This slide deck was used for a 2-day short course at IIT Gandhinagar in Spring 2015. Being a 2-day course, it focuses more on a qualitative description of how we access the Internet.
In this slides the all common and mostly used networking devices are describe that help the beginners students of networking to understand about the all networking devices for more details comment below or suggestion
One way to categorize the different types of computer network designs is by their scope or scale. For historical reasons, the networking industry refers to nearly every type of design as some kind of area network. Common types of area networks are:
LAN - Local Area Network
WAN - Wide Area Network
WLAN - Wireless Local Area Network
MAN - Metropolitan Area Network
SAN - Storage Area Network, System Area Network, Server Area Network, or sometimes Small Area Network
CAN - Campus Area Network, Controller Area Network, or sometimes Cluster Area Network
PAN - Personal Area Network
LAN and WAN are the two primary and best-known categories of area networks, while the others have emerged with technology advances
In this slides the all common and mostly used networking devices are describe that help the beginners students of networking to understand about the all networking devices for more details comment below or suggestion
One way to categorize the different types of computer network designs is by their scope or scale. For historical reasons, the networking industry refers to nearly every type of design as some kind of area network. Common types of area networks are:
LAN - Local Area Network
WAN - Wide Area Network
WLAN - Wireless Local Area Network
MAN - Metropolitan Area Network
SAN - Storage Area Network, System Area Network, Server Area Network, or sometimes Small Area Network
CAN - Campus Area Network, Controller Area Network, or sometimes Cluster Area Network
PAN - Personal Area Network
LAN and WAN are the two primary and best-known categories of area networks, while the others have emerged with technology advances
This Presentation consists of various Network Devices
Hub, Router, Repeater, Bridge, Brouter, Gateway, NIC etc. It is very helpful for B.tech, BCA, MCA, M.Tech students and for those who is interested in networking.
Learning Outcomes
A Network of Networks
Internet
Define Computer Networks
Define Communication
State Importance of Computer network and communication
Network classification
Types of networks
Comparison of different networks
TCP/IP
Hypertext Transfer Protocol
Internet
A network formed by the co-operative interconnection of a large no. of computer networks.
Since Internet is formed by the interconnection of no. of networks, sometimes its also called as network of networks
What is a network?
Need for networking
Components of Network
Types of Network
Evolution of Networking
Communication media
Data Communication Terminologies
Switching Techniques
Digital and Analog Transmission
Network Topology
Network Devices
Communication Protocols
Wireless/Mobile Computing
WLAN is a wireless computer network that links two or more devices (using-spectrum or OFDM radio) within a limited area such as a home, school, computer laboratory, or office building.
WLAN is a marketed under the Wi-Fi brand name.
Wireless LANs have become popular in the home due to ease of installation and use.
This Presentation consists of various Network Devices
Hub, Router, Repeater, Bridge, Brouter, Gateway, NIC etc. It is very helpful for B.tech, BCA, MCA, M.Tech students and for those who is interested in networking.
Learning Outcomes
A Network of Networks
Internet
Define Computer Networks
Define Communication
State Importance of Computer network and communication
Network classification
Types of networks
Comparison of different networks
TCP/IP
Hypertext Transfer Protocol
Internet
A network formed by the co-operative interconnection of a large no. of computer networks.
Since Internet is formed by the interconnection of no. of networks, sometimes its also called as network of networks
What is a network?
Need for networking
Components of Network
Types of Network
Evolution of Networking
Communication media
Data Communication Terminologies
Switching Techniques
Digital and Analog Transmission
Network Topology
Network Devices
Communication Protocols
Wireless/Mobile Computing
WLAN is a wireless computer network that links two or more devices (using-spectrum or OFDM radio) within a limited area such as a home, school, computer laboratory, or office building.
WLAN is a marketed under the Wi-Fi brand name.
Wireless LANs have become popular in the home due to ease of installation and use.
To Download this PPT click on the link below:-
http://www29.zippyshare.com/v/14569917/file.html
Networking
Computer network
Types of network
Personal Area Networks (PANs)
Local Area Networks (LANs)
Metropolitan Area Networks (MANs)
Wide Area Networks (WANs)
Classification of Network Architecture
Client-server architecture
Peer-to-peer architecture
Hybrid architecture
Network topology
Bus Topology
Star Topology
Ring Topology
Mesh Topology
Tree Topology
Hybrid Topology
This was the overview for the basics of the OSI model and the concepts around networking for an NIU course I taught on networking. Another instructor also named Steve taught the course previously, and much of the presentation was based on his work but I can't remember what was modified. It was meant for educators without a deep technical background. .
TCP/IP Protocol Suite model Transmission Control Protocol27230106
TCP/IP is a set of protocols developed to allow cooperating computers to share resources across a network
TCP stands for “Transmission Control Protocol”
IP stands for “Internet Protocol”
They are Transport layer and Network layer protocols respectively of the protocol suite
The most well known network that adopted TCP/IP is Internet – the biggest WAN in the world
Wi-Fi (or WiFi) is a local area wireless computer networking technology that allows electronic devices to network, mainly using the 2.4 gigahertz (12 cm) UHF and 5 gigahertz (6 cm) SHF ISM radio bands.
The Wi-Fi Alliance defines Wi-Fi as any "wireless local area network" (WLAN) product based on the Institute of Electrical and Electronics Engineers' (IEEE) 802.11 standards".[1] However, the term "Wi-Fi" is used in general English as a synonym for "WLAN" since most modern WLANs are based on these standards. "Wi-Fi" is a trademark of the Wi-Fi Alliance. The "Wi-Fi Certified" trademark can only be used by Wi-Fi products that successfully complete Wi-Fi Alliance interoperability certification testing.
Many devices can use Wi-Fi, e.g. personal computers, video-game consoles, smartphones, digital cameras, tablet computers and digital audio players. These can connect to a network resource such as the Internet via a wireless network access point. Such an access point (or hotspot) has a range of about 20 meters (66 feet) indoors and a greater range outdoors. Hotspot coverage can be as small as a single room with walls that block radio waves, or as large as many square kilometres achieved by using multiple overlapping access points.
Depiction of a device sending information wirelessly to another device, both connected to the local network, in order to print a document.
Wi-Fi can be less secure than wired connections, such as Ethernet, precisely because an intruder does not need a physical connection. Web pages that use TLS are secure, but unencrypted internet access can easily be detected by intruders. Because of this, Wi-Fi has adopted various encryption technologies. The early encryption WEP proved easy to break. Higher quality protocols (WPA, WPA2) were added later. An optional feature added in 2007, called Wi-Fi Protected Setup (WPS), had a serious flaw that allowed an attacker to recover the router's password.[2] The Wi-Fi Alliance has since updated its test plan and certification program to ensure all newly certified devices resist attacks .
Packet Analysis - Course Technology Computing Conference
Presenter: Lisa Bock - Pennsylvania College of Technology
Most network administrators are well-versed in hardware, applications, operating systems, and network analysis tools. However, many are not trained in analyzing network traffic. Network administrators should be able to identify normal network traffic in order to determine unusual or suspicious activity. Network packet analysis is important in order to troubleshoot congestion issues, create firewall and intrusion detection system rules, and perform incident and threat detection. This hands-on presentation will review fundamental concepts necessary to analyze network traffic, beginning with an overview of network analysis, then a review the TCP/IP protocol suite and LAN operations. Participants will examine packet captures and understand the field values of the protocols and as to what is considered normal behavior, and then examine captures that show exploits, network reconnaissance, and signatures of common network attacks. The program will use Wireshark, a network protocol analyzer for Unix and Windows, to study network packets, look at basic features such as display and capture filters, and examine common protocols such as TCP, HTTP, DNS, and FTP. Time permitting, the presentation will provide suggestions on how to troubleshoot performance problems, conduct a network baseline, and how to follow a TCP or UDP stream and see HTTP artifacts. Participants should have a basic knowledge of computer networking and an interest in the subject.
ER(Entity Relationship) Diagram for online shopping - TAEHimani415946
https://bit.ly/3KACoyV
The ER diagram for the project is the foundation for the building of the database of the project. The properties, datatypes, and attributes are defined by the ER diagram.
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
2. Ground Rules
• There are no “silly” questions. Focus on “why”
• Slides with have fundamental concepts
• Search on the web for anything you don’t understand
• Almost everything is explained reasonably well on the web
• You can send questions to amsaha+iitgn15s@gmail.com
3. Books – not mandatory
• Data and Computer Communications
- William Stallings
• Internetworking with TCP/IP Volume 1 Principles, Protocols,
and Architecture
- Douglas E. Comer
4. What is Networking?
• networking – the exchange of information or services among
individuals, groups, or institutions
• computer networking – the exchange of information or services
among computers
5. A Brief History
• http://visual.ly/brief-history-computer-network-technology
11. Wireless First Hop – WiFi
• IEEE 802.11 (a/b/g/n/…) standards
• Infrastructure mode (common) or Ad hoc mode
Ethernet Token Ring
New 802.11n
12. Connecting to a WiFi Access Point
• Scanning
• Joining
• Authentication
• Association
• The station feels as if it is “plugged” into a wired network
13. Communicating with a WiFi AP
• Wireless is a half duplex channel – either speak or listen
• Signal strength is inversely proportion to square of distance
• Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA)
• Fancy name for how humans talk
• This is generally true of all wireless systems (including humans)
16. Wired First Hop - Ethernet
• IEEE 802.3 standard
• If two ends of the Ethernet cable (e.g., RJ45) is electrically up,
connection is up.
• Some authentication steps are usually there but we will skip those
20. Getting an IP address
• DHCP – DHCP clients get IP addresses and networking
parameters from DHCP server
• Based on BOOTP
• DHCPv6 (for IPv6) is also available
21. DHCP Packets
• Discovery
• Offer (possibly multiple)
• Request
• Acknowledge
• Renew
• Release
Why do we need an IP address?
26. Got an IP! Hurray!
• But now what? How do I “go to” some website?
• IP is just an identity
• Still need to “route” to somewhere
27. DNS – Domain Name Service
• We almost always try to reach a human readable name
• But machines route based on IP addresses
• There must be a mapping from names to IP addresses
• But who is going to do this translation?
28. Default Gateway
• If host does not know how to route, who does it ask?
• There must be a “goto” guy in the network
29. Routing table – Host
ubuntu@ubuntu-VirtualBox:~/Projects/OpenStack/New/cinder$ route
Kernel IP routing table
Destination Gateway Genmask Flags Metric Ref Use Iface
default 10.0.2.2 0.0.0.0 UG 0 0 0 eth0
10.0.2.0 * 255.255.255.0 U 1 0 0 eth0
• Routing table becomes very interesting in a core router
• 50,000 to 1,00,000 routes (entries like the above table)
• We will get to it later
30. Who could …
• Be a host’s Domain Name Server
• Be a host’s Default Gateway
32. ARP – Address Resolution Protocol
• What is the MAC address for a given IP?
• ARP resolves network layer address to link layer address
• Remember network layer is the same as routing layer. This is also known
as Layer 3(L3)
• Link Layer is Layer 2 (L2)
33. Ethernet – IEEE 802.3b
• Broadcast medium
• These days mostly switched Ethernet (point-to-point)
• These days mostly Ethernet II
• No LLC
36. An Example
• Wireshark – Download it, install it and then play around with it
• Instructions are there on the web itself
• Will give you a lot of detail about packets and layering
37. DNS – Domain Name Service
• Hierarchical way of managing name space
• Managed by Internet Assigned Numbers Authority (IANA)
• http://www.iana.org/domains/root/db
38.
39. DNS – Root Servers
• <a-m>.root-servers.net – 13 hostnames, around 500 instances
• Use anycast to reach “nearest” instance – BGP supports this
• 12 of the 13 root servers A-M exist in multiple locations
• 11 on multiple continents
• Root server ‘h’ exists in two U.S. locations.
• Root server ‘b’ exists in a single location in the Los Angeles Area
• http://www.root-servers.org/
40. Subnetting
• Routing to each individual hosts does not scale
• Addresses grouped into different classes
41. CIDR
• Any “class system” is bad
• IPv4 was running out of unique IP addresses
• Hence IPv6 but…
• Classless Inter Domain Routing
• Network portion can be of any size
• Addresses need to specify subnet mask as well
48. Intra-Domain Routing
• Typically uses UDP
• Distance Vector
• RIP – Bellman – Ford Algorithm
• Link State
• OSPF – Dijkstra’s shortest path
• ISIS – Dijkstra’s shortest path
• Note: The fundamental concept here is Distance Vector and
Link State as two types of algorithms, not that they are used for
intra-domain routing
49. Inter-Domain Routing
• Border Gateway Protocol (BGP) – BGP version 4
• Path – vector routing
• Uses TCP
• External BGP – eBGP
• Internal BGP – iBGP
• Not to be confused with intra-domain routing (though iBGP could do that )
• Used to send information from one “side” of network to another
• Policy engineering
54. Transport Layer
• Provides end-to-end connection
• On top of the routing layer
• Two types of transmissions
• Unreliable – User Datagram Protocol (UDP)
• Reliable – Transmission Control Protocol (TCP)
55. UDP
• Best effort, connection-less
• Just send as fast as possible
• When is it okay?
• Phone calls, gaming, etc.
• Simple stuff like DNS
56. TCP
• Connection oriented
• Setup/teardown connection
• Sends stream of bytes, not messages
• Reliable and in-order delivery
• Flow Control
• Congestion Control
• Analogous to how humans communicate
57. Basics of Reliable Connection
• How do you make a transmission reliable?
• What do you need to protect against?
62. TCP – Being a Good Citizen
• Congestion Control
• MaxWindow = min(Congestion Window, Receiver Window)
• Congestion Window start at 1
• Original TCP: Additive Increase, Multiplicative Decrease
64. Evolution of TCP
1975 1980 1985 1990
1982
TCP & IP
RFC 793 & 791
1974
TCP described by
Vint Cerf and Bob Kahn
In IEEE Trans Comm
1983
BSD Unix 4.2
supports TCP/IP
1984
Nagel’s algorithm
to reduce overhead
of small packets;
predicts congestion
collapse
1987
Karn’s algorithm
to better estimate
round-trip time
1986
Congestion collapse
observed
1988
Van Jacobson’s algorithms
congestion avoidance and
congestion control
(most implemented in
4.3BSD Tahoe)
1990
4.3BSD Reno
fast retransmit
delayed ACK’s
1975
Three-way handshake
Raymond Tomlinson
In SIGCOMM 75
Taken from Aditya Akella’s slides, Dept. of Computer Science, University of Wisconsin - Madison
65. TCP Through the 1990s
1993 1994 1996
1994
ECN
(Floyd)
Explicit
Congestion
Notification
1993
TCP Vegas
(Brakmo et al)
real congestion
avoidance
1994
T/TCP
(Braden)
Transaction
TCP
1996
SACK TCP
(Floyd et al)
Selective
Acknowledgement
1996
Hoe
Improving TCP
startup
1996
FACK TCP
(Mathis et al)
extension to SACK
Taken from Aditya Akella’s slides, Dept. of Computer Science, University of Wisconsin - Madison
81. STP Variants
• Rapid STP – Converges faster than STP
• VLAN STP – Each VLAN can have a different STP tree
82. Data Centers
• Cloud computing – Making computing elastic
• Software Defined Networking (SDN)
• Universities are using data centers for compute resources
• Pay-as-you-go pricing model
• Power and Cooling most important
83. Data Centers – Network Properties
• Large number of ports
• Large number of L2 end points
• Multiple VMs per port
• Relatively fewer L3 end points
• Prime importance - manageability
84.
85.
86. Example Equipment – Pictures/Prices
• Go to websites such as www.cisco.com and www.juniper.net
and look at their product portfolio
• www.cisco.com has interactive 3D models
• Search for prices on the web
88. Industry Expectations
• Average loss $5600/minute $300K/hour
• Zero planned downtime is fast becoming the norm
• Can you think of anything similar?
89. The Future of Computer Networks
• Manageability
• Monitoring
• Trouble shooting
• Automated Healing
• More bandwidth
• Energy efficiency
• Faster way of implementing something –
algorithms/algorithmics
• OpenSource based – cheaper and “better”
• Broadband access will become a fundamental right