SlideShare a Scribd company logo
1
Enterprise Network Management
& Administration
BBC
Makerere University Business School
2012-2013
BWIRE SEDRICK
Introduction to computer networking
Objective:
To be acquainted with:
• The definitions of networking and concepts
• Network topology
• Network peripherals, hardware and software
Why Study Networking?
Indispensable part of modern society
 Commercial – e-commerce, banking, inventorying,
telecommunications, archiving, health
 Social – critical infrastructure, homeland security,
policing
 Human interaction/communication – email, chat,
videoconferencing, social networking, entertainment
Appears in every facet of engineering
 Modern trend – Network every (electronic) device
(computers, phones, sensors, planes, cars, TVs,
appliances, heart monitors, …) 3
Definitions
A network can be defined as two or more
computing devices connected together in such a
way that they can share resources.
The purpose of a network is to share resources.
A resource may be:
 A file, A folder, A printer, A disk drive, Or just about
anything else that exists on a computer.
Definitions (cont..)
A network is simply a collection of computers or
other hardware devices that are connected
together, either physically or logically, using
special hardware and software, to allow them to
exchange information and cooperate. Networking
is the term that describes the processes involved
in designing, implementing, upgrading, managing
and otherwise working with networks and
network technologies.
Advantages of networking
Connectivity and Communication
Data Sharing
Hardware Sharing
Internet Access
Internet Access Sharing
Data Security and Management
Performance Enhancement and Balancing
Entertainment
The Disadvantages (Costs) of Networking
Network Hardware, Software and Setup Costs
Hardware and Software Management and
Administration Costs
Undesirable Sharing
Illegal or Undesirable Behavior
Data Security Concerns
Network Classifications
Networks can be classified by either network
geography or component roles within the network.
Classification by Network Geography - Networks
are frequently classified according to the
geographical boundaries spanned by the network
itself
A local area network (LAN) is a computer network
covering a small geographic area, like a home, office, or
group of buildings
Network Classifications Cont
Wide Area Network (WAN) is a computer network that covers a
broad area (i.e., any network whose communications links cross
metropolitan, regional, or national boundaries). Or, less formally, a
network that uses routers and public communications links. The largest
and most well-known example of a WAN is the Internet.
WANs are used to connect LANs and other types of networks together, so
that users and computers in one location can communicate with users and
computers in other locations
A Metropolitan Area Network (MAN) is a network that
interconnects users in a geographic area or region larger than that covered
by even a large local area network (LAN) but smaller than the area covered
by a wide area network (WAN). The term is applied to the
interconnection of networks in a city into a single larger network. It is also
used to mean the interconnection of several local area networks by
bridging them with backbone lines. The latter usage is also sometimes
referred to as a campus network.
Fundamental Network Classifications (cont)
Wide Area Network
Fundamental Network Classifications (cont)
Metropolitan Area Network (MAN)
Classification by Component Roles
Networks can also be classified according to the roles that the
networked computers play in the network’s operation.
Peer-to-peer, server-based, and client-based are the types of
roles into which networks are classified.
Classification by Component Roles
Peer-to-peer:
 In a peer-to-peer network, all computers are considered
equal. Each computer controls its own information and
is capable of functioning as either a client or a server
depending upon the requirement. Peer-to-peer networks
are inexpensive and easy to install.
 They are popular as home networks and for use in small
companies.
Classification by Component Roles
Peer-to-peer (continued):
 Most operating systems come with built-in peer-
to-peer networking capability.
 Peer-to-peer networks become difficult to manage
when more security is added to resources, since
the users control their security by password-
protecting shares.
 Shares can be document
folders, printers, peripherals, and any other
resource that they control on their computers.
Classification by Component Roles
Peer-to-peer network
Classification by Component Roles
Server-based:
 A server-based network offers centralized control
and is designed for secure operations. In a server-
based network, a dedicated server controls the
network.
 A dedicated server is one that services the
network by storing data, applications, resources,
and also provides access to resources required by
the client. These servers can also control the
network’s security from one centralized location
or share it with other specially configured servers.
Client/Server Networking (cont..)
Classification by Component Roles
Client-based:
 Client-based network servers process requests
from clients and return just the results.
 These networks take advantage of the powerful
processing capabilities of both the client and
the server.
 Application servers and communications
servers are examples of client-based networks.
Classification by Component Roles
Client-based network
Intranet and Internet Specifications
Intranet: An intranet is a private network that is contained within
an enterprise. It may consist of many interlinked local area
networks and also use leased lines in the wide area network. An
intranet uses TCP/IP, HTTP, and other Internet protocols and in
general looks like a private version of the Internet.
Extranet – a network that connects people within your company
with people who are outside your company--all within a secure,
password-protected network that can be accessed from anywhere
Internet: is a worldwide system of computer networks - a
network of networks in which users at any one computer can, if
they have permission, get information from any other computer
(and sometimes talk directly to users at other computers).
Network topology
A topology is a way of “laying out” the network. Topologies can
be either physical or logical.
Physical topologies describe how the cables are run.
Logical topologies describe how the network messages travel
Network topology (cont.)
Bus (can be both logical and physical)
Star (physical only)
Ring (can be both logical and physical)
Mesh (can be both logical and physical)
Network topology (cont.)
Bus
• A bus is the simplest physical topology. It consists of a
single cable that runs to every workstation. This topology
uses the least amount of cabling, but also covers the
shortest amount of distance.
• Each computer shares the same data and address path.
With a logical bus topology, messages pass through the
trunk, and each workstation checks to see if the message
is addressed to itself. If the address of the message matches
the workstation’s address, the network adapter copies the
message to the card’s on-board memory.
Network topology (cont.)
Star Topology
• A physical star topology branches each network device off
a central device called a hub, making it very easy to add a
new workstation.
• Also, if any workstation goes down it does not affect the
entire network. (But, as you might expect, if the central
device goes down, the entire network goes down.)
• Some types of Ethernet and ARCNet use a physical star
topology. Figure 8.7 gives an example of the organization
of the star network.
Network topology (cont.)
Star topologies are easy to install. A cable is run from each
workstation to the hub. The hub is placed in a central location
in the office.
Star topologies are more expensive to install than bus networks,
because there are several more cables that need to be installed,
plus the cost of the hubs that are needed.
Network topology (cont.)
Star Topology
Network topology (cont.)
Ring
• Each computer connects to two other computers,
joining them in a circle creating a unidirectional
path where messages move workstation to
workstation.
• Each entity participating in the ring reads a
message, then regenerates it and hands it to its
neighbor on a different network cable.
Network topology (cont.)
The ring makes it difficult to add new computers.
Unlike a star topology network, the ring topology network will
go down if one entity is removed from the ring.
Physical ring topology systems don’t exist much
anymore, mainly because the hardware involved was fairly
expensive and the fault tolerance was very low.
Network topology (cont.)
Mesh
• The mesh topology is the simplest logical topology in terms of data flow, but
it is the most complex in terms of physical design.
• In this physical topology, each device is connected to every other device .
This topology is rarely found in LANs, mainly because of the complexity of
the cabling.
• Because of its design, the physical mesh topology is very expensive to
install and maintain. Cables must be run from each device to every other
device. The advantage you gain from it is its high fault tolerance.
• With a logical mesh topology, however, there will always be a way of
getting the data from source to destination.
• It may not be able to take the direct route, but it can take an alternate,
indirect route. It is for this reason that the mesh topology is still found in
WANs to connect multiple sites across WAN links. It uses devices called
routersto search multiple routes through the mesh and determine the best
path.
Network topology (cont.)
Mesh Topology
Network topology (cont.)
Advantages and Disadvantages of Network Topologies
Topology Advantages Disadvantages
Bus Cheap. Easy to install. Difficult to reconfigure.
Break in bus disables entire network.
Star Cheap. Easy to install.
Easy to reconfigure. Fault tolerant.
More expensive than bus.
Ring Efficient. Easy to install. Reconfiguration difficult.
Very expensive.
Mesh Simplest. Most fault tolerant. Reconfiguration extremely difficult.
Extremely expensive. Very complex.

More Related Content

What's hot

OSI Model
OSI ModelOSI Model
Networking Basics
Networking BasicsNetworking Basics
Networking Basics
Mohd. ShahNawab
 
Cabling
Cabling Cabling
Cabling
Ah Fawad Saiq
 
Networking devices
Networking devicesNetworking devices
Networking devices
frestoadi
 
Computer network basics
Computer network basicsComputer network basics
Computer network basics
JAI MCA-STUDENT
 
OSI Model
OSI ModelOSI Model
OSI Model
Simran Kaur
 
Introduction to mobile ad hoc network
Introduction to mobile ad hoc networkIntroduction to mobile ad hoc network
Introduction to mobile ad hoc network
Ashish Prajapat
 
Network architecture
Network architectureNetwork architecture
Network architecture
Online
 
Fundamentals of Enterprise Networks
Fundamentals ofEnterprise NetworksFundamentals ofEnterprise Networks
Fundamentals of Enterprise NetworksVisualBee.com
 
PPT on Basic of Gateway
PPT on Basic of GatewayPPT on Basic of Gateway
PPT on Basic of Gateway
Naveen Karn
 
Introduction to Computer Networks
 Introduction to Computer Networks Introduction to Computer Networks
Introduction to Computer NetworksGhaffar Khan
 
1 introduction to-networking
1 introduction to-networking1 introduction to-networking
1 introduction to-networkingNor Zailani
 
Introduction to computer networks
Introduction to computer networksIntroduction to computer networks
Introduction to computer networks
Haider Ali Malik
 
WLAN
WLANWLAN
CCNA training 101
CCNA training 101CCNA training 101
CCNA training 101
Rohan Reddy
 
Ppt for tranmission media
Ppt for tranmission mediaPpt for tranmission media
Ppt for tranmission media
Manish8976
 
The Basics of Computer Networking
The Basics of Computer NetworkingThe Basics of Computer Networking
The Basics of Computer Networking
Global Knowledge Training
 
Networking devices
Networking devicesNetworking devices
Networking devicesrupinderj
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networking
kieshore
 
Basics of Networks ,Advantages and Disadvantages
Basics of  Networks ,Advantages and DisadvantagesBasics of  Networks ,Advantages and Disadvantages
Basics of Networks ,Advantages and Disadvantages
sabari Giri
 

What's hot (20)

OSI Model
OSI ModelOSI Model
OSI Model
 
Networking Basics
Networking BasicsNetworking Basics
Networking Basics
 
Cabling
Cabling Cabling
Cabling
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Computer network basics
Computer network basicsComputer network basics
Computer network basics
 
OSI Model
OSI ModelOSI Model
OSI Model
 
Introduction to mobile ad hoc network
Introduction to mobile ad hoc networkIntroduction to mobile ad hoc network
Introduction to mobile ad hoc network
 
Network architecture
Network architectureNetwork architecture
Network architecture
 
Fundamentals of Enterprise Networks
Fundamentals ofEnterprise NetworksFundamentals ofEnterprise Networks
Fundamentals of Enterprise Networks
 
PPT on Basic of Gateway
PPT on Basic of GatewayPPT on Basic of Gateway
PPT on Basic of Gateway
 
Introduction to Computer Networks
 Introduction to Computer Networks Introduction to Computer Networks
Introduction to Computer Networks
 
1 introduction to-networking
1 introduction to-networking1 introduction to-networking
1 introduction to-networking
 
Introduction to computer networks
Introduction to computer networksIntroduction to computer networks
Introduction to computer networks
 
WLAN
WLANWLAN
WLAN
 
CCNA training 101
CCNA training 101CCNA training 101
CCNA training 101
 
Ppt for tranmission media
Ppt for tranmission mediaPpt for tranmission media
Ppt for tranmission media
 
The Basics of Computer Networking
The Basics of Computer NetworkingThe Basics of Computer Networking
The Basics of Computer Networking
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networking
 
Basics of Networks ,Advantages and Disadvantages
Basics of  Networks ,Advantages and DisadvantagesBasics of  Networks ,Advantages and Disadvantages
Basics of Networks ,Advantages and Disadvantages
 

Viewers also liked

( Network topology) )final
( Network topology) )final( Network topology) )final
( Network topology) )finalJai Kumar
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
Ashita Agrawal
 
Ali hassan khan gurmani fiber optics
Ali hassan khan gurmani fiber opticsAli hassan khan gurmani fiber optics
Ali hassan khan gurmani fiber opticsali814
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networkingmartuj
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networkingBesar Limani
 
Data communication and computer networks
Data communication and computer networksData communication and computer networks
Data communication and computer networks
marwa_ma
 
A topic 2.1.2 classification of network
A topic 2.1.2 classification of networkA topic 2.1.2 classification of network
A topic 2.1.2 classification of networkhazirma
 
Topologies
TopologiesTopologies
Topologies
Ahmed Elnaggar
 
Components of client server application
Components of client server applicationComponents of client server application
Components of client server application
Ashwin Ananthapadmanabhan
 
Advanced enterprise campus design. routed access (2015 milan)
Advanced enterprise campus design. routed access (2015 milan)Advanced enterprise campus design. routed access (2015 milan)
Advanced enterprise campus design. routed access (2015 milan)
slide_site
 
Trends In Telecommunications
Trends In TelecommunicationsTrends In Telecommunications
Trends In Telecommunications
Marlon Jamera
 
Multilayer Campus Architectures and Design Principles
Multilayer Campus Architectures and Design PrinciplesMultilayer Campus Architectures and Design Principles
Multilayer Campus Architectures and Design Principles
Cisco Canada
 
Classification of Computer Networks
Classification of Computer Networks Classification of Computer Networks
Classification of Computer Networks
Nazren Wak
 
Trends In Telecommunication Services
Trends In Telecommunication ServicesTrends In Telecommunication Services
Trends In Telecommunication Services
Chetan Kumar S
 
Classification of Networks & Network topologies
Classification of Networks & Network topologiesClassification of Networks & Network topologies
Classification of Networks & Network topologies
Priyanka Nain
 
Chapter 1 introduction to scaling networks
Chapter 1   introduction to scaling networksChapter 1   introduction to scaling networks
Chapter 1 introduction to scaling networks
Josue Wuezo
 
Personal area networks (PAN)
Personal area networks (PAN)Personal area networks (PAN)
Personal area networks (PAN)
Glaucio Pessoa, P.E.
 
Network topologies
Network topologiesNetwork topologies
Network topologies
sanjeev kumar
 

Viewers also liked (20)

( Network topology) )final
( Network topology) )final( Network topology) )final
( Network topology) )final
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
 
Traffic types in internet
Traffic types in internetTraffic types in internet
Traffic types in internet
 
Ali hassan khan gurmani fiber optics
Ali hassan khan gurmani fiber opticsAli hassan khan gurmani fiber optics
Ali hassan khan gurmani fiber optics
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
 
Topologia estrella
Topologia estrellaTopologia estrella
Topologia estrella
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
 
Data communication and computer networks
Data communication and computer networksData communication and computer networks
Data communication and computer networks
 
A topic 2.1.2 classification of network
A topic 2.1.2 classification of networkA topic 2.1.2 classification of network
A topic 2.1.2 classification of network
 
Topologies
TopologiesTopologies
Topologies
 
Components of client server application
Components of client server applicationComponents of client server application
Components of client server application
 
Advanced enterprise campus design. routed access (2015 milan)
Advanced enterprise campus design. routed access (2015 milan)Advanced enterprise campus design. routed access (2015 milan)
Advanced enterprise campus design. routed access (2015 milan)
 
Trends In Telecommunications
Trends In TelecommunicationsTrends In Telecommunications
Trends In Telecommunications
 
Multilayer Campus Architectures and Design Principles
Multilayer Campus Architectures and Design PrinciplesMultilayer Campus Architectures and Design Principles
Multilayer Campus Architectures and Design Principles
 
Classification of Computer Networks
Classification of Computer Networks Classification of Computer Networks
Classification of Computer Networks
 
Trends In Telecommunication Services
Trends In Telecommunication ServicesTrends In Telecommunication Services
Trends In Telecommunication Services
 
Classification of Networks & Network topologies
Classification of Networks & Network topologiesClassification of Networks & Network topologies
Classification of Networks & Network topologies
 
Chapter 1 introduction to scaling networks
Chapter 1   introduction to scaling networksChapter 1   introduction to scaling networks
Chapter 1 introduction to scaling networks
 
Personal area networks (PAN)
Personal area networks (PAN)Personal area networks (PAN)
Personal area networks (PAN)
 
Network topologies
Network topologiesNetwork topologies
Network topologies
 

Similar to ENTERPRISE NETWORKING

1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networkingshiv balapure
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networkingAnuja Lad
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networkingKhan Rahimeen
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
Mayank Jain
 
Introduction to-computer-networking
Introduction to-computer-networkingIntroduction to-computer-networking
Introduction to-computer-networkingArdit Meti
 
1-introduction-to-computer-networking.ppt
1-introduction-to-computer-networking.ppt1-introduction-to-computer-networking.ppt
1-introduction-to-computer-networking.ppt
jeronimored
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
Rozitarmizi Mohammad
 
1 introduction-to-computer-networking slide
1 introduction-to-computer-networking slide1 introduction-to-computer-networking slide
1 introduction-to-computer-networking slide
nextgencyber cafe
 
introduction-to-computer-networking
introduction-to-computer-networkingintroduction-to-computer-networking
introduction-to-computer-networking
Sithu PM
 
Networking
NetworkingNetworking
Networking
RajThakuri
 
COMPUTER NETWORKING
COMPUTER NETWORKINGCOMPUTER NETWORKING
COMPUTER NETWORKING
Milind Prajapat
 
Cisco Certified Networking Associate(Project Report)
Cisco Certified Networking Associate(Project Report)Cisco Certified Networking Associate(Project Report)
Cisco Certified Networking Associate(Project Report)
saurabh goel
 
Computer Network - Unit 1
Computer Network - Unit 1Computer Network - Unit 1
Computer Network - Unit 1
Chandan Gupta Bhagat
 
Lecture 1_Introduction to Networking_1.ppt
Lecture 1_Introduction to Networking_1.pptLecture 1_Introduction to Networking_1.ppt
Lecture 1_Introduction to Networking_1.ppt
flyinimohamed
 
Networking concepts
Networking conceptsNetworking concepts
Networking concepts
Akanksha Narkhede
 
Networking Concepts.pdf
Networking Concepts.pdfNetworking Concepts.pdf
Networking Concepts.pdf
ODINARARCH
 
Computer networks--networking
Computer networks--networkingComputer networks--networking
Computer networks--networking
Tańczący Z Kojotami
 
Business Network and Telecommunication, LAN vs WAN
Business Network and Telecommunication, LAN vs WANBusiness Network and Telecommunication, LAN vs WAN
Business Network and Telecommunication, LAN vs WAN
Rashed Barakzai
 
fundamental of information technology(1)
fundamental of information technology(1)fundamental of information technology(1)
fundamental of information technology(1)
Sorath Peetamber
 

Similar to ENTERPRISE NETWORKING (20)

1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
 
Introduction to-computer-networking
Introduction to-computer-networkingIntroduction to-computer-networking
Introduction to-computer-networking
 
1-introduction-to-computer-networking.ppt
1-introduction-to-computer-networking.ppt1-introduction-to-computer-networking.ppt
1-introduction-to-computer-networking.ppt
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
 
1 introduction-to-computer-networking slide
1 introduction-to-computer-networking slide1 introduction-to-computer-networking slide
1 introduction-to-computer-networking slide
 
introduction-to-computer-networking
introduction-to-computer-networkingintroduction-to-computer-networking
introduction-to-computer-networking
 
Networking
NetworkingNetworking
Networking
 
COMPUTER NETWORKING
COMPUTER NETWORKINGCOMPUTER NETWORKING
COMPUTER NETWORKING
 
Cisco Certified Networking Associate(Project Report)
Cisco Certified Networking Associate(Project Report)Cisco Certified Networking Associate(Project Report)
Cisco Certified Networking Associate(Project Report)
 
Computer Network - Unit 1
Computer Network - Unit 1Computer Network - Unit 1
Computer Network - Unit 1
 
Lecture 1_Introduction to Networking_1.ppt
Lecture 1_Introduction to Networking_1.pptLecture 1_Introduction to Networking_1.ppt
Lecture 1_Introduction to Networking_1.ppt
 
Networking concepts
Networking conceptsNetworking concepts
Networking concepts
 
Networking Concepts.pdf
Networking Concepts.pdfNetworking Concepts.pdf
Networking Concepts.pdf
 
Computer networks--networking
Computer networks--networkingComputer networks--networking
Computer networks--networking
 
Business Network and Telecommunication, LAN vs WAN
Business Network and Telecommunication, LAN vs WANBusiness Network and Telecommunication, LAN vs WAN
Business Network and Telecommunication, LAN vs WAN
 
fundamental of information technology(1)
fundamental of information technology(1)fundamental of information technology(1)
fundamental of information technology(1)
 
Computer network ppt
Computer network pptComputer network ppt
Computer network ppt
 

More from bwire sedrick

Effect of poor customer care on the image of police a case study of uganda po...
Effect of poor customer care on the image of police a case study of uganda po...Effect of poor customer care on the image of police a case study of uganda po...
Effect of poor customer care on the image of police a case study of uganda po...
bwire sedrick
 
Planning for a good presentation
Planning for a good presentationPlanning for a good presentation
Planning for a good presentation
bwire sedrick
 
Marketing channels
Marketing channelsMarketing channels
Marketing channels
bwire sedrick
 
Principles of ict concepts and data processing
Principles of ict   concepts and data processingPrinciples of ict   concepts and data processing
Principles of ict concepts and data processing
bwire sedrick
 
Computer systems
Computer systemsComputer systems
Computer systems
bwire sedrick
 
Ura taxation handbook
Ura  taxation handbookUra  taxation handbook
Ura taxation handbook
bwire sedrick
 
E learning slide
E learning slideE learning slide
E learning slide
bwire sedrick
 
INTRODUCTION TO HTML
INTRODUCTION TO HTMLINTRODUCTION TO HTML
INTRODUCTION TO HTML
bwire sedrick
 
NETWORK COMPONENTS
NETWORK COMPONENTSNETWORK COMPONENTS
NETWORK COMPONENTS
bwire sedrick
 
Lan access control methods
Lan access control methodsLan access control methods
Lan access control methodsbwire sedrick
 
Strategy implementation
Strategy implementationStrategy implementation
Strategy implementationbwire sedrick
 
Strategic management process
Strategic management processStrategic management process
Strategic management processbwire sedrick
 
Strategic management overview
Strategic management   overviewStrategic management   overview
Strategic management overviewbwire sedrick
 
Industry analysis, swot & portfolio analysis
Industry analysis, swot & portfolio analysisIndustry analysis, swot & portfolio analysis
Industry analysis, swot & portfolio analysisbwire sedrick
 
Industry analysis, swot & portfolio analysis spare
Industry analysis, swot & portfolio analysis   spareIndustry analysis, swot & portfolio analysis   spare
Industry analysis, swot & portfolio analysis sparebwire sedrick
 
Establishing sustainable markets for ugandan products
Establishing sustainable markets for ugandan productsEstablishing sustainable markets for ugandan products
Establishing sustainable markets for ugandan productsbwire sedrick
 

More from bwire sedrick (20)

Effect of poor customer care on the image of police a case study of uganda po...
Effect of poor customer care on the image of police a case study of uganda po...Effect of poor customer care on the image of police a case study of uganda po...
Effect of poor customer care on the image of police a case study of uganda po...
 
Planning for a good presentation
Planning for a good presentationPlanning for a good presentation
Planning for a good presentation
 
Marketing channels
Marketing channelsMarketing channels
Marketing channels
 
Principles of ict concepts and data processing
Principles of ict   concepts and data processingPrinciples of ict   concepts and data processing
Principles of ict concepts and data processing
 
Computer systems
Computer systemsComputer systems
Computer systems
 
Ura taxation handbook
Ura  taxation handbookUra  taxation handbook
Ura taxation handbook
 
E learning slide
E learning slideE learning slide
E learning slide
 
INTRODUCTION TO HTML
INTRODUCTION TO HTMLINTRODUCTION TO HTML
INTRODUCTION TO HTML
 
NETWORK COMPONENTS
NETWORK COMPONENTSNETWORK COMPONENTS
NETWORK COMPONENTS
 
Osi model
Osi modelOsi model
Osi model
 
Lan access control methods
Lan access control methodsLan access control methods
Lan access control methods
 
Strategy implementation
Strategy implementationStrategy implementation
Strategy implementation
 
Strategic management process
Strategic management processStrategic management process
Strategic management process
 
Strategic management overview
Strategic management   overviewStrategic management   overview
Strategic management overview
 
Strategic choice
Strategic choiceStrategic choice
Strategic choice
 
Industry analysis, swot & portfolio analysis
Industry analysis, swot & portfolio analysisIndustry analysis, swot & portfolio analysis
Industry analysis, swot & portfolio analysis
 
Industry analysis, swot & portfolio analysis spare
Industry analysis, swot & portfolio analysis   spareIndustry analysis, swot & portfolio analysis   spare
Industry analysis, swot & portfolio analysis spare
 
Establishing sustainable markets for ugandan products
Establishing sustainable markets for ugandan productsEstablishing sustainable markets for ugandan products
Establishing sustainable markets for ugandan products
 
Course outline
Course outlineCourse outline
Course outline
 
Busgrowth
BusgrowthBusgrowth
Busgrowth
 

Recently uploaded

Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 

Recently uploaded (20)

Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 

ENTERPRISE NETWORKING

  • 1. 1 Enterprise Network Management & Administration BBC Makerere University Business School 2012-2013 BWIRE SEDRICK
  • 2. Introduction to computer networking Objective: To be acquainted with: • The definitions of networking and concepts • Network topology • Network peripherals, hardware and software
  • 3. Why Study Networking? Indispensable part of modern society  Commercial – e-commerce, banking, inventorying, telecommunications, archiving, health  Social – critical infrastructure, homeland security, policing  Human interaction/communication – email, chat, videoconferencing, social networking, entertainment Appears in every facet of engineering  Modern trend – Network every (electronic) device (computers, phones, sensors, planes, cars, TVs, appliances, heart monitors, …) 3
  • 4. Definitions A network can be defined as two or more computing devices connected together in such a way that they can share resources. The purpose of a network is to share resources. A resource may be:  A file, A folder, A printer, A disk drive, Or just about anything else that exists on a computer.
  • 5. Definitions (cont..) A network is simply a collection of computers or other hardware devices that are connected together, either physically or logically, using special hardware and software, to allow them to exchange information and cooperate. Networking is the term that describes the processes involved in designing, implementing, upgrading, managing and otherwise working with networks and network technologies.
  • 6. Advantages of networking Connectivity and Communication Data Sharing Hardware Sharing Internet Access Internet Access Sharing Data Security and Management Performance Enhancement and Balancing Entertainment
  • 7. The Disadvantages (Costs) of Networking Network Hardware, Software and Setup Costs Hardware and Software Management and Administration Costs Undesirable Sharing Illegal or Undesirable Behavior Data Security Concerns
  • 8. Network Classifications Networks can be classified by either network geography or component roles within the network. Classification by Network Geography - Networks are frequently classified according to the geographical boundaries spanned by the network itself A local area network (LAN) is a computer network covering a small geographic area, like a home, office, or group of buildings
  • 9. Network Classifications Cont Wide Area Network (WAN) is a computer network that covers a broad area (i.e., any network whose communications links cross metropolitan, regional, or national boundaries). Or, less formally, a network that uses routers and public communications links. The largest and most well-known example of a WAN is the Internet. WANs are used to connect LANs and other types of networks together, so that users and computers in one location can communicate with users and computers in other locations A Metropolitan Area Network (MAN) is a network that interconnects users in a geographic area or region larger than that covered by even a large local area network (LAN) but smaller than the area covered by a wide area network (WAN). The term is applied to the interconnection of networks in a city into a single larger network. It is also used to mean the interconnection of several local area networks by bridging them with backbone lines. The latter usage is also sometimes referred to as a campus network.
  • 10. Fundamental Network Classifications (cont) Wide Area Network
  • 11. Fundamental Network Classifications (cont) Metropolitan Area Network (MAN)
  • 12. Classification by Component Roles Networks can also be classified according to the roles that the networked computers play in the network’s operation. Peer-to-peer, server-based, and client-based are the types of roles into which networks are classified.
  • 13. Classification by Component Roles Peer-to-peer:  In a peer-to-peer network, all computers are considered equal. Each computer controls its own information and is capable of functioning as either a client or a server depending upon the requirement. Peer-to-peer networks are inexpensive and easy to install.  They are popular as home networks and for use in small companies.
  • 14. Classification by Component Roles Peer-to-peer (continued):  Most operating systems come with built-in peer- to-peer networking capability.  Peer-to-peer networks become difficult to manage when more security is added to resources, since the users control their security by password- protecting shares.  Shares can be document folders, printers, peripherals, and any other resource that they control on their computers.
  • 15. Classification by Component Roles Peer-to-peer network
  • 16. Classification by Component Roles Server-based:  A server-based network offers centralized control and is designed for secure operations. In a server- based network, a dedicated server controls the network.  A dedicated server is one that services the network by storing data, applications, resources, and also provides access to resources required by the client. These servers can also control the network’s security from one centralized location or share it with other specially configured servers.
  • 18. Classification by Component Roles Client-based:  Client-based network servers process requests from clients and return just the results.  These networks take advantage of the powerful processing capabilities of both the client and the server.  Application servers and communications servers are examples of client-based networks.
  • 19. Classification by Component Roles Client-based network
  • 20. Intranet and Internet Specifications Intranet: An intranet is a private network that is contained within an enterprise. It may consist of many interlinked local area networks and also use leased lines in the wide area network. An intranet uses TCP/IP, HTTP, and other Internet protocols and in general looks like a private version of the Internet. Extranet – a network that connects people within your company with people who are outside your company--all within a secure, password-protected network that can be accessed from anywhere Internet: is a worldwide system of computer networks - a network of networks in which users at any one computer can, if they have permission, get information from any other computer (and sometimes talk directly to users at other computers).
  • 21. Network topology A topology is a way of “laying out” the network. Topologies can be either physical or logical. Physical topologies describe how the cables are run. Logical topologies describe how the network messages travel
  • 22. Network topology (cont.) Bus (can be both logical and physical) Star (physical only) Ring (can be both logical and physical) Mesh (can be both logical and physical)
  • 23. Network topology (cont.) Bus • A bus is the simplest physical topology. It consists of a single cable that runs to every workstation. This topology uses the least amount of cabling, but also covers the shortest amount of distance. • Each computer shares the same data and address path. With a logical bus topology, messages pass through the trunk, and each workstation checks to see if the message is addressed to itself. If the address of the message matches the workstation’s address, the network adapter copies the message to the card’s on-board memory.
  • 24. Network topology (cont.) Star Topology • A physical star topology branches each network device off a central device called a hub, making it very easy to add a new workstation. • Also, if any workstation goes down it does not affect the entire network. (But, as you might expect, if the central device goes down, the entire network goes down.) • Some types of Ethernet and ARCNet use a physical star topology. Figure 8.7 gives an example of the organization of the star network.
  • 25. Network topology (cont.) Star topologies are easy to install. A cable is run from each workstation to the hub. The hub is placed in a central location in the office. Star topologies are more expensive to install than bus networks, because there are several more cables that need to be installed, plus the cost of the hubs that are needed.
  • 27. Network topology (cont.) Ring • Each computer connects to two other computers, joining them in a circle creating a unidirectional path where messages move workstation to workstation. • Each entity participating in the ring reads a message, then regenerates it and hands it to its neighbor on a different network cable.
  • 28. Network topology (cont.) The ring makes it difficult to add new computers. Unlike a star topology network, the ring topology network will go down if one entity is removed from the ring. Physical ring topology systems don’t exist much anymore, mainly because the hardware involved was fairly expensive and the fault tolerance was very low.
  • 29. Network topology (cont.) Mesh • The mesh topology is the simplest logical topology in terms of data flow, but it is the most complex in terms of physical design. • In this physical topology, each device is connected to every other device . This topology is rarely found in LANs, mainly because of the complexity of the cabling. • Because of its design, the physical mesh topology is very expensive to install and maintain. Cables must be run from each device to every other device. The advantage you gain from it is its high fault tolerance. • With a logical mesh topology, however, there will always be a way of getting the data from source to destination. • It may not be able to take the direct route, but it can take an alternate, indirect route. It is for this reason that the mesh topology is still found in WANs to connect multiple sites across WAN links. It uses devices called routersto search multiple routes through the mesh and determine the best path.
  • 31. Network topology (cont.) Advantages and Disadvantages of Network Topologies Topology Advantages Disadvantages Bus Cheap. Easy to install. Difficult to reconfigure. Break in bus disables entire network. Star Cheap. Easy to install. Easy to reconfigure. Fault tolerant. More expensive than bus. Ring Efficient. Easy to install. Reconfiguration difficult. Very expensive. Mesh Simplest. Most fault tolerant. Reconfiguration extremely difficult. Extremely expensive. Very complex.