SlideShare a Scribd company logo
1 of 16
PRESENTED
BY:Kuldeep Bindal
Basics of NetworkingBasics of Networking
Networking began its infancy in the mid -1960’s.
by the US Department of Defence (DoD).
The original intention of networking was being
developed to withstand a nuclear war.
Telephone networks were to vulnerable and would
terminate all conversations should a nuclear war
occur.
WE ARE DEALING WITH MACHINES INSTEAD O F
PEO PLE INTO DAY’S WO RLD. O UR PRIVACY IS
AFFECTED AND ALMO ST ALL O F O UR PERSO NAL
INFO RMATIO NCANBE FO UND IN
THE “VIRTUAL WO RLD” .
Basics of NetworkingBasics of Networking
ARPA (Advanced Research Projects Agency)
was created in response with the launching of the
Sputnik in 1957.
ARPA decided that a DoD network should be packet-
switched networked consisting of a subnet and
host computers.
Experimental network research was awarded to
UCLA, UCSB, SRI and Univ. of Utha in 1969. These
areas were because they all had a large number
of ARPA contracts.
Basics of NetworkingBasics of Networking
These 4 universities also had different and completely
incompatible host computers.
ARPANET protocols were not suitable for running over
multiple networks, so TCP/IP model and protocols
were invented in 1974.
ARPA awarded several other contracts and specifically
Univ.. of California at Berkeley to integrate the
protocols with the Berkeley UNIX.
Basics of NetworkingBasics of Networking
NETWORKS ARE BROKEN INTO 3 TOPOLOGIES.
THEY ARE:
•BUS TOPOLOGY
•STAR TOPOLOGY
•RING TOPOLOGY
Basics of NetworkingBasics of Networking
BUS TOPOLOGY ALLOWS INFORMATION TO BE
DIRECTED FROM ONE COMPUTER TO THE OTHER.
LOTS OF BINARY COLLISION THOUGH.
Basics of NetworkingBasics of Networking
STAR TOPOLOGY IS THE MOST COMMON TYPE
USED. ALL COMPUTERS ARE ATTACHED TO A HUB.
LESS COLLISIONS AND MOST EFFICIENT.
Basics of NetworkingBasics of Networking
RING TOPOLOGY- USES A TOKEN TO PASS
INFORMATION FROM 1 COMPUTER TO THE OTHER.
A TOKEN IS ATTACHED TO THE MESSAGE BY THE
SENDER TO IDENTIFY WHICH COMPUTER SHOULD
RECEIVE THE MESSAGE. AS THE MESSAGE MOVES
AROUND THE RING, EACH COMPUTER EXAMINES
THE TOKEN. IF THE COMPUTER IDENTIFIES THE TOKEN
AS ITS OWN, THEN IT WILL PROCESS THE
INFORMATION.
Basics of NetworkingBasics of Networking
A DISADVANTAGE OF A TOKEN RING IS IF ONE
COMPUTER IS BROKEN OR DOWN, THE MESSAGE
CANNOT BE PASSED TO THE OTHER COMPUTERS.
Basics of NetworkingBasics of Networking
TYPES OF NETWORKS
LAN – LOCAL AREA NETWORK IS A SMALL
GEOGRAPHICAL AREA SUCH AS OUR SCHOOL
BOARD.
MAN – METROPOLITAN AREA NETWORK IS A
NETWORK OVER A LARGER GEOGRAPHICAL AREA
SUCH AS THE PROVINCIAL GOVERNMENT.
WAN – WIDE AREA NETWORK IS A NETWORK USED
OVER AN EXTREMELY LARGE GEOGRAPHICAL AREA
SUCH AS THE FEDERAL GOVERNMENT.
Basics of NetworkingBasics of Networking
Header Trailer (Footer)
Contains : Contains :
Mac Address (if available) Mac Address (from your compu
IP Address (where it's going) IP Address (where it came from)
Bits of
information
THERE ARE A NUMBEROF PACKETS THAT WILL
FOLLOWEACHOTHERTOTHE FINAL DESTINATION.
Basics of NetworkingBasics of Networking
FTP - File Tra nsfer Protocol
FTP provides a sta ndard system for sending
a nd receiving files over IP networks.
HTTP Protocol
Web browsers a nd servers use the Hypertext
Tra nsfer Protocol (HTTP) protocol to
communica te.
Electronic Ma il Protocols
Severa l network protocols were developed
specifica lly to support electronic ma il over the
Internet.
THE APPLICATION LAYER
Basics of NetworkingBasics of Networking
IPv6 - Internet Protocol version 6
IPv6 promises to relieve the current IP a ddress
shorta ge, a nd this new version of the protocol
ma y a lso increa se performa nce a nd improve
a dministra tion ca pabilities.
PPPoE
The Point to Point Protocol over Ethernet
(PPPoE) sta ndard helps a ccess providers
ma na ge their broa dba nd service delivery, a nd
it ca n a lso improve the ea se of use for DSL a nd
ca ble modem customers.
THE APPLICATION LAYER
Basics of NetworkingBasics of Networking
THE NETWORKLAYER
If you lookat the IPAddress, the numberare broken
into different categories.
216. 27.61.137
Classification Hosts
216. 27.61.137
Octets
Basics of NetworkingBasics of Networking
Thank You.

More Related Content

What's hot

เทคโนโลยีสารสนเทศ
เทคโนโลยีสารสนเทศเทคโนโลยีสารสนเทศ
เทคโนโลยีสารสนเทศ
Kaii Eiei
 
เทคโนโลยีสารสนเทศ
เทคโนโลยีสารสนเทศเทคโนโลยีสารสนเทศ
เทคโนโลยีสารสนเทศ
Kaii Eiei
 
Electronic Communications 2
Electronic Communications 2Electronic Communications 2
Electronic Communications 2
Tori Small
 
Electronic Communications
Electronic CommunicationsElectronic Communications
Electronic Communications
jpatetta
 

What's hot (19)

Super Barcode Training Camp - Motorola AirDefense Wireless Security Presentation
Super Barcode Training Camp - Motorola AirDefense Wireless Security PresentationSuper Barcode Training Camp - Motorola AirDefense Wireless Security Presentation
Super Barcode Training Camp - Motorola AirDefense Wireless Security Presentation
 
R1x g12 wifi i
R1x g12 wifi iR1x g12 wifi i
R1x g12 wifi i
 
slideshow 2
slideshow 2slideshow 2
slideshow 2
 
Bluetooth ppt
Bluetooth pptBluetooth ppt
Bluetooth ppt
 
เทคโนโลยีสารสนเทศ
เทคโนโลยีสารสนเทศเทคโนโลยีสารสนเทศ
เทคโนโลยีสารสนเทศ
 
เทคโนโลยีสารสนเทศ
เทคโนโลยีสารสนเทศเทคโนโลยีสารสนเทศ
เทคโนโลยีสารสนเทศ
 
Electronic Communications 2
Electronic Communications 2Electronic Communications 2
Electronic Communications 2
 
Passive ip traceback disclosing the locations of ip spoofers from path backsc...
Passive ip traceback disclosing the locations of ip spoofers from path backsc...Passive ip traceback disclosing the locations of ip spoofers from path backsc...
Passive ip traceback disclosing the locations of ip spoofers from path backsc...
 
Wifi slide by G.K.Sourav
Wifi slide by G.K.SouravWifi slide by G.K.Sourav
Wifi slide by G.K.Sourav
 
Bluetooth network-security-seminar-report
Bluetooth network-security-seminar-reportBluetooth network-security-seminar-report
Bluetooth network-security-seminar-report
 
Electronic Communications
Electronic CommunicationsElectronic Communications
Electronic Communications
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth technology presentation
Bluetooth technology presentationBluetooth technology presentation
Bluetooth technology presentation
 
Speedy ip trace back(sipt) for identifying sadhan
Speedy ip trace back(sipt) for identifying sadhanSpeedy ip trace back(sipt) for identifying sadhan
Speedy ip trace back(sipt) for identifying sadhan
 
Overview of IP traceback mechanism
Overview of IP traceback mechanismOverview of IP traceback mechanism
Overview of IP traceback mechanism
 
call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...
 
Blue1
Blue1Blue1
Blue1
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Passive ip traceback disclosing the locations of ip spoofers from path backsc
Passive ip traceback disclosing the locations of ip spoofers from path backscPassive ip traceback disclosing the locations of ip spoofers from path backsc
Passive ip traceback disclosing the locations of ip spoofers from path backsc
 

Similar to kuldeep

Ks 5th networking_basicskevinshea
Ks 5th networking_basicskevinsheaKs 5th networking_basicskevinshea
Ks 5th networking_basicskevinshea
Prema Bahadur
 
Networking Standards ( Osi Layers )
Networking Standards ( Osi Layers )Networking Standards ( Osi Layers )
Networking Standards ( Osi Layers )
Renee Jones
 
Network File System Version 4.2
Network File System Version 4.2Network File System Version 4.2
Network File System Version 4.2
Nicole Gomez
 
Thesis Statement On Digital Security
Thesis Statement On Digital SecurityThesis Statement On Digital Security
Thesis Statement On Digital Security
Lindsey Jones
 
Computing and informatics class notes for amie
Computing and informatics class notes for amieComputing and informatics class notes for amie
Computing and informatics class notes for amie
Panduga Kumar
 

Similar to kuldeep (20)

Ks 5th networking_basicskevinshea
Ks 5th networking_basicskevinsheaKs 5th networking_basicskevinshea
Ks 5th networking_basicskevinshea
 
Ks 5th networking_basicskevinshea
Ks 5th networking_basicskevinsheaKs 5th networking_basicskevinshea
Ks 5th networking_basicskevinshea
 
Dcs networking
Dcs networkingDcs networking
Dcs networking
 
Computer Networks Lecture Notes
Computer Networks Lecture NotesComputer Networks Lecture Notes
Computer Networks Lecture Notes
 
802. 11A Standard Essay
802. 11A Standard Essay802. 11A Standard Essay
802. 11A Standard Essay
 
Nad710 Introduction To Networks Using Linux
Nad710   Introduction To Networks Using LinuxNad710   Introduction To Networks Using Linux
Nad710 Introduction To Networks Using Linux
 
Networking Standards ( Osi Layers )
Networking Standards ( Osi Layers )Networking Standards ( Osi Layers )
Networking Standards ( Osi Layers )
 
Networking
NetworkingNetworking
Networking
 
Introduction to TCP/IP
Introduction to TCP/IPIntroduction to TCP/IP
Introduction to TCP/IP
 
Computer networking
Computer networkingComputer networking
Computer networking
 
Network Protocol
Network ProtocolNetwork Protocol
Network Protocol
 
Network protocols
Network protocolsNetwork protocols
Network protocols
 
Introduction To Networks
Introduction To NetworksIntroduction To Networks
Introduction To Networks
 
Network File System Version 4.2
Network File System Version 4.2Network File System Version 4.2
Network File System Version 4.2
 
Thesis Statement On Digital Security
Thesis Statement On Digital SecurityThesis Statement On Digital Security
Thesis Statement On Digital Security
 
Evolution of network - computer networks
Evolution of network - computer networksEvolution of network - computer networks
Evolution of network - computer networks
 
internet protocols
internet protocols internet protocols
internet protocols
 
Skype
SkypeSkype
Skype
 
Document
DocumentDocument
Document
 
Computing and informatics class notes for amie
Computing and informatics class notes for amieComputing and informatics class notes for amie
Computing and informatics class notes for amie
 

kuldeep

  • 2. Basics of NetworkingBasics of Networking Networking began its infancy in the mid -1960’s. by the US Department of Defence (DoD). The original intention of networking was being developed to withstand a nuclear war. Telephone networks were to vulnerable and would terminate all conversations should a nuclear war occur.
  • 3. WE ARE DEALING WITH MACHINES INSTEAD O F PEO PLE INTO DAY’S WO RLD. O UR PRIVACY IS AFFECTED AND ALMO ST ALL O F O UR PERSO NAL INFO RMATIO NCANBE FO UND IN THE “VIRTUAL WO RLD” . Basics of NetworkingBasics of Networking
  • 4. ARPA (Advanced Research Projects Agency) was created in response with the launching of the Sputnik in 1957. ARPA decided that a DoD network should be packet- switched networked consisting of a subnet and host computers. Experimental network research was awarded to UCLA, UCSB, SRI and Univ. of Utha in 1969. These areas were because they all had a large number of ARPA contracts. Basics of NetworkingBasics of Networking
  • 5. These 4 universities also had different and completely incompatible host computers. ARPANET protocols were not suitable for running over multiple networks, so TCP/IP model and protocols were invented in 1974. ARPA awarded several other contracts and specifically Univ.. of California at Berkeley to integrate the protocols with the Berkeley UNIX. Basics of NetworkingBasics of Networking
  • 6. NETWORKS ARE BROKEN INTO 3 TOPOLOGIES. THEY ARE: •BUS TOPOLOGY •STAR TOPOLOGY •RING TOPOLOGY Basics of NetworkingBasics of Networking
  • 7. BUS TOPOLOGY ALLOWS INFORMATION TO BE DIRECTED FROM ONE COMPUTER TO THE OTHER. LOTS OF BINARY COLLISION THOUGH. Basics of NetworkingBasics of Networking
  • 8. STAR TOPOLOGY IS THE MOST COMMON TYPE USED. ALL COMPUTERS ARE ATTACHED TO A HUB. LESS COLLISIONS AND MOST EFFICIENT. Basics of NetworkingBasics of Networking
  • 9. RING TOPOLOGY- USES A TOKEN TO PASS INFORMATION FROM 1 COMPUTER TO THE OTHER. A TOKEN IS ATTACHED TO THE MESSAGE BY THE SENDER TO IDENTIFY WHICH COMPUTER SHOULD RECEIVE THE MESSAGE. AS THE MESSAGE MOVES AROUND THE RING, EACH COMPUTER EXAMINES THE TOKEN. IF THE COMPUTER IDENTIFIES THE TOKEN AS ITS OWN, THEN IT WILL PROCESS THE INFORMATION. Basics of NetworkingBasics of Networking
  • 10. A DISADVANTAGE OF A TOKEN RING IS IF ONE COMPUTER IS BROKEN OR DOWN, THE MESSAGE CANNOT BE PASSED TO THE OTHER COMPUTERS. Basics of NetworkingBasics of Networking
  • 11. TYPES OF NETWORKS LAN – LOCAL AREA NETWORK IS A SMALL GEOGRAPHICAL AREA SUCH AS OUR SCHOOL BOARD. MAN – METROPOLITAN AREA NETWORK IS A NETWORK OVER A LARGER GEOGRAPHICAL AREA SUCH AS THE PROVINCIAL GOVERNMENT. WAN – WIDE AREA NETWORK IS A NETWORK USED OVER AN EXTREMELY LARGE GEOGRAPHICAL AREA SUCH AS THE FEDERAL GOVERNMENT. Basics of NetworkingBasics of Networking
  • 12. Header Trailer (Footer) Contains : Contains : Mac Address (if available) Mac Address (from your compu IP Address (where it's going) IP Address (where it came from) Bits of information THERE ARE A NUMBEROF PACKETS THAT WILL FOLLOWEACHOTHERTOTHE FINAL DESTINATION. Basics of NetworkingBasics of Networking
  • 13. FTP - File Tra nsfer Protocol FTP provides a sta ndard system for sending a nd receiving files over IP networks. HTTP Protocol Web browsers a nd servers use the Hypertext Tra nsfer Protocol (HTTP) protocol to communica te. Electronic Ma il Protocols Severa l network protocols were developed specifica lly to support electronic ma il over the Internet. THE APPLICATION LAYER Basics of NetworkingBasics of Networking
  • 14. IPv6 - Internet Protocol version 6 IPv6 promises to relieve the current IP a ddress shorta ge, a nd this new version of the protocol ma y a lso increa se performa nce a nd improve a dministra tion ca pabilities. PPPoE The Point to Point Protocol over Ethernet (PPPoE) sta ndard helps a ccess providers ma na ge their broa dba nd service delivery, a nd it ca n a lso improve the ea se of use for DSL a nd ca ble modem customers. THE APPLICATION LAYER Basics of NetworkingBasics of Networking
  • 15. THE NETWORKLAYER If you lookat the IPAddress, the numberare broken into different categories. 216. 27.61.137 Classification Hosts 216. 27.61.137 Octets Basics of NetworkingBasics of Networking