SlideShare a Scribd company logo
Twitter: @eminka_da
Computer Networking
Deborah E. Akuoko | Devops Engineer - Cloud Engineering
Twitter: @eminka_da
Objectives
❏ Give high level and relatable ideas of
computer networking concepts
❏ Prepare for self learning weeks 3 - 6 of google
technical support certification
❏ Prepare for self learning advanced
networking in future
Outline
❏ Recap
❏ Introduction to Network Services (Week 03)
❏ Introduction to Connecting to the Internet
(Week 04)
❏ Introduction to Troubleshooting and the
Future of Networking (Week 05)
Twitter: @eminka_da
Please Physical
Do Data Link
Not Network
Throw Transport
Sliced Session
Pizza Presentation
Away Application
Network Layers(OSI)
Recap
Twitter: @eminka_da
Network Services
○ Domain Name Service(DNS)
■ Overview
■ Why DNS uses UDP ?
■ What is my IP?
Twitter: @eminka_da
Network Services - Domain Name Service(DNS)
Twitter: @eminka_da
Network Services
○ Dynamic Host Config Protocol (DHCP)
■ Overview
■ Static vs dhcp → pros n cons
■ Analogy
Twitter: @eminka_da
Network Services
○ Network Address Translation (NAT)
■ Overview
■ NAT vs PAT
■ Non routable address space and ipv4
limitations
RFC1918: ‘We will refer to the
hosts in the first and second
categories as
"private". We will refer to the
hosts in the third category as
"public".’
Twitter: @eminka_da
Network Services - Network Address Translation (NAT)
Twitter: @eminka_da
Network Services
○ Virtual Private Networks (VPNs)
■ Overview
○ Proxy
Twitter: @eminka_da
Connecting to the Internet
○ Dial up
■ Overview
■ POTs
■ Dial up modems
■ Point to point protocol (PPP)
PO
T
Dial up modem
Twitter: @eminka_da
Connecting to the Internet
○ Broadband
■ Overview
■ Broadband technologies
(DSL, Cable, Fiber and
Satellite, also T-carriers)
Twitter: @eminka_da
Connecting to the Internet
○ T-Carrier technologies: T-Carrier: [L1]
■ T-1: 24 channels and 1.544 Mbps
■ T-2: 96 channels and 6.312 Mbps
■ T-3: 432 channels and 44.736 Mbps
■ T-4: 4032 channels and 274.176
Mbps
Twitter: @eminka_da
Connecting to the Internet
○ Wide Area Networks (WANs)
■ Overview
■ WAN technologies
■ WAN protocols
● Point-to-point topology
● Hub-and-spoke topology
● Full mesh topology
● Dual-homed topology
Twitter: @eminka_da
Connecting to the Internet
○ Wireless Networks
■ Overview
■ Wireless technologies
■ Wireless protocols
■ Wireless channels & security
■ What OSI layer is the network
adapter?
Twitter: @eminka_da
Connecting to the Internet
● 900 MHz (802.11ah)
● 2.4 GHz (802.11b/g/n/ax)
● 3.65 GHz (802.11y)
● 5.0 GHz (802.11j) WLAN
● 5 GHz or 5.8 GHz
(802.11a/h/j/n/ac/ax)
Twitter: @eminka_da
Connecting to the Internet
○ Cellular Networking
■ Mobile device networks
Twitter: @eminka_da
Troubleshooting & Future
○ Verification of network connectivity
■ How the OSI/TCP-IP layes
help ?
■ ICMP
■ Ping & Traceroute
■ What layer is ICMP ?
Twitter: @eminka_da
Troubleshooting & Future
○ DNS deep dive
■ Name resolution tools
■ Public DNS servers
■ Google DNS and nslookup
handson :)
■ DNS registration and expiration
Twitter: @eminka_da
Troubleshooting & Future
○ DNS deep dive
■ Hosts files
Twitter: @eminka_da
Troubleshooting & Future
○ Cloud
■ Virtualisation & hypervisors
■ private , public and hybrid
■ Cloud services(IAAC, PAAS, SAAS)
■ Cloud storage (E.g from Google: Multiregional,
Regional, Nearline and Coldline)
Twitter: @eminka_da
Troubleshooting & Future
Twitter: @eminka_da
Troubleshooting & Future
○ Ipv6
■ Addressing
■ Ipv6 headers
■ Ipv6 vs ipv4
Twitter: @eminka_da
Troubleshooting & Future
Twitter: @eminka_da
Word Definitions
Bit On or off signal (8 bits == Byte)
Symmetrical
Transmission
Equal download/upload speeds
Node Device on the network. Could be computer, switch.
Gateway Network entry point
Packet Formatted unit of data with header and user data
header Control information identifying packet, e.g source, destination.
Non routable ip Private IP space (A, B, C )
Twitter: @eminka_da
Word Definitions
ISP Internet Service Provider
ADSL Asymmetrical DSL (higher download than upload)
DSL Digital subscriber line
Analog Continuous signal
Cloud Cloud computing platform
hop Network count
L OSI /TCP-IP Layers (1-7)
Twitter: @eminka_da
References/Resources
○ IPv4 address space depletion
○ Network Address Translation
○ DHCP
○ Why does DNS use UDP ?
○ OSI Networking Game :)
○ Request for comments (RFC)
○ RFC archives
○ IANA
○ RIR
○ OSI Model

More Related Content

Similar to Bits and bytes of networking

The New Edge of the Network
The New Edge of the NetworkThe New Edge of the Network
The New Edge of the Network
Tom Paseka
 
Keeping the Internet Fast and Resilient for You and Your Customers
Keeping the Internet Fast and Resilient for You and Your CustomersKeeping the Internet Fast and Resilient for You and Your Customers
Keeping the Internet Fast and Resilient for You and Your Customers
Cloudflare
 
IPv6 with Mikrotik
IPv6 with MikrotikIPv6 with Mikrotik
IPv6 with Mikrotik
GLC Networks
 
Ch 11: Hacking Wireless Networks
Ch 11: Hacking Wireless NetworksCh 11: Hacking Wireless Networks
Ch 11: Hacking Wireless Networks
Sam Bowne
 
Internet Protocol Deep-Dive
Internet Protocol Deep-DiveInternet Protocol Deep-Dive
Internet Protocol Deep-Dive
GLC Networks
 
Network address translation
Network address translationNetwork address translation
Network address translation
Mohak Kaushik
 
CN 5151(15) Module II part 2 13082020.pdf
CN 5151(15) Module II part 2 13082020.pdfCN 5151(15) Module II part 2 13082020.pdf
CN 5151(15) Module II part 2 13082020.pdf
ADARSHN40
 
Up and Running DNS Service
Up and Running DNS ServiceUp and Running DNS Service
Up and Running DNS Service
GLC Networks
 
2018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 72018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 7
FRSecure
 
Internet Of Things: Hands on: YOW! night
Internet Of Things: Hands on: YOW! nightInternet Of Things: Hands on: YOW! night
Internet Of Things: Hands on: YOW! night
Andy Gelme
 
CISSP Week 5
CISSP Week 5CISSP Week 5
CISSP Week 5
jemtallon
 
How Networking works with Data Science
How Networking works with Data Science How Networking works with Data Science
How Networking works with Data Science
HungWei Chiu
 
Swiss IPv6 Council: The Cisco-Journey to an IPv6-only Building
Swiss IPv6 Council: The Cisco-Journey to an IPv6-only BuildingSwiss IPv6 Council: The Cisco-Journey to an IPv6-only Building
Swiss IPv6 Council: The Cisco-Journey to an IPv6-only Building
Digicomp Academy AG
 
Internet Week 2018: 1.1.1.0/24 A report from the (anycast) trenches
Internet Week 2018: 1.1.1.0/24 A report from the (anycast) trenchesInternet Week 2018: 1.1.1.0/24 A report from the (anycast) trenches
Internet Week 2018: 1.1.1.0/24 A report from the (anycast) trenches
APNIC
 
Troubleshooting Layer 2 Ethernet Problem: Loop, Broadcast, Security
Troubleshooting Layer 2 Ethernet Problem: Loop, Broadcast, Security Troubleshooting Layer 2 Ethernet Problem: Loop, Broadcast, Security
Troubleshooting Layer 2 Ethernet Problem: Loop, Broadcast, Security
GLC Networks
 
21092018-C4E-What's Next for the Net? Security, Reliability, Capability, Perf...
21092018-C4E-What's Next for the Net? Security, Reliability, Capability, Perf...21092018-C4E-What's Next for the Net? Security, Reliability, Capability, Perf...
21092018-C4E-What's Next for the Net? Security, Reliability, Capability, Perf...
Center for Entrepreneurship (C4E), University of Cyprus
 
CCNA training 101
CCNA training 101CCNA training 101
CCNA training 101
Rohan Reddy
 
Basic Foundation For Cybersecurity
Basic Foundation For CybersecurityBasic Foundation For Cybersecurity
Basic Foundation For Cybersecurity
Mohammed Adam
 
Lecture12 ie321 dr_atifshahzad - networks
Lecture12 ie321 dr_atifshahzad - networksLecture12 ie321 dr_atifshahzad - networks
Lecture12 ie321 dr_atifshahzad - networks
Atif Shahzad
 
Building Indoor Wireless Network
Building Indoor Wireless NetworkBuilding Indoor Wireless Network
Building Indoor Wireless Network
GLC Networks
 

Similar to Bits and bytes of networking (20)

The New Edge of the Network
The New Edge of the NetworkThe New Edge of the Network
The New Edge of the Network
 
Keeping the Internet Fast and Resilient for You and Your Customers
Keeping the Internet Fast and Resilient for You and Your CustomersKeeping the Internet Fast and Resilient for You and Your Customers
Keeping the Internet Fast and Resilient for You and Your Customers
 
IPv6 with Mikrotik
IPv6 with MikrotikIPv6 with Mikrotik
IPv6 with Mikrotik
 
Ch 11: Hacking Wireless Networks
Ch 11: Hacking Wireless NetworksCh 11: Hacking Wireless Networks
Ch 11: Hacking Wireless Networks
 
Internet Protocol Deep-Dive
Internet Protocol Deep-DiveInternet Protocol Deep-Dive
Internet Protocol Deep-Dive
 
Network address translation
Network address translationNetwork address translation
Network address translation
 
CN 5151(15) Module II part 2 13082020.pdf
CN 5151(15) Module II part 2 13082020.pdfCN 5151(15) Module II part 2 13082020.pdf
CN 5151(15) Module II part 2 13082020.pdf
 
Up and Running DNS Service
Up and Running DNS ServiceUp and Running DNS Service
Up and Running DNS Service
 
2018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 72018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 7
 
Internet Of Things: Hands on: YOW! night
Internet Of Things: Hands on: YOW! nightInternet Of Things: Hands on: YOW! night
Internet Of Things: Hands on: YOW! night
 
CISSP Week 5
CISSP Week 5CISSP Week 5
CISSP Week 5
 
How Networking works with Data Science
How Networking works with Data Science How Networking works with Data Science
How Networking works with Data Science
 
Swiss IPv6 Council: The Cisco-Journey to an IPv6-only Building
Swiss IPv6 Council: The Cisco-Journey to an IPv6-only BuildingSwiss IPv6 Council: The Cisco-Journey to an IPv6-only Building
Swiss IPv6 Council: The Cisco-Journey to an IPv6-only Building
 
Internet Week 2018: 1.1.1.0/24 A report from the (anycast) trenches
Internet Week 2018: 1.1.1.0/24 A report from the (anycast) trenchesInternet Week 2018: 1.1.1.0/24 A report from the (anycast) trenches
Internet Week 2018: 1.1.1.0/24 A report from the (anycast) trenches
 
Troubleshooting Layer 2 Ethernet Problem: Loop, Broadcast, Security
Troubleshooting Layer 2 Ethernet Problem: Loop, Broadcast, Security Troubleshooting Layer 2 Ethernet Problem: Loop, Broadcast, Security
Troubleshooting Layer 2 Ethernet Problem: Loop, Broadcast, Security
 
21092018-C4E-What's Next for the Net? Security, Reliability, Capability, Perf...
21092018-C4E-What's Next for the Net? Security, Reliability, Capability, Perf...21092018-C4E-What's Next for the Net? Security, Reliability, Capability, Perf...
21092018-C4E-What's Next for the Net? Security, Reliability, Capability, Perf...
 
CCNA training 101
CCNA training 101CCNA training 101
CCNA training 101
 
Basic Foundation For Cybersecurity
Basic Foundation For CybersecurityBasic Foundation For Cybersecurity
Basic Foundation For Cybersecurity
 
Lecture12 ie321 dr_atifshahzad - networks
Lecture12 ie321 dr_atifshahzad - networksLecture12 ie321 dr_atifshahzad - networks
Lecture12 ie321 dr_atifshahzad - networks
 
Building Indoor Wireless Network
Building Indoor Wireless NetworkBuilding Indoor Wireless Network
Building Indoor Wireless Network
 

Recently uploaded

Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
LucaBarbaro3
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Jeffrey Haguewood
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Tatiana Kojar
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 

Recently uploaded (20)

Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 

Bits and bytes of networking

Editor's Notes

  1. QnA from previous ??
  2. What: L7 network service that helps us resolve friendly domain names to ip addresses Why: although domain names are easy for people to remember, computers or machines, access websites based on IP addresses How: 3 way handshake (L7) to query → Uses either UDP or TCP (L4) via a 4 way handshake to serve requested resource Use cases, QnAnA
  3. What: L7 network service that helps us resolve friendly domain names to ip addresses Why: although domain names are easy for people to remember, computers or machines, access websites based on IP addresses How: 3 way handshake (L7) to query → Uses either UDP or TCP (L4) via a 4 way handshake to serve requested resource Use cases, QnAnA
  4. What: L7 network service that ensures automatic assignment of ip addresses on network Why: ip scalability if ip needs grow, less error prone, unlikely conflict in ip assignment, better ip assigning management. How: It accepts UDP requests for IP address from un-configured hosts. Then, returns the IP address for that host. Static may be prefered in VPN applications Use cases, QnAnA
  5. What: L3 network service that translates private ips to public ips for routing to and from a private network Why: Secure:keeps internal addressing from the external network, help conserve ip space by mappin multiple private ip set to one public ip How: Modifies IP header of packet to reflect appropriate public or private ip Non routable address space: Class A, B and C ( D==multicast, E==Experimental purpose) Use cases, QnAnA
  6. What: L3 network service that translates private ips to public ips for routing and vice versa Why: Secure:keeps internal addressing from the external network, help conserve ip space by mappin multiple private ip set to one public ip How: Modifies IP header of packet to reflect appropriate public or private ip Non routable address space: Class A, B and C ( D==multicast, E==Experimental purpose) Use cases, QnAnA
  7. What: (L3 / L2 ) network service for safe and encrypted connection over a less secure network e.g. internet. Extends private network via public network Why: safety, privacy, How: KPMG wfh scenario Proxies: Anonymous web browsing and managing content access control. It masks your IP location but doesn’t encrypt your data, (KPMG scenario) Use cases, QnAnA
  8. What: internet service that connect via phone line. Phone couldn’t be used for both calls and internet connectivity at same time(Baseband) Why: We had to get on the internet by some means :) and this was the best way then How: Dial into your ISP (Internet Service Provider) using a phone number via an external (or later internal) dial-up modem((L1 device) POTs: voice-grade telephone service. Uses analog signal transmission Point to point protocol (PPP):enable dial up connections / facilitates the transmission of data packets between point to point links. Use cases, QnAnA
  9. What: internet service uses multiple channel and able to split signal traffic among different channels for both calls and internet connectivity Why: it's a lot better than traditional dial up connection, faster and more options for delivery. Find protocols How: Broadband technologies(order of popularity): DSL, Cable modem, Fiber, t-carriers, and Satellite . Find order of speed
  10. What: internet service Dedicated multi channel phone call and data (point-to-point private networks). Unlike standard telephone lines which transfer data and voice at about 30,000 bits per second (30 kbps) using a dial-up modem Why: dedicated and faster connection How: multi channels (maths)
  11. What: geographically distributed network that interconnects multiple local area networks (LANs). E.g network of ATMs, internet, #askmore Why: expand networks accross diverse locations, How: Facilitated by WAN technologies and protocols WAN technologies usually at layers 1,2&3
  12. What: Network on which data transmission is via a wireless medium Why: Convenience/mobility, easy deployment, might cost less How: LAN==Wi-Fi, Community==WiMax, Satellite,MAN==Point-to-Point links, PAN==Bluetooth,Zigbee, infrared, etc.. Devices: Repeater(L1), Wireless router(L3),
  13. What: Network on which data transmission is via a wireless medium Why: Convenience/mobility, easy deployment, might cost less How: LAN==Wi-Fi, Community==WiMax, Satellite,MAN==Point-to-Point links, PAN==Bluetooth,Zigbee, infrared, etc.. Ref Devices: Repeater(L1), Wireless router(L3),
  14. What: A cellular network or mobile network is a radio network distributed over land areas called cells, each served by at least one fixed-location transceiver, known as a cell site or base station. Why: seamless roaming capabilities for supporting cellular devices. How:
  15. Handson with students (Ping & Traceroute) The Internet Control Message Protocol (ICMP) is a supporting protocol in the Internet protocol suite. It is used by network devices, including routers, to send error messages and operational information indicating success or failure when communicating with another IP address
  16. Hostsfiles: Maps custom hostnames to ip addresses. Testing domains locally before going live Tools: NSlookup: resolves domain names to ip
  17. Hostsfiles: Maps custom hostnames to ip addresses. Testing domains locally before going live Tools: NSlookup: resolves domain names to ip
  18. Virtualization: single host could run many virtual instances called guests. Hypervisor: runs and manages virtual machines while also offering these guests a virtual operating platform that's indistinguishable from actual hardware. Cloud leverages on this to create a system that allows massive resource sharing
  19. Virtualization: single host could run many virtual instances called guests. Hypervisor: runs and manages virtual machines while also offering these guests a virtual operating platform that's indistinguishable from actual hardware. Cloud leverages on this to create a system that allows massive resource sharing
  20. What: emerged to resolved the depleting addresses of ipv4. Uses alphanumeric to represent ip addresses rather than numbers as in ipv4. (Hexadecimals). 128 bit ip address & 16 octets
  21. What: emerged to resolved the depleting addresses of ipv4. Ipv6 vs ipv4 harmony: how do we safely and seamlessly transition or even merge these two ? Read more about ipv6 tunneling