications
Ch 15 .networks and communicationsKhan Yousafzai
 
Network yr 7 week 6
Network yr 7 week 6Network yr 7 week 6
Network yr 7 week 6yuvan80
 
1.introduction to computer networks
1.introduction to computer networks1.introduction to computer networks
1.introduction to computer networksSidra Yousuf
 
1 introduction to-networking
1 introduction to-networking1 introduction to-networking
1 introduction to-networkingNor Zailani
 
Cyber security training at ist apr-18
Cyber security training at ist apr-18Cyber security training at ist apr-18
Cyber security training at ist apr-18Sagar Walvekar
 
Networking devices
Networking devicesNetworking devices
Networking devicesRavi KC
 
Networking Basic Refresh.pdf
Networking Basic Refresh.pdfNetworking Basic Refresh.pdf
Networking Basic Refresh.pdfCS Knowledge
 
Networking Bridge course_PPT.pptx
Networking Bridge course_PPT.pptxNetworking Bridge course_PPT.pptx
Networking Bridge course_PPT.pptxakshataharage
 

Similar to Networking (20)

Introduction to Networking
Introduction to NetworkingIntroduction to Networking
Introduction to Networking
 
presentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.pptpresentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.ppt
 
presentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.pptpresentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.ppt
 
presentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.pptpresentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.ppt
 
Presentation On Computer Network
Presentation On Computer NetworkPresentation On Computer Network
Presentation On Computer Network
 
Networking presentationNetworking presentation.pptNetworking presentation.ppt...
Networking presentationNetworking presentation.pptNetworking presentation.ppt...Networking presentationNetworking presentation.pptNetworking presentation.ppt...
Networking presentationNetworking presentation.pptNetworking presentation.ppt...
 
Basic networking
Basic networkingBasic networking
Basic networking
 
Ch 15 .networks and communications
Ch 15 .networks and communicationsCh 15 .networks and communications
Ch 15 .networks and communications
 
Network yr 7 week 6
Network yr 7 week 6Network yr 7 week 6
Network yr 7 week 6
 
Networking lecture1
Networking lecture1Networking lecture1
Networking lecture1
 
Basics of Networking
Basics of NetworkingBasics of Networking
Basics of Networking
 
presentation on type of toplogy and network
presentation on type of toplogy and networkpresentation on type of toplogy and network
presentation on type of toplogy and network
 
1.introduction to computer networks
1.introduction to computer networks1.introduction to computer networks
1.introduction to computer networks
 
1 introduction to-networking
1 introduction to-networking1 introduction to-networking
1 introduction to-networking
 
Cyber security training at ist apr-18
Cyber security training at ist apr-18Cyber security training at ist apr-18
Cyber security training at ist apr-18
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Networking Basic Refresh.pdf
Networking Basic Refresh.pdfNetworking Basic Refresh.pdf
Networking Basic Refresh.pdf
 
Networking Bridge course_PPT.pptx
Networking Bridge course_PPT.pptxNetworking Bridge course_PPT.pptx
Networking Bridge course_PPT.pptx
 
Cct203 lesson 10
Cct203 lesson 10Cct203 lesson 10
Cct203 lesson 10
 
Networking
NetworkingNetworking
Networking
 

Recently uploaded

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 

Recently uploaded (20)

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 

Networking

  • 1. NETWORKING Made By: Prashant Anand Ayush Gupta Shaswat Jain Shubham Goel 1
  • 2. What is a Network? A network consists of 2 or more computers connected together, and they can communicate and share resources (e.g. information) 2
  • 3. Why Networking? Sharing information — i.e. data communication • Do you prefer these? • Or this? 3
  • 4. • Sharing hardware or software • E.g. print document • Centralize administration and support • E.g. Internet-based, so everyone can access the same administrative or support application from their PCs 4
  • 5. How many kinds of Networks? • Depending on one’s perspective, we can classify networks in different ways • Based on transmission media: Wired (UTP, coaxial cables, fiber-optic cables) and Wireless • Based on network size: LAN and WAN (and MAN) • Based on management method: Peer-to-peer and Client/Server • Based on topology (connectivity): Bus, Star, Ring,Mesh 5
  • 6. Transmission Media  Two main categories:  Guided ― wires, cables  Unguided ― wireless transmission, e.g. radio, microwave, infrared, sound, sonar  We will concentrate on guided media here:  Twisted-Pair cables: Unshielded Twisted-Pair (UTP) cables Shielded Twisted-Pair (STP) cables  Coaxial cables  Fiber-optic cables 6
  • 7. Twisted-Pair Cables  If the pair of wires are not twisted, electromagnetic noises from, e.g., motors, will affect the closer wire more than the further one, thereby causing errors 7
  • 8. Unshielded Twisted-Pair (UTP)  Typically wrapped inside a plastic cover (for mechanical protection)  A sample UTP cable with 5 unshielded twisted pairs of wires Insulator Metal 8
  • 9. Shielded Twisted-Pair (STP)  STP cables are similar to UTP cables, except there is a metal foil or braided-metal-mesh cover that encases each pair of insulated wires 9
  • 10. Fiber-Optic Cables  Light travels at 3108 ms-1 in free space and is the fastest possible speed in the Universe  Light slows down in denser media, e.g. glass  Refraction occurs at interface, with light bending away from the normal when it enters a less dense medium  Beyond the critical angle  total internal reflection 10
  • 11. Advantages and Disadvantages  Noise resistance ― external light is blocked by outer jacket  Less signal attenuation ― a signal can run for miles without regeneration (currently, the lowest measured loss is about ~4% or 0.16dB per km)  Higher bandwidth ― currently, limits on data rates come from the signal generation/reception technology, not the fiber itself  Cost ― Optical fibers are expensive  Installation/maintenance ― any crack in the core will degrade the signal, and all connections must be perfectly aligned 11
  • 12. LAN and WAN • Local Area Network (LAN) • Small network, short distance • A room, a floor, a building • Limited by no. of computers and distance covered • Usually one kind of technology throughout the LAN • Serve a department within an organization • Examples: • Network inside the Student Computer Room • Network inside CF502 • Network inside your home 12
  • 13. Wide Area Network (WAN) • A network that uses long-range telecommunication links to connect 2 or more LANs/computers housed in different places far apart. • Towns, states, countries • Examples: • Network of our Campus Your home • Internet WAN USA Student Computer Centre 13
  • 14. Peer-to-Peer Networks • Peer-to-peer network is also called workgroup • No hierarchy among computers  all are equal • No administrator responsible for the network Peer-to-peer 14
  • 15. • Advantages of peer-to-peer networks: • Low cost • Simple to configure • User has full accessibility of the computer • Disadvantages of peer-to-peer networks: • May have duplication in resources • Difficult to uphold security policy • Difficult to handle uneven loading • Where peer-to-peer network is appropriate: • 10 or less users • No specialized services required • Security is not an issue • Only limited growth in the foreseeable future 15
  • 16. Clients and Servers • Network Clients (Workstation) • Computers that request network resources or services • Network Servers • Computers that manage and provide network resources and services to clients • Usually have more processing power, memory and hard disk space than clients • Run Network Operating System that can manage not only data, but also users, groups, security, and applications on the network • Servers often have a more stringent requirement on its performance and reliability 16
  • 17. • Advantages of client/server networks • Facilitate resource sharing – centrally administrate and control • Facilitate system backup and improve fault tolerance • Enhance security – only administrator can have access to Server • Support more users – difficult to achieve with peer-to- peer networks • Disadvantages of client/server networks • High cost for Servers • Need expert to configure the network • Introduce a single point of failure to the system 17
  • 18. Topology ― 3 basic types • How so many computers are connected together? Bus Topology Ring Topology Star Topology Hub 18
  • 19. • Bus Topology • Simple and low-cost • A single cable called a trunk (backbone, segment) • Only one computer can send messages at a time • Passive topology - computer only listen for, not regenerate data • Star Topology • Each computer has a cable connected to a single point • More cabling, hence higher cost • All signals transmission through the hub; if down, entire network down • Depending on the intelligence of hub, two or more computers may send message at the same time 19
  • 20. • Ring Topology • Every computer serves as a repeater to boost signals • Typical way to send data: Ack T T • Token passing T • only the computer who T data T data gets the token can send data T T • Disadvantages T Ack T data Ack • Difficult to add computers T • More expensive T Ack • If one computer fails, whole network fails 20
  • 21. What is VOIP ???? VoIP (Voice over Internet Protocol) is a quite recent advancement in telephony systems. It uses a packet switched network, like the internet, to pass digitized voice data from one point to another. This allows telecommunications companies to squeeze more conversations in the same amount of bandwidth. Even home users can use VoIP handsets, or through computers via software, to call other people who are online for free. Other terms commonly associated with VoIP are IP telephony, Internet telephony, voice over broadband (VoBB), broadband telephony, IP communications, and broadband phone. 21
  • 22. Internet telephony refers to communications services — voice, fax, SMS, and/or voice-messaging applications— that are transported via the Internet, rather than the public switched telephone network (PSTN). The steps involved in originating a VoIP telephone call are signaling and media channel setup, digitization of the analog voice signal, encoding, packetization, and transmission as Internet Protocol (IP) packets over a packet-switched network. On the receiving side, similar steps (usually in the reverse order) such as reception of the IP packets, decoding of the packets and digital-to-analog conversion reproduce the original voice stream 22
  • 23. Even though IP Telephony and VoIP are terms that are used interchangeably, they are actually different; IP telephony has to do with digital telephony systems that use IP protocols for voice communication, while VoIP is actually a subset of IP Telephony. VoIP is a technology used by IP telephony as a means of transporting phone calls. 23
  • 24. PBX (Public Branch Exchange) is a miniature telephone network that is set to work within a company while providing several lines to an external phone company where calls can go in or out. Companies utilize a PBX in order to minimize cost. Instead of having a single telephone line for every office or department which are only used for a fraction of the time, the company can reduce this to a few lines with the use of PBX while still having a telephone unit in each office. All internal calls are routed internally while calls to the outside take any of the available outside lines. Most PBX systems are not equipped to handle VoIP calls because they were created and perfected before the advent of VoIP. But the advantages of implementing VoIP services in a PBX system has motivated companies and manufacturers to develop IP PBX systems. 24
  • 25. Advantages of Because of the bandwidth efficiency and low costs that VoIP technology can provide, businesses are migrating from traditional copper-wire telephone systems to VoIP systems to reduce their monthly phone costs. Routing phone calls over existing data networks to avoid the need for separate voice and data networks. The ability to transmit more than one telephone call over a single broadband connection. 25
  • 26. Secure calls using standardized protocols . Most of the difficulties of creating a secure telephone connection over traditional phone lines, such as digitizing and digital transmission, are already in place with VoIP. It is only necessary to encrypt and authenticate the existing data stream. 26
  • 27. Li-Fi It is the term some have used to label the fast and cheap wireless-communication system, which is the optical version of Wi-Fi. Li-Fi has the advantage of being able to be used in sensitive areas such as in aircraft without causing interference. 27
  • 28. The Session Initiation Protocol (SIP) It is an signaling protocol widely used for controlling communication sessions such as voice and video calls over Internet Protocol (IP). The protocol can be used for creating, modifying and terminating two-party (unicast) or multiparty (multicast) sessions. Sessions may consist of one or several media streams. Other SIP applications include video conferencing, streaming multimedia distribution, instant messaging, presence information, file transfer and online games. 28
  • 29. Wimax (Worldwide Interoperability for Microwave Access) Wireless metropolitan networks (MAN) such as WiMAX provide high-speed Internet access at much greater distances than wireless LANs can. A MAN requires a transmitting tower and a receiver and is typically operated by a government entity. It is a wireless communications standard designed to provide 30 to 40 megabit-per-second data rates, with the 2011 update providing up to 1 Gbit/s for fixed stations. WiMAX can be descriped as "a standards-based technology enabling the delivery of last mile wireless broadband access as an alternative to 29
  • 30. 4G Services Networks today are increasingly becoming more mobile, so you don't have to be at home or at work to get connected. For example, most mobile broadband services simply require the use of a card that allows users to access the Internet. 30
  • 31. Virtual Network Computing (VNC) It stands for Virtual Network Computing. It is, in essence, a remote display system which allows you to view a computing 'desktop' environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. 31
  • 32. It is the use of computing resources (hardware and software) that are delivered as a service over a network (typically the Internet). The name comes from the use of a cloud-shaped symbol as an abstraction for the complex infrastructure it contains in system diagrams. Cloud computing entrusts remote services with a user's data, software 32 and computation.
  • 33. 33