SlideShare a Scribd company logo
NetworkingBasics
Presented By:
Sahil Showkat
E-mail: sahil@pearlx.in
Website: www.pearlx.in
Network
 Group of two or more computers interconnected to share
resources, exchange data or allow electronic communication is
called as a network.
 The communication between two or more interconnected
devices is called networking.
 An internetwork is a connection of two or more networks.
 Internetworking means communication between different
networks.
The Uses of a Network
 Simultaneous access to data
 Data files are shared
 Access can be limited
 Shared files stored on a server
 Software can be shared
Sharing Data
File server contains documents
used by other computers.
The Uses of a Network
 Personal communication
 Email
 Instantaneous communication
 Conferencing
 Tele conferencing
 Videoconferencing
 Audio-conferencing
 Data-conferencing
 Voice over IP
 Phone communication over network wires
Voice Over IP
The Uses of a Network
 Easier data backup
 Backup copies data to removable media
 Server data backed up in one step
The Uses of a Network
 Hardware Sharing
 Printers, scanners and devices can be shared.
Types of Networks
 LAN
Local Area Networks are used to connect networking
devices that are in a very close geographic area such as a
floor of a building, a building itself or within a campus.
 MAN
Metropolitan Area Network are used to connect
networking devices that may span around the entire city.
 WAN
Wide Area Networks which connects two or more LANs
present at different geographical locations.
LAN
LANHUB
Administration
MAN
LANLAN
HUB SWITCH
MAN
CSE Administration
WAN
LANLAN
HUB SWITCH
CSE Administration
www.iustlive.com
WAN
Router Router
Network Operating System
 A network operating system is a software application that
provides a platform for both the functionality of an
individual computer and for multiple computers within an
interconnected network.
 A Network Operating System (NOS) is a software program
that controls other software and hardware running on a
network.
 It also allows multiple computers, known as network
computers, to communicate with one central hub and each
other to share resources, run applications, and send
messages.
Types of NOS’s
 There are two major types of network operating
systems:
 Peer-to-Peer
 Client/Server
Peer-to-Peer
 In Peer-to-Peer NOS, all
computers share
equivalent responsibility
for processing data. They
have same abilities to use
the resources available on
the network.
 They don’t have a
centralized management
source.
Advantages
 It is easy to install and so is the configuration of computers on
this network.
 All the resources and contents are shared by all the peers, unlike
server-client architecture where Server shares all the contents
and resources.
 P2P is more reliable as central dependency is eliminated. Failure
of one peer doesn’t affect the functioning of other peers.
 There is no need for full-time System Administrator. Every user
is the administrator of his machine. User can control their
shared resources.
 The over-all cost of building and maintaining this type of
network is comparatively very less.
Disadvantages
 In this network, the whole system is decentralized thus it is
difficult to administer.
 Security in this system is very less. Viruses, spywares,
trojans, etc malwares can easily transmitted over this P-2-P
architecture.
 Data recovery or backup is very difficult. Each computer
should have its own back-up system
Client/Server
 In Client Server NOS there is
one powerful computer
(known as server) which acts
as a provider of information
to other sub-ordinate
workstations (called client).
 Server becomes the heart of
the system, providing access
to resources and providing
security.
Advantages
 There is a centralized control. Servers help in
administering the whole set-up. Access rights and resource
allocation is done by Servers.
 All the files are stored at the same place. In this way,
management of files becomes easy. Also it becomes easier
to find files.
 As all the data is stored on server its easy to make a back-up
of it. Also, in case of some break-down if data is lost, it can
be recovered easily and efficiently.
 Rules defining security and access rights can be defined at
the time of set-up of server.
Disadvanatges
 Too many requests from the clients may lead to congestion,
which rarely takes place in P2P network. Overload can lead
to breaking-down of servers.
 If the server fails, the whole network goes down.
 It is very expensive to install and manage this type of
computing.
Topology
Topology is a physical layout of the systems connected in a
network.
 Different types of topology are:
 Bus
 Star
 Tree
 Choice affects
 Network performance
 Network size
 Network collision detection
Linear Bus Topology
 In bus topology all devices are connected to a single cable
or backbone.
 It supports half duplex communication.
Advantages
 Easy to setup.
 Requires less cable length.
Disadvantages
 A break at any point along the backbone will result in total
network failure.
Star Topology
 The most commonly used topology
 It consist of one centralized device which can be either a
switch or a hub.
 The devices connect to the various ports on the centralized
devices.
HUB/Switch
Advantages
 Easy to setup.
 Easy to add/remove parts
Disadvantages
 One hub crashing downs entire network.
 Uses lots of cable
Tree Topology
 A tree topology combines the characteristics of linear bus
and star topology.
 It consist of groups of star configured workstations
connected to a linear bus backbone cable.
Advantages
 Expansion of Network is possible and easy.
 We divide the whole network into segments (star
networks), which can be easily managed and maintained.
 Each segment is provided with dedicated point-to-point
wiring to the central hub.
 If one segment is damaged, other segments are not
affected.
Disadvantages
 Because of its basic structure, tree topology, relies heavily
on the main bus cable, if it breaks whole network is
crippled.
 More difficult to configure.
Ring Topology
 In ring topology each computer or device is connected to
its neighbor forming a loop.
Advantages
 Each computer has equal access to resources.
 There is no need for network server to control the
connectivity between workstations.
Disadvantages
 Failure of a single device or a break anywhere in the cable
causes the full network to stop communicating.
 Each packet of data must pass through all the computers
between source and destination. This makes it slower
than Star topology.
 If one workstation or port goes down, the entire network
gets affected.
Mesh Topology
 In mesh topology each device is directly connected to all other
devices.
 In fact a true mesh topology is the one where every node is
connected to every other node in the network. This type of
topology is very expensive as there are many redundant
connections
Advantages
 Data can be transmitted from different devices simultaneously.
This topology can withstand high traffic.
 Even if one of the components fails there is always an alternative
present. So data transfer doesn’t get affected.
 Expansion and modification in topology can be done without
disrupting other nodes.
Disadvantages
 There are high chances of redundancy in many of the network
connections.
 Overall cost of this network is way too high as compared to other
network topologies.
 Set-up and maintenance of this topology is very difficult. Even
administration of the network is tough.
Network Media
 Links that connect nodes.
 Communication channel through which data travels
on a network.
 Choice impacts
 Speed
 Security
 Size
Wire Based Media (guided)
 Twisted-pair cable
 Most common LAN
cable
 Four pairs of copper
cable twisted
 May be shielded from
interference
 Speeds range from
1 Mbps to 1,000 Mbps
Wire Based Media (guided)
 Coaxial cable
 Similar to cable TV wire
 One wire runs through cable
 Shielded from interference
 Speeds up to 10 Mbps
Wire Based Media (guided)
 Fiber-optic cable
 Data is transmitted with
light pulses
 Glass strand instead of
cable
 Immune to interference
 Very secure
 Hard to work with
 Speeds up to
100 Gbps
Wireless Media (unguided)
 Data transmitted through the air
 LANs use radio waves
 WANs use microwave signals
 Easy to setup
 Difficult to secure
Networking Devices
 Networking devices include all the equipment needed to
perform data-processing and communications within the
network.
 Network Interface Card
 Repeaters
 Concentrator/Hubs
 Bridges
 Switches
 Routers
Network Interface Card
 A NIC, typically an expansion card in a computer, is used to
connect a system to physical network media.
 Nowadays, computers are equipped with a built-in NIC.
 NICs are available for different types of network media, the
most common today being Ethernet NICs with a RJ-45
Socket for twisted pair cabling and wireless network
adapters with antenna.
Ethernet Card
LocalTalk Connectors
Token Ring Card
Repeater
 Repeaters clean, amplify, and resend signals that are
weakened by long cable length.
 Can be separate or built-in to hubs or switches
 Most economic way of expanding a network.
 The number of repeaters must be limited.
 Repeaters cannot connect different network
architecture.
 Repeater do not reduce network traffic.
 Half –Duplex Communication.
Hub/Concentrators
 Hubs regenerate and retime network signals.
 They are really multi-port repeaters.
 Hubs propagate signals through the network
 They cannot filter network traffic
 They cannot determine best path
 Uplink port – crossover mode or straight through mode
Functions of HUB
HUB
Data
DataDataDataData
Functions of HUB
HUB
Data
DataDataDataData
Data
Bridges
 Bridges are more intelligent than hubs.
 They increase network performance by segmenting
networks in separate collision domains.
 They maintains a table with MAC Addresses of all attached
nodes and on which segment they are located.
 Filter traffic by looking at the MAC address.
 Used for connecting two different topology (Segment).
 If the frame is addressed to a MAC address on the local side
of the bridge, it is not forwarded to the other segment
 Bridges maintain a MAC address table for both segments
they are connected to
Switches
 It is an Intelligent device.
 It maintains MAC address table (hardware address).
 Switches resemble bridges and can be considered as
multiport bridges.
 Each port of the switch has fixed bandwidth.
 Supports full duplex communication.
1
2
3
4 5 6
7
8
Functions of Switch MAC ADDRESS TABLE
PORT MAC-
ADDRESS
1
2
3
4
5
6
7
8
001C-C01A-0002
001C-C01A-0004
001C-C01A-0002
1
2
3
4 5 6
7
8
S
D
DataDataDataDataDataData
Data
Source MAC
001C.C01A.0002
Destination MAC
001C.C01A.0004
DATA
Source MAC
001C.C01A.0002
Destination MAC
001C.C01A.0004
DATA
MAC ADDRESS TABLE
PORT MAC-
ADDRESS
Fa0/1
Fa0/2 001C-C01A-
0002
Fa0/3
Fa0/4
Fa0/5
Fa0/6
Fa0/7
Fa0/8
001C-C01A-0004
001C-C01A-0002
001C-C01A-0004
1
2
3
4 5 6
7
8
D
S Data
Types of Switches
 Unmanaged Switch
 Managed Switch
 Smart Switch
 Enterprise managed Switch
Router
 These are physical devices that join multiple wired and
wireless networks together.
 Routers select the best path to route a message, based
on destination address and origin.
 The router can direct traffic to prevent head-on
collisions.
 Routers know the addresses of computers, bridges and
other routers on the network.
 Routers usually uses the IP Addresses
End of Presentation

More Related Content

What's hot

Star topology
Star topologyStar topology
Router and types
Router and types Router and types
Router and types
Qazafie Mehrzad
 
Chapter 1 introduction to computer networks
Chapter 1 introduction to computer networksChapter 1 introduction to computer networks
Chapter 1 introduction to computer networksViku1985
 
Computer network basic concepts
Computer network   basic conceptsComputer network   basic concepts
Computer network basic concepts
rahul kapoliya
 
Computer hardware and networking components
Computer hardware and networking componentsComputer hardware and networking components
Computer hardware and networking components
Manpreet Singh Bedi
 
Networking devices
Networking devicesNetworking devices
Networking devices
Mubassir Ambekar
 
Networking devices
Networking devicesNetworking devices
Networking devicesrupinderj
 
Networking Fundamentals
Networking  FundamentalsNetworking  Fundamentals
Networking Fundamentals
Manjit Chavda
 
Router
RouterRouter
Basics Of Networking (Overview)
Basics Of Networking (Overview)Basics Of Networking (Overview)
Basics Of Networking (Overview)ashiesh0007
 
Networking concepts
Networking conceptsNetworking concepts
Networking concepts
seemadav1
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference Model
Mukesh Tekwani
 
Computer Networking fundamentals
Computer Networking fundamentals Computer Networking fundamentals
Computer Networking fundamentals
Kirti Verma
 
Computer networking
Computer networkingComputer networking
Computer networking
Bayarmaa GBayarmaa
 
Data Communications and Computer Networks
Data Communications and Computer Networks Data Communications and Computer Networks
Data Communications and Computer Networks
Jubayer Alam Shoikat
 
Computer Network notes (handwritten) UNIT 1
Computer Network notes (handwritten) UNIT 1Computer Network notes (handwritten) UNIT 1
Computer Network notes (handwritten) UNIT 1
NANDINI SHARMA
 
Storage organization and stack allocation of space
Storage organization and stack allocation of spaceStorage organization and stack allocation of space
Storage organization and stack allocation of space
Muhammad Haroon
 
computer networking and its application ppt
computer networking and its application pptcomputer networking and its application ppt
computer networking and its application ppt
Nitesh Dubey
 

What's hot (20)

Star topology
Star topologyStar topology
Star topology
 
Router and types
Router and types Router and types
Router and types
 
Addressing
AddressingAddressing
Addressing
 
Chapter 1 introduction to computer networks
Chapter 1 introduction to computer networksChapter 1 introduction to computer networks
Chapter 1 introduction to computer networks
 
Computer network basic concepts
Computer network   basic conceptsComputer network   basic concepts
Computer network basic concepts
 
Computer hardware and networking components
Computer hardware and networking componentsComputer hardware and networking components
Computer hardware and networking components
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Networking Fundamentals
Networking  FundamentalsNetworking  Fundamentals
Networking Fundamentals
 
WAN Technologies slide show
WAN Technologies slide showWAN Technologies slide show
WAN Technologies slide show
 
Router
RouterRouter
Router
 
Basics Of Networking (Overview)
Basics Of Networking (Overview)Basics Of Networking (Overview)
Basics Of Networking (Overview)
 
Networking concepts
Networking conceptsNetworking concepts
Networking concepts
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference Model
 
Computer Networking fundamentals
Computer Networking fundamentals Computer Networking fundamentals
Computer Networking fundamentals
 
Computer networking
Computer networkingComputer networking
Computer networking
 
Data Communications and Computer Networks
Data Communications and Computer Networks Data Communications and Computer Networks
Data Communications and Computer Networks
 
Computer Network notes (handwritten) UNIT 1
Computer Network notes (handwritten) UNIT 1Computer Network notes (handwritten) UNIT 1
Computer Network notes (handwritten) UNIT 1
 
Storage organization and stack allocation of space
Storage organization and stack allocation of spaceStorage organization and stack allocation of space
Storage organization and stack allocation of space
 
computer networking and its application ppt
computer networking and its application pptcomputer networking and its application ppt
computer networking and its application ppt
 

Viewers also liked

Ch03 Access
Ch03 AccessCh03 Access
Ch03 AccessD
 
ITT PROJECT ON CREATE QUERY(QUERY-SELECT WITH CONDITION, MAKE A TABLE,APPEND,...
ITT PROJECT ON CREATE QUERY(QUERY-SELECT WITH CONDITION, MAKE A TABLE,APPEND,...ITT PROJECT ON CREATE QUERY(QUERY-SELECT WITH CONDITION, MAKE A TABLE,APPEND,...
ITT PROJECT ON CREATE QUERY(QUERY-SELECT WITH CONDITION, MAKE A TABLE,APPEND,...
Alok Mishra
 
Network topology
Network topologyNetwork topology
Network topology
Hardik Patel
 
MS-ACCESS:CREATE TAB(QUERY-SELECT WITH CONDITIONS, MAKE A TABLE,DELETE,APPNED...
MS-ACCESS:CREATE TAB(QUERY-SELECT WITH CONDITIONS, MAKE A TABLE,DELETE,APPNED...MS-ACCESS:CREATE TAB(QUERY-SELECT WITH CONDITIONS, MAKE A TABLE,DELETE,APPNED...
MS-ACCESS:CREATE TAB(QUERY-SELECT WITH CONDITIONS, MAKE A TABLE,DELETE,APPNED...Ashish Saxena
 
AIN102.2 Microsoft Access Queries
AIN102.2 Microsoft Access QueriesAIN102.2 Microsoft Access Queries
AIN102.2 Microsoft Access Queries
Dan D'Urso
 
AIN102.1 Microsoft Access Queries Module 1
AIN102.1 Microsoft Access Queries Module 1AIN102.1 Microsoft Access Queries Module 1
AIN102.1 Microsoft Access Queries Module 1
Dan D'Urso
 
마말레이드 GUI PPT입니다.
마말레이드 GUI PPT입니다.마말레이드 GUI PPT입니다.
마말레이드 GUI PPT입니다.
ChoiHyoRim
 
Publications
PublicationsPublications
PublicationsPhilip Ng
 
Computational Toxicity: Stochastic PBPK modeling
Computational Toxicity: Stochastic PBPK modelingComputational Toxicity: Stochastic PBPK modeling
Computational Toxicity: Stochastic PBPK modeling
Wei-Chun Chou
 
Tips for sikker kjøring
Tips for sikker kjøringTips for sikker kjøring
Tips for sikker kjøring
Jacquelinegan
 
Final Human Communication Ethics Paper (1)(1)
Final Human Communication Ethics Paper (1)(1)Final Human Communication Ethics Paper (1)(1)
Final Human Communication Ethics Paper (1)(1)James Price
 
Cesar Soto MAR. 2016
Cesar Soto MAR. 2016Cesar Soto MAR. 2016
Cesar Soto MAR. 2016Cesar Soto
 

Viewers also liked (13)

Ch03 Access
Ch03 AccessCh03 Access
Ch03 Access
 
ITT PROJECT ON CREATE QUERY(QUERY-SELECT WITH CONDITION, MAKE A TABLE,APPEND,...
ITT PROJECT ON CREATE QUERY(QUERY-SELECT WITH CONDITION, MAKE A TABLE,APPEND,...ITT PROJECT ON CREATE QUERY(QUERY-SELECT WITH CONDITION, MAKE A TABLE,APPEND,...
ITT PROJECT ON CREATE QUERY(QUERY-SELECT WITH CONDITION, MAKE A TABLE,APPEND,...
 
Network topology
Network topologyNetwork topology
Network topology
 
MS-ACCESS:CREATE TAB(QUERY-SELECT WITH CONDITIONS, MAKE A TABLE,DELETE,APPNED...
MS-ACCESS:CREATE TAB(QUERY-SELECT WITH CONDITIONS, MAKE A TABLE,DELETE,APPNED...MS-ACCESS:CREATE TAB(QUERY-SELECT WITH CONDITIONS, MAKE A TABLE,DELETE,APPNED...
MS-ACCESS:CREATE TAB(QUERY-SELECT WITH CONDITIONS, MAKE A TABLE,DELETE,APPNED...
 
AIN102.2 Microsoft Access Queries
AIN102.2 Microsoft Access QueriesAIN102.2 Microsoft Access Queries
AIN102.2 Microsoft Access Queries
 
AIN102.1 Microsoft Access Queries Module 1
AIN102.1 Microsoft Access Queries Module 1AIN102.1 Microsoft Access Queries Module 1
AIN102.1 Microsoft Access Queries Module 1
 
마말레이드 GUI PPT입니다.
마말레이드 GUI PPT입니다.마말레이드 GUI PPT입니다.
마말레이드 GUI PPT입니다.
 
20151106091843405
2015110609184340520151106091843405
20151106091843405
 
Publications
PublicationsPublications
Publications
 
Computational Toxicity: Stochastic PBPK modeling
Computational Toxicity: Stochastic PBPK modelingComputational Toxicity: Stochastic PBPK modeling
Computational Toxicity: Stochastic PBPK modeling
 
Tips for sikker kjøring
Tips for sikker kjøringTips for sikker kjøring
Tips for sikker kjøring
 
Final Human Communication Ethics Paper (1)(1)
Final Human Communication Ethics Paper (1)(1)Final Human Communication Ethics Paper (1)(1)
Final Human Communication Ethics Paper (1)(1)
 
Cesar Soto MAR. 2016
Cesar Soto MAR. 2016Cesar Soto MAR. 2016
Cesar Soto MAR. 2016
 

Similar to Networking basics

Tata Chuna
Tata Chuna Tata Chuna
Tata Chuna
Ramesh Sibal
 
Hcs Topic 4 Networks V2
Hcs Topic 4 Networks V2Hcs Topic 4 Networks V2
Hcs Topic 4 Networks V2ekul
 
Hcs Topic 4 Networks V2
Hcs Topic 4 Networks V2Hcs Topic 4 Networks V2
Hcs Topic 4 Networks V2Kyle
 
Hcs Topic 4 Networks V2
Hcs Topic 4 Networks V2Hcs Topic 4 Networks V2
Hcs Topic 4 Networks V2Naruin
 
NETWORK AND DATABASE CONCEPTS UNIT 1 CHAPTER 2 MRS.SOWMYA JYOTHI
NETWORK AND DATABASE CONCEPTS UNIT 1 CHAPTER 2 MRS.SOWMYA JYOTHINETWORK AND DATABASE CONCEPTS UNIT 1 CHAPTER 2 MRS.SOWMYA JYOTHI
NETWORK AND DATABASE CONCEPTS UNIT 1 CHAPTER 2 MRS.SOWMYA JYOTHI
Sowmya Jyothi
 
Computer networking
Computer networkingComputer networking
Computer networking
tdsparks3
 
NETWORKING
NETWORKINGNETWORKING
NETWORKING
junaid abbasi
 
Computer network ppt communication
Computer network ppt communicationComputer network ppt communication
Computer network ppt communication
Kajal Sharma
 
Cf presentation by muhammad saad salman
Cf presentation by muhammad saad salmanCf presentation by muhammad saad salman
Cf presentation by muhammad saad salman
Muhammad Saad Salman
 
Networks and telecommunication technologies basics
Networks and telecommunication technologies basicsNetworks and telecommunication technologies basics
Networks and telecommunication technologies basics
David Kibuki
 
Networking And Telecommunications
Networking And TelecommunicationsNetworking And Telecommunications
Networking And TelecommunicationsUMaine
 
1 introduction to-networking
1 introduction to-networking1 introduction to-networking
1 introduction to-networkingNor Zailani
 
Network servers and TOPOLOGY
Network servers  and TOPOLOGYNetwork servers  and TOPOLOGY
Network servers and TOPOLOGY
Kirti Verma
 
Networking
NetworkingNetworking
Networking
RajThakuri
 
Business Network and Telecommunication, LAN vs WAN
Business Network and Telecommunication, LAN vs WANBusiness Network and Telecommunication, LAN vs WAN
Business Network and Telecommunication, LAN vs WAN
Rashed Barakzai
 
Networking tutorials introduction to networking
Networking tutorials   introduction to networkingNetworking tutorials   introduction to networking
Networking tutorials introduction to networkingVinod Jadhav
 
ENTERPRISE NETWORKING
ENTERPRISE NETWORKINGENTERPRISE NETWORKING
ENTERPRISE NETWORKINGbwire sedrick
 
LAN (Local Area Network)
LAN (Local Area Network)LAN (Local Area Network)
LAN (Local Area Network)
Ridwanul Hoque
 

Similar to Networking basics (20)

Tata Chuna
Tata Chuna Tata Chuna
Tata Chuna
 
Hcs Topic 4 Networks V2
Hcs Topic 4 Networks V2Hcs Topic 4 Networks V2
Hcs Topic 4 Networks V2
 
Hcs Topic 4 Networks V2
Hcs Topic 4 Networks V2Hcs Topic 4 Networks V2
Hcs Topic 4 Networks V2
 
Hcs Topic 4 Networks V2
Hcs Topic 4 Networks V2Hcs Topic 4 Networks V2
Hcs Topic 4 Networks V2
 
NETWORK AND DATABASE CONCEPTS UNIT 1 CHAPTER 2 MRS.SOWMYA JYOTHI
NETWORK AND DATABASE CONCEPTS UNIT 1 CHAPTER 2 MRS.SOWMYA JYOTHINETWORK AND DATABASE CONCEPTS UNIT 1 CHAPTER 2 MRS.SOWMYA JYOTHI
NETWORK AND DATABASE CONCEPTS UNIT 1 CHAPTER 2 MRS.SOWMYA JYOTHI
 
Computer networking
Computer networkingComputer networking
Computer networking
 
NETWORKING
NETWORKINGNETWORKING
NETWORKING
 
Computer network ppt communication
Computer network ppt communicationComputer network ppt communication
Computer network ppt communication
 
Cf presentation by muhammad saad salman
Cf presentation by muhammad saad salmanCf presentation by muhammad saad salman
Cf presentation by muhammad saad salman
 
Computer network ppt
Computer network pptComputer network ppt
Computer network ppt
 
Networks and telecommunication technologies basics
Networks and telecommunication technologies basicsNetworks and telecommunication technologies basics
Networks and telecommunication technologies basics
 
Kinds of networks
Kinds of networksKinds of networks
Kinds of networks
 
Networking And Telecommunications
Networking And TelecommunicationsNetworking And Telecommunications
Networking And Telecommunications
 
1 introduction to-networking
1 introduction to-networking1 introduction to-networking
1 introduction to-networking
 
Network servers and TOPOLOGY
Network servers  and TOPOLOGYNetwork servers  and TOPOLOGY
Network servers and TOPOLOGY
 
Networking
NetworkingNetworking
Networking
 
Business Network and Telecommunication, LAN vs WAN
Business Network and Telecommunication, LAN vs WANBusiness Network and Telecommunication, LAN vs WAN
Business Network and Telecommunication, LAN vs WAN
 
Networking tutorials introduction to networking
Networking tutorials   introduction to networkingNetworking tutorials   introduction to networking
Networking tutorials introduction to networking
 
ENTERPRISE NETWORKING
ENTERPRISE NETWORKINGENTERPRISE NETWORKING
ENTERPRISE NETWORKING
 
LAN (Local Area Network)
LAN (Local Area Network)LAN (Local Area Network)
LAN (Local Area Network)
 

Recently uploaded

AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
BrazilAccount1
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
Vijay Dialani, PhD
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 

Recently uploaded (20)

AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 

Networking basics

  • 1. NetworkingBasics Presented By: Sahil Showkat E-mail: sahil@pearlx.in Website: www.pearlx.in
  • 2. Network  Group of two or more computers interconnected to share resources, exchange data or allow electronic communication is called as a network.  The communication between two or more interconnected devices is called networking.  An internetwork is a connection of two or more networks.  Internetworking means communication between different networks.
  • 3. The Uses of a Network  Simultaneous access to data  Data files are shared  Access can be limited  Shared files stored on a server  Software can be shared
  • 4. Sharing Data File server contains documents used by other computers.
  • 5. The Uses of a Network  Personal communication  Email  Instantaneous communication  Conferencing  Tele conferencing  Videoconferencing  Audio-conferencing  Data-conferencing  Voice over IP  Phone communication over network wires
  • 7. The Uses of a Network  Easier data backup  Backup copies data to removable media  Server data backed up in one step
  • 8. The Uses of a Network  Hardware Sharing  Printers, scanners and devices can be shared.
  • 9. Types of Networks  LAN Local Area Networks are used to connect networking devices that are in a very close geographic area such as a floor of a building, a building itself or within a campus.  MAN Metropolitan Area Network are used to connect networking devices that may span around the entire city.  WAN Wide Area Networks which connects two or more LANs present at different geographical locations.
  • 13. Network Operating System  A network operating system is a software application that provides a platform for both the functionality of an individual computer and for multiple computers within an interconnected network.  A Network Operating System (NOS) is a software program that controls other software and hardware running on a network.  It also allows multiple computers, known as network computers, to communicate with one central hub and each other to share resources, run applications, and send messages.
  • 14. Types of NOS’s  There are two major types of network operating systems:  Peer-to-Peer  Client/Server
  • 15. Peer-to-Peer  In Peer-to-Peer NOS, all computers share equivalent responsibility for processing data. They have same abilities to use the resources available on the network.  They don’t have a centralized management source.
  • 16. Advantages  It is easy to install and so is the configuration of computers on this network.  All the resources and contents are shared by all the peers, unlike server-client architecture where Server shares all the contents and resources.  P2P is more reliable as central dependency is eliminated. Failure of one peer doesn’t affect the functioning of other peers.  There is no need for full-time System Administrator. Every user is the administrator of his machine. User can control their shared resources.  The over-all cost of building and maintaining this type of network is comparatively very less.
  • 17. Disadvantages  In this network, the whole system is decentralized thus it is difficult to administer.  Security in this system is very less. Viruses, spywares, trojans, etc malwares can easily transmitted over this P-2-P architecture.  Data recovery or backup is very difficult. Each computer should have its own back-up system
  • 18. Client/Server  In Client Server NOS there is one powerful computer (known as server) which acts as a provider of information to other sub-ordinate workstations (called client).  Server becomes the heart of the system, providing access to resources and providing security.
  • 19. Advantages  There is a centralized control. Servers help in administering the whole set-up. Access rights and resource allocation is done by Servers.  All the files are stored at the same place. In this way, management of files becomes easy. Also it becomes easier to find files.  As all the data is stored on server its easy to make a back-up of it. Also, in case of some break-down if data is lost, it can be recovered easily and efficiently.  Rules defining security and access rights can be defined at the time of set-up of server.
  • 20. Disadvanatges  Too many requests from the clients may lead to congestion, which rarely takes place in P2P network. Overload can lead to breaking-down of servers.  If the server fails, the whole network goes down.  It is very expensive to install and manage this type of computing.
  • 21. Topology Topology is a physical layout of the systems connected in a network.  Different types of topology are:  Bus  Star  Tree  Choice affects  Network performance  Network size  Network collision detection
  • 22. Linear Bus Topology  In bus topology all devices are connected to a single cable or backbone.  It supports half duplex communication.
  • 23. Advantages  Easy to setup.  Requires less cable length. Disadvantages  A break at any point along the backbone will result in total network failure.
  • 24. Star Topology  The most commonly used topology  It consist of one centralized device which can be either a switch or a hub.  The devices connect to the various ports on the centralized devices. HUB/Switch
  • 25. Advantages  Easy to setup.  Easy to add/remove parts Disadvantages  One hub crashing downs entire network.  Uses lots of cable
  • 26. Tree Topology  A tree topology combines the characteristics of linear bus and star topology.  It consist of groups of star configured workstations connected to a linear bus backbone cable.
  • 27. Advantages  Expansion of Network is possible and easy.  We divide the whole network into segments (star networks), which can be easily managed and maintained.  Each segment is provided with dedicated point-to-point wiring to the central hub.  If one segment is damaged, other segments are not affected. Disadvantages  Because of its basic structure, tree topology, relies heavily on the main bus cable, if it breaks whole network is crippled.  More difficult to configure.
  • 28. Ring Topology  In ring topology each computer or device is connected to its neighbor forming a loop.
  • 29. Advantages  Each computer has equal access to resources.  There is no need for network server to control the connectivity between workstations. Disadvantages  Failure of a single device or a break anywhere in the cable causes the full network to stop communicating.  Each packet of data must pass through all the computers between source and destination. This makes it slower than Star topology.  If one workstation or port goes down, the entire network gets affected.
  • 30. Mesh Topology  In mesh topology each device is directly connected to all other devices.  In fact a true mesh topology is the one where every node is connected to every other node in the network. This type of topology is very expensive as there are many redundant connections
  • 31. Advantages  Data can be transmitted from different devices simultaneously. This topology can withstand high traffic.  Even if one of the components fails there is always an alternative present. So data transfer doesn’t get affected.  Expansion and modification in topology can be done without disrupting other nodes. Disadvantages  There are high chances of redundancy in many of the network connections.  Overall cost of this network is way too high as compared to other network topologies.  Set-up and maintenance of this topology is very difficult. Even administration of the network is tough.
  • 32. Network Media  Links that connect nodes.  Communication channel through which data travels on a network.  Choice impacts  Speed  Security  Size
  • 33. Wire Based Media (guided)  Twisted-pair cable  Most common LAN cable  Four pairs of copper cable twisted  May be shielded from interference  Speeds range from 1 Mbps to 1,000 Mbps
  • 34. Wire Based Media (guided)  Coaxial cable  Similar to cable TV wire  One wire runs through cable  Shielded from interference  Speeds up to 10 Mbps
  • 35. Wire Based Media (guided)  Fiber-optic cable  Data is transmitted with light pulses  Glass strand instead of cable  Immune to interference  Very secure  Hard to work with  Speeds up to 100 Gbps
  • 36. Wireless Media (unguided)  Data transmitted through the air  LANs use radio waves  WANs use microwave signals  Easy to setup  Difficult to secure
  • 37. Networking Devices  Networking devices include all the equipment needed to perform data-processing and communications within the network.  Network Interface Card  Repeaters  Concentrator/Hubs  Bridges  Switches  Routers
  • 38. Network Interface Card  A NIC, typically an expansion card in a computer, is used to connect a system to physical network media.  Nowadays, computers are equipped with a built-in NIC.  NICs are available for different types of network media, the most common today being Ethernet NICs with a RJ-45 Socket for twisted pair cabling and wireless network adapters with antenna.
  • 42. Repeater  Repeaters clean, amplify, and resend signals that are weakened by long cable length.  Can be separate or built-in to hubs or switches  Most economic way of expanding a network.  The number of repeaters must be limited.  Repeaters cannot connect different network architecture.  Repeater do not reduce network traffic.  Half –Duplex Communication.
  • 43. Hub/Concentrators  Hubs regenerate and retime network signals.  They are really multi-port repeaters.  Hubs propagate signals through the network  They cannot filter network traffic  They cannot determine best path  Uplink port – crossover mode or straight through mode
  • 46. Bridges  Bridges are more intelligent than hubs.  They increase network performance by segmenting networks in separate collision domains.  They maintains a table with MAC Addresses of all attached nodes and on which segment they are located.  Filter traffic by looking at the MAC address.  Used for connecting two different topology (Segment).  If the frame is addressed to a MAC address on the local side of the bridge, it is not forwarded to the other segment  Bridges maintain a MAC address table for both segments they are connected to
  • 47. Switches  It is an Intelligent device.  It maintains MAC address table (hardware address).  Switches resemble bridges and can be considered as multiport bridges.  Each port of the switch has fixed bandwidth.  Supports full duplex communication.
  • 49. Functions of Switch MAC ADDRESS TABLE PORT MAC- ADDRESS 1 2 3 4 5 6 7 8 001C-C01A-0002 001C-C01A-0004 001C-C01A-0002 1 2 3 4 5 6 7 8 S D DataDataDataDataDataData Data Source MAC 001C.C01A.0002 Destination MAC 001C.C01A.0004 DATA Source MAC 001C.C01A.0002 Destination MAC 001C.C01A.0004 DATA
  • 50. MAC ADDRESS TABLE PORT MAC- ADDRESS Fa0/1 Fa0/2 001C-C01A- 0002 Fa0/3 Fa0/4 Fa0/5 Fa0/6 Fa0/7 Fa0/8 001C-C01A-0004 001C-C01A-0002 001C-C01A-0004 1 2 3 4 5 6 7 8 D S Data
  • 51. Types of Switches  Unmanaged Switch  Managed Switch  Smart Switch  Enterprise managed Switch
  • 52. Router  These are physical devices that join multiple wired and wireless networks together.  Routers select the best path to route a message, based on destination address and origin.  The router can direct traffic to prevent head-on collisions.  Routers know the addresses of computers, bridges and other routers on the network.  Routers usually uses the IP Addresses