SlideShare a Scribd company logo
Network Essentials
FUNDAMENTALS – CHAPTER 2
A network is a collection of systems and devices exchanging data over some form of media.
A host is defined as any device that holds a logical address on your network.
Hosts can be workstations, servers, printers, connection devices, or routers.
Modern networks are charged with delivering our phone calls and, soon, our television and
entertainment options. Data—no matter what its form—is transmitted in the form of bits.
A single bit is a 1 or a 0 (based on the binary number system of two digits versus the typically
used decimal numbering system based on the digits 0–9).
A protocol is simply an agreed upon set of rules for a particular network function.
Bandwidth is generally considered to be the total amount of data (in bits) you can theoretically
transmit within a given time period (typically one second).
Bandwidth is expressed in bits or bytes per second in digital networking.
Network Topologies
The topology can refer to how the network actually looks
Physical Topologies:
The physical topology of the network refers to how the network actually looks from a
bird’s-eye view—the physical cabling layout of the network itself.
A bus topology consists of all devices connecting to a single wire—a coaxial cable.
A physical bus looks like a straight line—a stick—with connections to hosts coming off
in a “T” shape.
In a ring topology, all devices are connected to each other in the shape of a circle—the first
device feeds into the second device, which in turn feeds into the third, and so on and so on until
the loop plugs back into the first device
Star topologies can also include extended star, where the central device extends links to other
hubs and switches.
A token passing, or ring, topology works in a more organized, almost friendly format. In a
token passing logical topology, systems can only transmit information when they hold a special
data packet, known as a token. The token is passed from one device to the next, in a prescribed,
circular path. Each device receives the token and examines it. If it holds a message for the
device, it will open and process it.
Network Categories
Networks are typically of two types: LANs and WANs.
LANs :
A LAN (local area network) can be defined as a network that serves users within a small
geographic footprint.
WANs:
A WAN(wide area network ) is nothing more than the network connecting a collection of LANs
across a wide geographic area—perhaps a state, nation, or even the whole world! Aside from
the distance variable, another defining characteristic of WANs is the concept of a leased line.
The OSI Reference Model 11 CERTIFICATION OBJECTIVE 1.02 The OSI Reference
Model
One word bandied about quite a bit in regards to the OSI model is encapsulation.
Encapsulation is the process of adding a header and a trailer to a piece of data. While each stage
of communication (layer of the model) adds a header to the data, only one layer always adds a
trailer. Some texts define encapsulation as occurring in all layers of the model; however, it
technically only occurs at one—the Data Link layer.
The Layers
The OSI Reference Model splits the communications process into seven distinct modular layers,
with each layer accomplishing a specific function independently of all other layers. The layers do
rely on layers above and below to provide something to work with, but they don’t necessarily
care what they receive to work with.
The OSI REFERENCE MODEL SERIES
LAYER DEVICES FOUND IN THE LAYER PROTOCOLS AND STANDARDS WORKING
Application Firewall,Gateway and IDS SMTP,POP3,DNS,DHCP,FTP,HTTP,TFTP,SNMP
Presentation N/A JPG,JPEG,TIFF,GIF,MIME
Session N/A NFS,ASP,SQL,RPC
Transport Firewall TCP,UDP, SPX
Network Router IP,IPX, Appletalk
Data link layer Bridge and Switch Ethernet,ATM,PPP,Frame Relay
Physical Transceiver,Repeater, and Hub RJ45,ST/SC
The Data Layers (Application,Presentation, and Session)
Seven layers of the OSI model:-
The data layers would be the top three layers of the model.
At the top of the stack, we find layer 7—the Application layer
The Application layer holds the protocols that allow programs to access and make use of a
Network.
For example, Microsoft Outlook—a common e-mail program—can work just fine without a
network. You can open, edit, create, and delete e-mails offline just as well as you can online.
However, if you wish to use the network to send and receive e-mail, you need an Application
layer protocol to do this. In this example, the Application layer protocol would be SMTP.
Continuing the e-mail analogy, imagine you are sending an e-mail from a Microsoft Outlook
application to a computer running the Thunderbird e-mail application. You may have bold,
italics, and any number of font settings within your e-mail. Additionally, you may attach a picture
file (jpg) for the recipient to enjoy. Thunderbird might treat bold, italics, and font settings
differently than does Outlook, and SMTP is only capable of sending ASCIIcode (a combination of
bits representing an alphanumeric character, commonly referred to as, simply, text).
Enter layer 6—the Presentation layer. The Presentation layer is responsible for formatting and
code conversion between systems. This layer accepts the data from the Application layer and
ensures it is placed in a format the end station can understand. In this case, the e-mail is in text
mode, and another protocol, like MIME, translates the jpg into ASCII for transit. Once received at
the far end, the recipient’s Presentation layer will perform the reverse, handing the data back to
the Application layer protocol. Encryption is another function of the Presentation layer
Layer 5—the Session layer:—is perhaps the most enigmatic and troublesome of the entire
stack. This layer doesn’t necessarily do anything to the data at all. Instead, its function is to
work in the background, ensuring the communications process between two systems runs
smoothly.
The Delivery Layers:-
Transport layer:
Transport the data from receiver to sender.
The three main functions:
1. Segmentation.
2. The reliable delivery
3. Flow control
Segmentation is simply taking a small piece of the bits making up the data as a whole.
A small header is put in front of these bits. Inside the header is all sorts of information,
including:
The Network layer is responsible for logical addressing and routing.
Receiving a segment from the Transport layer, the Network layer adds a header that includes a
source and destination logical (network) address. This address is read by layer-3 devices
(routers) and best path determinations are made to deliver the segment to its final destination
Network Components
Physical Layer Devices:
Physical layer devices do nothing more than physically connect wiring together to complete a
path, or change the connection from one type to another.
Examples of physical layer devices include transceivers, repeaters, and hubs.
Transceivers connect one media type to another, such as a fiber connection to a copper one.
Repeaters are used to extend the range of a given media—whatever they take in one port,
they regenerate and repeat out the other. Hubs are nothing more than multiport
repeaters. Comparatively, where a repeater takes bits in one port to relay to another,
hubs have several ports they accept and relay bits on.
Data Link Layer Devices
Layer-2 devices include bridges and switches. Switches and bridges split (or
segment) collision domains, decrease network traffic problems, and increase effective
available bandwidth to hosts. However, keep in mind they are incapable of moving
traffic outside your LAN.
Network Layer Devices
Network layer devices play a unique role in your network design. These devices read the
Logical network addresses on your data and make decisions about which route to
send the data. This sounds very much like the switches and bridges discussed earlier,
but keep in mind the layer-3 device not only knows which port to send the data out,
but also the best route through outside networks to its final destination. Continuing
the analogy from earlier, if the street address on your letter is akin to the physical
address of your hosts, the logical address used by layer-3 devices is equivalent to the
ZIP code.
Other Devices
Networks can also include a variety of other devices, such as firewalls, gateways,
and proxies. A firewall is a device that typically works at layers 3 and 4, and is
used to filter network traffic based upon rules the administrator configures on
the device. Generally placed between your network and the Internet, firewalls
work on an implicit deny principle—if you do not explicitly allow the traffic, it is
blocked.
Gateways work at all layers and are generally used to connect networks and applications of
different types together. A proxy is a system that provides a specific service to a host. For
example, a web proxy will make requests to the Internet for web content on behalf of a host.
This increases security and performance since web traffic coming from your network appears
from only one system, and hosts can access cached pages on the proxy instead of going out to
find them. Generally speaking, these devices are usually placed between your network and the
Internet in a special network called a DMZ

More Related Content

What's hot

Itn6 instructor materials_chapter3
Itn6 instructor materials_chapter3Itn6 instructor materials_chapter3
Itn6 instructor materials_chapter3limenih muluneh
 
Ex 1 chapter05-network-layer-tony_chen
Ex 1 chapter05-network-layer-tony_chenEx 1 chapter05-network-layer-tony_chen
Ex 1 chapter05-network-layer-tony_chenĐô GiẢn
 
IEEE 802 Standard for Computer Networks
IEEE 802 Standard for Computer NetworksIEEE 802 Standard for Computer Networks
IEEE 802 Standard for Computer NetworksPradeep Kumar TS
 
Communication standards ieee 802 3
Communication standards ieee 802 3Communication standards ieee 802 3
Communication standards ieee 802 3thanhtrung_ys
 
CCNA Introducing Networks
CCNA Introducing NetworksCCNA Introducing Networks
CCNA Introducing NetworksDsunte Wilson
 
Ccna Presentation
Ccna PresentationCcna Presentation
Ccna Presentationbcdran
 
Week 4 introducing network standards
Week 4 introducing network standardsWeek 4 introducing network standards
Week 4 introducing network standardsRobert Almazan
 
Ccna PPT
Ccna PPTCcna PPT
Ccna PPTAIRTEL
 
CCNA Course Training Presentation
CCNA Course Training PresentationCCNA Course Training Presentation
CCNA Course Training PresentationRohit Singh
 

What's hot (19)

Itn6 instructor materials_chapter3
Itn6 instructor materials_chapter3Itn6 instructor materials_chapter3
Itn6 instructor materials_chapter3
 
Ex 1 chapter05-network-layer-tony_chen
Ex 1 chapter05-network-layer-tony_chenEx 1 chapter05-network-layer-tony_chen
Ex 1 chapter05-network-layer-tony_chen
 
IEEE 802 Standard for Computer Networks
IEEE 802 Standard for Computer NetworksIEEE 802 Standard for Computer Networks
IEEE 802 Standard for Computer Networks
 
chapter_1
chapter_1chapter_1
chapter_1
 
Communication standards ieee 802 3
Communication standards ieee 802 3Communication standards ieee 802 3
Communication standards ieee 802 3
 
Chapter2
Chapter2Chapter2
Chapter2
 
CCNA Introducing Networks
CCNA Introducing NetworksCCNA Introducing Networks
CCNA Introducing Networks
 
Ieee standards
Ieee standardsIeee standards
Ieee standards
 
Ccna Presentation
Ccna PresentationCcna Presentation
Ccna Presentation
 
Network layers
Network layersNetwork layers
Network layers
 
Ccna complete notes
Ccna complete notesCcna complete notes
Ccna complete notes
 
Cisco network 1 1
Cisco network 1 1Cisco network 1 1
Cisco network 1 1
 
Week 4 introducing network standards
Week 4 introducing network standardsWeek 4 introducing network standards
Week 4 introducing network standards
 
Ccna notes
Ccna notesCcna notes
Ccna notes
 
ETHERNET
ETHERNETETHERNET
ETHERNET
 
Ccna PPT
Ccna PPTCcna PPT
Ccna PPT
 
Ethernet technology
Ethernet technologyEthernet technology
Ethernet technology
 
CCNA Course Training Presentation
CCNA Course Training PresentationCCNA Course Training Presentation
CCNA Course Training Presentation
 
Ccna (200 125)
Ccna (200 125)Ccna (200 125)
Ccna (200 125)
 

Viewers also liked

Network technology Paper 2
Network technology Paper 2Network technology Paper 2
Network technology Paper 2Sachii Dosti
 
Net essentials6e ch2
Net essentials6e ch2Net essentials6e ch2
Net essentials6e ch2APSU
 
Net essentials6e ch3
Net essentials6e ch3Net essentials6e ch3
Net essentials6e ch3APSU
 
02 protocols and tcp-ip
02 protocols and tcp-ip02 protocols and tcp-ip
02 protocols and tcp-ipmyl_1116
 
Net essentials6e ch4
Net essentials6e ch4Net essentials6e ch4
Net essentials6e ch4APSU
 
Net essentials6e ch5
Net essentials6e ch5Net essentials6e ch5
Net essentials6e ch5APSU
 
Deterministic context free grammars &non-deterministic
Deterministic context free grammars &non-deterministicDeterministic context free grammars &non-deterministic
Deterministic context free grammars &non-deterministicLeyo Stephen
 
Networking Essentials Lesson 01 - Eric Vanderburg
 Networking Essentials Lesson 01 - Eric Vanderburg Networking Essentials Lesson 01 - Eric Vanderburg
Networking Essentials Lesson 01 - Eric VanderburgEric Vanderburg
 
Module 2 patient transfers
Module 2 patient transfersModule 2 patient transfers
Module 2 patient transfersAPSU
 
Net essentials6e ch1
Net essentials6e ch1Net essentials6e ch1
Net essentials6e ch1APSU
 
Qa conf 2011_ads
Qa conf 2011_adsQa conf 2011_ads
Qa conf 2011_adsgremars
 
Context free langauges
Context free langaugesContext free langauges
Context free langaugessudhir sharma
 
Context free languages
Context free languagesContext free languages
Context free languagesJahurul Islam
 
Context free grammars
Context free grammarsContext free grammars
Context free grammarsShiraz316
 
Context free grammars
Context free grammarsContext free grammars
Context free grammarsRonak Thakkar
 
Lecture: Context-Free Grammars
Lecture: Context-Free GrammarsLecture: Context-Free Grammars
Lecture: Context-Free GrammarsMarina Santini
 
Best Practice - Learning CCNA E1 module using Mind Maps
Best Practice - Learning CCNA E1 module using Mind MapsBest Practice - Learning CCNA E1 module using Mind Maps
Best Practice - Learning CCNA E1 module using Mind Mapsgremars
 
CCNA Network Devices
CCNA Network DevicesCCNA Network Devices
CCNA Network DevicesDsunte Wilson
 
Alphorm.com Formation Cisco ICND2
Alphorm.com Formation Cisco ICND2Alphorm.com Formation Cisco ICND2
Alphorm.com Formation Cisco ICND2Alphorm
 

Viewers also liked (20)

Network technology Paper 2
Network technology Paper 2Network technology Paper 2
Network technology Paper 2
 
Net essentials6e ch2
Net essentials6e ch2Net essentials6e ch2
Net essentials6e ch2
 
Net essentials6e ch3
Net essentials6e ch3Net essentials6e ch3
Net essentials6e ch3
 
02 protocols and tcp-ip
02 protocols and tcp-ip02 protocols and tcp-ip
02 protocols and tcp-ip
 
Net essentials6e ch4
Net essentials6e ch4Net essentials6e ch4
Net essentials6e ch4
 
Chapter 6 - Networking
Chapter 6 - NetworkingChapter 6 - Networking
Chapter 6 - Networking
 
Net essentials6e ch5
Net essentials6e ch5Net essentials6e ch5
Net essentials6e ch5
 
Deterministic context free grammars &non-deterministic
Deterministic context free grammars &non-deterministicDeterministic context free grammars &non-deterministic
Deterministic context free grammars &non-deterministic
 
Networking Essentials Lesson 01 - Eric Vanderburg
 Networking Essentials Lesson 01 - Eric Vanderburg Networking Essentials Lesson 01 - Eric Vanderburg
Networking Essentials Lesson 01 - Eric Vanderburg
 
Module 2 patient transfers
Module 2 patient transfersModule 2 patient transfers
Module 2 patient transfers
 
Net essentials6e ch1
Net essentials6e ch1Net essentials6e ch1
Net essentials6e ch1
 
Qa conf 2011_ads
Qa conf 2011_adsQa conf 2011_ads
Qa conf 2011_ads
 
Context free langauges
Context free langaugesContext free langauges
Context free langauges
 
Context free languages
Context free languagesContext free languages
Context free languages
 
Context free grammars
Context free grammarsContext free grammars
Context free grammars
 
Context free grammars
Context free grammarsContext free grammars
Context free grammars
 
Lecture: Context-Free Grammars
Lecture: Context-Free GrammarsLecture: Context-Free Grammars
Lecture: Context-Free Grammars
 
Best Practice - Learning CCNA E1 module using Mind Maps
Best Practice - Learning CCNA E1 module using Mind MapsBest Practice - Learning CCNA E1 module using Mind Maps
Best Practice - Learning CCNA E1 module using Mind Maps
 
CCNA Network Devices
CCNA Network DevicesCCNA Network Devices
CCNA Network Devices
 
Alphorm.com Formation Cisco ICND2
Alphorm.com Formation Cisco ICND2Alphorm.com Formation Cisco ICND2
Alphorm.com Formation Cisco ICND2
 

Similar to Network essentials chapter 2

Similar to Network essentials chapter 2 (20)

Network essentials chapter 3
Network essentials  chapter 3Network essentials  chapter 3
Network essentials chapter 3
 
Network essentials chapter 4
Network essentials  chapter 4Network essentials  chapter 4
Network essentials chapter 4
 
OSI model (7 layer )
OSI model (7 layer ) OSI model (7 layer )
OSI model (7 layer )
 
Osi model
Osi modelOsi model
Osi model
 
Mohanccna
MohanccnaMohanccna
Mohanccna
 
01 pengenalan
01 pengenalan01 pengenalan
01 pengenalan
 
Cisco doc
Cisco docCisco doc
Cisco doc
 
Networking concepts by Sachidananda M H
Networking concepts by Sachidananda M HNetworking concepts by Sachidananda M H
Networking concepts by Sachidananda M H
 
Ictinfraosi7 layers tcpipmodel2016e
Ictinfraosi7 layers tcpipmodel2016eIctinfraosi7 layers tcpipmodel2016e
Ictinfraosi7 layers tcpipmodel2016e
 
Computer networking
Computer networkingComputer networking
Computer networking
 
Topology Chapter 2.pptx
Topology Chapter 2.pptxTopology Chapter 2.pptx
Topology Chapter 2.pptx
 
7 layer OSI model
7 layer OSI model7 layer OSI model
7 layer OSI model
 
Network Fundamentals: OSI Model
Network Fundamentals: OSI Model Network Fundamentals: OSI Model
Network Fundamentals: OSI Model
 
006 Osi Model
006 Osi Model006 Osi Model
006 Osi Model
 
Network essentials - chapter 1
Network essentials - chapter 1Network essentials - chapter 1
Network essentials - chapter 1
 
Networking
NetworkingNetworking
Networking
 
CCNA Report
CCNA ReportCCNA Report
CCNA Report
 
Ccna exploration network fundamentals
Ccna exploration  network fundamentalsCcna exploration  network fundamentals
Ccna exploration network fundamentals
 
Dist 03-4
Dist 03-4Dist 03-4
Dist 03-4
 
Computer_Network
Computer_NetworkComputer_Network
Computer_Network
 

More from Raghu nath

Ftp (file transfer protocol)
Ftp (file transfer protocol)Ftp (file transfer protocol)
Ftp (file transfer protocol)Raghu nath
 
Javascript part1
Javascript part1Javascript part1
Javascript part1Raghu nath
 
Regular expressions
Regular expressionsRegular expressions
Regular expressionsRaghu nath
 
Selection sort
Selection sortSelection sort
Selection sortRaghu nath
 
Binary search
Binary search Binary search
Binary search Raghu nath
 
JSON(JavaScript Object Notation)
JSON(JavaScript Object Notation)JSON(JavaScript Object Notation)
JSON(JavaScript Object Notation)Raghu nath
 
Stemming algorithms
Stemming algorithmsStemming algorithms
Stemming algorithmsRaghu nath
 
Step by step guide to install dhcp role
Step by step guide to install dhcp roleStep by step guide to install dhcp role
Step by step guide to install dhcp roleRaghu nath
 
Python chapter 2
Python chapter 2Python chapter 2
Python chapter 2Raghu nath
 
python chapter 1
python chapter 1python chapter 1
python chapter 1Raghu nath
 
Linux Shell Scripting
Linux Shell ScriptingLinux Shell Scripting
Linux Shell ScriptingRaghu nath
 
Adv excel® 2013
Adv excel® 2013Adv excel® 2013
Adv excel® 2013Raghu nath
 
Basic xml syntax
Basic xml syntaxBasic xml syntax
Basic xml syntaxRaghu nath
 

More from Raghu nath (20)

Mongo db
Mongo dbMongo db
Mongo db
 
Ftp (file transfer protocol)
Ftp (file transfer protocol)Ftp (file transfer protocol)
Ftp (file transfer protocol)
 
MS WORD 2013
MS WORD 2013MS WORD 2013
MS WORD 2013
 
Msword
MswordMsword
Msword
 
Ms word
Ms wordMs word
Ms word
 
Javascript part1
Javascript part1Javascript part1
Javascript part1
 
Regular expressions
Regular expressionsRegular expressions
Regular expressions
 
Selection sort
Selection sortSelection sort
Selection sort
 
Binary search
Binary search Binary search
Binary search
 
JSON(JavaScript Object Notation)
JSON(JavaScript Object Notation)JSON(JavaScript Object Notation)
JSON(JavaScript Object Notation)
 
Stemming algorithms
Stemming algorithmsStemming algorithms
Stemming algorithms
 
Step by step guide to install dhcp role
Step by step guide to install dhcp roleStep by step guide to install dhcp role
Step by step guide to install dhcp role
 
Python chapter 2
Python chapter 2Python chapter 2
Python chapter 2
 
python chapter 1
python chapter 1python chapter 1
python chapter 1
 
Linux Shell Scripting
Linux Shell ScriptingLinux Shell Scripting
Linux Shell Scripting
 
Perl
PerlPerl
Perl
 
Adv excel® 2013
Adv excel® 2013Adv excel® 2013
Adv excel® 2013
 
Excel® 2013
Excel® 2013Excel® 2013
Excel® 2013
 
Excel 2013
Excel 2013Excel 2013
Excel 2013
 
Basic xml syntax
Basic xml syntaxBasic xml syntax
Basic xml syntax
 

Recently uploaded

2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptx2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptxmansk2
 
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...Nguyen Thanh Tu Collection
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXMIRIAMSALINAS13
 
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdfINU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdfbu07226
 
Basic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
Basic Civil Engg Notes_Chapter-6_Environment Pollution & EngineeringBasic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
Basic Civil Engg Notes_Chapter-6_Environment Pollution & EngineeringDenish Jangid
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxEduSkills OECD
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPCeline George
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsCol Mukteshwar Prasad
 
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General QuizPragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General QuizPragya - UEM Kolkata Quiz Club
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
 
Gyanartha SciBizTech Quiz slideshare.pptx
Gyanartha SciBizTech Quiz slideshare.pptxGyanartha SciBizTech Quiz slideshare.pptx
Gyanartha SciBizTech Quiz slideshare.pptxShibin Azad
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfVivekanand Anglo Vedic Academy
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345beazzy04
 
Industrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training ReportIndustrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training ReportAvinash Rai
 
Research Methods in Psychology | Cambridge AS Level | Cambridge Assessment In...
Research Methods in Psychology | Cambridge AS Level | Cambridge Assessment In...Research Methods in Psychology | Cambridge AS Level | Cambridge Assessment In...
Research Methods in Psychology | Cambridge AS Level | Cambridge Assessment In...Abhinav Gaur Kaptaan
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleCeline George
 
size separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceuticssize separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceuticspragatimahajan3
 
Keeping Your Information Safe with Centralized Security Services
Keeping Your Information Safe with Centralized Security ServicesKeeping Your Information Safe with Centralized Security Services
Keeping Your Information Safe with Centralized Security ServicesTechSoup
 
Morse OER Some Benefits and Challenges.pptx
Morse OER Some Benefits and Challenges.pptxMorse OER Some Benefits and Challenges.pptx
Morse OER Some Benefits and Challenges.pptxjmorse8
 

Recently uploaded (20)

2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptx2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptx
 
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdfINU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
 
Basic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
Basic Civil Engg Notes_Chapter-6_Environment Pollution & EngineeringBasic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
Basic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General QuizPragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Gyanartha SciBizTech Quiz slideshare.pptx
Gyanartha SciBizTech Quiz slideshare.pptxGyanartha SciBizTech Quiz slideshare.pptx
Gyanartha SciBizTech Quiz slideshare.pptx
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
NCERT Solutions Power Sharing Class 10 Notes pdf
NCERT Solutions Power Sharing Class 10 Notes pdfNCERT Solutions Power Sharing Class 10 Notes pdf
NCERT Solutions Power Sharing Class 10 Notes pdf
 
Industrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training ReportIndustrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training Report
 
Research Methods in Psychology | Cambridge AS Level | Cambridge Assessment In...
Research Methods in Psychology | Cambridge AS Level | Cambridge Assessment In...Research Methods in Psychology | Cambridge AS Level | Cambridge Assessment In...
Research Methods in Psychology | Cambridge AS Level | Cambridge Assessment In...
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
size separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceuticssize separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceutics
 
Keeping Your Information Safe with Centralized Security Services
Keeping Your Information Safe with Centralized Security ServicesKeeping Your Information Safe with Centralized Security Services
Keeping Your Information Safe with Centralized Security Services
 
Morse OER Some Benefits and Challenges.pptx
Morse OER Some Benefits and Challenges.pptxMorse OER Some Benefits and Challenges.pptx
Morse OER Some Benefits and Challenges.pptx
 

Network essentials chapter 2

  • 2. A network is a collection of systems and devices exchanging data over some form of media. A host is defined as any device that holds a logical address on your network. Hosts can be workstations, servers, printers, connection devices, or routers.
  • 3. Modern networks are charged with delivering our phone calls and, soon, our television and entertainment options. Data—no matter what its form—is transmitted in the form of bits. A single bit is a 1 or a 0 (based on the binary number system of two digits versus the typically used decimal numbering system based on the digits 0–9).
  • 4. A protocol is simply an agreed upon set of rules for a particular network function. Bandwidth is generally considered to be the total amount of data (in bits) you can theoretically transmit within a given time period (typically one second). Bandwidth is expressed in bits or bytes per second in digital networking.
  • 5. Network Topologies The topology can refer to how the network actually looks Physical Topologies: The physical topology of the network refers to how the network actually looks from a bird’s-eye view—the physical cabling layout of the network itself.
  • 6. A bus topology consists of all devices connecting to a single wire—a coaxial cable. A physical bus looks like a straight line—a stick—with connections to hosts coming off in a “T” shape. In a ring topology, all devices are connected to each other in the shape of a circle—the first device feeds into the second device, which in turn feeds into the third, and so on and so on until the loop plugs back into the first device
  • 7. Star topologies can also include extended star, where the central device extends links to other hubs and switches. A token passing, or ring, topology works in a more organized, almost friendly format. In a token passing logical topology, systems can only transmit information when they hold a special data packet, known as a token. The token is passed from one device to the next, in a prescribed, circular path. Each device receives the token and examines it. If it holds a message for the device, it will open and process it.
  • 8. Network Categories Networks are typically of two types: LANs and WANs. LANs : A LAN (local area network) can be defined as a network that serves users within a small geographic footprint. WANs: A WAN(wide area network ) is nothing more than the network connecting a collection of LANs across a wide geographic area—perhaps a state, nation, or even the whole world! Aside from the distance variable, another defining characteristic of WANs is the concept of a leased line.
  • 9. The OSI Reference Model 11 CERTIFICATION OBJECTIVE 1.02 The OSI Reference Model One word bandied about quite a bit in regards to the OSI model is encapsulation. Encapsulation is the process of adding a header and a trailer to a piece of data. While each stage of communication (layer of the model) adds a header to the data, only one layer always adds a trailer. Some texts define encapsulation as occurring in all layers of the model; however, it technically only occurs at one—the Data Link layer.
  • 10. The Layers The OSI Reference Model splits the communications process into seven distinct modular layers, with each layer accomplishing a specific function independently of all other layers. The layers do rely on layers above and below to provide something to work with, but they don’t necessarily care what they receive to work with.
  • 11. The OSI REFERENCE MODEL SERIES
  • 12. LAYER DEVICES FOUND IN THE LAYER PROTOCOLS AND STANDARDS WORKING Application Firewall,Gateway and IDS SMTP,POP3,DNS,DHCP,FTP,HTTP,TFTP,SNMP Presentation N/A JPG,JPEG,TIFF,GIF,MIME Session N/A NFS,ASP,SQL,RPC Transport Firewall TCP,UDP, SPX Network Router IP,IPX, Appletalk Data link layer Bridge and Switch Ethernet,ATM,PPP,Frame Relay Physical Transceiver,Repeater, and Hub RJ45,ST/SC
  • 13. The Data Layers (Application,Presentation, and Session) Seven layers of the OSI model:- The data layers would be the top three layers of the model. At the top of the stack, we find layer 7—the Application layer The Application layer holds the protocols that allow programs to access and make use of a Network.
  • 14. For example, Microsoft Outlook—a common e-mail program—can work just fine without a network. You can open, edit, create, and delete e-mails offline just as well as you can online. However, if you wish to use the network to send and receive e-mail, you need an Application layer protocol to do this. In this example, the Application layer protocol would be SMTP.
  • 15. Continuing the e-mail analogy, imagine you are sending an e-mail from a Microsoft Outlook application to a computer running the Thunderbird e-mail application. You may have bold, italics, and any number of font settings within your e-mail. Additionally, you may attach a picture file (jpg) for the recipient to enjoy. Thunderbird might treat bold, italics, and font settings differently than does Outlook, and SMTP is only capable of sending ASCIIcode (a combination of bits representing an alphanumeric character, commonly referred to as, simply, text).
  • 16. Enter layer 6—the Presentation layer. The Presentation layer is responsible for formatting and code conversion between systems. This layer accepts the data from the Application layer and ensures it is placed in a format the end station can understand. In this case, the e-mail is in text mode, and another protocol, like MIME, translates the jpg into ASCII for transit. Once received at the far end, the recipient’s Presentation layer will perform the reverse, handing the data back to the Application layer protocol. Encryption is another function of the Presentation layer
  • 17. Layer 5—the Session layer:—is perhaps the most enigmatic and troublesome of the entire stack. This layer doesn’t necessarily do anything to the data at all. Instead, its function is to work in the background, ensuring the communications process between two systems runs smoothly. The Delivery Layers:-
  • 18. Transport layer: Transport the data from receiver to sender. The three main functions: 1. Segmentation. 2. The reliable delivery 3. Flow control
  • 19. Segmentation is simply taking a small piece of the bits making up the data as a whole. A small header is put in front of these bits. Inside the header is all sorts of information, including: The Network layer is responsible for logical addressing and routing.
  • 20. Receiving a segment from the Transport layer, the Network layer adds a header that includes a source and destination logical (network) address. This address is read by layer-3 devices (routers) and best path determinations are made to deliver the segment to its final destination
  • 21. Network Components Physical Layer Devices: Physical layer devices do nothing more than physically connect wiring together to complete a path, or change the connection from one type to another. Examples of physical layer devices include transceivers, repeaters, and hubs. Transceivers connect one media type to another, such as a fiber connection to a copper one. Repeaters are used to extend the range of a given media—whatever they take in one port, they regenerate and repeat out the other. Hubs are nothing more than multiport repeaters. Comparatively, where a repeater takes bits in one port to relay to another, hubs have several ports they accept and relay bits on.
  • 22. Data Link Layer Devices Layer-2 devices include bridges and switches. Switches and bridges split (or segment) collision domains, decrease network traffic problems, and increase effective available bandwidth to hosts. However, keep in mind they are incapable of moving traffic outside your LAN.
  • 23. Network Layer Devices Network layer devices play a unique role in your network design. These devices read the Logical network addresses on your data and make decisions about which route to send the data. This sounds very much like the switches and bridges discussed earlier, but keep in mind the layer-3 device not only knows which port to send the data out, but also the best route through outside networks to its final destination. Continuing the analogy from earlier, if the street address on your letter is akin to the physical address of your hosts, the logical address used by layer-3 devices is equivalent to the ZIP code.
  • 24. Other Devices Networks can also include a variety of other devices, such as firewalls, gateways, and proxies. A firewall is a device that typically works at layers 3 and 4, and is used to filter network traffic based upon rules the administrator configures on the device. Generally placed between your network and the Internet, firewalls work on an implicit deny principle—if you do not explicitly allow the traffic, it is blocked.
  • 25. Gateways work at all layers and are generally used to connect networks and applications of different types together. A proxy is a system that provides a specific service to a host. For example, a web proxy will make requests to the Internet for web content on behalf of a host. This increases security and performance since web traffic coming from your network appears from only one system, and hosts can access cached pages on the proxy instead of going out to find them. Generally speaking, these devices are usually placed between your network and the Internet in a special network called a DMZ