SlideShare a Scribd company logo
Networking…
What Is Networking?
• Computer network A collection of
computing devices that are connected in
various ways in order to communicate and
share resources
Usually, the connections between
computers in a network are made using
physical wires or cables
However, some connections are wireless,
using radio waves or infrared signals
Networking
• The generic term node or host refers to
any device on a network
• Data transfer rate The speed with which
data is moved from one place on a
network to another
• Data transfer rate is a key issue in
computer networks
Networking
• Computer networks have opened up an
entire frontier in the world of computing
called the client/server model

Figure 15.1 Client/Server interaction
Networking
• File server A computer that stores and
manages files for multiple users on a
network
• Web server A computer dedicated to
responding to requests (from the browser
client) for web pages
Types of Networks
• Local-area network (LAN) A network
that connects a relatively small number of
machines in a relatively close
geographical area
Types of Networks
• Wide-area network (WAN) A network that
connects two or more local-area networks over a
potentially large geographic distance
Often one particular node on a LAN is set up to serve
as a gateway to handle all communication going
between that LAN and other networks

Communication between networks is called
internetworking
The Internet, as we know it today, is essentially the
ultimate wide-area network, spanning the entire globe
Types of Networks
• Metropolitan-area network (MAN) The
communication infrastructures that have
been developed in and around large cities
So, who owns the Internet?
Well, nobody does. No single person or
company owns the Internet or even
controls it entirely. As a wide-area
network, it is made up of many smaller
networks. These smaller networks are
often owned and managed by a person or
organization. The Internet, then, is really
defined by how connections can be made
between these networks.
Types of Networks

Figure 15.1 Local-area networks connected across a distance to
create a wide-area network
Internet Connections
• Internet backbone A set of high-speed
networks that carry Internet traffic
These networks are provided by
companies such as AT&T, GTE, and IBM
• Internet service provider (ISP) A
company that provides other companies or
individuals with access to the Internet
Internet Connections
• There are various technologies available that you can
use to connect a home computer to the Internet
– A phone modem converts computer data into an analog
audio signal for transfer over a telephone line, and then a
modem at the destination converts it back again into data
– A digital subscriber line (DSL) uses regular copper phone
lines to transfer digital data to and from the phone company’s
central office
Internet Connections
• Broadband A connection in which transfer
speeds are faster than 128 bits per second
– DSL connections and cable modems are broadband
connections
– The speed for downloads (getting data from the
Internet to your home computer) may not be the same
as uploads (sending data from your home computer
to the Internet)
Packet Switching
• To improve the efficiency of transferring information over
a shared communication line, messages are divided into
fixed-sized, numbered packets
• Network devices called routers are used to direct
packets between networks
Figure 15.4
Messages
sent by
packet
switching
Network Protocols
• Network protocols are layered such that
each one relies on the protocols that
underlie it
• Sometimes referred to as a protocol
stack

Figure 15.6 Layering of key network protocols
TCP/IP
• TCP stands for Transmission Control Protocol
TCP software breaks messages into packets,
hands them off to the IP software for delivery,
and then orders and reassembles the packets
at their destination
• IP stands for Internet Protocol
IP software deals with the routing of packets
through the maze of interconnected networks
to their final destination
TCP/IP (cont.)
• UDP stands for User Datagram Protocol
– It is an alternative to TCP
– The main difference is that TCP is highly
reliable, at the cost of decreased
performance, while UDP is less reliable, but
generally faster
High-Level Protocols
• Other protocols build on the foundation
established by the TCP/IP protocol suite
– Simple Mail Transfer Protocol (SMTP)
– File Transfer Protocol (FTP)
– Telnet
– Hyper Text Transfer Protocol (http)
MIME Types
• Related to the idea of network protocols
and standardization is the concept of a
file’s MIME type
– MIME stands for Multipurpose Internet Mail
Extension
– Based on a document’s MIME type, an
application program can decide how to deal
with the data it is given
MIME Types

Figure 15.7
Some
protocols and
the ports they
use
Firewalls
• Firewall A machine and its software that
serve as a special gateway to a network,
protecting it from inappropriate access
– Filters the network traffic that comes in,
checking the validity of the messages as
much as possible and perhaps denying some
messages altogether
– Enforces an organization’s access control
policy
Firewalls

Figure 15.8 A firewall protecting a LAN
Network Addresses
• Hostname A unique identification that
specifies a particular computer on the
Internet
For example
matisse.csc.villanova.edu
condor.develocorp.com
Network Addresses
• Network software translates a hostname
into its corresponding IP address
For example
205.39.145.18
Network Addresses
• An IP address can be split into
– network address, which specifies a specific network
– host number, which specifies a particular machine in
that network

Figure 15.9
An IP address is
stored in four
bytes
Domain Name System
• A hostname consists of the computer name
followed by the domain name
• www.dpssrinagar.com is the domain name
– A domain name is separated into two or more
sections that specify the organization, and possibly a
subset of an organization, of which the computer is a
part
– Two organizations can have a computer named the
same thing because the domain name makes it clear
which one is being referred to
Domain Name System
• The domain name system (DNS) is
chiefly used to translate hostnames into
numeric IP addresses
– DNS is an example of a distributed database
– If that server can resolve the hostname, it
does so
– If not, that server asks another domain name
server

More Related Content

What's hot

Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
Ashita Agrawal
 
Computer network
Computer networkComputer network
Computer network
Burhan Ahmed
 
Network Topology
Network TopologyNetwork Topology
Network Topology
Swapna Subhadarsini
 
Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardware
Mziaulla
 
Network Slides
Network SlidesNetwork Slides
Network Slidesiarthur
 
Computer networking ppt
Computer networking pptComputer networking ppt
Computer networking ppt
Jitender Kumar
 
Introduction to computer networks
Introduction to computer networksIntroduction to computer networks
Introduction to computer networks
Haider Ali Malik
 
Computer network_network devices
Computer network_network devicesComputer network_network devices
Computer network_network devices
Sweta Kumari Barnwal
 
Computer network basic concepts
Computer network   basic conceptsComputer network   basic concepts
Computer network basic concepts
rahul kapoliya
 
Networking fundamentals
Networking fundamentalsNetworking fundamentals
Networking fundamentalsjpprakash
 
Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking Fundamentals
UMA MAHESWARI
 
Computer network
Computer networkComputer network
Computer network
Neha Gupta
 
Basics of Networks ,Advantages and Disadvantages
Basics of  Networks ,Advantages and DisadvantagesBasics of  Networks ,Advantages and Disadvantages
Basics of Networks ,Advantages and Disadvantages
sabari Giri
 
Basics of computer networks
Basics of computer networksBasics of computer networks
Basics of computer networks
Rubal Sagwal
 
Networking Fundamentals
Networking  FundamentalsNetworking  Fundamentals
Networking Fundamentals
Manjit Chavda
 
Computer network
Computer networkComputer network
Computer network
Mallikarjuna G D
 
Types of Computer Network
Types of Computer NetworkTypes of Computer Network
Types of Computer Network
Mohit Dasariya
 
Packet switching
Packet switchingPacket switching
Packet switchingasimnawaz54
 
Basic Networking Concepts
Basic Networking ConceptsBasic Networking Concepts
Basic Networking Concepts
Sehajbir Singh
 

What's hot (20)

Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
 
Computer network
Computer networkComputer network
Computer network
 
Network Topology
Network TopologyNetwork Topology
Network Topology
 
Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardware
 
Network Slides
Network SlidesNetwork Slides
Network Slides
 
Computer networking ppt
Computer networking pptComputer networking ppt
Computer networking ppt
 
Introduction to computer networks
Introduction to computer networksIntroduction to computer networks
Introduction to computer networks
 
Computer network_network devices
Computer network_network devicesComputer network_network devices
Computer network_network devices
 
Computer network basic concepts
Computer network   basic conceptsComputer network   basic concepts
Computer network basic concepts
 
Networking fundamentals
Networking fundamentalsNetworking fundamentals
Networking fundamentals
 
Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking Fundamentals
 
Computer network
Computer networkComputer network
Computer network
 
Basics of Networks ,Advantages and Disadvantages
Basics of  Networks ,Advantages and DisadvantagesBasics of  Networks ,Advantages and Disadvantages
Basics of Networks ,Advantages and Disadvantages
 
Basics of computer networks
Basics of computer networksBasics of computer networks
Basics of computer networks
 
Networking Fundamentals
Networking  FundamentalsNetworking  Fundamentals
Networking Fundamentals
 
Computer network
Computer networkComputer network
Computer network
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networking
 
Types of Computer Network
Types of Computer NetworkTypes of Computer Network
Types of Computer Network
 
Packet switching
Packet switchingPacket switching
Packet switching
 
Basic Networking Concepts
Basic Networking ConceptsBasic Networking Concepts
Basic Networking Concepts
 

Viewers also liked

Copyright and Open Content
Copyright and Open ContentCopyright and Open Content
Copyright and Open Content
Sound and Vision R&D
 
Export
ExportExport
ExportRD90
 
Marketing strategy presentation final
Marketing strategy presentation finalMarketing strategy presentation final
Marketing strategy presentation finalRD90
 
Lindile ntshanyana multi-purpose_co-operative__ltd__constitution28
Lindile ntshanyana multi-purpose_co-operative__ltd__constitution28Lindile ntshanyana multi-purpose_co-operative__ltd__constitution28
Lindile ntshanyana multi-purpose_co-operative__ltd__constitution28Lindile Ntshanyana
 
Icfes
IcfesIcfes
Icfes
beiromix
 
Identification Authentication Authorization in CLARIAH
Identification Authentication Authorization in CLARIAHIdentification Authentication Authorization in CLARIAH
Identification Authentication Authorization in CLARIAH
Sound and Vision R&D
 
Operations manual [lindile ntshanyana mpc (ltd)
Operations manual [lindile ntshanyana mpc (ltd)Operations manual [lindile ntshanyana mpc (ltd)
Operations manual [lindile ntshanyana mpc (ltd)Lindile Ntshanyana
 
Export
ExportExport
Export
RD90
 
Tolerancia inmunologica
Tolerancia inmunologicaTolerancia inmunologica
Tolerancia inmunologica
B Elsi Cruz Toledo
 
501 sentence completion questions
501 sentence completion questions501 sentence completion questions
501 sentence completion questionsNguyen Phan
 
Head & shoulders
Head & shouldersHead & shoulders
Head & shouldersRD90
 

Viewers also liked (11)

Copyright and Open Content
Copyright and Open ContentCopyright and Open Content
Copyright and Open Content
 
Export
ExportExport
Export
 
Marketing strategy presentation final
Marketing strategy presentation finalMarketing strategy presentation final
Marketing strategy presentation final
 
Lindile ntshanyana multi-purpose_co-operative__ltd__constitution28
Lindile ntshanyana multi-purpose_co-operative__ltd__constitution28Lindile ntshanyana multi-purpose_co-operative__ltd__constitution28
Lindile ntshanyana multi-purpose_co-operative__ltd__constitution28
 
Icfes
IcfesIcfes
Icfes
 
Identification Authentication Authorization in CLARIAH
Identification Authentication Authorization in CLARIAHIdentification Authentication Authorization in CLARIAH
Identification Authentication Authorization in CLARIAH
 
Operations manual [lindile ntshanyana mpc (ltd)
Operations manual [lindile ntshanyana mpc (ltd)Operations manual [lindile ntshanyana mpc (ltd)
Operations manual [lindile ntshanyana mpc (ltd)
 
Export
ExportExport
Export
 
Tolerancia inmunologica
Tolerancia inmunologicaTolerancia inmunologica
Tolerancia inmunologica
 
501 sentence completion questions
501 sentence completion questions501 sentence completion questions
501 sentence completion questions
 
Head & shoulders
Head & shouldersHead & shoulders
Head & shoulders
 

Similar to Networking.

Computer networks--network
Computer networks--networkComputer networks--network
Computer networks--network
suhaimin othman
 
Computer networks--network
Computer networks--networkComputer networks--network
Computer networks--networkVinnu Vinod Kvk
 
Computer networks--network
Computer networks--networkComputer networks--network
Computer networks--network
Duy Hoang Nguyen
 
Computer networks--network
Computer networks--networkComputer networks--network
Computer networks--network
Sompal Duhan
 
Computer networks--network
Computer networks--networkComputer networks--network
Computer networks--network
karan saini
 
Computer networks--network
Computer networks--networkComputer networks--network
Computer networks--network
Anchal doomra
 
Computer Network - Types & Definition
Computer Network - Types & DefinitionComputer Network - Types & Definition
Computer Network - Types & Definition
shreyarai297
 
Computer Network
Computer NetworkComputer Network
Computer Network
Hassan Khan
 
Computer networks--network
Computer networks--networkComputer networks--network
Computer networks--network
Zainurin Suparman
 
Computer networks--network
Computer networks--networkComputer networks--network
Computer networks--network
karan saini
 
Computer networks--network
Computer networks--networkComputer networks--network
Computer networks--network
amare lakew
 
Computer networks--network
Computer networks--networkComputer networks--network
Computer networks--network
Ayush Bhardwaj
 
Computer networks--network
Computer networks--networkComputer networks--network
Computer networks--network
Antenh Mekonen
 
Computer networks--network
Computer networks--networkComputer networks--network
Computer networks--networkBuntha Chhay
 
Computer-Networks--Network.ppt
Computer-Networks--Network.pptComputer-Networks--Network.ppt
Computer-Networks--Network.ppt
SamiAAli44
 
Computer-Networks--Network.ppt
Computer-Networks--Network.pptComputer-Networks--Network.ppt
Computer-Networks--Network.ppt
AbdulRehman378540
 
Computer-Networks-general in-Network.ppt
Computer-Networks-general in-Network.pptComputer-Networks-general in-Network.ppt
Computer-Networks-general in-Network.ppt
drezhilazhaganc1
 
koushal networks.ppt
koushal networks.pptkoushal networks.ppt
koushal networks.ppt
KOUSHALKUMAR13
 

Similar to Networking. (20)

Computing 9
Computing 9Computing 9
Computing 9
 
Computer networks--network
Computer networks--networkComputer networks--network
Computer networks--network
 
Computer networks--network
Computer networks--networkComputer networks--network
Computer networks--network
 
Computer networks--network
Computer networks--networkComputer networks--network
Computer networks--network
 
Computer networks--network
Computer networks--networkComputer networks--network
Computer networks--network
 
Computer networks--network
Computer networks--networkComputer networks--network
Computer networks--network
 
Computer networks--network
Computer networks--networkComputer networks--network
Computer networks--network
 
Computer Network - Types & Definition
Computer Network - Types & DefinitionComputer Network - Types & Definition
Computer Network - Types & Definition
 
Computer Network
Computer NetworkComputer Network
Computer Network
 
Computer networks--network
Computer networks--networkComputer networks--network
Computer networks--network
 
Computer networks--network
Computer networks--networkComputer networks--network
Computer networks--network
 
Computer networks--network
Computer networks--networkComputer networks--network
Computer networks--network
 
Computer networks--network
Computer networks--networkComputer networks--network
Computer networks--network
 
Computer networks--network
Computer networks--networkComputer networks--network
Computer networks--network
 
TIL networks
TIL networksTIL networks
TIL networks
 
Computer networks--network
Computer networks--networkComputer networks--network
Computer networks--network
 
Computer-Networks--Network.ppt
Computer-Networks--Network.pptComputer-Networks--Network.ppt
Computer-Networks--Network.ppt
 
Computer-Networks--Network.ppt
Computer-Networks--Network.pptComputer-Networks--Network.ppt
Computer-Networks--Network.ppt
 
Computer-Networks-general in-Network.ppt
Computer-Networks-general in-Network.pptComputer-Networks-general in-Network.ppt
Computer-Networks-general in-Network.ppt
 
koushal networks.ppt
koushal networks.pptkoushal networks.ppt
koushal networks.ppt
 

Recently uploaded

From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 

Recently uploaded (20)

From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 

Networking.

  • 2. What Is Networking? • Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually, the connections between computers in a network are made using physical wires or cables However, some connections are wireless, using radio waves or infrared signals
  • 3. Networking • The generic term node or host refers to any device on a network • Data transfer rate The speed with which data is moved from one place on a network to another • Data transfer rate is a key issue in computer networks
  • 4. Networking • Computer networks have opened up an entire frontier in the world of computing called the client/server model Figure 15.1 Client/Server interaction
  • 5. Networking • File server A computer that stores and manages files for multiple users on a network • Web server A computer dedicated to responding to requests (from the browser client) for web pages
  • 6. Types of Networks • Local-area network (LAN) A network that connects a relatively small number of machines in a relatively close geographical area
  • 7. Types of Networks • Wide-area network (WAN) A network that connects two or more local-area networks over a potentially large geographic distance Often one particular node on a LAN is set up to serve as a gateway to handle all communication going between that LAN and other networks Communication between networks is called internetworking The Internet, as we know it today, is essentially the ultimate wide-area network, spanning the entire globe
  • 8. Types of Networks • Metropolitan-area network (MAN) The communication infrastructures that have been developed in and around large cities
  • 9. So, who owns the Internet? Well, nobody does. No single person or company owns the Internet or even controls it entirely. As a wide-area network, it is made up of many smaller networks. These smaller networks are often owned and managed by a person or organization. The Internet, then, is really defined by how connections can be made between these networks.
  • 10. Types of Networks Figure 15.1 Local-area networks connected across a distance to create a wide-area network
  • 11. Internet Connections • Internet backbone A set of high-speed networks that carry Internet traffic These networks are provided by companies such as AT&T, GTE, and IBM • Internet service provider (ISP) A company that provides other companies or individuals with access to the Internet
  • 12. Internet Connections • There are various technologies available that you can use to connect a home computer to the Internet – A phone modem converts computer data into an analog audio signal for transfer over a telephone line, and then a modem at the destination converts it back again into data – A digital subscriber line (DSL) uses regular copper phone lines to transfer digital data to and from the phone company’s central office
  • 13. Internet Connections • Broadband A connection in which transfer speeds are faster than 128 bits per second – DSL connections and cable modems are broadband connections – The speed for downloads (getting data from the Internet to your home computer) may not be the same as uploads (sending data from your home computer to the Internet)
  • 14. Packet Switching • To improve the efficiency of transferring information over a shared communication line, messages are divided into fixed-sized, numbered packets • Network devices called routers are used to direct packets between networks Figure 15.4 Messages sent by packet switching
  • 15. Network Protocols • Network protocols are layered such that each one relies on the protocols that underlie it • Sometimes referred to as a protocol stack Figure 15.6 Layering of key network protocols
  • 16. TCP/IP • TCP stands for Transmission Control Protocol TCP software breaks messages into packets, hands them off to the IP software for delivery, and then orders and reassembles the packets at their destination • IP stands for Internet Protocol IP software deals with the routing of packets through the maze of interconnected networks to their final destination
  • 17. TCP/IP (cont.) • UDP stands for User Datagram Protocol – It is an alternative to TCP – The main difference is that TCP is highly reliable, at the cost of decreased performance, while UDP is less reliable, but generally faster
  • 18. High-Level Protocols • Other protocols build on the foundation established by the TCP/IP protocol suite – Simple Mail Transfer Protocol (SMTP) – File Transfer Protocol (FTP) – Telnet – Hyper Text Transfer Protocol (http)
  • 19. MIME Types • Related to the idea of network protocols and standardization is the concept of a file’s MIME type – MIME stands for Multipurpose Internet Mail Extension – Based on a document’s MIME type, an application program can decide how to deal with the data it is given
  • 20. MIME Types Figure 15.7 Some protocols and the ports they use
  • 21. Firewalls • Firewall A machine and its software that serve as a special gateway to a network, protecting it from inappropriate access – Filters the network traffic that comes in, checking the validity of the messages as much as possible and perhaps denying some messages altogether – Enforces an organization’s access control policy
  • 22. Firewalls Figure 15.8 A firewall protecting a LAN
  • 23. Network Addresses • Hostname A unique identification that specifies a particular computer on the Internet For example matisse.csc.villanova.edu condor.develocorp.com
  • 24. Network Addresses • Network software translates a hostname into its corresponding IP address For example 205.39.145.18
  • 25. Network Addresses • An IP address can be split into – network address, which specifies a specific network – host number, which specifies a particular machine in that network Figure 15.9 An IP address is stored in four bytes
  • 26. Domain Name System • A hostname consists of the computer name followed by the domain name • www.dpssrinagar.com is the domain name – A domain name is separated into two or more sections that specify the organization, and possibly a subset of an organization, of which the computer is a part – Two organizations can have a computer named the same thing because the domain name makes it clear which one is being referred to
  • 27. Domain Name System • The domain name system (DNS) is chiefly used to translate hostnames into numeric IP addresses – DNS is an example of a distributed database – If that server can resolve the hostname, it does so – If not, that server asks another domain name server