SlideShare a Scribd company logo
1 of 61
ECE 1- Data
Communication and
Networking
HOYLE S. FAJANILAN JR.
Learning Objectives:
Students should be able to:
1. Define what is a network and how it work;
2. Understand Local Area Networks (LANs);
3. Know the capabilities of Hubs compared to switches;
4. Understand the difference between the wired LAN and a wireless LAN;
5. Define what is a VLAN;
6. Describe the various security zones;
7. Describe network topologies and access methods; and
8. Identify the Ethernet standards
Lesson 1: Understanding Local Area
Networking
A network refers to a collection of interconnected
devices, such as computers, servers, routers, switches,
and other hardware, that are linked together to share
resources, information, and services. The primary
purpose of a network is to facilitate communication
and collaboration between devices, allowing them to
exchange data and interact with each other.
Some key concepts related to
networks:
 Networks can vary widely in size and
complexity, ranging from small local area
networks (LANs) within a single building to
large-scale global networks that span
continents.
Some key concepts related to
networks:
 Nodes: Nodes are the individual devices or
components that are connected within a
network. These can include computers,
servers, smartphones, printers, and more.
Some key concepts related to
networks:
Connections: The connections between
nodes can be physical, such as Ethernet
cables or fiber optic lines, or they can be
wireless, such as Wi-Fi or cellular
connections.
Some key concepts related to
networks:
Topologies: Network topology refers to
the arrangement of nodes and
connections within a network. Common
topologies include star, bus, ring, and
mesh configurations.
Some key concepts related to
networks:
 Protocols: Network protocols are a set of
rules and standards that govern how data is
transmitted, received, and interpreted across a
network. Examples include TCP/IP
(Transmission Control Protocol/Internet
Protocol) for the internet and Ethernet for
local networks.
Some key concepts related to
networks:
 Data Transmission: Networks allow devices to send
and receive data, which can include anything from
simple text messages to complex multimedia files.
Data transmission can occur in various formats, such
as packets for digital data.
Some key concepts related to
networks:
Resource Sharing: One of the
fundamental functions of a network is to
enable resource sharing. This can include
sharing files, printers, internet
connections, and more among connected
devices.
Some key concepts related to
networks:
 Security: Network security involves measures
to protect the confidentiality, integrity, and
availability of data within a network. This
includes mechanisms like firewalls, encryption,
and access controls.
Some key concepts related to
networks:
 Types of Networks: Networks can be
categorized based on their size and scope. In
addition to LANs and global networks (WANs),
there are also metropolitan area networks
(MANs) that cover city-wide areas and
personal area networks (PANs) that are meant
for small, personal connections.
Some key concepts related to
networks:
 Internet: The internet is the largest and most
well-known global network, connecting
billions of devices worldwide. It is a vast
network of networks that uses the TCP/IP
protocol suite.
 Intranet and Extranet: An intranet is a private network
within an organization, allowing internal
communication and collaboration. An extranet
extends this concept to include external parties, such
as suppliers or customers, for controlled access to
specific resources.
:
Networks are a fundamental part of modern
computing and communication, enabling
individuals and organizations to share information,
access services, and collaborate across different
locations and devices.
What is LAN?
WHAT IS LAN?
 LAN stands for "Local Area Network." It is a type of
computer network that covers a small geographic
area, typically within a single building or a group of
nearby buildings like a school, office, or home. LANs
are used to connect computers, devices, and
resources within a limited area, allowing them to
share information, resources, and services.
Key characteristics of LANs include:
 Limited Geographic Area: LANs cover a small
and well-defined geographic area, usually
within a few kilometers. This distinguishes
them from larger networks like wide area
networks (WANs) that cover broader
geographical regions.
Key characteristics of LANs include:
 High Data Transfer Rates: LANs are designed
for relatively high data transfer rates, allowing
devices on the network to communicate
quickly and efficiently. This is essential for
tasks like file sharing, printing, and
collaborative work.
Key characteristics of LANs include:
 Private Ownership: LANs are typically owned, set
up, and maintained by the organization or individual
who owns the premises where the network is
deployed. This gives the owner more control over the
network's configuration and security.
Key characteristics of LANs include:
Topologies: LANs can be set up in
various topologies, including star, bus,
ring, or mesh configurations. These
topologies determine how devices are
interconnected within the network.
Key characteristics of LANs include:
Ethernet and Wi-Fi: Ethernet, a wired
technology, and Wi-Fi, a wireless
technology, are commonly used to
connect devices within a LAN. Ethernet
uses cables to establish connections,
while Wi-Fi uses radio signals for wireless
connections.
Key characteristics of LANs include:
Resource Sharing: One of the primary
purposes of a LAN is to enable resource
sharing. This includes sharing files,
printers, and other peripherals among
the connected devices.
Key characteristics of LANs include:
 Ease of Administration: Because LANs are
relatively small, they are easier to manage and
administer compared to larger networks. This
makes tasks such as monitoring,
troubleshooting, and security management
more straightforward.
Key characteristics of LANs include:
 Low Latency: LANs typically have low latency, which
means that data transmission and response times
between devices are minimal. This is essential for
real-time applications like online gaming and video
conferencing.
 Overall, LANs play a crucial role in enabling
local communication and resource sharing,
making them an essential component of
modern computing environments.
 To understand local area networks (LANs) better, it helps to write out the
structure of the LAN—to document it. Network documentation is any
information that helps describe, define, and otherwise explain how
computers are connected in a physical and logical way.
 In the following exercises, you will:
 1. Examine typical LAN network documentation.
 2. View the type of network adapter in a computer, inspect the type of
connection that the network adapter makes to the network, and view its
Properties page.
 3. Define how information is sent across the LAN.
 4. Configure IP addresses on hosts.
Examine LAN Network Documentation
Examine LAN Network Documentation
A server, used to centralize data and share it with
(or serve it to) other computers on the network.
A PC (personal computer) usually acts as a client
on the network, most likely getting its
information from the server. The PC can also
store information locally.
A Mac (Macintosh) computer, which is another
type of client computer; once again, this
computer can store information locally, or get it
from the server.
A laptop, which could be a PC or a Mac, is meant
for portability. However, it can also store and
access data the same way the other computers
do.
A hub , also known as a multiport repeater . This is the most basic of central
connecting devices (CCDs); it connects each of the computers, known as
hosts, to each other by way of copper-based cables
Intermediate LAN documentation
the hub is replaced with a basic four-port router;
these are also referred to as SOHO (Small
Office/Home Office) routers. The router acts as a
central connecting device, connecting the hosts
together, but also has a special communications link
to the Internet, allowing the hosts to send and
receive data to and from computers on the Internet.
That communications link between the router and
the Internet is where the LAN ends. So, the PC,
laptop, server, and router are part of the LAN.
Anything else beyond the router is considered to be
outside of the LAN
Advanced LAN documentation
In example, more central connecting devices are
added. Instead of connecting hundreds of
devices to a single central connecting device,
you can arrange the network in a hierarchical
way. For instance, on the left side of the figure,
there are two PCs and one server connected to a
hub. Let's assume these represent 24 computers
each, and each group of computers connected to
a hub also represents 24 computers. Instead of
linking all computers to one central device,
which might not be able to handle all of them,
the groups of 24 computers are connected to
their own hubs. Then, these hubs are connected
one after another to a switch at the top of the
figure. This switch will likely be a powerful (and
costly) device to support all the computers
connected to it. You can think of individual hubs
as devices providing connectivity for separate
departments in a company or individual
classrooms in a school.
In summary:‱Hub: Basic, operates at the physical layer,
broadcasts data to all devices.
‱Router: Connects different networks, operates at
the network layer, routes data based on IP
addresses and maintains routing tables.
‱Switch: More intelligent, operates at the data link
layer, forwards data only to the intended device
based on MAC addresses.
‱In modern networking setups, switches and routers
are commonly used due to their efficiency and ability
to handle more complex networking tasks. Hubs are
generally considered obsolete due to their
limitations in managing network traffic.
The network adapter, also known as a
network interface card (NIC), is the device
that enables the sending and receiving of
data to and from your computer. It might
be integrated into the motherboard or it
might act as a separate device that
connects to a PCI slot, or perhaps connects
to a PC Card slot or USB port
This particular network adapter is a PCI card, but
again, network adapters come in many different
forms. However, notice the port on the card. This is
known as an RJ-45 port, and is where the RJ-45 plug
at the end of the network cable connects
This type of cable is known as twisted pair
View the Network Adapter
 View the Network Adapter To view the network adapter, perform the
following steps.
 1. Examine the card, which shows a typical network adapter.
 2. Look for the network adapter on your computer. If the computer only
uses a wireless network adapter, look for an antenna on the card. Laptops
have an internal antenna, but you can usually find out if you are connected
wirelessly by looking at the wireless LED
 Examine Figure 1.5. This is a typical patch cable that connects to an RJ-45
port
View the Network Adapter (contd..)
 Identify the cable that connects your computer to the network. Disconnect
the cable (finish any downloads from the Internet if in progress first) and
view the connector. If you are connected via a cable, attempt to identify
what device is connected to the other end of the cable, such as a hub,
switch, or router.
 5. Now let’s access the operating system and look at the properties of a
network adapter. For this example, we are using a Windows 10 client
computer with a Realtek PCIe network adapter. However, older versions of
Windows have almost identical window and dialog box names, and the
navigation to those windows is similar as well.
 a. Right-click Start and choose
Computer Management.
Alternatively for Windows 10, and
for Windows Server 2016, click Start,
type Computer Management, and
then press Enter.
 b. Click Device Manager.
 c. Click the > sign to expand the
Network adapters category.
Device Manager with the Network adapters
category expanded
Click the Advanced tab. If
you click the Speed &
Duplex option, you can
then change the value.
Full-duplex means that the network card can send and
receive data simultaneously. In the Speed and Duplex
drop-down menu, you can select various speeds ,
including 10 Mbps, 100 Mbps, and 1 Gbps. You can also
select half-duplex, which means that the network adapter
can send and receive data, but not at the same time. Full-
duplex is the superior connection, as long as your central
connecting device supports it. A fullduplex connection can
transceive (transmit and receive) twice as much
information per second compared with a half-duplex
connection. So, to meet the requirements of the original
scenario, you would probably want your client computers
to connect at 1 Gbps as well as utilize full-duplex
negotiations. You can tell that a card is active because the
Link Status field on the physical device shows a green
light. You can also open the device Status window (Open
Network and Sharing Center, and clink the adapter link) to
see the current speed of the adapter such as 1 Gbps, its
media state, how long it has been up and the current
activity.
7. Finally, every network adapter will have a logical name. By
default, the network adapter is known as Ethernet, although
you can change the name if you so desire. Ethernet will have
its own Properties page and a status page. Let’s view these
now: a. Right-click the Network icon on the far right of the
taskbar and choose Open Network And Sharing Center. The
Network And Sharing Center window opens.. An alternate
way to access the Network and Sharing Center is to right-
click Start and choose Control Panel. Then, navigate to
Network And Internet ➱ Network And Sharing Center. b.
Click the Change Adapter Settings link. The Network
Connections window opens. (Navigation to this window is
slightly different in other versions of Windows.) c. In this
window, right-click the Ethernet icon and choose
Properties..
From here, you can configure Internet
Protocol (IP), bind new protocols to the
network adapter, and so on
d. Click Cancel to close the dialog box. This
should return you to the Network
Connections window.
e. Now, double-click the Ethernet icon. The
Ethernet Status dialog box opens. This dialog
box displays the type of connectivity, speed,
and how long the adapter has been
connected; it also shows the total bytes sent
and received. In addition, from this dialog
box, you can access the Properties dialog box
and diagnose the network adapter, if
necessary.
Defining Data Transfer on the LAN
Configuring Internet Protocol
 Internet Protocol, or IP, is the part of TCP/IP that, among other
things, governs IP addresses. The IP address is the cornerstone
of networking. It defines the computer or host you are
working on. Today, every computer and many other devices
have one. An IP address allows each computer to send and
receive information back and forth in an orderly and efficient
manner. IP addresses are like your home address. Just like your
home address identifies your house number and the street
you live on, an IP address identifies your computer number
and the network it lives on. A common example of an IP
address is 192.168.1.1.
 The subnet mask is a group of four numbers that define what IP network the
computer is a member of. All of the 255s in a subnet mask collectively refer to
the network portion, while the 0s refer to the host portion. This is illustrated in
Table 1.1. This table shows a typical Class C IP address and the default
corresponding subnet mask. If you were to configure the IP address of a
Windows computer as 192.168.1.1, Windows would automatically default to a
subnet mask of 255.255.255.0
 IP addresses are actually 32-bit dotted-decimal numbers. If you were to
convert an IP address’s decimal numbers to binary, you’d have a total of 32
bits. It is considered dotted because each number is separated by a dot.
Altogether, they contain four numbers, each of which is a byte or octet. For
example, 192 is an octet and its binary equivalent is 11000000, which is 8
bits. 168 is also an octet, its binary equivalent is 10101000, and so on.
Adding all four octets together equals 32 bits. IP addresses are usually
applied to your network adapter, but can be applied to other devices, such
as switches, routers, and so on. It’s the fact that the device or computer has
an IP address that makes it a host
Configure IP Addresses
 To configure IP addresses, perform the following steps.
 1. Access the Ethernet Properties dialog box.
 2. Click Internet Protocol Version 4 and then click the Properties button. The
Internet Protocol Version 4 Properties dialog box opens. Write down the current
settings (if there are any) so that you can return the computer to these settings
at the end of the exercise.
 3. By default, the Obtain an IP address automatically and Obtain DNS server
address automatically radio buttons are enabled, as shown in Figure 1.11. That
means that the network adapter will attempt to get all its IP information from a
DHCP server or other device like a SOHO (Small Office/Home Office) four-port
router. However, we want to configure the adapter statically, so let’s continue
on!
Click the “Use the following IP address” radio
button. This enables the other fields so you can type
in the IP information. Enter the following: ■■ For the
IP address, enter 192.168.1.1.
■■ For the Subnet mask, enter 255.255.255.0.
Leave the Default gateway and the Preferred DNS
server fields blank. The Default gateway is needed if
you need to communicate with remote computers. The
DNS is needed if you need to perform name resolution
(names to IP addresses).
When you are finished, it should look like Figure 1.12 .
■■ If you have other computers, try configuring their IP
addresses as well; the host portion of the IP should
ascend once for each computer: .1, .2, .3, and so on.
5. Click OK. Then, in the Ethernet
Properties dialog box, click OK. This
completes and binds the configuration to
the network adapter.
6.Test your configuration. We will do this
in two ways, first with the ipconfig
command, and second with the ping
command: a. Open the Command Prompt
window. Do this by pressing the
Windows+R keys and typing cmd in the
Open field. In the Command Prompt
window, type ipconfig. The results should
look similar to Figure 1.13. Notice the IPv4
Address field in the results and the IP
address that is listed. It should be the IP
address you configured previously. If not,
go back and check your Internet Protocol
Properties dialog box.
Ping a computer on the same 192.168.1
network. If there are no other
computers, ping your own IP address.
For example, type the following
command: ping 192.168.1.1 This
command sends requests out to the
other IP address. If the other computer
is running and configured properly, it
should reply back. A positive ping
would look similar to Figure 1.14, where
four replies are received by the pinging
computer
 If you do not receive replies, but do receive
another message, for example, “request timed
out,” check the IP configuration again, and
check to ensure that the computer you are
trying to ping is configured properly. In
addition, make sure that the computers are
wired to the network.
Always test your network
configurations!
 You can also ping your own computer by way of the loopback address,
also known as the local loopback. Every Windows computer automatically
gets this address; it is 127.0.0.1. This is in addition to the logical address
that you assigned earlier. Try the command ping loopback and check out
the results you get. You can also try ping localhost and ping 127.0.0.1 .
Regardless, you should get results from 127.0.0.1. When pinging this
address, no network traffi c is incurred because the network adapter is
really just looping the ping back to the OS; it never places any packets on
to the network, so this is a solid way to test if TCP/IP is installed correctly
to a network adapter, even if you aren’t physically connected to the
network!
Types of LANs
 The first and most common type
of LAN is the wired LAN.
Computers and other devices
are wired together by way of
copper-based, twisted-pair
cables. These cables have RJ-45
plugs on each end, making the
actual connection to RJ-45 ports
that reside on the computer’s
network adapter, and on hubs,
switches, or routers
Figure 1.15 This time it’s three LANs connected together by a router. Some
new devices appear in this figure: a firewall, which protects the LAN (or
LANs) from the Internet, and a supercomputer, which occupies its own little
LAN.
Types of LANs
 A wireless local area network (WLAN) has
many advantages, the most standout of
which is the ability to roam. A person with a
laptop, handheld computer or PDA, or
another like device can work from anywhere.
However, because wireless LANs can pose
additional security problems, some
companies have opted not to use them in
their main offices. But with advancements in
security, including developments in
encryption, wireless is now more popular
than ever. Figure 1.16 illustrates some
wireless devices
 The wireless access point (WAP) acts as the central connecting device for
the network. But now, one of the advantages is that the network can
consist of more types of devices, including smartphones, PDAs, tablet
computers, and laptops. Of course, PCs and laptops equipped with
wireless network adapters will be able to connect to this network as well.
There are also logical types of VLANs like the protocol-
based VLAN and the MAC address-based VLAN, but by
far the most common is the port-based VLAN. The most
common standard associated with VLANs is IEEE
802.1Q, which modifies Ethernet frames by “tagging”
them with the appropriate VLAN information, based on
which VLAN the Ethernet frame should be directed to.
A virtual LAN (VLAN) is a group of hosts with a common
set of requirements that communicate as if they were
connected together in a normal fashion on one switch,
regardless of their physical location. A VLAN is
implemented to segment the network, reduce collisions,
organize the network, boost performance, and increase
security. Usually, switches control the VLAN. Like
subnetting, a VLAN compartmentalizes the network and
can isolate traffic. But unlike subnetting, a VLAN can be
set up in a physical manner; an example of this is the
portbased VLAN, as is shown in Figure 1.17
Getting to Know Perimeter Networks
 A perimeter network (also known as a demilitarized zone [DMZ]) is a
small network that is set up separately from a company’s private local
area network and the Internet. It is called a perimeter network because
it is usually on the edge of the LAN, but DMZ has become a much more
popular term. The DMZ allows users outside of the company LAN to
access specific services located on the DMZ. However, when set up
properly, those users are blocked from gaining access to the company
LAN. Users on the LAN will quite often connect to the DMZ as well, but
without having to worry about outside attackers gaining access to their
private LAN. The DMZ might house a switch with servers connected to
it that offer web, email, and other services
Two common configurations of a DMZ
include:
Back-to-Back Configuration This
configuration has a DMZ situated in
between two firewall devices, which
could be black box appliances. An
illustration of this is shown in Figure
1.18. In this configuration, an
attacker would have to get through
two firewalls in order to gain access
to the LAN.
3-leg Perimeter Configuration: In this
scenario, the DMZ is usually attached to
a separate connection of the company
firewall. So, the firewall would have three
connections: one to the company LAN,
one to the DMZ, and one to the Internet,
as shown in Figure 1.19. Once again, this
could be done with a firewall appliance
or server. In this configuration, an
attacker would only need to break
through one firewall to gain access to
the LAN. Although this is a disadvantage,
technologies like network intrusion
detection/prevention systems can help
alleviate most security issues. Also, one
firewall means less administration.

More Related Content

What's hot

Lecture 2 - Networking Devices.pdf
Lecture 2 - Networking Devices.pdfLecture 2 - Networking Devices.pdf
Lecture 2 - Networking Devices.pdfOliverCSilvano
 
basic networking
basic networkingbasic networking
basic networkingAnmol Bagga
 
Computer Network Introduction by Mr. Lokesh Kumar #easterscience
Computer Network Introduction by Mr. Lokesh Kumar #easterscienceComputer Network Introduction by Mr. Lokesh Kumar #easterscience
Computer Network Introduction by Mr. Lokesh Kumar #easterscienceLOKESH KUMAR
 
Computer networks
Computer networksComputer networks
Computer networksSudar Sudar
 
Computer networks and it's applications
Computer networks and it's applicationsComputer networks and it's applications
Computer networks and it's applicationsvarun arora
 
Computer Networking.
Computer Networking.Computer Networking.
Computer Networking.mvenkat2016
 
Computer Network Complete Introduction
Computer Network Complete IntroductionComputer Network Complete Introduction
Computer Network Complete IntroductionAhmar Hashmi
 
Vpn cliente - servidor con Mikrotik 6.10
Vpn cliente - servidor con Mikrotik 6.10Vpn cliente - servidor con Mikrotik 6.10
Vpn cliente - servidor con Mikrotik 6.10Vanesa RodrĂ­guez Percy
 
Network devices
Network devicesNetwork devices
Network devicesTapan Khilar
 
Cisco_4 Packet Tracer 9.3.1.2
Cisco_4 Packet Tracer 9.3.1.2Cisco_4 Packet Tracer 9.3.1.2
Cisco_4 Packet Tracer 9.3.1.2Kyle Fitzpatrick
 
Computer networking class 12
Computer networking class 12Computer networking class 12
Computer networking class 12LakshyaT
 
NETWORK COMPONENTS
NETWORK COMPONENTSNETWORK COMPONENTS
NETWORK COMPONENTSbwire sedrick
 
Basics of Computer Network Device
Basics of Computer Network DeviceBasics of Computer Network Device
Basics of Computer Network DeviceRubal Sagwal
 
Network Basics
Network BasicsNetwork Basics
Network Basicstmavroidis
 
Lenovo idea pad s400 notebook pc manual spanish
Lenovo idea pad s400 notebook pc manual   spanishLenovo idea pad s400 notebook pc manual   spanish
Lenovo idea pad s400 notebook pc manual spanishMary Taype
 
Hubs vs switches vs routers
Hubs vs switches vs routersHubs vs switches vs routers
Hubs vs switches vs routers3Anetwork com
 
Networking presentation
Networking presentationNetworking presentation
Networking presentationJyoti Tewari
 

What's hot (20)

Lecture 2 - Networking Devices.pdf
Lecture 2 - Networking Devices.pdfLecture 2 - Networking Devices.pdf
Lecture 2 - Networking Devices.pdf
 
basic networking
basic networkingbasic networking
basic networking
 
Computer Network Introduction by Mr. Lokesh Kumar #easterscience
Computer Network Introduction by Mr. Lokesh Kumar #easterscienceComputer Network Introduction by Mr. Lokesh Kumar #easterscience
Computer Network Introduction by Mr. Lokesh Kumar #easterscience
 
Computer networks
Computer networksComputer networks
Computer networks
 
Computer networks and it's applications
Computer networks and it's applicationsComputer networks and it's applications
Computer networks and it's applications
 
Computer Networking.
Computer Networking.Computer Networking.
Computer Networking.
 
Computer Network Complete Introduction
Computer Network Complete IntroductionComputer Network Complete Introduction
Computer Network Complete Introduction
 
Computer networking
Computer networkingComputer networking
Computer networking
 
Vpn cliente - servidor con Mikrotik 6.10
Vpn cliente - servidor con Mikrotik 6.10Vpn cliente - servidor con Mikrotik 6.10
Vpn cliente - servidor con Mikrotik 6.10
 
Network devices
Network devicesNetwork devices
Network devices
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
WirelessHart and 6LowPAN
WirelessHart and 6LowPANWirelessHart and 6LowPAN
WirelessHart and 6LowPAN
 
Cisco_4 Packet Tracer 9.3.1.2
Cisco_4 Packet Tracer 9.3.1.2Cisco_4 Packet Tracer 9.3.1.2
Cisco_4 Packet Tracer 9.3.1.2
 
Computer networking class 12
Computer networking class 12Computer networking class 12
Computer networking class 12
 
NETWORK COMPONENTS
NETWORK COMPONENTSNETWORK COMPONENTS
NETWORK COMPONENTS
 
Basics of Computer Network Device
Basics of Computer Network DeviceBasics of Computer Network Device
Basics of Computer Network Device
 
Network Basics
Network BasicsNetwork Basics
Network Basics
 
Lenovo idea pad s400 notebook pc manual spanish
Lenovo idea pad s400 notebook pc manual   spanishLenovo idea pad s400 notebook pc manual   spanish
Lenovo idea pad s400 notebook pc manual spanish
 
Hubs vs switches vs routers
Hubs vs switches vs routersHubs vs switches vs routers
Hubs vs switches vs routers
 
Networking presentation
Networking presentationNetworking presentation
Networking presentation
 

Similar to ECE 1- Lesson 1 Data Communication and Networking.pptx

Dotson - Network Tutorial
Dotson - Network TutorialDotson - Network Tutorial
Dotson - Network TutorialBOXLIGHT Inc
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer networkK. A. M Lutfullah
 
Computer networking project
Computer networking projectComputer networking project
Computer networking projectAshifimrankhan1
 
Introduction to networks
Introduction to networksIntroduction to networks
Introduction to networksSagar Gor
 
Introduction to Computer Networks: Basic concept of Computer networks Goals o...
Introduction to Computer Networks: Basic concept of Computer networks Goals o...Introduction to Computer Networks: Basic concept of Computer networks Goals o...
Introduction to Computer Networks: Basic concept of Computer networks Goals o...MostafizurRahmanMonn
 
Computer Network Second Edition
Computer Network Second EditionComputer Network Second Edition
Computer Network Second EditionMd Saylab
 
Data Communication & Network
Data Communication & NetworkData Communication & Network
Data Communication & NetworkMaulen Bale
 
Imd Corporate Presentation Nov 2010
Imd Corporate Presentation   Nov 2010Imd Corporate Presentation   Nov 2010
Imd Corporate Presentation Nov 2010anneke_blaauw
 
Computer network
Computer networkComputer network
Computer networkAnupan Jain
 
Class viii ch-1 networking concepts
Class  viii ch-1 networking conceptsClass  viii ch-1 networking concepts
Class viii ch-1 networking conceptsjessandy
 
Computer-Network-class-presentaiton.pptx
Computer-Network-class-presentaiton.pptxComputer-Network-class-presentaiton.pptx
Computer-Network-class-presentaiton.pptxdairylvirrey1
 
Network Communication Flow of information among the group of memb.pdf
Network Communication Flow of information among the group of memb.pdfNetwork Communication Flow of information among the group of memb.pdf
Network Communication Flow of information among the group of memb.pdfsooryasalini
 
Data communication class note 1
Data communication class note 1Data communication class note 1
Data communication class note 1Prosanta Mazumder
 
Computer network
Computer networkComputer network
Computer networkMd Saylab
 
POLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAPOLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAAiman Hud
 

Similar to ECE 1- Lesson 1 Data Communication and Networking.pptx (20)

Dotson - Network Tutorial
Dotson - Network TutorialDotson - Network Tutorial
Dotson - Network Tutorial
 
Module-1.pptx
Module-1.pptxModule-1.pptx
Module-1.pptx
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
 
Networking
NetworkingNetworking
Networking
 
Computer networking project
Computer networking projectComputer networking project
Computer networking project
 
Introduction to networks
Introduction to networksIntroduction to networks
Introduction to networks
 
Networks
NetworksNetworks
Networks
 
Chapter 6.0
Chapter 6.0Chapter 6.0
Chapter 6.0
 
Introduction to Computer Networks: Basic concept of Computer networks Goals o...
Introduction to Computer Networks: Basic concept of Computer networks Goals o...Introduction to Computer Networks: Basic concept of Computer networks Goals o...
Introduction to Computer Networks: Basic concept of Computer networks Goals o...
 
Computer Network Second Edition
Computer Network Second EditionComputer Network Second Edition
Computer Network Second Edition
 
Data Communication & Network
Data Communication & NetworkData Communication & Network
Data Communication & Network
 
Imd Corporate Presentation Nov 2010
Imd Corporate Presentation   Nov 2010Imd Corporate Presentation   Nov 2010
Imd Corporate Presentation Nov 2010
 
Computer Network - Unit 1
Computer Network - Unit 1Computer Network - Unit 1
Computer Network - Unit 1
 
Computer network
Computer networkComputer network
Computer network
 
Class viii ch-1 networking concepts
Class  viii ch-1 networking conceptsClass  viii ch-1 networking concepts
Class viii ch-1 networking concepts
 
Computer-Network-class-presentaiton.pptx
Computer-Network-class-presentaiton.pptxComputer-Network-class-presentaiton.pptx
Computer-Network-class-presentaiton.pptx
 
Network Communication Flow of information among the group of memb.pdf
Network Communication Flow of information among the group of memb.pdfNetwork Communication Flow of information among the group of memb.pdf
Network Communication Flow of information among the group of memb.pdf
 
Data communication class note 1
Data communication class note 1Data communication class note 1
Data communication class note 1
 
Computer network
Computer networkComputer network
Computer network
 
POLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAPOLITEKNIK MALAYSIA
POLITEKNIK MALAYSIA
 

Recently uploaded

Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptxPoojaSen20
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 

Recently uploaded (20)

Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 

ECE 1- Lesson 1 Data Communication and Networking.pptx

  • 1. ECE 1- Data Communication and Networking HOYLE S. FAJANILAN JR.
  • 2. Learning Objectives: Students should be able to: 1. Define what is a network and how it work; 2. Understand Local Area Networks (LANs); 3. Know the capabilities of Hubs compared to switches; 4. Understand the difference between the wired LAN and a wireless LAN; 5. Define what is a VLAN; 6. Describe the various security zones; 7. Describe network topologies and access methods; and 8. Identify the Ethernet standards
  • 3. Lesson 1: Understanding Local Area Networking A network refers to a collection of interconnected devices, such as computers, servers, routers, switches, and other hardware, that are linked together to share resources, information, and services. The primary purpose of a network is to facilitate communication and collaboration between devices, allowing them to exchange data and interact with each other.
  • 4. Some key concepts related to networks:  Networks can vary widely in size and complexity, ranging from small local area networks (LANs) within a single building to large-scale global networks that span continents.
  • 5. Some key concepts related to networks:  Nodes: Nodes are the individual devices or components that are connected within a network. These can include computers, servers, smartphones, printers, and more.
  • 6. Some key concepts related to networks: Connections: The connections between nodes can be physical, such as Ethernet cables or fiber optic lines, or they can be wireless, such as Wi-Fi or cellular connections.
  • 7. Some key concepts related to networks: Topologies: Network topology refers to the arrangement of nodes and connections within a network. Common topologies include star, bus, ring, and mesh configurations.
  • 8. Some key concepts related to networks:  Protocols: Network protocols are a set of rules and standards that govern how data is transmitted, received, and interpreted across a network. Examples include TCP/IP (Transmission Control Protocol/Internet Protocol) for the internet and Ethernet for local networks.
  • 9. Some key concepts related to networks:  Data Transmission: Networks allow devices to send and receive data, which can include anything from simple text messages to complex multimedia files. Data transmission can occur in various formats, such as packets for digital data.
  • 10. Some key concepts related to networks: Resource Sharing: One of the fundamental functions of a network is to enable resource sharing. This can include sharing files, printers, internet connections, and more among connected devices.
  • 11. Some key concepts related to networks:  Security: Network security involves measures to protect the confidentiality, integrity, and availability of data within a network. This includes mechanisms like firewalls, encryption, and access controls.
  • 12. Some key concepts related to networks:  Types of Networks: Networks can be categorized based on their size and scope. In addition to LANs and global networks (WANs), there are also metropolitan area networks (MANs) that cover city-wide areas and personal area networks (PANs) that are meant for small, personal connections.
  • 13. Some key concepts related to networks:  Internet: The internet is the largest and most well-known global network, connecting billions of devices worldwide. It is a vast network of networks that uses the TCP/IP protocol suite.
  • 14.  Intranet and Extranet: An intranet is a private network within an organization, allowing internal communication and collaboration. An extranet extends this concept to include external parties, such as suppliers or customers, for controlled access to specific resources.
  • 15. : Networks are a fundamental part of modern computing and communication, enabling individuals and organizations to share information, access services, and collaborate across different locations and devices.
  • 17. WHAT IS LAN?  LAN stands for "Local Area Network." It is a type of computer network that covers a small geographic area, typically within a single building or a group of nearby buildings like a school, office, or home. LANs are used to connect computers, devices, and resources within a limited area, allowing them to share information, resources, and services.
  • 18. Key characteristics of LANs include:  Limited Geographic Area: LANs cover a small and well-defined geographic area, usually within a few kilometers. This distinguishes them from larger networks like wide area networks (WANs) that cover broader geographical regions.
  • 19. Key characteristics of LANs include:  High Data Transfer Rates: LANs are designed for relatively high data transfer rates, allowing devices on the network to communicate quickly and efficiently. This is essential for tasks like file sharing, printing, and collaborative work.
  • 20. Key characteristics of LANs include:  Private Ownership: LANs are typically owned, set up, and maintained by the organization or individual who owns the premises where the network is deployed. This gives the owner more control over the network's configuration and security.
  • 21. Key characteristics of LANs include: Topologies: LANs can be set up in various topologies, including star, bus, ring, or mesh configurations. These topologies determine how devices are interconnected within the network.
  • 22. Key characteristics of LANs include: Ethernet and Wi-Fi: Ethernet, a wired technology, and Wi-Fi, a wireless technology, are commonly used to connect devices within a LAN. Ethernet uses cables to establish connections, while Wi-Fi uses radio signals for wireless connections.
  • 23. Key characteristics of LANs include: Resource Sharing: One of the primary purposes of a LAN is to enable resource sharing. This includes sharing files, printers, and other peripherals among the connected devices.
  • 24. Key characteristics of LANs include:  Ease of Administration: Because LANs are relatively small, they are easier to manage and administer compared to larger networks. This makes tasks such as monitoring, troubleshooting, and security management more straightforward.
  • 25. Key characteristics of LANs include:  Low Latency: LANs typically have low latency, which means that data transmission and response times between devices are minimal. This is essential for real-time applications like online gaming and video conferencing.
  • 26.  Overall, LANs play a crucial role in enabling local communication and resource sharing, making them an essential component of modern computing environments.
  • 27.  To understand local area networks (LANs) better, it helps to write out the structure of the LAN—to document it. Network documentation is any information that helps describe, define, and otherwise explain how computers are connected in a physical and logical way.  In the following exercises, you will:  1. Examine typical LAN network documentation.  2. View the type of network adapter in a computer, inspect the type of connection that the network adapter makes to the network, and view its Properties page.  3. Define how information is sent across the LAN.  4. Configure IP addresses on hosts.
  • 28.
  • 29. Examine LAN Network Documentation
  • 30. Examine LAN Network Documentation A server, used to centralize data and share it with (or serve it to) other computers on the network. A PC (personal computer) usually acts as a client on the network, most likely getting its information from the server. The PC can also store information locally. A Mac (Macintosh) computer, which is another type of client computer; once again, this computer can store information locally, or get it from the server. A laptop, which could be a PC or a Mac, is meant for portability. However, it can also store and access data the same way the other computers do. A hub , also known as a multiport repeater . This is the most basic of central connecting devices (CCDs); it connects each of the computers, known as hosts, to each other by way of copper-based cables
  • 31. Intermediate LAN documentation the hub is replaced with a basic four-port router; these are also referred to as SOHO (Small Office/Home Office) routers. The router acts as a central connecting device, connecting the hosts together, but also has a special communications link to the Internet, allowing the hosts to send and receive data to and from computers on the Internet. That communications link between the router and the Internet is where the LAN ends. So, the PC, laptop, server, and router are part of the LAN. Anything else beyond the router is considered to be outside of the LAN
  • 32. Advanced LAN documentation In example, more central connecting devices are added. Instead of connecting hundreds of devices to a single central connecting device, you can arrange the network in a hierarchical way. For instance, on the left side of the figure, there are two PCs and one server connected to a hub. Let's assume these represent 24 computers each, and each group of computers connected to a hub also represents 24 computers. Instead of linking all computers to one central device, which might not be able to handle all of them, the groups of 24 computers are connected to their own hubs. Then, these hubs are connected one after another to a switch at the top of the figure. This switch will likely be a powerful (and costly) device to support all the computers connected to it. You can think of individual hubs as devices providing connectivity for separate departments in a company or individual classrooms in a school.
  • 33. In summary:‱Hub: Basic, operates at the physical layer, broadcasts data to all devices. ‱Router: Connects different networks, operates at the network layer, routes data based on IP addresses and maintains routing tables. ‱Switch: More intelligent, operates at the data link layer, forwards data only to the intended device based on MAC addresses. ‱In modern networking setups, switches and routers are commonly used due to their efficiency and ability to handle more complex networking tasks. Hubs are generally considered obsolete due to their limitations in managing network traffic.
  • 34. The network adapter, also known as a network interface card (NIC), is the device that enables the sending and receiving of data to and from your computer. It might be integrated into the motherboard or it might act as a separate device that connects to a PCI slot, or perhaps connects to a PC Card slot or USB port This particular network adapter is a PCI card, but again, network adapters come in many different forms. However, notice the port on the card. This is known as an RJ-45 port, and is where the RJ-45 plug at the end of the network cable connects
  • 35. This type of cable is known as twisted pair
  • 36. View the Network Adapter  View the Network Adapter To view the network adapter, perform the following steps.  1. Examine the card, which shows a typical network adapter.  2. Look for the network adapter on your computer. If the computer only uses a wireless network adapter, look for an antenna on the card. Laptops have an internal antenna, but you can usually find out if you are connected wirelessly by looking at the wireless LED  Examine Figure 1.5. This is a typical patch cable that connects to an RJ-45 port
  • 37. View the Network Adapter (contd..)  Identify the cable that connects your computer to the network. Disconnect the cable (finish any downloads from the Internet if in progress first) and view the connector. If you are connected via a cable, attempt to identify what device is connected to the other end of the cable, such as a hub, switch, or router.  5. Now let’s access the operating system and look at the properties of a network adapter. For this example, we are using a Windows 10 client computer with a Realtek PCIe network adapter. However, older versions of Windows have almost identical window and dialog box names, and the navigation to those windows is similar as well.
  • 38.  a. Right-click Start and choose Computer Management. Alternatively for Windows 10, and for Windows Server 2016, click Start, type Computer Management, and then press Enter.  b. Click Device Manager.  c. Click the > sign to expand the Network adapters category. Device Manager with the Network adapters category expanded
  • 39. Click the Advanced tab. If you click the Speed & Duplex option, you can then change the value.
  • 40. Full-duplex means that the network card can send and receive data simultaneously. In the Speed and Duplex drop-down menu, you can select various speeds , including 10 Mbps, 100 Mbps, and 1 Gbps. You can also select half-duplex, which means that the network adapter can send and receive data, but not at the same time. Full- duplex is the superior connection, as long as your central connecting device supports it. A fullduplex connection can transceive (transmit and receive) twice as much information per second compared with a half-duplex connection. So, to meet the requirements of the original scenario, you would probably want your client computers to connect at 1 Gbps as well as utilize full-duplex negotiations. You can tell that a card is active because the Link Status field on the physical device shows a green light. You can also open the device Status window (Open Network and Sharing Center, and clink the adapter link) to see the current speed of the adapter such as 1 Gbps, its media state, how long it has been up and the current activity.
  • 41. 7. Finally, every network adapter will have a logical name. By default, the network adapter is known as Ethernet, although you can change the name if you so desire. Ethernet will have its own Properties page and a status page. Let’s view these now: a. Right-click the Network icon on the far right of the taskbar and choose Open Network And Sharing Center. The Network And Sharing Center window opens.. An alternate way to access the Network and Sharing Center is to right- click Start and choose Control Panel. Then, navigate to Network And Internet ➱ Network And Sharing Center. b. Click the Change Adapter Settings link. The Network Connections window opens. (Navigation to this window is slightly different in other versions of Windows.) c. In this window, right-click the Ethernet icon and choose Properties..
  • 42. From here, you can configure Internet Protocol (IP), bind new protocols to the network adapter, and so on d. Click Cancel to close the dialog box. This should return you to the Network Connections window. e. Now, double-click the Ethernet icon. The Ethernet Status dialog box opens. This dialog box displays the type of connectivity, speed, and how long the adapter has been connected; it also shows the total bytes sent and received. In addition, from this dialog box, you can access the Properties dialog box and diagnose the network adapter, if necessary.
  • 44. Configuring Internet Protocol  Internet Protocol, or IP, is the part of TCP/IP that, among other things, governs IP addresses. The IP address is the cornerstone of networking. It defines the computer or host you are working on. Today, every computer and many other devices have one. An IP address allows each computer to send and receive information back and forth in an orderly and efficient manner. IP addresses are like your home address. Just like your home address identifies your house number and the street you live on, an IP address identifies your computer number and the network it lives on. A common example of an IP address is 192.168.1.1.
  • 45.  The subnet mask is a group of four numbers that define what IP network the computer is a member of. All of the 255s in a subnet mask collectively refer to the network portion, while the 0s refer to the host portion. This is illustrated in Table 1.1. This table shows a typical Class C IP address and the default corresponding subnet mask. If you were to configure the IP address of a Windows computer as 192.168.1.1, Windows would automatically default to a subnet mask of 255.255.255.0
  • 46.  IP addresses are actually 32-bit dotted-decimal numbers. If you were to convert an IP address’s decimal numbers to binary, you’d have a total of 32 bits. It is considered dotted because each number is separated by a dot. Altogether, they contain four numbers, each of which is a byte or octet. For example, 192 is an octet and its binary equivalent is 11000000, which is 8 bits. 168 is also an octet, its binary equivalent is 10101000, and so on. Adding all four octets together equals 32 bits. IP addresses are usually applied to your network adapter, but can be applied to other devices, such as switches, routers, and so on. It’s the fact that the device or computer has an IP address that makes it a host
  • 47. Configure IP Addresses  To configure IP addresses, perform the following steps.  1. Access the Ethernet Properties dialog box.  2. Click Internet Protocol Version 4 and then click the Properties button. The Internet Protocol Version 4 Properties dialog box opens. Write down the current settings (if there are any) so that you can return the computer to these settings at the end of the exercise.  3. By default, the Obtain an IP address automatically and Obtain DNS server address automatically radio buttons are enabled, as shown in Figure 1.11. That means that the network adapter will attempt to get all its IP information from a DHCP server or other device like a SOHO (Small Office/Home Office) four-port router. However, we want to configure the adapter statically, so let’s continue on!
  • 48. Click the “Use the following IP address” radio button. This enables the other fields so you can type in the IP information. Enter the following: ■■ For the IP address, enter 192.168.1.1. ■■ For the Subnet mask, enter 255.255.255.0.
  • 49. Leave the Default gateway and the Preferred DNS server fields blank. The Default gateway is needed if you need to communicate with remote computers. The DNS is needed if you need to perform name resolution (names to IP addresses). When you are finished, it should look like Figure 1.12 . ■■ If you have other computers, try configuring their IP addresses as well; the host portion of the IP should ascend once for each computer: .1, .2, .3, and so on.
  • 50. 5. Click OK. Then, in the Ethernet Properties dialog box, click OK. This completes and binds the configuration to the network adapter. 6.Test your configuration. We will do this in two ways, first with the ipconfig command, and second with the ping command: a. Open the Command Prompt window. Do this by pressing the Windows+R keys and typing cmd in the Open field. In the Command Prompt window, type ipconfig. The results should look similar to Figure 1.13. Notice the IPv4 Address field in the results and the IP address that is listed. It should be the IP address you configured previously. If not, go back and check your Internet Protocol Properties dialog box.
  • 51. Ping a computer on the same 192.168.1 network. If there are no other computers, ping your own IP address. For example, type the following command: ping 192.168.1.1 This command sends requests out to the other IP address. If the other computer is running and configured properly, it should reply back. A positive ping would look similar to Figure 1.14, where four replies are received by the pinging computer
  • 52.  If you do not receive replies, but do receive another message, for example, “request timed out,” check the IP configuration again, and check to ensure that the computer you are trying to ping is configured properly. In addition, make sure that the computers are wired to the network.
  • 53. Always test your network configurations!  You can also ping your own computer by way of the loopback address, also known as the local loopback. Every Windows computer automatically gets this address; it is 127.0.0.1. This is in addition to the logical address that you assigned earlier. Try the command ping loopback and check out the results you get. You can also try ping localhost and ping 127.0.0.1 . Regardless, you should get results from 127.0.0.1. When pinging this address, no network traffi c is incurred because the network adapter is really just looping the ping back to the OS; it never places any packets on to the network, so this is a solid way to test if TCP/IP is installed correctly to a network adapter, even if you aren’t physically connected to the network!
  • 54. Types of LANs  The first and most common type of LAN is the wired LAN. Computers and other devices are wired together by way of copper-based, twisted-pair cables. These cables have RJ-45 plugs on each end, making the actual connection to RJ-45 ports that reside on the computer’s network adapter, and on hubs, switches, or routers Figure 1.15 This time it’s three LANs connected together by a router. Some new devices appear in this figure: a firewall, which protects the LAN (or LANs) from the Internet, and a supercomputer, which occupies its own little LAN.
  • 55. Types of LANs  A wireless local area network (WLAN) has many advantages, the most standout of which is the ability to roam. A person with a laptop, handheld computer or PDA, or another like device can work from anywhere. However, because wireless LANs can pose additional security problems, some companies have opted not to use them in their main offices. But with advancements in security, including developments in encryption, wireless is now more popular than ever. Figure 1.16 illustrates some wireless devices
  • 56.  The wireless access point (WAP) acts as the central connecting device for the network. But now, one of the advantages is that the network can consist of more types of devices, including smartphones, PDAs, tablet computers, and laptops. Of course, PCs and laptops equipped with wireless network adapters will be able to connect to this network as well.
  • 57.
  • 58. There are also logical types of VLANs like the protocol- based VLAN and the MAC address-based VLAN, but by far the most common is the port-based VLAN. The most common standard associated with VLANs is IEEE 802.1Q, which modifies Ethernet frames by “tagging” them with the appropriate VLAN information, based on which VLAN the Ethernet frame should be directed to. A virtual LAN (VLAN) is a group of hosts with a common set of requirements that communicate as if they were connected together in a normal fashion on one switch, regardless of their physical location. A VLAN is implemented to segment the network, reduce collisions, organize the network, boost performance, and increase security. Usually, switches control the VLAN. Like subnetting, a VLAN compartmentalizes the network and can isolate traffic. But unlike subnetting, a VLAN can be set up in a physical manner; an example of this is the portbased VLAN, as is shown in Figure 1.17
  • 59. Getting to Know Perimeter Networks  A perimeter network (also known as a demilitarized zone [DMZ]) is a small network that is set up separately from a company’s private local area network and the Internet. It is called a perimeter network because it is usually on the edge of the LAN, but DMZ has become a much more popular term. The DMZ allows users outside of the company LAN to access specific services located on the DMZ. However, when set up properly, those users are blocked from gaining access to the company LAN. Users on the LAN will quite often connect to the DMZ as well, but without having to worry about outside attackers gaining access to their private LAN. The DMZ might house a switch with servers connected to it that offer web, email, and other services
  • 60. Two common configurations of a DMZ include: Back-to-Back Configuration This configuration has a DMZ situated in between two firewall devices, which could be black box appliances. An illustration of this is shown in Figure 1.18. In this configuration, an attacker would have to get through two firewalls in order to gain access to the LAN.
  • 61. 3-leg Perimeter Configuration: In this scenario, the DMZ is usually attached to a separate connection of the company firewall. So, the firewall would have three connections: one to the company LAN, one to the DMZ, and one to the Internet, as shown in Figure 1.19. Once again, this could be done with a firewall appliance or server. In this configuration, an attacker would only need to break through one firewall to gain access to the LAN. Although this is a disadvantage, technologies like network intrusion detection/prevention systems can help alleviate most security issues. Also, one firewall means less administration.