SlideShare a Scribd company logo
1 of 23
Chapter – 1
Networking
Fundamentals
BUVANESH.K
WIPRO,MYSORE
What we cover in this chapter
 1.What is a Computer Network?
 2.Difference between LAN/WAN
 3.Difference between point to point/MPLS and Internet link
 4.Site-to-Site WAN topologies
 5.Collision Domain
 6.Broadcast Domain
 7.Networking devices
What is a computer network?
A set of computers connected together for sharing information & resources
A Simple Network
Benefits of a Network
 Information sharing: Authorized users can use other
computers on the network to access and share information and data. This
could include special group projects, databases, etc.
 Hardware sharing: One device connected to a network, can be
shared by many users.
 Software sharing: Instead of purchasing and installing a
software program on each computer, it can be installed on the server. All
of the users can then access the program from a single location.
Types of Networks
 Local Area Network (LAN) – It is a group of network
components that work within small area.
 Wide Area Network (WAN) – It is a group of LANs that are
interconnected within large area.
Difference between point to point,
MPLS and Internet link
 Will explain in training.
Site to Site WAN Topology
 Hub and Spoke Topology
 Full Mesh Topology
 Partial Mesh Topology
Hub and Spoke Topology
Full Mesh Topology
Partial Mesh Topology
What is a Collision Domain?
 What is a Collision?
Ethernet uses
CSMA/CD for determining when a
computer is free to transmit data thru
the medium. Using CSMA/CD all
computers monitor the transmission
medium and wait until the medium is
free before transmitting. If two
computers try to transmit at the same
time a collision will occur.
 What is a Collision Domain?
Only one device in the collision
domain may transmit at any one time,
and the other devices in
the domain listen to the network in
order to avoid data collisions.
What is a Broadcast Domain?
 A Broadcast Domain consists of all
the devices that will receive any
broadcast packet originating from any
device within the network segment.
 In the picture, "Computer A" is
sending a broadcast and switch will
forward it to every ports and all the
switches will get a copy of broadcast
packet. Every switch will flood the
broadcast packet to all the ports.
Router also will get a copy of
broadcast packet, but the Router will
not forward the packet to the next
network segment.
Networking Devices
Repeater
 A repeater does exactly that – It
repeats any electric signals that come
into one port out of its other port.
 Ethernet or WiFi data transmissions
can only span a limited distance.
Repeater helps to extend that
distance.
HUB
 A HUB is a multiport repeater.
 It allows to connect multiple PCs to a
single network.
 A HUB receives signal from one port
and transmit it to all the other devices
connected in that HUB. It is not an
intelligent device. If a computer A
sends out a signal, computer B,C & D
will also receive even though it was
meant only for computer B.
 It is a Half duplex Device.
 One collision domain and one
broadcast domain per device.
Switch
 A switch is an intelligent device.
 Unlike network hubs, a network switch
forwards data only to one or multiple
devices that need to receive it, rather
than broadcasting the same data out of
each of its ports.
 If computer A send a message to
computer B, a switch will make sure that
only computer B receives it.
 Switch can operate as full duplex or half
duplex.
 It has one collision domain per port and
one broadcast domain per device.
Bridge
 A bridge does the same function as a
switch. But it is slower and has less
ports than a switch. (Switch has 24 &
48 ports whereas bridge has 2 ports)
 It operates only in Half duplex mode.
 One collision domain per port and one
broadcast domain per device.
Router
 Routers joins multiple networks
together. It forward packets based on
IP addresses.
 A router is the device which allows a
PC to connect to WAN link/Internet.
 A router finds the best path to the
destination.
 One collision domain per port and one
broadcast domain per port. (Router
breaks broadcast domain.)
Firewall
 Primary function of a Firewall is to
protect a network from unauthorized
users/hackers.
 Firewalls can be configured with
"rules". Firewall rules can be used to
allow/deny network traffic from/to the
network. These rules can be based on
Source/Destination network,
Source/Destination IP Address,
Source/Destination TCP/UDP port
numbers, Protocols, Applications etc.
Wireless Access Points
 When you don’t have Wi-Fi on a
device, If you want Wi-Fi for that
device you can use wireless access
point and connect to the device that
you need wi-fi.
Load Balancer
 Load balancers allow you to distribute
load between several servers.
 Advantages of load balancer is
Reliability and capacity.

More Related Content

Similar to Chapter_1_Networking_Fundamentals.pptx

INFORMATION PRACTICES CBSE CLASS 12 UNIT 3
INFORMATION PRACTICES CBSE CLASS 12 UNIT 3INFORMATION PRACTICES CBSE CLASS 12 UNIT 3
INFORMATION PRACTICES CBSE CLASS 12 UNIT 3NIMISHMUTYAPU
 
NETWORK COMPONENTS AND CABLES.pdf
NETWORK COMPONENTS AND CABLES.pdfNETWORK COMPONENTS AND CABLES.pdf
NETWORK COMPONENTS AND CABLES.pdfSanjanaSingh158
 
Network devices.pptx
Network devices.pptxNetwork devices.pptx
Network devices.pptxAslamCh3
 
What is networking
What is networkingWhat is networking
What is networkingbabyparul
 
Basic Networking
Basic NetworkingBasic Networking
Basic NetworkingCEC Landran
 
Hubs vs switches vs routers
Hubs vs switches vs routersHubs vs switches vs routers
Hubs vs switches vs routers3Anetwork com
 
Terminologies used with networking
Terminologies used with networkingTerminologies used with networking
Terminologies used with networkingchamwama
 
Computer networking class 12
Computer networking class 12Computer networking class 12
Computer networking class 12LakshyaT
 
Introduction To Computer Networks
Introduction To Computer Networks Introduction To Computer Networks
Introduction To Computer Networks AfsanaAkterRubi
 
information technology
information technologyinformation technology
information technologyNavneet kaur
 

Similar to Chapter_1_Networking_Fundamentals.pptx (20)

INFORMATION PRACTICES CBSE CLASS 12 UNIT 3
INFORMATION PRACTICES CBSE CLASS 12 UNIT 3INFORMATION PRACTICES CBSE CLASS 12 UNIT 3
INFORMATION PRACTICES CBSE CLASS 12 UNIT 3
 
NETWORK COMPONENTS AND CABLES.pdf
NETWORK COMPONENTS AND CABLES.pdfNETWORK COMPONENTS AND CABLES.pdf
NETWORK COMPONENTS AND CABLES.pdf
 
Network connecting device
Network connecting device Network connecting device
Network connecting device
 
Network devices
Network devicesNetwork devices
Network devices
 
Network devices.pptx
Network devices.pptxNetwork devices.pptx
Network devices.pptx
 
network layer
network layernetwork layer
network layer
 
What is networking
What is networkingWhat is networking
What is networking
 
Basic Networking
Basic NetworkingBasic Networking
Basic Networking
 
Data communication notes
Data communication notesData communication notes
Data communication notes
 
Hubs vs switches vs routers
Hubs vs switches vs routersHubs vs switches vs routers
Hubs vs switches vs routers
 
Terminologies used with networking
Terminologies used with networkingTerminologies used with networking
Terminologies used with networking
 
2nd class
2nd class2nd class
2nd class
 
Computer networking class 12
Computer networking class 12Computer networking class 12
Computer networking class 12
 
Networks
Networks   Networks
Networks
 
W 10 introduction to network
W 10 introduction to networkW 10 introduction to network
W 10 introduction to network
 
Class 2
Class 2Class 2
Class 2
 
COMPUTER NETWORKS
COMPUTER NETWORKSCOMPUTER NETWORKS
COMPUTER NETWORKS
 
Introduction To Computer Networks
Introduction To Computer Networks Introduction To Computer Networks
Introduction To Computer Networks
 
Network devices
Network devicesNetwork devices
Network devices
 
information technology
information technologyinformation technology
information technology
 

Recently uploaded

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 

Recently uploaded (20)

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 

Chapter_1_Networking_Fundamentals.pptx

  • 2. What we cover in this chapter  1.What is a Computer Network?  2.Difference between LAN/WAN  3.Difference between point to point/MPLS and Internet link  4.Site-to-Site WAN topologies  5.Collision Domain  6.Broadcast Domain  7.Networking devices
  • 3. What is a computer network? A set of computers connected together for sharing information & resources
  • 5. Benefits of a Network  Information sharing: Authorized users can use other computers on the network to access and share information and data. This could include special group projects, databases, etc.  Hardware sharing: One device connected to a network, can be shared by many users.  Software sharing: Instead of purchasing and installing a software program on each computer, it can be installed on the server. All of the users can then access the program from a single location.
  • 6. Types of Networks  Local Area Network (LAN) – It is a group of network components that work within small area.  Wide Area Network (WAN) – It is a group of LANs that are interconnected within large area.
  • 7. Difference between point to point, MPLS and Internet link  Will explain in training.
  • 8. Site to Site WAN Topology  Hub and Spoke Topology  Full Mesh Topology  Partial Mesh Topology
  • 9. Hub and Spoke Topology
  • 12. What is a Collision Domain?  What is a Collision? Ethernet uses CSMA/CD for determining when a computer is free to transmit data thru the medium. Using CSMA/CD all computers monitor the transmission medium and wait until the medium is free before transmitting. If two computers try to transmit at the same time a collision will occur.  What is a Collision Domain? Only one device in the collision domain may transmit at any one time, and the other devices in the domain listen to the network in order to avoid data collisions.
  • 13. What is a Broadcast Domain?  A Broadcast Domain consists of all the devices that will receive any broadcast packet originating from any device within the network segment.  In the picture, "Computer A" is sending a broadcast and switch will forward it to every ports and all the switches will get a copy of broadcast packet. Every switch will flood the broadcast packet to all the ports. Router also will get a copy of broadcast packet, but the Router will not forward the packet to the next network segment.
  • 14.
  • 16. Repeater  A repeater does exactly that – It repeats any electric signals that come into one port out of its other port.  Ethernet or WiFi data transmissions can only span a limited distance. Repeater helps to extend that distance.
  • 17. HUB  A HUB is a multiport repeater.  It allows to connect multiple PCs to a single network.  A HUB receives signal from one port and transmit it to all the other devices connected in that HUB. It is not an intelligent device. If a computer A sends out a signal, computer B,C & D will also receive even though it was meant only for computer B.  It is a Half duplex Device.  One collision domain and one broadcast domain per device.
  • 18. Switch  A switch is an intelligent device.  Unlike network hubs, a network switch forwards data only to one or multiple devices that need to receive it, rather than broadcasting the same data out of each of its ports.  If computer A send a message to computer B, a switch will make sure that only computer B receives it.  Switch can operate as full duplex or half duplex.  It has one collision domain per port and one broadcast domain per device.
  • 19. Bridge  A bridge does the same function as a switch. But it is slower and has less ports than a switch. (Switch has 24 & 48 ports whereas bridge has 2 ports)  It operates only in Half duplex mode.  One collision domain per port and one broadcast domain per device.
  • 20. Router  Routers joins multiple networks together. It forward packets based on IP addresses.  A router is the device which allows a PC to connect to WAN link/Internet.  A router finds the best path to the destination.  One collision domain per port and one broadcast domain per port. (Router breaks broadcast domain.)
  • 21. Firewall  Primary function of a Firewall is to protect a network from unauthorized users/hackers.  Firewalls can be configured with "rules". Firewall rules can be used to allow/deny network traffic from/to the network. These rules can be based on Source/Destination network, Source/Destination IP Address, Source/Destination TCP/UDP port numbers, Protocols, Applications etc.
  • 22. Wireless Access Points  When you don’t have Wi-Fi on a device, If you want Wi-Fi for that device you can use wireless access point and connect to the device that you need wi-fi.
  • 23. Load Balancer  Load balancers allow you to distribute load between several servers.  Advantages of load balancer is Reliability and capacity.