SlideShare a Scribd company logo
Network Fundamentals: Introduction to Network Structure  and Protocol LAN, WAN, TCP/IP Prepared & Presented by: Muhammad Junaid Assistant Manager Corporate Services Dancom Online Services (PVT) Ltd. Feb 10, 2007
Outline ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Basic Concepts in Communication
Basic Concepts ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Essentials for Communications ,[object Object],[object Object],[object Object],[object Object],[object Object],Source    Transmitter     Transmission     Receiver    Destination Source System Destination System Workstation/PC Workstation/PC Medium  1 2 3 4 5 6
Essentials for Communications Source    Transmitter     Transmission     Receiver    Destination Source System Destination System Workstation/PC Workstation/PC Medium  1 2 3 4 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],5 6
Data Communication Tasks Routing Delivery Error Feedback Network MGT Flow Control Signal Distortion Bit Error Network MGT Error Detection & Correction Nature and Timing of Signal Security Exchange Management Signal Begins & Ends Messsage Formatting Synchronization Repeater/Amplifier; Propagation; Interoperable Recovery Signal Generation Router / Server / Media Control / Protocol Routing Interfacing Multiplexing Capacity Congestion Control Addressing Data System Utilization
Understanding Networking
Big Picture What do you see here for a typical network?
Key Network Terminology Explained (1) ,[object Object],[object Object],[object Object]
Key Network Terminology Explained (2) ,[object Object],[object Object],[object Object],[object Object],Network architecture  
Common Topologies - Bus  ,[object Object]
Common Topologies - Ring ,[object Object]
Common Topologies - Star ,[object Object],[object Object],[object Object]
Common Topologies - Star ,[object Object]
Common Topologies – Star Bus ,[object Object],[object Object],[object Object]
Other network topologies (architecture) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Key Network Terminology Explained (3) ,[object Object],[object Object],[object Object]
Basic Signal Terminologies ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Kilo  K 2^10 Mega M 2^20 Giga G 2^30 Tera T 2^40 Peta P 2^50 Exa E 2^60 Zetta Z 2^70 Yotta Y 2^80
Data Transmission ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Understanding Transmission Medium
Basic transmission medium concepts ,[object Object],[object Object],[object Object]
Medium examples by type ,[object Object],[object Object],[object Object],[object Object]
Coaxial cable (1) ,[object Object],[object Object],[object Object],   Covered by sheath material    Outer conductor is braided shielded (ground)    Separated by insulating material    Inner conductor is solid copper metal
Coaxial cable (2) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Twisted Pair Cables ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Categories of Twisted Pairs Cabling System Specs describe cable Material, type of  Connectors, and Junction blocks to Conform to a category 100 Mbps 20 Mbps 16 Mbps 4 Mbps Less than 1 Mbps Maximum data rate Usual application Category 100 Mbps TPDDI 155 Mbps asynchronous transfer mode (certify 100 Mhz signal) CAT 5 Used in 16Mbps Token Ring Otherwise not used much CAT 4 Voice and data on 10BASE-T Ethernet (certify 16Mhz signal) CAT 3 Mainly used in the IBM Cabling System for token ring networks CAT 2 analog voice (plain old telephone service) Integrated Services Digital Network Basic Rate Interface in ISDN Doorbell wiring CAT 1
Optical Fibers (1) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Repeaters  
Optical Fibers (2) ,[object Object],[object Object]
Wireless Transmission (1) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Wireless Transmission (2) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Wireless LAN ,[object Object],[object Object],[object Object]
Network Hardware
Hubs ,[object Object],[object Object],Reference to equipment
Gateways ,[object Object],[object Object],[object Object]
Routers ,[object Object],[object Object],[object Object],[object Object]
Bridge ,[object Object],[object Object]
What is the difference between? ,[object Object],[object Object],[object Object]
Switches ,[object Object],[object Object]
WANs and LANs
Major Categories of Networks ,[object Object],[object Object],[object Object],[object Object],[object Object]
Data Communications Through WANs (1) ,[object Object],[object Object],[object Object],[object Object]
Data Communications Through WANs (2) ,[object Object],[object Object],[object Object],[object Object]
Circuit Switching Technologies ,[object Object],[object Object],[object Object],[object Object],[object Object]
Packet Switching Technologies ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Frame Relay Techniques ,[object Object],[object Object],[object Object],[object Object],[object Object]
Asynchronous Transfer Mode (ATM) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ISDN and Broadband ISDN Technology ,[object Object],[object Object],[object Object],[object Object],[object Object]
Local Area Network ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What is ethernet? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Network Interface Card (NIC) ,[object Object]
How does Ethernet work? ,[object Object]
What is a MAC Address? ,[object Object]
What is a Token Ring? ,[object Object]
How do Token Rings work? ,[object Object],[object Object],[object Object],[object Object],[object Object]
Understanding Network Protocols
Protocols of Computer Communications and Networks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Protocol Architecture ,[object Object],[object Object],[object Object]
ISO/OSI Reference Model (1) ,[object Object],[object Object],[object Object],[object Object],[object Object]
ISO/OSI Reference Model (2) How to transmit signal; coding Hardware means of sending and   receiving data on a carrier Two party communication: Ethernet   Routing and Forwarding Address: IP   End-to-end control & error checking  (ensure complete data transfer): TCP   Establish/manage connection   ASCII Text, Sound (syntax layer)   File Transfer, Email, Remote Login  
What is TCP/IP? ,[object Object],[object Object],[object Object],[object Object]
TCP/IP Five Independent Levels ,[object Object],[object Object],[object Object],[object Object],[object Object],HTTP / FTP / Telnet /  SMTP / SLIP / PPP   TCP keep track of the  individual packets   And reassemble IP handles actual   delivery of packets
TCP (example) ,[object Object],[object Object],[object Object],[object Object],[object Object]
IP ,[object Object],[object Object],[object Object]
Associated TCP/IP Protocols & Services SLIP (Serial Line Internet Protocol) and PPP (Point to Point Protocol) encapsulate the IP packets so that they can be sent over a dial up phone connection to an access provider’s modem. SLIP/ PPP Provides meaningful names like achilles.mycorp.com for computers to replace numerical addresses like 123.45.67.89. Stands for the Domain Name System. DNS Used to remotely manage network devices. Stands for the Simple Network Management Protocol.  SNMP A remote terminal emulation protocol that enables clients to log on to remote hosts on the network. Telnet This protocol, the core of the World Wide Web, facilitates retrieval and transfer of hypertext (mixed media) documents. Stands for the HyperText Transfer protocol HTTP

More Related Content

What's hot

Routing algorithms
Routing algorithmsRouting algorithms
Routing algorithms
Parameswaran Selvakumar
 
CCNA Introducing Networks
CCNA Introducing NetworksCCNA Introducing Networks
CCNA Introducing NetworksDsunte Wilson
 
Networking basics PPT
Networking basics PPTNetworking basics PPT
Networking basics PPT
Ehsan Ullah Kakar
 
data-link layer protocols
data-link layer protocols  data-link layer protocols
data-link layer protocols
BE Smârt
 
Network Topologies in Simple (Logical, Physical and Types)
Network Topologies in Simple (Logical, Physical and Types)Network Topologies in Simple (Logical, Physical and Types)
wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11
Shreejan Acharya
 
TCP and UDP
TCP and UDP TCP and UDP
TCP and UDP
Ramesh Giri
 
Cellular network presentation
Cellular network presentationCellular network presentation
Cellular network presentationAditya Pandey
 
Security issues in manet
Security issues in manetSecurity issues in manet
Security issues in manet
flowerjaan
 
Mobile computing (Wireless) Medium Access Control (MAC)
Mobile computing (Wireless) Medium Access Control (MAC)Mobile computing (Wireless) Medium Access Control (MAC)
Mobile computing (Wireless) Medium Access Control (MAC)
Jyothishmathi Institute of Technology and Science Karimnagar
 
Generations of Mobile Communications
Generations of Mobile CommunicationsGenerations of Mobile Communications
Generations of Mobile Communications
sivakumar m
 
Ppt for tranmission media
Ppt for tranmission mediaPpt for tranmission media
Ppt for tranmission media
Manish8976
 
Mobile transport layer - traditional TCP
Mobile transport layer - traditional TCPMobile transport layer - traditional TCP
Mobile transport layer - traditional TCP
Vishal Tandel
 
IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11
Keshav Maheshwari
 
Gprs architecture ppt
Gprs architecture pptGprs architecture ppt
Gprs architecture ppt
Arpita Sanghani
 
Virtual LAN
Virtual LANVirtual LAN
Virtual LAN
Lilesh Pathe
 
Issues in mobile communication
Issues in mobile communicationIssues in mobile communication
Issues in mobile communication
hina firdaus
 
HDLC, PPP and SLIP
HDLC, PPP and SLIPHDLC, PPP and SLIP
HDLC, PPP and SLIP
Naveen Kumar
 

What's hot (20)

Routing algorithms
Routing algorithmsRouting algorithms
Routing algorithms
 
CCNA Introducing Networks
CCNA Introducing NetworksCCNA Introducing Networks
CCNA Introducing Networks
 
Networking basics PPT
Networking basics PPTNetworking basics PPT
Networking basics PPT
 
data-link layer protocols
data-link layer protocols  data-link layer protocols
data-link layer protocols
 
Network Topologies in Simple (Logical, Physical and Types)
Network Topologies in Simple (Logical, Physical and Types)Network Topologies in Simple (Logical, Physical and Types)
Network Topologies in Simple (Logical, Physical and Types)
 
wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11
 
TCP and UDP
TCP and UDP TCP and UDP
TCP and UDP
 
Cellular network presentation
Cellular network presentationCellular network presentation
Cellular network presentation
 
Security issues in manet
Security issues in manetSecurity issues in manet
Security issues in manet
 
Mobile computing (Wireless) Medium Access Control (MAC)
Mobile computing (Wireless) Medium Access Control (MAC)Mobile computing (Wireless) Medium Access Control (MAC)
Mobile computing (Wireless) Medium Access Control (MAC)
 
Generations of Mobile Communications
Generations of Mobile CommunicationsGenerations of Mobile Communications
Generations of Mobile Communications
 
Ppt for tranmission media
Ppt for tranmission mediaPpt for tranmission media
Ppt for tranmission media
 
Mobile transport layer - traditional TCP
Mobile transport layer - traditional TCPMobile transport layer - traditional TCP
Mobile transport layer - traditional TCP
 
IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11
 
Gprs architecture ppt
Gprs architecture pptGprs architecture ppt
Gprs architecture ppt
 
Virtual LAN
Virtual LANVirtual LAN
Virtual LAN
 
Ambiente wifi
Ambiente wifiAmbiente wifi
Ambiente wifi
 
Issues in mobile communication
Issues in mobile communicationIssues in mobile communication
Issues in mobile communication
 
Tutorial Redes ATM
Tutorial Redes ATMTutorial Redes ATM
Tutorial Redes ATM
 
HDLC, PPP and SLIP
HDLC, PPP and SLIPHDLC, PPP and SLIP
HDLC, PPP and SLIP
 

Similar to Fundamentals of Networking

HPE Training uts prs PowerPoint presentation
HPE Training uts   prs    PowerPoint presentationHPE Training uts   prs    PowerPoint presentation
HPE Training uts prs PowerPoint presentation
urmishabm
 
What Is A Network made by Ms. Archika Bhatia
What Is A Network made by Ms. Archika BhatiaWhat Is A Network made by Ms. Archika Bhatia
What Is A Network made by Ms. Archika Bhatia
kulachihansraj
 
Networking ppt
Networking ppt Networking ppt
Networking ppt
Shovan Mandal
 
Computer network by faraz ali
Computer network by faraz aliComputer network by faraz ali
Computer network by faraz ali
Faraz Faqeer
 
NETWORKS & TOPOLOGY
NETWORKS & TOPOLOGYNETWORKS & TOPOLOGY
NETWORKS & TOPOLOGY
PRINCE KUMAR
 
Rajesh basics of networking and routing
Rajesh basics of networking and routingRajesh basics of networking and routing
Rajesh basics of networking and routingr123027
 
3.pptx
3.pptx3.pptx
3.pptx
kebeAman
 
It infrastructure
It infrastructureIt infrastructure
It infrastructure
raptrovic
 
Network topology and media presentation
Network topology and media presentationNetwork topology and media presentation
Network topology and media presentation
hassaanashraf1
 
Computer Network - OSI model
Computer Network - OSI modelComputer Network - OSI model
Computer Network - OSI model
Manoj Kumar
 
Lecture6 Data Networking.pptx
Lecture6 Data Networking.pptxLecture6 Data Networking.pptx
Lecture6 Data Networking.pptx
EvadeDube
 
communication and network concepts
communication and network concepts communication and network concepts
communication and network concepts
Gunjan Mathur
 
DCCN Unit 1.pdf
DCCN Unit 1.pdfDCCN Unit 1.pdf
DCCN Unit 1.pdf
Sreedhar Chowdam
 
Communication technologies & devices
Communication technologies & devicesCommunication technologies & devices
Communication technologies & devices
Amril Huda
 
basic networking
basic networkingbasic networking
basic networkingAnmol Bagga
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
SadamoTaga
 
Computer project
Computer project Computer project
Computer project
SUPER ULTRON
 
Ethernet lan
Ethernet lanEthernet lan
Ethernet lan
Yolanda Konde
 
Computer NW Security - Kizza - ch01 (1).ppt
Computer NW Security - Kizza - ch01 (1).pptComputer NW Security - Kizza - ch01 (1).ppt
Computer NW Security - Kizza - ch01 (1).ppt
TestUser621581
 

Similar to Fundamentals of Networking (20)

HPE Training uts prs PowerPoint presentation
HPE Training uts   prs    PowerPoint presentationHPE Training uts   prs    PowerPoint presentation
HPE Training uts prs PowerPoint presentation
 
What Is A Network made by Ms. Archika Bhatia
What Is A Network made by Ms. Archika BhatiaWhat Is A Network made by Ms. Archika Bhatia
What Is A Network made by Ms. Archika Bhatia
 
Networking ppt
Networking ppt Networking ppt
Networking ppt
 
Computer network by faraz ali
Computer network by faraz aliComputer network by faraz ali
Computer network by faraz ali
 
NETWORKS & TOPOLOGY
NETWORKS & TOPOLOGYNETWORKS & TOPOLOGY
NETWORKS & TOPOLOGY
 
Rajesh basics of networking and routing
Rajesh basics of networking and routingRajesh basics of networking and routing
Rajesh basics of networking and routing
 
3.pptx
3.pptx3.pptx
3.pptx
 
It infrastructure
It infrastructureIt infrastructure
It infrastructure
 
Network topology and media presentation
Network topology and media presentationNetwork topology and media presentation
Network topology and media presentation
 
Computer Network - OSI model
Computer Network - OSI modelComputer Network - OSI model
Computer Network - OSI model
 
Lecture6 Data Networking.pptx
Lecture6 Data Networking.pptxLecture6 Data Networking.pptx
Lecture6 Data Networking.pptx
 
communication and network concepts
communication and network concepts communication and network concepts
communication and network concepts
 
DCCN Unit 1.pdf
DCCN Unit 1.pdfDCCN Unit 1.pdf
DCCN Unit 1.pdf
 
Communication technologies & devices
Communication technologies & devicesCommunication technologies & devices
Communication technologies & devices
 
Arvind Singh
Arvind SinghArvind Singh
Arvind Singh
 
basic networking
basic networkingbasic networking
basic networking
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Computer project
Computer project Computer project
Computer project
 
Ethernet lan
Ethernet lanEthernet lan
Ethernet lan
 
Computer NW Security - Kizza - ch01 (1).ppt
Computer NW Security - Kizza - ch01 (1).pptComputer NW Security - Kizza - ch01 (1).ppt
Computer NW Security - Kizza - ch01 (1).ppt
 

Recently uploaded

FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 

Fundamentals of Networking

  • 1. Network Fundamentals: Introduction to Network Structure and Protocol LAN, WAN, TCP/IP Prepared & Presented by: Muhammad Junaid Assistant Manager Corporate Services Dancom Online Services (PVT) Ltd. Feb 10, 2007
  • 2.
  • 3. Basic Concepts in Communication
  • 4.
  • 5.
  • 6.
  • 7. Data Communication Tasks Routing Delivery Error Feedback Network MGT Flow Control Signal Distortion Bit Error Network MGT Error Detection & Correction Nature and Timing of Signal Security Exchange Management Signal Begins & Ends Messsage Formatting Synchronization Repeater/Amplifier; Propagation; Interoperable Recovery Signal Generation Router / Server / Media Control / Protocol Routing Interfacing Multiplexing Capacity Congestion Control Addressing Data System Utilization
  • 9. Big Picture What do you see here for a typical network?
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27. Categories of Twisted Pairs Cabling System Specs describe cable Material, type of Connectors, and Junction blocks to Conform to a category 100 Mbps 20 Mbps 16 Mbps 4 Mbps Less than 1 Mbps Maximum data rate Usual application Category 100 Mbps TPDDI 155 Mbps asynchronous transfer mode (certify 100 Mhz signal) CAT 5 Used in 16Mbps Token Ring Otherwise not used much CAT 4 Voice and data on 10BASE-T Ethernet (certify 16Mhz signal) CAT 3 Mainly used in the IBM Cabling System for token ring networks CAT 2 analog voice (plain old telephone service) Integrated Services Digital Network Basic Rate Interface in ISDN Doorbell wiring CAT 1
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 53.
  • 54.
  • 55.
  • 57.
  • 58.
  • 59.
  • 60. ISO/OSI Reference Model (2) How to transmit signal; coding Hardware means of sending and  receiving data on a carrier Two party communication: Ethernet  Routing and Forwarding Address: IP  End-to-end control & error checking (ensure complete data transfer): TCP  Establish/manage connection  ASCII Text, Sound (syntax layer)  File Transfer, Email, Remote Login 
  • 61.
  • 62.
  • 63.
  • 64.
  • 65. Associated TCP/IP Protocols & Services SLIP (Serial Line Internet Protocol) and PPP (Point to Point Protocol) encapsulate the IP packets so that they can be sent over a dial up phone connection to an access provider’s modem. SLIP/ PPP Provides meaningful names like achilles.mycorp.com for computers to replace numerical addresses like 123.45.67.89. Stands for the Domain Name System. DNS Used to remotely manage network devices. Stands for the Simple Network Management Protocol. SNMP A remote terminal emulation protocol that enables clients to log on to remote hosts on the network. Telnet This protocol, the core of the World Wide Web, facilitates retrieval and transfer of hypertext (mixed media) documents. Stands for the HyperText Transfer protocol HTTP

Editor's Notes

  1. This is intended to be a very general overview of the concepts in computer networking and communication.
  2. Potential topics: TCP/IP and the Internet TCP and UDP Gateway and Routing Protocols Telnet and FTP TCP/IP Configuration TCP/IP and Networks Domain Name Service Network File System
  3. Transmitter: modem Transmission system: public telephone network Receiver: modem Destination: server
  4. Transmitter: modem Transmission system: public telephone network Receiver: modem Destination: server
  5. Network - A group of computers connected together in a way that allows information to be exchanged between the computers. Node - Anything that is connected to the network. While a node is typically a computer, it can also be something like a printer or CD-ROM tower. Segment - Any portion of a network that is separated, by a switch, bridge or router, from other parts of the network. Backbone - The main cabling of a network that all of the segments connect to. Typically, the backbone is capable of carrying more information than the individual segments. For example, each segment may have a transfer rate of 10 Mbps (megabits per second: 1 million bits a second), while the backbone may operate at 100 Mbps. Topology - The way that each node is physically connected to the network.
  6. Backbone example: E.g. each segment may have a transfer rate of 10Mbps (megabits per second or 1 million bits a second) while the backbone may operate at 100Mbps
  7. Similar to a bus network, rings have nodes daisy chained, but the end of the network in a ring topology comes back around to the first node, creating a complete circuit. Each node takes a turn sending and receiving information through the use of a token. The token along with any data is sent from the first node to the second node which extracts the data addressed to it and adds any data it wishes to send. Then second node passes the token and data to the third node, etc. until ti comes back around to the first node again. Only the node with the token is allowed to send data . All other nodes must wait for the token to come to them.
  8. A hub does not perform any type of filtering or routing of the data. A hub is a junction that joins all the different nodes together.
  9. A hub does not perform any type of filtering or routing of the data. A hub is a junction that joins all the different nodes together.
  10. Baud – don’t use; a single state change can involve more than a single bit of data
  11.  we will talk about network cables next
  12. CAT 5 is currently under consideration to be incorporated into the Gigabit Ethernet specification for short distance wiring. While longer connections using Gigabit Ethernet use optical fiber, the goal is to leverage the CAT 5 twisted-pair wiring most organizations already have in place for connections out to the desktop.
  13. Use of optical fibers over ; Optical fiber (or "fiber optic") refers to the medium and the technology associated with the transmission of information as light pulses along a glass or plastic wire or fiber. Optical fiber carries much more information than conventional copper wire and is in general not subject to electromagnetic interference and the need to retransmit signals. Most telephone company long-distance lines are now of optical fiber. Transmission on optical fiber wire requires repeater at distance intervals. The glass fiber requires more protection within an outer cable than copper. For these reasons and because the installation of any new wiring is labor-intensive, few communities yet have optical fiber wires or cables from the phone company's branch office to local customers (known as local loop). single mode fiber fiber is used for longer distances; multimode fiber fiber is used for shorter distances.
  14. Multimode has a larger core than single mode optical fiber
  15. Starband.com DirectDuo DirectPC
  16. In wireless LAN (WLAN) technology, 802.11 refers to a family of specifications developed by a working group of the Institute of Electrical and Electronics Engineers ( IEEE ). There are three specifications in the family: 802.11, 802.11a, and 802.11b. All three of the above mentioned specifications use CSMA/CD carrier sense multiple access with collision detection ( CSMA/CD )as the path sharing protocol. If a source station has a data packet to send, the station checks the system to see if the path medium is busy. If the medium is not busy, the packet is sent; if the medium is busy, the station waits until the first moment that the medium becomes clear. Testing is done repeatedly by the source via a short test message called RTS (ready to send). The data packet is not transmitted until the destination station returns a confirmation message called CTS (clear to send). If two stations send at exactly the same time, CSMA/CD prevents the loss of data that might otherwise occur and provides a system for retrying. The 802.11 and 802.11b specifications apply to wireless Ethernet LANs, and operate at frequencies in the 2.4-GHz region of the radio spectrum. Data speeds are generally 1 Mbps or 2 Mbps for 802.11, and 5.5 Mbps or 11 Mbps for 802.11b, although speeds up to about 20 Mbps are realizable with 802.11b. The 802.11b standard is backward compatible with 802.11. The modulation used in 802.11 has historically been phase-shift keying ( PSK ). The modulation method selected for 802.11b is known as CCK (complementary code keying), which allows higher data speeds and is less susceptible to multipath-propagation interference. The 802.11a specification applies to wireless ATM systems and operates at radio frequencies between 5 GHz and 6 GHz. A modulation scheme known as OFDM (orthogonal frequency-division multiplexing) makes possible data speeds as high as 54 Mbps, but most commonly, communications takes place at 6 Mbps, 12 Mbps, or 24 Mbps.
  17. Nowadays you see hubs with switches; but basically the hub is the place where data comes together while the switch determines how and where data is forwarded from the place where data comes together.
  18. bridge In telecommunication networks, a bridge is a product that connects a local area network (LAN) to another local area network that uses the same protocol (for example, Ethernet or token ring). You can envision a bridge as being a device that decides whether a message from you to someone else is going to the local area network in your building or to someone on the local area network in the building across the street. A bridge examines each message on a LAN, "passing" those known to be within the same LAN, and forwarding those known to be on the other interconnected LAN (or LANs). In bridging networks, computer or node addresses have no specific relationship to location. For this reason, messages are sent out to every address on the network and accepted only by the intended destination node. Bridges learn which addresses are on which network and develop a learning table so that subsequent messages can be forwarded to the right network. Bridging networks are generally always interconnected local area networks since broadcasting every message to all possible destinations would flood a larger network with unnecessary traffic. For this reason, router networks such as the Internet use a scheme that assigns addresses to nodes so that a message or packet can be forwarded only in one general direction rather than forwarded in all directions. A bridge works at the data-link (physical network) level of a network, copying a data frame from one network to the next network along the communications path. A bridge is sometimes combined with a router in a product called a brouter.
  19. The range for WAN transmission will vary: 56 Kb/s to 1.544 Mb/s
  20. Communication path established between two
  21. What is the third generation speed for ISDN?
  22. http://www.informit.com/newsletter.asp?link=320 The 802.3 standards put down in writing what happens at the very basest level of network communication: that which actually travels through the wires and hardware.
  23. Structure of protocols architecture: file transfer module contains all logic for file transfer applications (transmitting passwords, file commands, and file records). Need is to transmit the files and commands reliably. Some sorts of reliability are relevant to a variety of applications (e.g. e-mail, document transfer) Met by separate communication service modules that can be used by a variety of applications. Communication service modules assumes two computer systems are active and ready for data transfer, and keeps track of data being exchanged to assure delivery. A structured set of modules are used that implements the communication functions.
  24. It is use to guide product implementors so that their products will consistently work with other products.
  25. OSI divides telecommunication into seven layers. The layers are in two groups. The upper four layers are used whenever a message passes from or to a user. The lowest three layers (Up to network layer) are used when any message passes through the host computer. Message intended for this computer pass to the upper layers. Message destined for some other host are not passed up to the upper layers but are forwarded to another host. Physical layer: Bit stream through network at electrical/mechanical level
  26. There are several higher layer application protocols that use TCP/IP to get to the internet. They include World Wide Web’s Hypertext Transfer Protocol; File Transfer Protocol (FTP); Telnet (Telnet) [ allow you to logion to remote computers], Simple Mail Transfer Protocol (SMTP) These and other protocols are often packaged together as a suite. TCP keep track of the individual packets that a message is divided into for efficient routing through the internet