SlideShare a Scribd company logo
We Fix Computers Presents
    Computer Networking 101
What is Simple Networking?
• The simplest kind of network contains exactly
  two computers. You can use this kind of
  network to share files, a printer or another
  peripheral device, and even an Internet
  connection.
Types of Networks
• LAN - Local Area Network
  – A LAN connects network devices over a relatively
    short distance. A networked office
    building, school, or home usually contains a single
    LAN, though sometimes one building will contain
    a few small LANs (perhaps one per office).
  – In TCP/IP networking, a LAN is often implemented
    as a single IP subnet.
Types of Networks
• WAN - Wide Area Network
  – As the term implies, a WAN spans a large physical
    distance. The Internet, for example, is the largest
    WAN, spanning the Earth.
  – A WAN is a geographically-dispersed collection of
    LANs. A network device called a router connects
    LANs to a WAN. In IP networking, the router
    maintains both a LAN address and a WAN address.
Types of Networks
• WLAN - Wireless Local Area Network
  – A LAN based on WiFi wireless network technology
  – Offices who employ laptops predominantly use
    this type of network.
  – Smartphones, tablets, and iPads also primarily
    communicate via this type of network.
Networking Components
• Network Router
    – A network router is a small electronic device that allows
      you to build a simple network . The router serves as the
      core or "centerpiece" of the network to which
      computers, printers and other devices can be connected.
      Networking with a router helps you to (for example):
•   share files between computers
•   share an Internet connection between computers
•   share a printer
•   connect your gaming console or other home
    entertainment equipment to the Internet
Networking Components
• Network Switch
  – A network switch is a small hardware device that joins
    multiple computers together within one local area network
    (LAN).
  – Most consumer-grade network switches provide either
    four or eight connections for Ethernet devices. Switches
    can be connected to each other, a so-called daisy chaining
    method to add a progressively larger number of devices to
    a LAN.
  – These are generally used to expand the amount of devices
    you can connect to you LAN when the 4 ports your Router
    comes with is not sufficient.
  – Think of it as a splitter of sorts.
Networking Components
• Network Firewall
  – A network firewall protects a computer network from
    unauthorized access. Network firewalls may be
    hardware devices, software programs, or a
    combination of the two.
  – Network firewalls guard an internal computer
    network (home, school, business) against malicious
    access from the outside. Network firewalls may also
    be configured to limit access to the outside from
    internal users. (ie. Facebook, instant messaging,
    Limewire, etc..)
Networking Components
• Server
  – A network server is a powerful computer designed to
    process requests and deliver data to other (client)
    computers over a LAN or the Internet.
  – Network servers typically are configured with
    additional processing, memory and storage capacity
    to handle the heavy load of continually servicing client
    computers.
  – Must EVERY network have a server?
  – FALSE. A server is best fit for business that need a
    collective store for their corporate data and/or need
    stringent security policies.
Network Addressing
• IP Address
   – An IP address serves as a unique identifier for a computer
     on a network. When set up correctly, computers can
     determine the addresses of other computers on the
     network and use these addresses to send messages to
     each other.
   – IP addresses are unique to each device on a LAN. 2
     devices can NEVER share the same IP address or a conflict
     will occur.
   – EVERY device on a LAN must share a common addressing
     scheme (ie. 192.168.1.x)
   – Think of an IP address as a sort of home address each
     device has so the other devices know where to find it.
Network Addressing
• MAC Address
   – Media Access Control (MAC) addressing provides unique
     identification and access control for computers on a network.
• The MAC address is commonly written as a sequence of 12
  hexadecimal digits (ie. 48-3F-0A-91-00-BC).
• MAC addresses are uniquely set by the network adapter
  manufacturer and are sometimes called physical addresses.
  The first six digits of the address correspond to a
  manufacturer's unique identifier, while the last six digits
  correspond to the device's serial number.
• These are also unique and 2 network devices will NEVER
  have the same MAC address.
Networking Language
• TCP/IP
  – Transmission Control Protocol (TCP) and Internet
    Protocol (IP).
  – This is the language of the LAN and internet. Just
    about EVERY device mentioned talks to each other
    via this communication medium.
  – The average person on the Internet works in a
    predominately TCP/IP environment. Web
    browsers, for example, use TCP/IP to
    communicate with Web servers.
So what sets me apart ?
• Educating the Client
  – Computer maintenance How-To
  – Security consulting
  – And more…
• Honesty
  – Build the relationship and trust, NOT the bill.
  – Comprehensive troubleshooting
  – And more…

More Related Content

What's hot

Ccna summer training ppt
Ccna summer training pptCcna summer training ppt
Ccna summer training ppt
saroj choudhary
 
Why sdn
Why sdnWhy sdn
Why sdn
lz1dsb
 
Difference between Routing & Routed Protocol
Difference between Routing & Routed ProtocolDifference between Routing & Routed Protocol
Difference between Routing & Routed Protocol
Netwax Lab
 
System and network administration network services
System and network administration network servicesSystem and network administration network services
System and network administration network services
Uc Man
 
Router
RouterRouter
Network Design on cisco packet tracer 6.0
Network Design on cisco packet tracer 6.0Network Design on cisco packet tracer 6.0
Network Design on cisco packet tracer 6.0
Saurav Pandey
 
Computer network
Computer networkComputer network
Computer network
rajat jasuja
 
uCPE and VNFs Explained
uCPE and VNFs ExplaineduCPE and VNFs Explained
uCPE and VNFs Explained
Alan Percy
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
Priya Manik
 
CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01
Irsandi Hasan
 
Computer network
Computer networkComputer network
Computer network
Abdul Wahab
 
Seamless mpls
Seamless mpls Seamless mpls
Seamless mpls
Sherif Hussein
 
Location Services with Aruba Beacons Data Sheet
Location Services with Aruba Beacons Data SheetLocation Services with Aruba Beacons Data Sheet
Location Services with Aruba Beacons Data Sheet
Aruba, a Hewlett Packard Enterprise company
 
Basic concepts of computer Networking
Basic concepts of computer NetworkingBasic concepts of computer Networking
Basic concepts of computer NetworkingHj Habib
 
Ccna Presentation
Ccna PresentationCcna Presentation
Ccna Presentationbcdran
 
Computer networking
Computer networkingComputer networking
Computer networking
Chinmoy Jena
 
SD WAN Overview | What is SD WAN | Benefits of SD WAN
SD WAN Overview | What is SD WAN | Benefits of SD WAN SD WAN Overview | What is SD WAN | Benefits of SD WAN
SD WAN Overview | What is SD WAN | Benefits of SD WAN
Ashutosh Kaushik
 
Networking Basics
Networking BasicsNetworking Basics
Networking Basics
Mohd. ShahNawab
 
Communication devices
Communication devicesCommunication devices
Communication devices
FazailAhmad2
 

What's hot (20)

Ccna summer training ppt
Ccna summer training pptCcna summer training ppt
Ccna summer training ppt
 
Why sdn
Why sdnWhy sdn
Why sdn
 
Difference between Routing & Routed Protocol
Difference between Routing & Routed ProtocolDifference between Routing & Routed Protocol
Difference between Routing & Routed Protocol
 
System and network administration network services
System and network administration network servicesSystem and network administration network services
System and network administration network services
 
Router
RouterRouter
Router
 
Network Design on cisco packet tracer 6.0
Network Design on cisco packet tracer 6.0Network Design on cisco packet tracer 6.0
Network Design on cisco packet tracer 6.0
 
Computer network
Computer networkComputer network
Computer network
 
uCPE and VNFs Explained
uCPE and VNFs ExplaineduCPE and VNFs Explained
uCPE and VNFs Explained
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
 
CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01
 
Computer network
Computer networkComputer network
Computer network
 
Seamless mpls
Seamless mpls Seamless mpls
Seamless mpls
 
SD WAN
SD WANSD WAN
SD WAN
 
Location Services with Aruba Beacons Data Sheet
Location Services with Aruba Beacons Data SheetLocation Services with Aruba Beacons Data Sheet
Location Services with Aruba Beacons Data Sheet
 
Basic concepts of computer Networking
Basic concepts of computer NetworkingBasic concepts of computer Networking
Basic concepts of computer Networking
 
Ccna Presentation
Ccna PresentationCcna Presentation
Ccna Presentation
 
Computer networking
Computer networkingComputer networking
Computer networking
 
SD WAN Overview | What is SD WAN | Benefits of SD WAN
SD WAN Overview | What is SD WAN | Benefits of SD WAN SD WAN Overview | What is SD WAN | Benefits of SD WAN
SD WAN Overview | What is SD WAN | Benefits of SD WAN
 
Networking Basics
Networking BasicsNetworking Basics
Networking Basics
 
Communication devices
Communication devicesCommunication devices
Communication devices
 

Viewers also liked

Computer Myths
Computer MythsComputer Myths
Computer Myths
Shawn Keller
 
The Hunger Games
The Hunger GamesThe Hunger Games
The Hunger Games
Babu_
 
We Fix Web Protection
We Fix Web ProtectionWe Fix Web Protection
We Fix Web Protection
Shawn Keller
 
Immune response 2012
Immune response 2012Immune response 2012
Immune response 2012mkalmus2010
 
Comentarios sobre etica ambiental, ing. glee
Comentarios sobre etica ambiental, ing. gleeComentarios sobre etica ambiental, ing. glee
Comentarios sobre etica ambiental, ing. glee
Krolita Tobar
 
Shawn's Top 5 Favorite Utilites
Shawn's Top 5 Favorite UtilitesShawn's Top 5 Favorite Utilites
Shawn's Top 5 Favorite Utilites
Shawn Keller
 
Abastecimiento de agua
Abastecimiento de aguaAbastecimiento de agua
Apostila tattoo
Apostila tattooApostila tattoo
Apostila tattoo
ApostilaTattoo
 
Marketing Mix of Apple iPhone
Marketing Mix of Apple iPhoneMarketing Mix of Apple iPhone
Marketing Mix of Apple iPhone
Pratik Shah
 

Viewers also liked (10)

Computer Myths
Computer MythsComputer Myths
Computer Myths
 
The Hunger Games
The Hunger GamesThe Hunger Games
The Hunger Games
 
wireless communication
wireless communicationwireless communication
wireless communication
 
We Fix Web Protection
We Fix Web ProtectionWe Fix Web Protection
We Fix Web Protection
 
Immune response 2012
Immune response 2012Immune response 2012
Immune response 2012
 
Comentarios sobre etica ambiental, ing. glee
Comentarios sobre etica ambiental, ing. gleeComentarios sobre etica ambiental, ing. glee
Comentarios sobre etica ambiental, ing. glee
 
Shawn's Top 5 Favorite Utilites
Shawn's Top 5 Favorite UtilitesShawn's Top 5 Favorite Utilites
Shawn's Top 5 Favorite Utilites
 
Abastecimiento de agua
Abastecimiento de aguaAbastecimiento de agua
Abastecimiento de agua
 
Apostila tattoo
Apostila tattooApostila tattoo
Apostila tattoo
 
Marketing Mix of Apple iPhone
Marketing Mix of Apple iPhoneMarketing Mix of Apple iPhone
Marketing Mix of Apple iPhone
 

Similar to Networking 101

ICT - Lecture Notes 5.pdf
ICT - Lecture Notes 5.pdfICT - Lecture Notes 5.pdf
ICT - Lecture Notes 5.pdf
HonKencyTress
 
Module-1.pptx
Module-1.pptxModule-1.pptx
Module-1.pptx
AnushaJagadeesh4
 
Communications and Networking
Communications and NetworkingCommunications and Networking
Communications and Networking
Sajitha Pathirana
 
Networking
NetworkingNetworking
Networking
Joseph Zacharia
 
Computer networks
Computer networksComputer networks
Computer networks
Nilesh Thadani
 
network fundamentals
network fundamentalsnetwork fundamentals
network fundamentals
Sithu PM
 
Types of Network And Devices
Types of Network And DevicesTypes of Network And Devices
Types of Network And Devices
Hanshul Arya
 
Computer Networking concepts
Computer Networking conceptsComputer Networking concepts
Computer Networking concepts
Mujeeb Ahmad
 
data communication and Network.ppt
data communication and Network.pptdata communication and Network.ppt
data communication and Network.ppt
GetachewDires1
 
Computer Network Second Edition
Computer Network Second EditionComputer Network Second Edition
Computer Network Second Edition
Md Saylab
 
Networking
Networking Networking
Networkingconcepts (1)
Networkingconcepts (1)Networkingconcepts (1)
Networkingconcepts (1)
ranigodha
 
Lecture 2 types of network
Lecture 2 types of networkLecture 2 types of network
Lecture 2 types of network
Albert Abbosey
 
Networking Basics - Ferdon
Networking Basics - FerdonNetworking Basics - Ferdon
Networking Basics - Ferdon
Susan Ferdon
 
541ferdon networktutorial
541ferdon networktutorial541ferdon networktutorial
541ferdon networktutorialSusan Ferdon
 
ICT 101 LECTURE 2 - BASICS OF COMPUTER NETWORKS.pptx
ICT 101 LECTURE 2 - BASICS OF COMPUTER NETWORKS.pptxICT 101 LECTURE 2 - BASICS OF COMPUTER NETWORKS.pptx
ICT 101 LECTURE 2 - BASICS OF COMPUTER NETWORKS.pptx
mbombongafu
 
Chapter One Network nile.pptx
Chapter One Network nile.pptxChapter One Network nile.pptx
Chapter One Network nile.pptx
MohamedAbdi347025
 
IOT on health waste management and its use on rat poison and bomb making
IOT on health waste management and its use on rat poison and bomb makingIOT on health waste management and its use on rat poison and bomb making
IOT on health waste management and its use on rat poison and bomb making
sunnymaxlord
 
Computer networking class 12
Computer networking class 12Computer networking class 12
Computer networking class 12
LakshyaT
 

Similar to Networking 101 (20)

ICT - Lecture Notes 5.pdf
ICT - Lecture Notes 5.pdfICT - Lecture Notes 5.pdf
ICT - Lecture Notes 5.pdf
 
Module-1.pptx
Module-1.pptxModule-1.pptx
Module-1.pptx
 
Communications and Networking
Communications and NetworkingCommunications and Networking
Communications and Networking
 
Networking
NetworkingNetworking
Networking
 
PC 106 Slide no.02
PC 106 Slide no.02PC 106 Slide no.02
PC 106 Slide no.02
 
Computer networks
Computer networksComputer networks
Computer networks
 
network fundamentals
network fundamentalsnetwork fundamentals
network fundamentals
 
Types of Network And Devices
Types of Network And DevicesTypes of Network And Devices
Types of Network And Devices
 
Computer Networking concepts
Computer Networking conceptsComputer Networking concepts
Computer Networking concepts
 
data communication and Network.ppt
data communication and Network.pptdata communication and Network.ppt
data communication and Network.ppt
 
Computer Network Second Edition
Computer Network Second EditionComputer Network Second Edition
Computer Network Second Edition
 
Networking
Networking Networking
Networking
 
Networkingconcepts (1)
Networkingconcepts (1)Networkingconcepts (1)
Networkingconcepts (1)
 
Lecture 2 types of network
Lecture 2 types of networkLecture 2 types of network
Lecture 2 types of network
 
Networking Basics - Ferdon
Networking Basics - FerdonNetworking Basics - Ferdon
Networking Basics - Ferdon
 
541ferdon networktutorial
541ferdon networktutorial541ferdon networktutorial
541ferdon networktutorial
 
ICT 101 LECTURE 2 - BASICS OF COMPUTER NETWORKS.pptx
ICT 101 LECTURE 2 - BASICS OF COMPUTER NETWORKS.pptxICT 101 LECTURE 2 - BASICS OF COMPUTER NETWORKS.pptx
ICT 101 LECTURE 2 - BASICS OF COMPUTER NETWORKS.pptx
 
Chapter One Network nile.pptx
Chapter One Network nile.pptxChapter One Network nile.pptx
Chapter One Network nile.pptx
 
IOT on health waste management and its use on rat poison and bomb making
IOT on health waste management and its use on rat poison and bomb makingIOT on health waste management and its use on rat poison and bomb making
IOT on health waste management and its use on rat poison and bomb making
 
Computer networking class 12
Computer networking class 12Computer networking class 12
Computer networking class 12
 

Recently uploaded

GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
Jen Stirrup
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
UiPathCommunity
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 

Recently uploaded (20)

GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 

Networking 101

  • 1. We Fix Computers Presents Computer Networking 101
  • 2. What is Simple Networking? • The simplest kind of network contains exactly two computers. You can use this kind of network to share files, a printer or another peripheral device, and even an Internet connection.
  • 3. Types of Networks • LAN - Local Area Network – A LAN connects network devices over a relatively short distance. A networked office building, school, or home usually contains a single LAN, though sometimes one building will contain a few small LANs (perhaps one per office). – In TCP/IP networking, a LAN is often implemented as a single IP subnet.
  • 4. Types of Networks • WAN - Wide Area Network – As the term implies, a WAN spans a large physical distance. The Internet, for example, is the largest WAN, spanning the Earth. – A WAN is a geographically-dispersed collection of LANs. A network device called a router connects LANs to a WAN. In IP networking, the router maintains both a LAN address and a WAN address.
  • 5. Types of Networks • WLAN - Wireless Local Area Network – A LAN based on WiFi wireless network technology – Offices who employ laptops predominantly use this type of network. – Smartphones, tablets, and iPads also primarily communicate via this type of network.
  • 6. Networking Components • Network Router – A network router is a small electronic device that allows you to build a simple network . The router serves as the core or "centerpiece" of the network to which computers, printers and other devices can be connected. Networking with a router helps you to (for example): • share files between computers • share an Internet connection between computers • share a printer • connect your gaming console or other home entertainment equipment to the Internet
  • 7. Networking Components • Network Switch – A network switch is a small hardware device that joins multiple computers together within one local area network (LAN). – Most consumer-grade network switches provide either four or eight connections for Ethernet devices. Switches can be connected to each other, a so-called daisy chaining method to add a progressively larger number of devices to a LAN. – These are generally used to expand the amount of devices you can connect to you LAN when the 4 ports your Router comes with is not sufficient. – Think of it as a splitter of sorts.
  • 8. Networking Components • Network Firewall – A network firewall protects a computer network from unauthorized access. Network firewalls may be hardware devices, software programs, or a combination of the two. – Network firewalls guard an internal computer network (home, school, business) against malicious access from the outside. Network firewalls may also be configured to limit access to the outside from internal users. (ie. Facebook, instant messaging, Limewire, etc..)
  • 9. Networking Components • Server – A network server is a powerful computer designed to process requests and deliver data to other (client) computers over a LAN or the Internet. – Network servers typically are configured with additional processing, memory and storage capacity to handle the heavy load of continually servicing client computers. – Must EVERY network have a server? – FALSE. A server is best fit for business that need a collective store for their corporate data and/or need stringent security policies.
  • 10. Network Addressing • IP Address – An IP address serves as a unique identifier for a computer on a network. When set up correctly, computers can determine the addresses of other computers on the network and use these addresses to send messages to each other. – IP addresses are unique to each device on a LAN. 2 devices can NEVER share the same IP address or a conflict will occur. – EVERY device on a LAN must share a common addressing scheme (ie. 192.168.1.x) – Think of an IP address as a sort of home address each device has so the other devices know where to find it.
  • 11. Network Addressing • MAC Address – Media Access Control (MAC) addressing provides unique identification and access control for computers on a network. • The MAC address is commonly written as a sequence of 12 hexadecimal digits (ie. 48-3F-0A-91-00-BC). • MAC addresses are uniquely set by the network adapter manufacturer and are sometimes called physical addresses. The first six digits of the address correspond to a manufacturer's unique identifier, while the last six digits correspond to the device's serial number. • These are also unique and 2 network devices will NEVER have the same MAC address.
  • 12. Networking Language • TCP/IP – Transmission Control Protocol (TCP) and Internet Protocol (IP). – This is the language of the LAN and internet. Just about EVERY device mentioned talks to each other via this communication medium. – The average person on the Internet works in a predominately TCP/IP environment. Web browsers, for example, use TCP/IP to communicate with Web servers.
  • 13. So what sets me apart ? • Educating the Client – Computer maintenance How-To – Security consulting – And more… • Honesty – Build the relationship and trust, NOT the bill. – Comprehensive troubleshooting – And more…