SlideShare a Scribd company logo
NETWORKING
FUNDAMENTALS
Selected Concepts
WHAT IS A NETWORK?
 A network is simply two or more computers
that are linked together.
 The most common types of networks are:

Local Area Networks (LANS) and
 Wide Area Networks (WANS).
 The primary difference between the two is
that a LAN is generally confined to a limited
geographical area, whereas a WAN covers a
large geographical area. Most WANs are
made up of several connected LANs.
TYPES OF NETWORKS
 Local Area Network (LAN) – a network that spans a
small area such as a building or an office.
 Software applications and other resources are stored on a
file server.
 Print servers enable multiple users to share the same
printer.
 Wide Area Network (WAN) – a network that spans a
wide geographical area; there are several types of
WANS
 Metropolitan area network (MAN)
 Public access network (PAN)
 Value added network (VAN)
 Virtual private network (VPN)
TYPES OF NETWORKS
 Intranet – An intranet is a private LAN designed for
use by everyone within an organization. An intranet
might consist of an internal e-mail system, a message
board and one or more Web site portals that contain
company news, forms, and personnel information.
Access to an intranet’s web site is restricted by a
firewall.
 Extranet – a network that connects people within
your company with people who are outside your
company--all within a secure, password-protected
network that can be accessed from anywhere.
http://www.clienthelpdesk.com/dictionary
BENEFITS OF A
NETWORK
 Information sharing: Authorized users can use other
computers on the network to access and share information and data.
This could include special group projects, databases, etc.
 Hardware sharing: One device connected to a network, such
as a printer or scanner, can be shared by many users.
 Software sharing: Instead of purchasing and installing a
software program on each computer, it can be installed on the server.
All of the users can then access the program from a single location.
 Collaborative environment: Users can work together on
group projects by combining the power and capabilities of diverse
equipment.
Ambrose, Bergerud, Busche, Morrison, and Wells-Pusins: IC3 BASICS, Thomson Course Technology, 2003
RISKS OF NETWORK
COMPUTING
 The security of a computer network is
challenged everyday by:
 Equipment malfunctions
 System failures
 Note: equipment malfunctions and system failures may
be caused by natural disasters such as floods, storms, or
fires, and electrical disturbances
 Computer hackers
 Virus attacks
Ambrose, Bergerud, Busche, Morrison, and Wells-Pusins: IC3 BASICS, Thomson Course Technology, 2003
COMMUNICATIONS
MEDIA
 Communications Channel
 To transfer data from one computer to another
requires some type of link through which the data
can be transmitted. This link is known as the
communications channel.
 To send data through the channel requires some
type of transmission media, which may be either
physical or wireless.
PHYSICAL MEDIA
 Twisted-pair cable – consists of two independently
insulated wires twisted around each other (least
expensive type of cable—the kind that is used in many telephone
systems)
 Coaxial cable – consists of an insulated center wire
grounded by a shield of braided wire (the primary type of
cabling used by the cable television industry; it is more expensive than
twisted pair)
 Fiber-optic cable – contains hundreds of clear
fiberglass or plastic fibers (threads) (made from thin, flexible
glass tubing; bandwidth is greater, so it can carry more data; it is lighter
than metal wires and is less susceptible to interference; it is fragile and
expensive)
 ISDN line – a special digital telephone line that
transmits and receives information at very high
speeds
Fuller, Floyd, Computers: Understanding Technology: EMC Paradigm, 2003.
WIRELESS MEDIA
 Microwave system – transmits data via high-
frequency radio signals through the atmosphere
 Satellite system – receive transmitted signals, amplify
them, and then transmit the signals to the appropriate
locations
 Cellular technology – uses antennae resembling
telephone towers to pick up radio signals within a
specific area (cell)
 Infrared technology – transmits data as infrared light
waves from one device to another, providing wireless
links between PCs and peripherals
Note: The type selected is determined by the type of
network, the size of the network, and the cost.
Fuller, Floyd, Computers: Understanding Technology: EMC Paradigm, 2003.
HOW ARE NETWORKS
CATEGORIZED?
 Networks are usually classified using
three properties:
Topology
Protocol
Architecture
NETWORK
TOPOLOGIES
 Network Topology (or layout) – refers to the way
computers and peripherals are configured to form
networks
 Bus topology – all computers are linked by a single
line of cable
 Star topology – multiple computers and peripheral
devices are linked to a central computer, called a
host
 Ring topology – each computer or workstation is
connected to two other computers, with the entire
network forming a circle
 Hybrid topology – combine network layout
types to meet their needs
NETWORK/COMMUNICATION
PROTOCOLS
 A protocol is simply an agreed-on set of
rules and procedures for transmitting data
between two or more devices.
 Features determined by the protocol are:
 How the sending device indicates it has finished
sending the message.
 How the receiving device indicates it has received
the message.
 The type of error checking to be used.
Ambrose, Bergerud, Busche, Morrison, and Wells-Pusins: IC3 BASICS, Thomson Course Technology, 2003
NETWORK/COMMUNICATIONS
PROTOCOLS
 Most networks use Ethernet, but some
network may use IBM’s Token Ring
protocol.
 On the Internet, the major protocol is
TCP/IP (an acronym for Transmission
Control Protocol/Internet Protocol).
Networks for Beginners: http://compnetworking.about.com/
EXAMPLE OF AN ETHERNET
BUS
 Ethernet LANs use a bus
topology.
 All stations are connected to
a single long cable.
 Any station can send a
signal along the cable, which
all other stations will receive.
Unlike ring topologies, the
cable doesn't close a loop.
Networks for Beginners: http://compnetworking.about.com/
TOKEN RING NETWORK
 A token passing ring LAN is a
group of computers connected in
a loop. The group uses a token
passing access mechanism.
 A computer wishing to send data
should first receive permission.
When it gets control of the
network it may transmit a frame.
Each frame transmitted on the
ring is transmitted from one
computer to the next, until it
ultimately returns to the initiator of
the transmission.
Networks for Beginners: http://compnetworking.about.com/
INTERNET PROTOCOLS
Networks for Beginners: http://compnetworking.about.com/
NETWORKING HARDWARE
AND SOFTWARE
 Hub – electronic device (with a number of ports) used
in a LAN to link groups of computers
 Repeaters (also called amplifiers) – electronic devices
that receive signals and amplify and send them along
the network
 Routers - electronic devices used to ensure
messages are sent to their intended destinations
 Gateway – consists of hardware and/or software that
allows communications between dissimilar networks
 Bridge – consists of hardware and/or software
that allows communication between two
similar networks
HUBS
The original Ethernet LANs relied on certain physical
characteristics of the cable carrying the network data
(usually coaxial cable). New Ethernet technologies
introduced new cable types that we unable to fulfill the
original physical requirements. New devices - hubs -
were introduced to simulate those characteristics.
Simply put, the hub's major function is to replicate data it
receives from one device attached to it to all others.
Networks for Beginners: http://compnetworking.about.com/
REPEATERS
An illustration of a repeater at work
The electrical signal entering the repeater at one end is weakened.
The repeater amplifies the electrical signals and resends the data.
A common problem in the networking world is that of weakening
electrical signals. Electrical signals traveling through wires (such as
copper wires used in most networks), weaken due to the wire's
electrical resistance. This effect limits the lengths of the cable that can
be used. A repeater will overcome this limit, when there is a need to
connect two computers at a larger distance.
A repeater is connected to two cable segments. Any electrical signal
reaching the repeater from one segment, will be amplified and
retransmitted to the other segment.
Networks for Beginners: http://compnetworking.about.com/
ROUTERS
 Routers connect two or more networks and forward data
packets between them. When data arrives from one of
the segments, the router decides, according to it's routing
table, to which segment to forward that data.
Networks for Beginners: http://compnetworking.about.com/
GATEWAY
 "Gateway" is a term that was once used to refer to a routing device.
Today, in the TCP/IP world, the term "router" is used to describe such a
device.
The term gateway now refers to special-purpose devices, that perform
protocol conversions. Gateways implement application layer
conversions of information received from various protocols.
 Examples of gateways found on today's markets are:
 VocalTec Gateway: A gateway that converts human speech traveling on
analog phone lines into local area network protocol data, and visa-versa.
 RadVision Gateway: Converts video from digital phone lines into local area
network protocol data, and visa-versa.
Networks for Beginners: http://compnetworking.about.com/
MODEMS
An illustration of data sent using a modem and a regular
telephone line.
A modem is a device that converts digital data originating from a
terminal or computer, to analog signals used by voice
communication networks such as the telephone system. At one
end, modems convert the digital pulses to audible tones and
convert audio tones back to digital pulses at the other.
The word "Modem" stands for "MOdulator-DEModulator".
Networks for Beginners: http://compnetworking.about.com/
MODEMS
 Transmission speed
Modems are available in different transmission speeds, which
are measured in BPS (bits per second) also called BAUD rate.
Standard modems speeds: 9600 baud, 14400 baud, 28800
baud, 33600 baud, 56800 baud.
 Internal/External
Internal modems are electronic cards. An internal modem is
installed in one of the computer's expansion slot.
External modems are fully functioning external devices. The
external modem is connected to a computer using a serial
cable to one of the computer's serial ports, and draws power
from an external power source.
Networks for Beginners: http://compnetworking.about.com/
EXAMPLE OF
FIREWALL
 Firewalls are systems that establish access control policies
among networks. They can block information from entering
a network or from getting out of that network, they can
permit different users to perform different kinds of
operations, according to the user's authorizations.
Networks for Beginners: http://compnetworking.about.com/
NETWORK
ARCHITECTURE
 Network architecture – refers to the way a
network is designed and built. The two major
types are:
 Peer-to-peer architecture – Computers connect
with each other in a workgroup to share files,
printers, and Internet access. This is used to
connect a small number of computers.
 Client/server architecture – sends information from
a client computer to a server, which then relays the
information back to the client computer, or to other
computers on the network
Networks for Beginners: http://compnetworking.about.com/
COMMUNICATION
PROTOCOLS
 File transfer protocol (FTP) – used to transmit files.
 Simple mail transfer protocol (SMTP) – used to
transmit e-mail messages.
 Post office protocol (POP) – allows the recipient to
retrieve messages.
 Wireless application protocol – enables wireless
devices to access and use the Internet using a
client/server network.
 802.11 – protocol for wireless LAN technology
DATA TRANSMISSION
CHARACTERISTICS
 Bandwidth (rate of transmission)
 Analog or Digital (type of signal)
 Analog transmission – takes the form of
continuous waves transmitted over a medium at a
certain frequency rage
 Digital transmission – sends data in the form of bits
 Serial or Parallel (order of bits)
 Serial transmission – all of the data bits are
transmitted one bit after another in a continuous
line
 Parallel transmission – data bits are sent at the
same time along multiple paths
COMMUNICATIONS
SOFTWARE
 E-Mail Software – used to send and receive
electronic messages using the Internet
 Web Browser – allows users to access and
view Web pages
 Groupware – allows groups of people on a
network to share information and to
collaborate on various projects

More Related Content

What's hot

Decission support system in MIS (assignment)
Decission support system in MIS (assignment)Decission support system in MIS (assignment)
Decission support system in MIS (assignment)
Yamini Kahaliya
 
Executive support system (ess)
Executive support system (ess)Executive support system (ess)
Executive support system (ess)Saumya Singh
 
Management Information System (Full Notes)
Management Information System (Full Notes)Management Information System (Full Notes)
Management Information System (Full Notes)
Harish Chand
 
MIS 17 Cross-Functional Enterprise Systems
MIS 17 Cross-Functional Enterprise SystemsMIS 17 Cross-Functional Enterprise Systems
MIS 17 Cross-Functional Enterprise Systems
Tushar B Kute
 
MANAGEMENT INFORMATION SYSTEM ppt
MANAGEMENT INFORMATION SYSTEM pptMANAGEMENT INFORMATION SYSTEM ppt
MANAGEMENT INFORMATION SYSTEM ppt
Suyash Sinha
 
Decision Support Systems: Concept, Constructing a DSS, Executive Information ...
Decision Support Systems: Concept, Constructing a DSS, Executive Information ...Decision Support Systems: Concept, Constructing a DSS, Executive Information ...
Decision Support Systems: Concept, Constructing a DSS, Executive Information ...
Ashish Hande
 
Building Service Oriented Architecture based applications
Building Service Oriented Architecture based applicationsBuilding Service Oriented Architecture based applications
Building Service Oriented Architecture based applications
Ramco Institute of Technology, Rajapalayam, Tamilnadu, India
 
Concept of information system & networking..
Concept of information system & networking..Concept of information system & networking..
Concept of information system & networking..
Deekshit Geddam
 
Decision Support System
Decision Support SystemDecision Support System
Decision Support Systemparamalways
 
200981104 management-information-system-case-study
200981104 management-information-system-case-study200981104 management-information-system-case-study
200981104 management-information-system-case-study
homeworkping4
 
Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information system
Online
 
Different Types of Information Systems Alexis Chua SYANDES K31
Different Types of  Information Systems  Alexis Chua SYANDES K31Different Types of  Information Systems  Alexis Chua SYANDES K31
Different Types of Information Systems Alexis Chua SYANDES K31
Alexis Chua
 
M365 admin center overview - November 2018
M365 admin center overview - November 2018M365 admin center overview - November 2018
M365 admin center overview - November 2018
Matthew Ruderman
 
Commercial & Open Source Software
Commercial & Open Source SoftwareCommercial & Open Source Software
Commercial & Open Source Software
Erick Watson
 
operating support system
operating support systemoperating support system
operating support system
Aqsa Nawab
 
Management Information System
Management Information SystemManagement Information System
Management Information System
Rahul Rajan
 
3 the system analyst
3 the system analyst3 the system analyst
3 the system analyst
ricardovigan
 
Network Engineer - Resume
Network Engineer - ResumeNetwork Engineer - Resume
Network Engineer - ResumeAssan Samba
 
Big Data: Technical Introduction to BigSheets for InfoSphere BigInsights
Big Data:  Technical Introduction to BigSheets for InfoSphere BigInsightsBig Data:  Technical Introduction to BigSheets for InfoSphere BigInsights
Big Data: Technical Introduction to BigSheets for InfoSphere BigInsights
Cynthia Saracco
 

What's hot (20)

Decission support system in MIS (assignment)
Decission support system in MIS (assignment)Decission support system in MIS (assignment)
Decission support system in MIS (assignment)
 
Executive support system (ess)
Executive support system (ess)Executive support system (ess)
Executive support system (ess)
 
Management Information System (Full Notes)
Management Information System (Full Notes)Management Information System (Full Notes)
Management Information System (Full Notes)
 
MIS 17 Cross-Functional Enterprise Systems
MIS 17 Cross-Functional Enterprise SystemsMIS 17 Cross-Functional Enterprise Systems
MIS 17 Cross-Functional Enterprise Systems
 
MANAGEMENT INFORMATION SYSTEM ppt
MANAGEMENT INFORMATION SYSTEM pptMANAGEMENT INFORMATION SYSTEM ppt
MANAGEMENT INFORMATION SYSTEM ppt
 
Decision Support Systems: Concept, Constructing a DSS, Executive Information ...
Decision Support Systems: Concept, Constructing a DSS, Executive Information ...Decision Support Systems: Concept, Constructing a DSS, Executive Information ...
Decision Support Systems: Concept, Constructing a DSS, Executive Information ...
 
Building Service Oriented Architecture based applications
Building Service Oriented Architecture based applicationsBuilding Service Oriented Architecture based applications
Building Service Oriented Architecture based applications
 
Concept of information system & networking..
Concept of information system & networking..Concept of information system & networking..
Concept of information system & networking..
 
Decision Support System
Decision Support SystemDecision Support System
Decision Support System
 
200981104 management-information-system-case-study
200981104 management-information-system-case-study200981104 management-information-system-case-study
200981104 management-information-system-case-study
 
Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information system
 
Different Types of Information Systems Alexis Chua SYANDES K31
Different Types of  Information Systems  Alexis Chua SYANDES K31Different Types of  Information Systems  Alexis Chua SYANDES K31
Different Types of Information Systems Alexis Chua SYANDES K31
 
M365 admin center overview - November 2018
M365 admin center overview - November 2018M365 admin center overview - November 2018
M365 admin center overview - November 2018
 
Commercial & Open Source Software
Commercial & Open Source SoftwareCommercial & Open Source Software
Commercial & Open Source Software
 
operating support system
operating support systemoperating support system
operating support system
 
Chapter2
Chapter2Chapter2
Chapter2
 
Management Information System
Management Information SystemManagement Information System
Management Information System
 
3 the system analyst
3 the system analyst3 the system analyst
3 the system analyst
 
Network Engineer - Resume
Network Engineer - ResumeNetwork Engineer - Resume
Network Engineer - Resume
 
Big Data: Technical Introduction to BigSheets for InfoSphere BigInsights
Big Data:  Technical Introduction to BigSheets for InfoSphere BigInsightsBig Data:  Technical Introduction to BigSheets for InfoSphere BigInsights
Big Data: Technical Introduction to BigSheets for InfoSphere BigInsights
 

Viewers also liked

Психология на социалните медии. Типове личности и тяхното дигитално наследство
Психология на социалните медии. Типове личности и тяхното дигитално наследствоПсихология на социалните медии. Типове личности и тяхното дигитално наследство
Психология на социалните медии. Типове личности и тяхното дигитално наследство
Violeta Georgieva
 
За "традигиталността" в педагогическият "ню ейдж"
За "традигиталността" в педагогическият "ню ейдж"За "традигиталността" в педагогическият "ню ейдж"
За "традигиталността" в педагогическият "ню ейдж"
Violeta Georgieva
 
Социални медии - същност
Социални медии - същностСоциални медии - същност
Социални медии - същност
Violeta Georgieva
 
Традигиталните хора
Традигиталните хораТрадигиталните хора
Традигиталните хора
Violeta Georgieva
 
c-programming
c-programmingc-programming
c-programming
Zulhazmi Harith
 
Satellite system links
Satellite system linksSatellite system links
Satellite system links
Zulhazmi Harith
 

Viewers also liked (6)

Психология на социалните медии. Типове личности и тяхното дигитално наследство
Психология на социалните медии. Типове личности и тяхното дигитално наследствоПсихология на социалните медии. Типове личности и тяхното дигитално наследство
Психология на социалните медии. Типове личности и тяхното дигитално наследство
 
За "традигиталността" в педагогическият "ню ейдж"
За "традигиталността" в педагогическият "ню ейдж"За "традигиталността" в педагогическият "ню ейдж"
За "традигиталността" в педагогическият "ню ейдж"
 
Социални медии - същност
Социални медии - същностСоциални медии - същност
Социални медии - същност
 
Традигиталните хора
Традигиталните хораТрадигиталните хора
Традигиталните хора
 
c-programming
c-programmingc-programming
c-programming
 
Satellite system links
Satellite system linksSatellite system links
Satellite system links
 

Similar to Networking fundamentals (1)

Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking Fundamentals
DURYODHAN MAHAPATRA
 
Networking fundamentals
Networking fundamentalsNetworking fundamentals
Networking fundamentalsjpprakash
 
Networking fundamentals
Networking fundamentalsNetworking fundamentals
Networking fundamentalsBesar Limani
 
Computer Networking
Computer Networking Computer Networking
Computer Networking
Víñodh Alwal
 
It infrastructure
It infrastructureIt infrastructure
It infrastructure
raptrovic
 
Networking Fundamentals
Networking  FundamentalsNetworking  Fundamentals
Networking Fundamentals
Manjit Chavda
 
Networking fundamentalsss
Networking fundamentalsssNetworking fundamentalsss
Networking fundamentalsss
shahinaz Altabbakh
 
Network ppt
Network pptNetwork ppt
Network ppt
hlalu861
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
Priya Manik
 
Computer Networks1
Computer Networks1Computer Networks1
Computer Networks1arjun0222
 
(computer Networks it) by gulshan k maheshwari qau
(computer Networks it) by gulshan k maheshwari qau(computer Networks it) by gulshan k maheshwari qau
(computer Networks it) by gulshan k maheshwari qau
GulshanKumar368
 
Networking And Telecommunications
Networking And TelecommunicationsNetworking And Telecommunications
Networking And TelecommunicationsUMaine
 
Networking concepts
Networking conceptsNetworking concepts
Networking conceptsritajindal2
 
Networking concepts
Networking conceptsNetworking concepts
Networking concepts
seemadav1
 
What is networking
What is networkingWhat is networking
What is networkingbabyparul
 
E business 2014 l06
E business 2014 l06E business 2014 l06
E business 2014 l06kchanaka3
 
Networkingconcepts
NetworkingconceptsNetworkingconcepts
Networkingconcepts
vasanthimuniasamy
 
Computer network theory
Computer network theoryComputer network theory
Computer network theory
sheikhparvez4
 
7312334 chapter-7 a-networking-basics
7312334 chapter-7 a-networking-basics7312334 chapter-7 a-networking-basics
7312334 chapter-7 a-networking-basics
fasywan
 

Similar to Networking fundamentals (1) (20)

Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking Fundamentals
 
Networking fundamentals
Networking fundamentalsNetworking fundamentals
Networking fundamentals
 
Networking fundamentals
Networking fundamentalsNetworking fundamentals
Networking fundamentals
 
Computer Networking
Computer Networking Computer Networking
Computer Networking
 
It infrastructure
It infrastructureIt infrastructure
It infrastructure
 
Networking Fundamentals
Networking  FundamentalsNetworking  Fundamentals
Networking Fundamentals
 
Networking fundamentalsss
Networking fundamentalsssNetworking fundamentalsss
Networking fundamentalsss
 
Network ppt
Network pptNetwork ppt
Network ppt
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
 
Computer Networks1
Computer Networks1Computer Networks1
Computer Networks1
 
(computer Networks it) by gulshan k maheshwari qau
(computer Networks it) by gulshan k maheshwari qau(computer Networks it) by gulshan k maheshwari qau
(computer Networks it) by gulshan k maheshwari qau
 
Networking And Telecommunications
Networking And TelecommunicationsNetworking And Telecommunications
Networking And Telecommunications
 
Networking concepts
Networking conceptsNetworking concepts
Networking concepts
 
Networking concepts
Networking conceptsNetworking concepts
Networking concepts
 
What is networking
What is networkingWhat is networking
What is networking
 
E business 2014 l06
E business 2014 l06E business 2014 l06
E business 2014 l06
 
Networkingconcepts
NetworkingconceptsNetworkingconcepts
Networkingconcepts
 
Computer network theory
Computer network theoryComputer network theory
Computer network theory
 
7312334 chapter-7 a-networking-basics
7312334 chapter-7 a-networking-basics7312334 chapter-7 a-networking-basics
7312334 chapter-7 a-networking-basics
 
Week seven
Week sevenWeek seven
Week seven
 

Recently uploaded

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 

Recently uploaded (20)

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 

Networking fundamentals (1)

  • 2. WHAT IS A NETWORK?  A network is simply two or more computers that are linked together.  The most common types of networks are:  Local Area Networks (LANS) and  Wide Area Networks (WANS).  The primary difference between the two is that a LAN is generally confined to a limited geographical area, whereas a WAN covers a large geographical area. Most WANs are made up of several connected LANs.
  • 3. TYPES OF NETWORKS  Local Area Network (LAN) – a network that spans a small area such as a building or an office.  Software applications and other resources are stored on a file server.  Print servers enable multiple users to share the same printer.  Wide Area Network (WAN) – a network that spans a wide geographical area; there are several types of WANS  Metropolitan area network (MAN)  Public access network (PAN)  Value added network (VAN)  Virtual private network (VPN)
  • 4. TYPES OF NETWORKS  Intranet – An intranet is a private LAN designed for use by everyone within an organization. An intranet might consist of an internal e-mail system, a message board and one or more Web site portals that contain company news, forms, and personnel information. Access to an intranet’s web site is restricted by a firewall.  Extranet – a network that connects people within your company with people who are outside your company--all within a secure, password-protected network that can be accessed from anywhere. http://www.clienthelpdesk.com/dictionary
  • 5. BENEFITS OF A NETWORK  Information sharing: Authorized users can use other computers on the network to access and share information and data. This could include special group projects, databases, etc.  Hardware sharing: One device connected to a network, such as a printer or scanner, can be shared by many users.  Software sharing: Instead of purchasing and installing a software program on each computer, it can be installed on the server. All of the users can then access the program from a single location.  Collaborative environment: Users can work together on group projects by combining the power and capabilities of diverse equipment. Ambrose, Bergerud, Busche, Morrison, and Wells-Pusins: IC3 BASICS, Thomson Course Technology, 2003
  • 6. RISKS OF NETWORK COMPUTING  The security of a computer network is challenged everyday by:  Equipment malfunctions  System failures  Note: equipment malfunctions and system failures may be caused by natural disasters such as floods, storms, or fires, and electrical disturbances  Computer hackers  Virus attacks Ambrose, Bergerud, Busche, Morrison, and Wells-Pusins: IC3 BASICS, Thomson Course Technology, 2003
  • 7. COMMUNICATIONS MEDIA  Communications Channel  To transfer data from one computer to another requires some type of link through which the data can be transmitted. This link is known as the communications channel.  To send data through the channel requires some type of transmission media, which may be either physical or wireless.
  • 8. PHYSICAL MEDIA  Twisted-pair cable – consists of two independently insulated wires twisted around each other (least expensive type of cable—the kind that is used in many telephone systems)  Coaxial cable – consists of an insulated center wire grounded by a shield of braided wire (the primary type of cabling used by the cable television industry; it is more expensive than twisted pair)  Fiber-optic cable – contains hundreds of clear fiberglass or plastic fibers (threads) (made from thin, flexible glass tubing; bandwidth is greater, so it can carry more data; it is lighter than metal wires and is less susceptible to interference; it is fragile and expensive)  ISDN line – a special digital telephone line that transmits and receives information at very high speeds Fuller, Floyd, Computers: Understanding Technology: EMC Paradigm, 2003.
  • 9. WIRELESS MEDIA  Microwave system – transmits data via high- frequency radio signals through the atmosphere  Satellite system – receive transmitted signals, amplify them, and then transmit the signals to the appropriate locations  Cellular technology – uses antennae resembling telephone towers to pick up radio signals within a specific area (cell)  Infrared technology – transmits data as infrared light waves from one device to another, providing wireless links between PCs and peripherals Note: The type selected is determined by the type of network, the size of the network, and the cost. Fuller, Floyd, Computers: Understanding Technology: EMC Paradigm, 2003.
  • 10. HOW ARE NETWORKS CATEGORIZED?  Networks are usually classified using three properties: Topology Protocol Architecture
  • 11. NETWORK TOPOLOGIES  Network Topology (or layout) – refers to the way computers and peripherals are configured to form networks  Bus topology – all computers are linked by a single line of cable  Star topology – multiple computers and peripheral devices are linked to a central computer, called a host  Ring topology – each computer or workstation is connected to two other computers, with the entire network forming a circle  Hybrid topology – combine network layout types to meet their needs
  • 12. NETWORK/COMMUNICATION PROTOCOLS  A protocol is simply an agreed-on set of rules and procedures for transmitting data between two or more devices.  Features determined by the protocol are:  How the sending device indicates it has finished sending the message.  How the receiving device indicates it has received the message.  The type of error checking to be used. Ambrose, Bergerud, Busche, Morrison, and Wells-Pusins: IC3 BASICS, Thomson Course Technology, 2003
  • 13. NETWORK/COMMUNICATIONS PROTOCOLS  Most networks use Ethernet, but some network may use IBM’s Token Ring protocol.  On the Internet, the major protocol is TCP/IP (an acronym for Transmission Control Protocol/Internet Protocol). Networks for Beginners: http://compnetworking.about.com/
  • 14. EXAMPLE OF AN ETHERNET BUS  Ethernet LANs use a bus topology.  All stations are connected to a single long cable.  Any station can send a signal along the cable, which all other stations will receive. Unlike ring topologies, the cable doesn't close a loop. Networks for Beginners: http://compnetworking.about.com/
  • 15. TOKEN RING NETWORK  A token passing ring LAN is a group of computers connected in a loop. The group uses a token passing access mechanism.  A computer wishing to send data should first receive permission. When it gets control of the network it may transmit a frame. Each frame transmitted on the ring is transmitted from one computer to the next, until it ultimately returns to the initiator of the transmission. Networks for Beginners: http://compnetworking.about.com/
  • 16. INTERNET PROTOCOLS Networks for Beginners: http://compnetworking.about.com/
  • 17. NETWORKING HARDWARE AND SOFTWARE  Hub – electronic device (with a number of ports) used in a LAN to link groups of computers  Repeaters (also called amplifiers) – electronic devices that receive signals and amplify and send them along the network  Routers - electronic devices used to ensure messages are sent to their intended destinations  Gateway – consists of hardware and/or software that allows communications between dissimilar networks  Bridge – consists of hardware and/or software that allows communication between two similar networks
  • 18. HUBS The original Ethernet LANs relied on certain physical characteristics of the cable carrying the network data (usually coaxial cable). New Ethernet technologies introduced new cable types that we unable to fulfill the original physical requirements. New devices - hubs - were introduced to simulate those characteristics. Simply put, the hub's major function is to replicate data it receives from one device attached to it to all others. Networks for Beginners: http://compnetworking.about.com/
  • 19. REPEATERS An illustration of a repeater at work The electrical signal entering the repeater at one end is weakened. The repeater amplifies the electrical signals and resends the data. A common problem in the networking world is that of weakening electrical signals. Electrical signals traveling through wires (such as copper wires used in most networks), weaken due to the wire's electrical resistance. This effect limits the lengths of the cable that can be used. A repeater will overcome this limit, when there is a need to connect two computers at a larger distance. A repeater is connected to two cable segments. Any electrical signal reaching the repeater from one segment, will be amplified and retransmitted to the other segment. Networks for Beginners: http://compnetworking.about.com/
  • 20. ROUTERS  Routers connect two or more networks and forward data packets between them. When data arrives from one of the segments, the router decides, according to it's routing table, to which segment to forward that data. Networks for Beginners: http://compnetworking.about.com/
  • 21. GATEWAY  "Gateway" is a term that was once used to refer to a routing device. Today, in the TCP/IP world, the term "router" is used to describe such a device. The term gateway now refers to special-purpose devices, that perform protocol conversions. Gateways implement application layer conversions of information received from various protocols.  Examples of gateways found on today's markets are:  VocalTec Gateway: A gateway that converts human speech traveling on analog phone lines into local area network protocol data, and visa-versa.  RadVision Gateway: Converts video from digital phone lines into local area network protocol data, and visa-versa. Networks for Beginners: http://compnetworking.about.com/
  • 22. MODEMS An illustration of data sent using a modem and a regular telephone line. A modem is a device that converts digital data originating from a terminal or computer, to analog signals used by voice communication networks such as the telephone system. At one end, modems convert the digital pulses to audible tones and convert audio tones back to digital pulses at the other. The word "Modem" stands for "MOdulator-DEModulator". Networks for Beginners: http://compnetworking.about.com/
  • 23. MODEMS  Transmission speed Modems are available in different transmission speeds, which are measured in BPS (bits per second) also called BAUD rate. Standard modems speeds: 9600 baud, 14400 baud, 28800 baud, 33600 baud, 56800 baud.  Internal/External Internal modems are electronic cards. An internal modem is installed in one of the computer's expansion slot. External modems are fully functioning external devices. The external modem is connected to a computer using a serial cable to one of the computer's serial ports, and draws power from an external power source. Networks for Beginners: http://compnetworking.about.com/
  • 24. EXAMPLE OF FIREWALL  Firewalls are systems that establish access control policies among networks. They can block information from entering a network or from getting out of that network, they can permit different users to perform different kinds of operations, according to the user's authorizations. Networks for Beginners: http://compnetworking.about.com/
  • 25. NETWORK ARCHITECTURE  Network architecture – refers to the way a network is designed and built. The two major types are:  Peer-to-peer architecture – Computers connect with each other in a workgroup to share files, printers, and Internet access. This is used to connect a small number of computers.  Client/server architecture – sends information from a client computer to a server, which then relays the information back to the client computer, or to other computers on the network Networks for Beginners: http://compnetworking.about.com/
  • 26. COMMUNICATION PROTOCOLS  File transfer protocol (FTP) – used to transmit files.  Simple mail transfer protocol (SMTP) – used to transmit e-mail messages.  Post office protocol (POP) – allows the recipient to retrieve messages.  Wireless application protocol – enables wireless devices to access and use the Internet using a client/server network.  802.11 – protocol for wireless LAN technology
  • 27. DATA TRANSMISSION CHARACTERISTICS  Bandwidth (rate of transmission)  Analog or Digital (type of signal)  Analog transmission – takes the form of continuous waves transmitted over a medium at a certain frequency rage  Digital transmission – sends data in the form of bits  Serial or Parallel (order of bits)  Serial transmission – all of the data bits are transmitted one bit after another in a continuous line  Parallel transmission – data bits are sent at the same time along multiple paths
  • 28. COMMUNICATIONS SOFTWARE  E-Mail Software – used to send and receive electronic messages using the Internet  Web Browser – allows users to access and view Web pages  Groupware – allows groups of people on a network to share information and to collaborate on various projects