This document discusses network protocols, structure, and scope. It defines what a network protocol is and describes some common protocols like Ethernet, Token Ring, FDDI, and ATM. It also discusses different types of network structures including peer-to-peer and client-server models, and various network topologies like bus, star, ring, and mesh. Finally, it covers the scope of different network types including local area networks (LANs), personal area networks (PANs), home area networks (HANs), wide area networks (WANs), campus networks, metropolitan area networks (MANs), virtual private networks (VPNs), backbone networks, and global area networks (GANs).
Introduction, Virtual and Datagram networks, study of router, IP protocol and addressing in the Internet, Routing algorithms, Broadcast and Multicast routing
Introduction, Virtual and Datagram networks, study of router, IP protocol and addressing in the Internet, Routing algorithms, Broadcast and Multicast routing
group of computers connected with each other to share information or resources. A network can be small or a large. it can be created in a building or spread all over the world. Networks are main source of communication all over the world. The most common resource shared today is connection to the Internet.
computer network is a group of interconnected computers that share information and resources. The most common resource shared today is connection to the Internet. Other shared resources can include a printer or a file server. The Internet itself can be considered a computer network. Two basic network types are local-area networks (LANs) and wide-area networks (WANs). LANs connect computers and peripheral devices in a limited physical area, such as a business office, laboratory, or college campus, by means of links (wires, Ethernet cables, fibre optics, Wi-Fi) that transmit data rapidly.
For beginners in Computer Networking field, know about basics about what is Computer Networks, what are ways through which we can communicate, what is meant by protocols, he famous OSI its layers and TCP/IP and its layers, What makes a Networking Device, basic topologies of Computer Networks, special purpose network devices like Switch, routers, repeter, bridges and hub, and basics of networking methods, basics of ethernet, TCP its characteristics, UDP, TCP vs UDP, One would wonder what happens when information particular to each layer is read by the corresponding protocols at target machine or why is it required?
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
3. What is network protocol ?
• Network Protocol is a set of rules that governs the communications
between computers on a network.
• The computer network consists of many different protocols for helping it
carrying data packets.
• These protocols are designed to work on different level of network layers.
The functionality of these layers are different depending on the network
model.
• There are two types of network models:
• OSI model
• TCP/IP model
4. Some of the basic network protocols
1. Ethernet
2. Token Ring
3. FDDI
4. ATM
5. 1.Ethernet
• The Ethernet protocol is by far the most widely used.
• Ethernet uses an access method called CSMA/CD (Carrier Sense
Multiple Access/Collision Detection). This is a system where each
computer listens to the cable before sending anything through the
network.
• If the network is clear, the computer will transmit. If some other node
is already transmitting on the cable, the computer will wait and try
again when the line is clear.
• Sometimes, two computers attempt to transmit at the same instant.
When this happens a collision occurs. Each computer then backs off
and waits a random amount of time before attempting to retransmit.
6. • With this access method, it is normal to have collisions.
However, the delay caused by collisions and retransmitting is
very small and does not normally effect the speed of
transmission on the network.
• The Ethernet protocol allows for linear bus, star, or tree
topologies.
• Data can be transmitted over wireless access points, twisted
pair, coaxial, or fiber optic cable at a speed of 10 Mbps up to
1000 Mbps.
1.Ethernet (Contd..)
7. 2.Token Ring
• The Token Ring protocol was developed by IBM in the mid-1980s. The
access method used involves token-passing.
• In Token Ring, the computers are connected so that the signal travels
around the network from one computer to another in a logical ring.
• A single electronic token moves around the ring from one computer
to the next.
• If a computer does not have information to transmit, it simply passes
the token on to the next workstation. If a computer wishes to
transmit and receives an empty token, it attaches data to the token.
8. • The token then proceeds around the ring until it comes to the
computer for which the data is meant. At this point, the data
is captured by the receiving computer.
• The Token Ring protocol requires a star-wired ring using
twisted pair or fiber optic cable.
• It can operate at transmission speeds of 4 Mbps or 16 Mbps.
• Due to the increasing popularity of Ethernet, the use of Token
Ring in school environments has decreased.
2.Token Ring (Contd..)
9. 3.FDDI
• Fiber Distributed Data Interface (FDDI) is a network protocol that is
used primarily to interconnect two or more local area networks, often
over large distances.
• The access method used by FDDI involves token-passing.
• FDDI uses a dual ring physical topology.
• Transmission normally occurs on one of the rings; however, if a break
occurs, the system keeps information moving by automatically using
portions of the second ring to create a new complete ring.
• A major advantage of FDDI is speed. It operates over fiber optic cable
at 100 Mbps.
10. 4.ATM
• Asynchronous Transfer Mode (ATM) is a network protocol that transmits data at
a speed of 155 Mbps and higher.
• ATM works by transmitting all data in small packets of a fixed size; whereas,
other protocols transfer variable length packets.
• ATM supports a variety of media such as video, CD-quality audio, and imaging.
• ATM employs a star topology, which can work with fiber optic as well as twisted
pair cable.
• ATM is most often used to interconnect two or more local area networks. It is
also frequently used by Internet Service Providers to utilize high-speed access to
the Internet for their clients.
• As ATM technology becomes more cost-effective, it will provide another solution
for constructing faster local area networks.
12. What is Network Structure
• a network structure is anything pertaining to a computer network
• these systems may be anything from the design of the network all the way through
implementation and use
• can be many different things to different people
• from the perspective of one of the people that designed or implemented a network, it
is a collection of wires, computers and components
• is composed mostly of cables, switches and workstations
• in larger businesses, these networks are often designed by a network architect and
implemented by network engineers
• in smaller areas or homes, the physical network is rarely complex enough to need an
actual design
13. Network Structure’s Classification
• Based on transmission media: Wired (UTP, coaxial
cables, fiber-optic cables) and Wireless
• Based on network size: LAN and WAN (and MAN)
• Based on management method: Peer-to-peer and
Client/Server
• Based on topology (connectivity): Bus, Star, Ring …
14. Based on network size
• LAN - Local Area Network
• WAN - Wide Area Network
• MAN – Metropolitan Area Network
16. Peer to Peer
• resources are shared between peers without any
central coordination by a server
• act as both suppliers and consumers of resources
• implement an abstract overlay network at the
application layer on top of the physical network
topology
• share resources inexpensively as possible
17. Peer to Peer (contd..)
• is no centralized security scheme and end users
themselves are allowed to control access to
resources, reducing the security in peer to peer
networks
• users can create any share point that they wish in
their computer and security can only be provided
by assigning a password when they create the
share point
18. Client Server
• is built on the concept of servers providing
services and a set of clients requesting those
services
• A server is actually a host that is running one or
more server programs, which share their
resources with the clients
• The client initiates the communication session
with the servers by requesting server’s content or
services
19. Client Server (contd..)
• Servers always await incoming requests from
clients
• have centralized security database, which controls
the access to shared resources on the server
• server contains a list of usernames and passwords
and a user is only allowed to access the network
only if they provide a valid username and a
password to the server
20. Client Server (contd..)
• After they login, users can only access those
resources that have been granted permission for
by the network administrator
• Widely used functions such as email
exchange, web access and database access are
built on the client–server architecture
21. Client Server vs Peer to Peer
• A client server system has a server or set of central
servers that manage all the activities in the
network and they are expensive to implement.
• A peer-to-peer network is essentially composed of
user workstations that share files and resources
but are not centrally managed by other computers
22. Client Server vs Peer to Peer
(Contd..)
• Tasks or workloads are partitioned between
servers, and services are requested by clients
• Tasks or workloads are partitioned between peers
and these peers are said to form a peer to peer
network
23. Client Server vs Peer to Peer
(Contd..)
• There are designated clients that request for services
and servers that provide services in Client-server
• Peers act as both service providers and service
consumers in P2P
• Are more stable and could be scaled as much as we
need in Client-server
• Suffer in performance as the number of nodes
increase in P2P
24. Client Server vs Peer to Peer
(Contd..)
• Servers define rights and roles for client
computers in Client-server
• All computers have same rights and roles in P2P
• A dedicated file server provides level of access to
the clients, providing better security in Client-
server
• Security is handled by the end users in P2P
25. Based on Topologies
• Bus Topologies
• Star Topologies
• Mesh Topologies
• Ring Topologies
26. Bus Topologies
• uses one cable to connect multiple computers
• cable is also called a trunk, a backbone, and a
segment
• To prevent packets from bouncing up and down
the cable, devices called terminators must be
attached to both ends of the cable
• Only one computer at a time can transmit a packet
27. Bus Topologies (Contd..)
• listen to all traffic on the network but accept only the
packets that are addressed to them
• Broadcast packets are an exception because all
computers on the network accept them
• When a computer sends out a packet, it travels in both
directions from the computer.
• number of computers on a bus topology network has a
major influence on the performance of the network
28. Bus Topologies (Contd..)
• bus is a passive topology
• The computers on a bus topology only listen or
send data
• do not take data and send it on or regenerate it
• So if one computer on the network fails, the
network is still up
30. Star Topologies
• all computers are connected through one central
hub or switch
• Computer in a star topology are all connected to a
central hub
• A star topology actually comes from the days of
the mainframe system
• The mainframe system had a centralized point
where the terminals connected
32. Mesh Topologies
• more commonly seen with something like the
national phone network
• With the mesh topology, every workstation has a
connection to every other component of the
network
• Computers in a mesh topology are all connected to
every other component of the network
34. Ring Topologies
• all computers are connected with a cable that loops
around
• the ring topology is a circle that has no start and no
end
• Terminators are not necessary in a ring topology
• Signals travel in one direction on a ring while they are
passed from one computer to the next.
• Each computer checks the packet for its destination
and passes it on as a repeater would
37. Local area network
• A local area network (LAN) is a network that connects computers
and devices in a limited geographical area such as home, school,
computer laboratory, office building, or closely positioned group
of buildings.
• Each computer or device on the network is a node.
• Current wired LANs are most likely to be based on Ethernet
technology, although new standards like ITU-T G.hn also provide
a way to create a wired LAN using existing home wires (coaxial
cables, phone lines and power lines).Typical library network, in a
branching tree topology and controlled access to resources.
• All interconnected devices must understand the network layer
(layer 3), because they are handling multiple subnets (the
different colors).
38. Local area network (Contd..)
• Those inside the library, which have only 10/100 Mbit/s Ethernet
connections to the user device and a Gigabit Ethernet connection to the
central router, could be called "layer 3 switches" because they only have
Ethernet interfaces and must understand IP.
• It would be more correct to call them access routers, where the router
at the top is a distribution router that connects to the Internet and
academic networks customer access routers.
• The defining characteristics of LANs, in contrast to WANs (Wide Area
Networks), include their higher data transfer rates, smaller geographic
range, and no need for leased telecommunication lines.
• Current Ethernet or other IEEE 802.3 LAN technologies operate at
speeds up to 10 Grit/s. This is the data transfer rate. IEEE has projects
investigating the standardization of 40 and 100 Grit/s
39. Personal area network
• A personal area network (PAN) is a computer network used for
communication among computer and different information
technological devices close to one person.
• Some examples of devices that are used in a PAN are personal
computers, printers, fax machines, telephones, PDAs, scanners,
and even video game consoles.
• A PAN may include wired and wireless devices. The reach of a
PAN typically extends to 10 meters.
• A wired PAN is usually constructed with USB and Fire wire
connections while technologies such as Bluetooth and infrared
communication typically form a wireless PAN.
40. Home area network
• A home area network (HAN) is a residential LAN which is used
for communication between digital devices typically deployed in
the home, usually a small number of personal computers and
accessories, such as printers and mobile computing devices.
• An important function is the sharing of Internet access, often a
broadband service through a CATV or Digital Subscriber Line
(DSL) provider. It can also be referred to as an office area
network (OAN).
41. Wide area network
• A wide area network (WAN) is a computer network that covers
a large geographic area such as a city, country, or spans even
intercontinental distances, using a communications channel
that combines many types of media such as telephone lines,
cables, and air waves.
• A WAN often uses transmission facilities provided by common
carriers, such as telephone companies.
• WAN technologies generally function at the lower three layers
of the OSI reference model: the physical layer, the data link
layer, and the network layer.
42. Campus network
• A campus network is a computer network made up of an
interconnection of local area networks (LAN's) within a limited
geographical area.
• The networking equipment (switches, routers) and transmission
media (optical fiber, copper plant, Cat5 cabling etc.) are almost
entirely owned (by the campus tenant / owner: an
enterprise, university, government etc.).
• In the case of a university campus-based campus network, the
network is likely to link a variety of campus buildings including;
academic departments, the university library and student
residence halls.
43. Metropolitan area network
• A Metropolitan area network is a large computer network that
usually spans a city or a large campus.
• Sample EPN made of Frame relay WAN connections and dialup
remote access.
• Sample VPN used to interconnect 3 offices and remote users
44. Virtual private network
• A virtual private network (VPN) is a computer network in which some of the
links between nodes are carried by open connections or virtual circuits in
some larger network (e.g., the Internet) instead of by physical wires.
• The data link layer protocols of the virtual network are said to be tunneled
through the larger network when this is the case.
• One common application is secure communications through the public
Internet, but a VPN need not have explicit security features, such as
authentication or content encryption.
• VPNs, for example, can be used to separate the traffic of different user
communities over an underlying network with strong security features.
• VPN may have best-effort performance, or may have a defined service level
agreement (SLA) between the VPN customer and the VPN service provider.
Generally, a VPN has a topology more complex than point-to-point.
45. Backbone network
• A Backbone network (BBN) a backbone network or network backbone is part of a
computer network infrastructure that interconnects various pieces of network,
providing a path for the exchange of information between different LANs or sub
networks a backbone can tie together diverse networks in the same building, in
different buildings in a campus environment, or over wide areas.
• Normally, the backbone's capacity is greater than the networks connected to it.
• A large corporation that has many locations may have a backbone network that ties
all of the locations together, for example, if a server cluster needs to be accessed by
different departments of a company that are located at different geographical
locations.
• The pieces of the network connections (for example: Ethernet, wireless) that bring
these departments together is often mentioned as network backbone.
• Network congestion is often taken into consideration while designing backbones.
• Backbone networks should not be confused with the Internet backbone.
46. Backbone network
• A Backbone network (BBN) a backbone network or network backbone is part of a
computer network infrastructure that interconnects various pieces of network,
providing a path for the exchange of information between different LANs or sub
networks a backbone can tie together diverse networks in the same building, in
different buildings in a campus environment, or over wide areas.
• Normally, the backbone's capacity is greater than the networks connected to it.
• A large corporation that has many locations may have a backbone network that ties
all of the locations together, for example, if a server cluster needs to be accessed by
different departments of a company that are located at different geographical
locations.
• The pieces of the network connections (for example: Ethernet, wireless) that bring
these departments together is often mentioned as network backbone.
• Network congestion is often taken into consideration while designing backbones.
• Backbone networks should not be confused with the Internet backbone.
47. Global area network
• A global area network (GAN) is a network used for supporting mobile communications
across an arbitrary number of wireless LANs, satellite coverage areas, etc.
• The key challenge in mobile communications is handing off the user communications
from one local coverage area to the next.
• In IEEE Project 802, this involves a succession of terrestrial wireless LANs.
48. Internet
• The Internet is a global system of interconnected governmental, academic, corporate,
public, and private computer networks.
• It is based on the networking technologies of the Internet Protocol Suite.
• It is the successor of the Advanced Research Projects Agency Network (ARPANET)
developed by DARPA of the United States Department of Defense.
• The Internet is also the communications backbone underlying the World Wide Web
(WWW).
• Participants in the Internet use a diverse array of methods of several hundred
documented, and often standardized, protocols compatible with the Internet Protocol
Suite and an addressing system (IP addresses) administered by the Internet Assigned
Numbers Authority and address registries.
• Service providers and large enterprises exchange information about the reachability of
their address spaces through the Border Gateway Protocol (BGP), forming a redundant
worldwide mesh of transmission paths.
49. Intranets and extranets
• Intranets and extranets are parts or extensions of a computer network, usually a local area
network.
• An intranet is a set of networks, using the Internet Protocol and IP-based tools such as web
browsers and file transfer applications that is under the control of a single administrative
entity.
• That administrative entity closes the intranet to all but specific, authorized users. Most
commonly, an intranet is the internal network of an organization.
• A large intranet will typically have at least one web server to provide users with organizational
information.
• An extranet is a network that is limited in scope to a single organization or entity and also has
limited connections to the networks of one or more other usually, but not necessarily, trusted
organizations or entities—a company's customers may be given access to some part of its
intranet—while at the same time the customers may not be considered trusted from a
security standpoint.
• Technically, an extranet may also be categorized as a CAN, MAN, WAN, or other type of
network, although an extranet cannot consist of a single LAN; it must have at least one
connection with an external network.
50. Overlay network
• An overlay network is a virtual computer network that is built on top of another
network.
• Nodes in the overlay are connected by virtual or logical links, each of which
corresponds to a path, perhaps through many physical links, in the underlying
network.
• A sample overlay network: IP over SONET over Optical For example, many peer-to-
peer networks are overlay networks because they are organized as nodes of a virtual
system of links run on top of the Internet.
• The Internet was initially built as an overlay on the telephone network. Overlay
networks have been around since the invention of networking when computer
systems were connected over telephone lines using modem, before any data network
existed.
51. Overlay network (Conntd..)
• Nowadays the Internet is the basis for many overlaid networks that can be constructed
to permit routing of messages to destinations specified by an IP address.
• For example, distributed hash tables can be used to route messages to a node having a
specific logical address, whose IP address is known in advance.
• Overlay networks have also been proposed as a way to improve Internet routing, such
as through quality of service guarantees to achieve higher-quality streaming media.
• Previous proposals such as Insert, Differ, and IP Multicast have not seen wide
acceptance largely because they require modification of all routers in the
network.[citation needed] On the other hand, an overlay network can be
incrementally deployed on end-hosts running the overlay protocol software, without
cooperation from Internet service providers.
• The overlay has no control over how packets are routed in the underlying network
between two overlay nodes, but it can control, for example, the sequence of overlay
nodes a message traverses before reaching its destination.