SlideShare a Scribd company logo
1 of 135
Avishek Maitra
NETWORK AND SECURITY
Data Communication
Network
A network is a collection of multiple computer and
hardware devices that are connected together ,
either physically or logically , using special
hardware and software for the exchange of
information and resources.
Advantages of networking
Connectivity and communication.
Data Sharing.
Resource Sharing.
Network Criteria
Transmission Mode
Modes Of Communication
Network Classification
LAN (Local Area Network)
 Local Area Network (LAN)
 A local area network (LAN) is a
computer network that interconnects
computers in a limited area such as a
home, school, computer laboratory, or
office building using network media.
MAN ( Metropolitan Area Network)
 Man is network which interconnects
large computer networks in which
two or more computer are connected
across a campus or a city.
 Area coverage is 5 to 50km
diameter.
 This network uses wireless
infrastructure or optical fiber
connections .
WAN (Wide Area Network)
Bus Topology
Features of Bus Topology
 Bus topology is the cheapest and the most common method of networking
system where multiple nodes are connected in a single line using a single
cable.
 The data is transferred to the entire system from one end of the cable to other
. A break in the cable will make the signal bounce back and forth along the
cable , to stop the signal from bouncing a component called “terminator” is
placed at ends to absorb free signal.
Advantages Disadvantages
Advantages And Disadvantages Of
Bus Topology
 Failure of one station does not
effect others.
 Easy to implement and extend.
 Failure of one cable connections
can disable the entire network
 Difficult to administer or
troubleshoot.
Mesh Topology
Star Topology
Advantages And Disadvantages
Of Star Topology
 Advantages
 Easy to extend and
implement even in large
networks.
 The failure of non central
node will not have major
effect on the functionality of
the network.
 Security can be
implemented in the
hub/switch.
 Disadvantages
 Failure of the central node
can disable the entire
network.
Ring Topology
Advantages And Disadvantages
Of Ring Topology
 Advantages
 Data travel in one direction
at high speed.
 Using coaxial cable to
create a ring network the
service become much
faster.
 Disadvantages
 Numerous connection to
other slow down the
network activity.
 If one node fails the rest of
the network fails.
Networking Hardware
Network Interface Card
Hubs
Bridges
Switches
Routers
Gateways
Firewalls
Workstation
Server
HUB
 Hubs are generally called multipoint repeaters.
 It is the simplest network device for interaction and the central point
of connection in star topology.
 Now days hubs have been replaced by switches.
SWITCH
 A switch is used to connect device on a network.
 It works in data link layer of OSI model.
 A switch is more intelligent than a hub ,as it forwards traffic to
destination MAC address ,rather than broadcasting messages to each
port.
 Uses full duplex technology i .e multiple device can communicate
simultaneously.
 Micro segmentation is possible in switches.
 Bandwidth is used efficiently as the frames are nor broadcast to all the
ports and hence secured than hubs.
 Operates at frame level.
Bridge
 A Bridge is a physical unit with 2 ports which connects 2
similar network segments together.
 a Bridge contains mac address and corresponding port
address.
NETWORK INTERFACE
CARD
FUNCTION OF NIC CARD
 Also known as network card/ Lan adapter card.
 It gives physical address or the mac address.
 It works in the data link layer of osi model.
ROUTER
 A router connects two or more (different) networks together and routes
packets of data from one network to another.
 A router runs a software that allows device to move data from one network
to other network.
 Router operates in network layer.
 It restricts network broadcast to lan.
 Act as a default gateway.
 Path selection .
 It communicates at packet level.
Router Diagram
BRIDGE VS ROUTER
• Bridge works at layer 1 and 2 of
osi model.
• A bridge recognizes one path
between the networks.
• A bridge works at mac layer by
looking at the destination
address and forwarding the
frame to appropiate segment.
• A bridge generally connects two
same networks.
 Router works at layer 3 of osi model.
 A router search among multiple
paths and determine the best path
for the particular packet.
 A router works with routing protocols
it filters address .It forward particular
data to particular address or to other
router.
 A router connects two different
networks.
IMPORTANT PROTOCOLS THAT USES TCP
AND UDP ALONG WITH THERE PORT
NUMBERS:
 TCP
 Telnet 23
 SMTP 25
 HTTP 80
 FTP 20 and 21
 DNS 53
 HTTPS 443
 SSH 22
 POP3 110
 NTP 123
 IMAP4 143
 UDP
 SNMP 161
 TFTP 69
 DNS 53
 DHCP 67
FIREWALL
 A firewall is a piece of software or hardware ,which will filter network traffic
between a computer , home network , or a company network.
 There are mainly 4 types of firewall
 packet filtering firewall
 proxy server
 Personal or local firewall
 Application gateway
SERVER
 A server provides resources to the clients on the network.
 Servers are typically powerful computers that runs a operating system that
controls and maintains the network.
 Severs are usually a specialized for a single purpose.
 Examples of server
 File server FTP server
 Print server proxy server
 Fax server mail server
 Web server
 Chat server
GATEWAY
 Gateways are task specific that performs protocol conversion
between different types of networks and applications
 The main features of the gateway is that it performs the
function of translating the data from one format to other
format
BROADCAST VS UNICAST VS
MULTICAST
OSI MODEL
 Also known as open source interconnection.
 Developed by ISO (International Standards ORGANIZATION)
 It is an architecture which divides network communication into seven
layers.
 Each layer covers different network activities , equipments and
protocols and has its own functions.
 The protocols help the other systems to communicate with each other
TCP VS UDP
 Transmission control protocol
 It is connection oriented protocol
 Acknowledgement segments.
 It establishes connection
between the two nodes , transfer
information , acknowledges the
other end of the station to know
data is receiving ensures that
packets are delivered error free.
 HTTP, HTTPs, FTP, SMTP
,TELNET
 User datagram protocol
 It is connectionless protocol
 No acknowledgement
 No initial connection is
established between the two
end points .The device transmits
the data from one end to the
other end without ensuring that
recipient is prepared to receive
the data.
 DNS, DHCP, TFTP, SNMP, RIP,
TCP/IP
 TCP/IP is the most popular protocol stack, which consist of large no of
protocol. According to the OSI model TCP/IP consist of only four layers.
TCP/IP model is modified form of DOD (Department of Defense)
model.
TCP/IP enables cross-platform or hetrogeneous , networking and
has following characteristics:
 Good failure recovery
 High error rate handling
 Platform independence
 Low data rate
 The ability to add network without interrupting existing service
TCP/IP LAYERS
WIRELESS ACCESS POINT
(WAP)
DNS
 DNS stands for (Domain Name Service/System/Server).
 Computer and other device communicate with IP address to identify each
other on the network.
 People do not remember IP address they use words to remember
www.google.com
www.europa.eu
 The domain name system is a TCP/IP standard that resolves IP address
to user friendly names and vice versa and gets you to your destination.
www.google.com 209.85.129.183
www.europa.com 147.67.119.102
DNS Name Resolution
DNS cont
 DNS service relies on 13 computers also known as root servers which act
as top level authority.
 There are mainly 3 components of DNS service
Resolver
Name servers
Name space
 Resolver is any host on internet that needs domain name information
 A name server/DNS server that has the database of names and their
associated IP address . If one name server cannot map the domain name
of its IP address ,the query is passed on to a name server with higher
authority.
 Name space refers to the database of IP address and corresponding
domain.
ARP/RARP
 Address Resolution Protocol is used to map an IP address with its
corresponding MAC address on a LAN.
 ARP cache is a table used to maintain a correlation between MAC and its
corresponding IP address.
 The reverse ARP performs the reverse steps of ARP . It uses the MAC
address to determine the devices IP address.
 RARP was originally developed foe diskless workstation to obtan their IP
address from a server.
MAC Address
 Media Access Control or MAC address is a hardware address which
uniquely identifies each node of a network.
 It is 12 bit hexadecimal number.
 Format of MAC address
 MM:MM:MM:SS:SS:SS
 MM-MM-MM-SS-SS-SS
 MAC address generally functions at the data link layer.
IP Addressing
 IP address is a unique number used to identify a computer and
communicate with each other on a network.
 IP address is 32 bit value which is divided into 8 bits field called octet.
 The IP address range from 1.0.0.0 to 255.255.255.255
 There are 2 parts of IP address
Network Address
Host Address
Why IP Addressing?
 An IP address serves two principal functions: host or network
interface identification and location addressing. Its role has been
characterized as follows: "A name indicates what we seek. An address
indicates where it is. A route indicates how to get there."[
 The Internet Assigned Numbers Authority (IANA) manages the IP address
space allocations globally.
 Computer uses IP address to locate and talk to each other on the tnternet
, much the same way people use phone number to locate and talk to one
another.
IP Addressing Methods
 There are 3 types of addressing methods
Static IP Address
Dynamic IP Address
APIPA(Automatic IP Addressing)
 Static IP Addressing
Static IP Addressing is done manually it is called permanent IP addressing
and it is given to user.
Static IP addressing do not require a DHCP server , we have to manually
configure IP , subnet and default gateway.
IP Addressing cont
Dynamic IP Addressing
 In dynamic IP addressing DHCP server automatically assigns IP , Subnet
mask , DNS Server ,default gateway.
 When we click on obtain IP Address automatically in windows ,the node
sends a request to DHCP Server to assign a n IP address.
APIPA (Automatic IP Addressing)
 When DHCP server goes down or the connection to the server is lost the
computer assigns its own IP address in the range of 169.254.0.0,so that the
computer can still communicate in the LAN , when it regains connectivity from
DHCP it changes its address
DHCP DORA Process
UTP
STP
UTP VS STP
 Unshielded twisted pair
 UTP is the most common type of
cable today.
 IT has 4 pair of cable twisted
together.
 Wire are twisted together to
prevent Electromagnet
interference (crosstalk).
 Shielded Twisted Pair
 It has a metal shielding on top.
 The shielding provides
resistance to external EMI.
 STP is considered secure than
UTP
Cabling
 Ethernet Cabling can be done in 3 ways
Straight-through cable
Crossover cable
Rolled cable
 Straight-through cable are used to connect 2 different devices
Host to Switch/hub
Router to Switch/hub
 Crossover cable can be used o connect 2 similar devices
Switch to Switch
Hub to Hub
Host to Host
Cabling cont
 Rolled Cable is used to connect a host EIA-TIA 232 interface to a
router console serial communication Port.
Media Types
Cable Standards
Straight Cable and Cross Cable
Rolled Cable
Media Connectors
Networrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyy
Networrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyy
Networrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyy
Networrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyy
Networrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyy
Networrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyy
Networrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyy
Networrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyy
Networrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyy
Networrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyy
Networrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyy
Networrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyy
Networrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyy
Networrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyy
Networrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyy
Networrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyy
Networrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyy
Networrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyy
Networrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyy
Networrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyy
Networrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyy

More Related Content

What's hot

Networking Basics
Networking BasicsNetworking Basics
Networking BasicsCarlo Fonda
 
Introduction to Computer Networks
Introduction to Computer NetworksIntroduction to Computer Networks
Introduction to Computer NetworksVenkatesh Iyer
 
Internetworking
InternetworkingInternetworking
InternetworkingRaghu nath
 
Protocol
ProtocolProtocol
ProtocolShi Na
 
Osi layer and network protocol
Osi layer and network protocolOsi layer and network protocol
Osi layer and network protocolNayan Sarma
 
Advanced computer network lab manual (practicals in Cisco Packet tracer)
Advanced computer network lab manual (practicals in Cisco Packet tracer)Advanced computer network lab manual (practicals in Cisco Packet tracer)
Advanced computer network lab manual (practicals in Cisco Packet tracer)VrundaBhavsar
 
Windows network administration Basic theories
Windows network administration Basic theoriesWindows network administration Basic theories
Windows network administration Basic theoriesRavi Yasas
 
Basic Networking Network
Basic Networking NetworkBasic Networking Network
Basic Networking NetworkJGrace Johnny
 
Internetworking basics
Internetworking basicsInternetworking basics
Internetworking basicsRomeo Alonzo
 
Networking Standards And Protocols
Networking Standards And ProtocolsNetworking Standards And Protocols
Networking Standards And ProtocolsSteven Cahill
 

What's hot (20)

Computer network
Computer networkComputer network
Computer network
 
Networking Basics
Networking BasicsNetworking Basics
Networking Basics
 
Networking
NetworkingNetworking
Networking
 
Osi model
Osi modelOsi model
Osi model
 
Computer network
Computer networkComputer network
Computer network
 
Internetworking
InternetworkingInternetworking
Internetworking
 
Introduction to Computer Networks
Introduction to Computer NetworksIntroduction to Computer Networks
Introduction to Computer Networks
 
Internetworking
InternetworkingInternetworking
Internetworking
 
Cisco doc
Cisco docCisco doc
Cisco doc
 
Protocol
ProtocolProtocol
Protocol
 
Osi layer and network protocol
Osi layer and network protocolOsi layer and network protocol
Osi layer and network protocol
 
OSI model
OSI modelOSI model
OSI model
 
Mcse notes
Mcse notesMcse notes
Mcse notes
 
Tcp/Ip Model
Tcp/Ip ModelTcp/Ip Model
Tcp/Ip Model
 
Advanced computer network lab manual (practicals in Cisco Packet tracer)
Advanced computer network lab manual (practicals in Cisco Packet tracer)Advanced computer network lab manual (practicals in Cisco Packet tracer)
Advanced computer network lab manual (practicals in Cisco Packet tracer)
 
Windows network administration Basic theories
Windows network administration Basic theoriesWindows network administration Basic theories
Windows network administration Basic theories
 
Basic Networking Network
Basic Networking NetworkBasic Networking Network
Basic Networking Network
 
CCNA
CCNACCNA
CCNA
 
Internetworking basics
Internetworking basicsInternetworking basics
Internetworking basics
 
Networking Standards And Protocols
Networking Standards And ProtocolsNetworking Standards And Protocols
Networking Standards And Protocols
 

Viewers also liked

Viewers also liked (14)

Connecting devices ece 702
Connecting devices ece 702Connecting devices ece 702
Connecting devices ece 702
 
Switch y hub
Switch y hubSwitch y hub
Switch y hub
 
Networking topics like ISP,DNS etc
Networking topics like ISP,DNS etcNetworking topics like ISP,DNS etc
Networking topics like ISP,DNS etc
 
Deployment guide1
Deployment guide1Deployment guide1
Deployment guide1
 
Network devices (2)
Network devices (2)Network devices (2)
Network devices (2)
 
Networking basics
Networking basicsNetworking basics
Networking basics
 
HUB Presentation
HUB PresentationHUB Presentation
HUB Presentation
 
Popular network devices
Popular network devicesPopular network devices
Popular network devices
 
Presentation on basic networking
Presentation on basic networkingPresentation on basic networking
Presentation on basic networking
 
Dhcp ppt
Dhcp pptDhcp ppt
Dhcp ppt
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Computer networking devices
Computer networking devicesComputer networking devices
Computer networking devices
 
BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
 

Similar to Networrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyy

Concept of networking
Concept of networkingConcept of networking
Concept of networkingsumit dimri
 
IMD 251 - Networking
IMD 251 - NetworkingIMD 251 - Networking
IMD 251 - Networkingisma ishak
 
Networking concepts by Sachidananda M H
Networking concepts by Sachidananda M HNetworking concepts by Sachidananda M H
Networking concepts by Sachidananda M HSachidananda M H
 
Data communication
Data communication Data communication
Data communication SarifIslam3
 
E business 2014 l06
E business 2014 l06E business 2014 l06
E business 2014 l06kchanaka3
 
Network essentials chapter 3
Network essentials  chapter 3Network essentials  chapter 3
Network essentials chapter 3Raghu nath
 
chaptet 4 DC and CN.ppt
chaptet 4 DC and CN.pptchaptet 4 DC and CN.ppt
chaptet 4 DC and CN.pptEliasPetros
 
Fundamentals of Networking
Fundamentals of NetworkingFundamentals of Networking
Fundamentals of NetworkingIsrael Marcus
 
CN Module 1 ppt final 20.08.2020.ppt
CN Module 1 ppt final 20.08.2020.pptCN Module 1 ppt final 20.08.2020.ppt
CN Module 1 ppt final 20.08.2020.pptdeeplearning6
 
Data Communication
Data Communication Data Communication
Data Communication MSSadeq
 
Introduction to networking
Introduction to networkingIntroduction to networking
Introduction to networkingMohsen Sarakbi
 
Basic networking hardware pre final 1
Basic networking hardware pre final 1Basic networking hardware pre final 1
Basic networking hardware pre final 1Sujee Antony
 
Introduction to Computer Networks and Network Security.pptx
Introduction to Computer Networks and Network Security.pptxIntroduction to Computer Networks and Network Security.pptx
Introduction to Computer Networks and Network Security.pptxShehanMarasinghe1
 
Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking FundamentalsRajet Veshin
 
W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)Parvesh Taneja
 
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...Soumen Santra
 

Similar to Networrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyy (20)

Concept of networking
Concept of networkingConcept of networking
Concept of networking
 
IMD 251 - Networking
IMD 251 - NetworkingIMD 251 - Networking
IMD 251 - Networking
 
Networking
NetworkingNetworking
Networking
 
Networking concepts by Sachidananda M H
Networking concepts by Sachidananda M HNetworking concepts by Sachidananda M H
Networking concepts by Sachidananda M H
 
Data communication
Data communication Data communication
Data communication
 
1658897215230.pdf
1658897215230.pdf1658897215230.pdf
1658897215230.pdf
 
E business 2014 l06
E business 2014 l06E business 2014 l06
E business 2014 l06
 
Network essentials chapter 3
Network essentials  chapter 3Network essentials  chapter 3
Network essentials chapter 3
 
chaptet 4 DC and CN.ppt
chaptet 4 DC and CN.pptchaptet 4 DC and CN.ppt
chaptet 4 DC and CN.ppt
 
Fundamentals of Networking
Fundamentals of NetworkingFundamentals of Networking
Fundamentals of Networking
 
CN Module 1 ppt final 20.08.2020.ppt
CN Module 1 ppt final 20.08.2020.pptCN Module 1 ppt final 20.08.2020.ppt
CN Module 1 ppt final 20.08.2020.ppt
 
Computer networking
Computer networkingComputer networking
Computer networking
 
Data Communication
Data Communication Data Communication
Data Communication
 
Introduction to networking
Introduction to networkingIntroduction to networking
Introduction to networking
 
Basic networking hardware pre final 1
Basic networking hardware pre final 1Basic networking hardware pre final 1
Basic networking hardware pre final 1
 
Introduction to Computer Networks and Network Security.pptx
Introduction to Computer Networks and Network Security.pptxIntroduction to Computer Networks and Network Security.pptx
Introduction to Computer Networks and Network Security.pptx
 
Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking Fundamentals
 
CCNA Report
CCNA ReportCCNA Report
CCNA Report
 
W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)
 
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
 

Recently uploaded

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 

Recently uploaded (20)

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 

Networrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyy

  • 3.
  • 4. Network A network is a collection of multiple computer and hardware devices that are connected together , either physically or logically , using special hardware and software for the exchange of information and resources. Advantages of networking Connectivity and communication. Data Sharing. Resource Sharing.
  • 9. LAN (Local Area Network)  Local Area Network (LAN)  A local area network (LAN) is a computer network that interconnects computers in a limited area such as a home, school, computer laboratory, or office building using network media.
  • 10.
  • 11. MAN ( Metropolitan Area Network)  Man is network which interconnects large computer networks in which two or more computer are connected across a campus or a city.  Area coverage is 5 to 50km diameter.  This network uses wireless infrastructure or optical fiber connections .
  • 12. WAN (Wide Area Network)
  • 14. Features of Bus Topology  Bus topology is the cheapest and the most common method of networking system where multiple nodes are connected in a single line using a single cable.  The data is transferred to the entire system from one end of the cable to other . A break in the cable will make the signal bounce back and forth along the cable , to stop the signal from bouncing a component called “terminator” is placed at ends to absorb free signal.
  • 15. Advantages Disadvantages Advantages And Disadvantages Of Bus Topology  Failure of one station does not effect others.  Easy to implement and extend.  Failure of one cable connections can disable the entire network  Difficult to administer or troubleshoot.
  • 18. Advantages And Disadvantages Of Star Topology  Advantages  Easy to extend and implement even in large networks.  The failure of non central node will not have major effect on the functionality of the network.  Security can be implemented in the hub/switch.  Disadvantages  Failure of the central node can disable the entire network.
  • 20. Advantages And Disadvantages Of Ring Topology  Advantages  Data travel in one direction at high speed.  Using coaxial cable to create a ring network the service become much faster.  Disadvantages  Numerous connection to other slow down the network activity.  If one node fails the rest of the network fails.
  • 21. Networking Hardware Network Interface Card Hubs Bridges Switches Routers Gateways Firewalls Workstation Server
  • 22. HUB  Hubs are generally called multipoint repeaters.  It is the simplest network device for interaction and the central point of connection in star topology.  Now days hubs have been replaced by switches.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40. SWITCH  A switch is used to connect device on a network.  It works in data link layer of OSI model.  A switch is more intelligent than a hub ,as it forwards traffic to destination MAC address ,rather than broadcasting messages to each port.  Uses full duplex technology i .e multiple device can communicate simultaneously.  Micro segmentation is possible in switches.  Bandwidth is used efficiently as the frames are nor broadcast to all the ports and hence secured than hubs.  Operates at frame level.
  • 41. Bridge  A Bridge is a physical unit with 2 ports which connects 2 similar network segments together.  a Bridge contains mac address and corresponding port address.
  • 43. FUNCTION OF NIC CARD  Also known as network card/ Lan adapter card.  It gives physical address or the mac address.  It works in the data link layer of osi model.
  • 44.
  • 45. ROUTER  A router connects two or more (different) networks together and routes packets of data from one network to another.  A router runs a software that allows device to move data from one network to other network.  Router operates in network layer.  It restricts network broadcast to lan.  Act as a default gateway.  Path selection .  It communicates at packet level.
  • 47. BRIDGE VS ROUTER • Bridge works at layer 1 and 2 of osi model. • A bridge recognizes one path between the networks. • A bridge works at mac layer by looking at the destination address and forwarding the frame to appropiate segment. • A bridge generally connects two same networks.  Router works at layer 3 of osi model.  A router search among multiple paths and determine the best path for the particular packet.  A router works with routing protocols it filters address .It forward particular data to particular address or to other router.  A router connects two different networks.
  • 48. IMPORTANT PROTOCOLS THAT USES TCP AND UDP ALONG WITH THERE PORT NUMBERS:  TCP  Telnet 23  SMTP 25  HTTP 80  FTP 20 and 21  DNS 53  HTTPS 443  SSH 22  POP3 110  NTP 123  IMAP4 143  UDP  SNMP 161  TFTP 69  DNS 53  DHCP 67
  • 49. FIREWALL  A firewall is a piece of software or hardware ,which will filter network traffic between a computer , home network , or a company network.  There are mainly 4 types of firewall  packet filtering firewall  proxy server  Personal or local firewall  Application gateway
  • 50. SERVER  A server provides resources to the clients on the network.  Servers are typically powerful computers that runs a operating system that controls and maintains the network.  Severs are usually a specialized for a single purpose.  Examples of server  File server FTP server  Print server proxy server  Fax server mail server  Web server  Chat server
  • 51. GATEWAY  Gateways are task specific that performs protocol conversion between different types of networks and applications  The main features of the gateway is that it performs the function of translating the data from one format to other format
  • 52. BROADCAST VS UNICAST VS MULTICAST
  • 53. OSI MODEL  Also known as open source interconnection.  Developed by ISO (International Standards ORGANIZATION)  It is an architecture which divides network communication into seven layers.  Each layer covers different network activities , equipments and protocols and has its own functions.  The protocols help the other systems to communicate with each other
  • 54.
  • 55. TCP VS UDP  Transmission control protocol  It is connection oriented protocol  Acknowledgement segments.  It establishes connection between the two nodes , transfer information , acknowledges the other end of the station to know data is receiving ensures that packets are delivered error free.  HTTP, HTTPs, FTP, SMTP ,TELNET  User datagram protocol  It is connectionless protocol  No acknowledgement  No initial connection is established between the two end points .The device transmits the data from one end to the other end without ensuring that recipient is prepared to receive the data.  DNS, DHCP, TFTP, SNMP, RIP,
  • 56. TCP/IP  TCP/IP is the most popular protocol stack, which consist of large no of protocol. According to the OSI model TCP/IP consist of only four layers. TCP/IP model is modified form of DOD (Department of Defense) model. TCP/IP enables cross-platform or hetrogeneous , networking and has following characteristics:  Good failure recovery  High error rate handling  Platform independence  Low data rate  The ability to add network without interrupting existing service
  • 59.
  • 60. DNS  DNS stands for (Domain Name Service/System/Server).  Computer and other device communicate with IP address to identify each other on the network.  People do not remember IP address they use words to remember www.google.com www.europa.eu  The domain name system is a TCP/IP standard that resolves IP address to user friendly names and vice versa and gets you to your destination. www.google.com 209.85.129.183 www.europa.com 147.67.119.102
  • 62. DNS cont  DNS service relies on 13 computers also known as root servers which act as top level authority.  There are mainly 3 components of DNS service Resolver Name servers Name space  Resolver is any host on internet that needs domain name information  A name server/DNS server that has the database of names and their associated IP address . If one name server cannot map the domain name of its IP address ,the query is passed on to a name server with higher authority.  Name space refers to the database of IP address and corresponding domain.
  • 63. ARP/RARP  Address Resolution Protocol is used to map an IP address with its corresponding MAC address on a LAN.  ARP cache is a table used to maintain a correlation between MAC and its corresponding IP address.  The reverse ARP performs the reverse steps of ARP . It uses the MAC address to determine the devices IP address.  RARP was originally developed foe diskless workstation to obtan their IP address from a server.
  • 64. MAC Address  Media Access Control or MAC address is a hardware address which uniquely identifies each node of a network.  It is 12 bit hexadecimal number.  Format of MAC address  MM:MM:MM:SS:SS:SS  MM-MM-MM-SS-SS-SS  MAC address generally functions at the data link layer.
  • 65.
  • 66. IP Addressing  IP address is a unique number used to identify a computer and communicate with each other on a network.  IP address is 32 bit value which is divided into 8 bits field called octet.  The IP address range from 1.0.0.0 to 255.255.255.255  There are 2 parts of IP address Network Address Host Address
  • 67. Why IP Addressing?  An IP address serves two principal functions: host or network interface identification and location addressing. Its role has been characterized as follows: "A name indicates what we seek. An address indicates where it is. A route indicates how to get there."[  The Internet Assigned Numbers Authority (IANA) manages the IP address space allocations globally.  Computer uses IP address to locate and talk to each other on the tnternet , much the same way people use phone number to locate and talk to one another.
  • 68. IP Addressing Methods  There are 3 types of addressing methods Static IP Address Dynamic IP Address APIPA(Automatic IP Addressing)  Static IP Addressing Static IP Addressing is done manually it is called permanent IP addressing and it is given to user. Static IP addressing do not require a DHCP server , we have to manually configure IP , subnet and default gateway.
  • 69. IP Addressing cont Dynamic IP Addressing  In dynamic IP addressing DHCP server automatically assigns IP , Subnet mask , DNS Server ,default gateway.  When we click on obtain IP Address automatically in windows ,the node sends a request to DHCP Server to assign a n IP address. APIPA (Automatic IP Addressing)  When DHCP server goes down or the connection to the server is lost the computer assigns its own IP address in the range of 169.254.0.0,so that the computer can still communicate in the LAN , when it regains connectivity from DHCP it changes its address
  • 71.
  • 72.
  • 73.
  • 74.
  • 75.
  • 76.
  • 77.
  • 78.
  • 79.
  • 80.
  • 81.
  • 82.
  • 83.
  • 84.
  • 85.
  • 86.
  • 87.
  • 88.
  • 89.
  • 90.
  • 91.
  • 92.
  • 93.
  • 94.
  • 95.
  • 96.
  • 97.
  • 98.
  • 99.
  • 100.
  • 101.
  • 102.
  • 103.
  • 104.
  • 105.
  • 106.
  • 107. UTP STP UTP VS STP  Unshielded twisted pair  UTP is the most common type of cable today.  IT has 4 pair of cable twisted together.  Wire are twisted together to prevent Electromagnet interference (crosstalk).  Shielded Twisted Pair  It has a metal shielding on top.  The shielding provides resistance to external EMI.  STP is considered secure than UTP
  • 108. Cabling  Ethernet Cabling can be done in 3 ways Straight-through cable Crossover cable Rolled cable  Straight-through cable are used to connect 2 different devices Host to Switch/hub Router to Switch/hub  Crossover cable can be used o connect 2 similar devices Switch to Switch Hub to Hub Host to Host
  • 109. Cabling cont  Rolled Cable is used to connect a host EIA-TIA 232 interface to a router console serial communication Port.
  • 112. Straight Cable and Cross Cable