An Introduction to Networking

Slides:



Advertisements
Similar presentations
Case Study: Pat Lee’s Home PC Network Chapter 1a Panko’s Business Data Networks and Telecommunications, 6th edition Copyright 2007 Prentice-Hall May only.
Advertisements

BTT 101 / 2O1 Lesson 10 Dundas Valley Secondary Mr. Young.
IP: The Internet Protocol
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Networking Components
Networking Components Chad Benedict – LTEC
Introduction Chapter 1 Panko’s Business Data Networks and Telecommunications, 5th edition Copyright 2005 Prentice-Hall.
An Introduction to Networking Chapter 1 Updated January 2007 Panko’s Business Data Networks and Telecommunications, 6 th edition Copyright 2007 Prentice-Hall.
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Addressing Networking for Home and Small Businesses – Chapter 5.
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
Common Devices Used In Computer Networks
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Connecting to the Network Networking for Home and Small Businesses.
An Introduction to Networking Chapter 1 Panko’s Business Data Networks and Telecommunications, 6 th edition Copyright 2007 Prentice-Hall (Modified by Kevin.
An Introduction to Networking Chapter 1 Panko’s Business Data Networks and Telecommunications, 6 th edition Copyright 2007 Prentice-Hall May only be used.
An Introduction to Networking Chapter 1. Part I: Basic Networks Concepts Concepts we will see throughout the book.
Network Addresses, Switches and Routing Bob Bradley IS361 Fall 2005 Chapter 1 Part 2.
The Internet School of Business Eastern Illinois University © Abdou Illia, Fall 2002 (Week 15, Monday 12/02/2002 and Wednesday 12/04/2002)
1 Network Basics 1.The Nine Elements of a Network 2.LANs and WANs 3.Internets 4.Packet Switching vs. Circuit Switching.
INFS 361 Chapter 1 Notes UTM Bob Bradley Fall 2005.
Lectu re 1 Recap: “Operational” view of Internet r Internet: “network of networks” m Requires sending, receiving of messages r protocols control sending,
Accessing the World Wide Web from Home Many students access the World Wide Web from home Here is how it works, in terms of standards.
1 计算机网络 胥正川 ( XU Zhengchuan ) 管理学院 信息管理与信息系统系 办公室:思源楼 708 室,电话:
Chapter 9 Introduction To Data-Link Layer Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
ITE PC v4.0 Chapter 8 1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public  Networks are systems that are formed by links.  People use different.
NT1210 Introduction to Networking
15-1 Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
19.1 Chapter 19 Network Layer: Logical Addressing Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 9 Introduction To Data-Link Layer
Chapter 2 PHYSICAL LAYER.
William Stallings Data and Computer Communications 7th Edition
Chapter 9 Introduction To Data-Link Layer 9.# 1
Instructor & Todd Lammle
COS 338 Day 1 Introduction.
Chapter Objectives In this chapter, you will learn:
Chapter 2 Network Models
Chapter 1 Introduction to Networking
Chapter 5 Network and Transport Layers
Lecture 3 By Miss Irum Matloob.
Instructor Materials Chapter 3 Communicating on a Local Network
An Introduction to Networking
Chapter 2 Network Models
Understand Wide Area Networks (WANs)
Section 4 – Computer Networks
Chapter 2 Network Models
Welcome to the Cloud Chapter 1 Panko and Panko
The OSI Model and the TCP/IP Protocol Suite
Underlying Technology
Using MIS 2e Chapter 6 Appendix
Lecture 6: TCP/IP Networking By: Adal Alashban
ADDRESSING Before you can send a message, you must know the destination address. It is extremely important to understand that each computer has several.
Instructor: Mr. Malik Zaib
Ken Gunnells, Ph.D. - Networking Paul Crigler - Programming
Web Development & Design Chapter 1, Sections 4, 5 & 6
Networks, telecommunications
Wednesday, September 19, 2018 What Is the Internet?
Computer Technology Notes #4
The OSI Model and the TCP/IP Protocol Suite
Design Unit 26 Design a small or home office network
William Stallings Data and Computer Communications 7th Edition
William Stallings Data and Computer Communications 7th Edition
Firewalls Routers, Switches, Hubs VPNs
Chapter 2 Network Models
Review of TCP/IP Internetworking
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 4: Planning and Configuring Routing and Switching.
Chapter Goals Compare and contrast various technologies for home Internet connections Explain packet switching Describe the basic roles of various network.
Lecture 6: TCP/IP Networking 1nd semester By: Adal ALashban.
Networks, telecommunications
AbbottLink™ - IP Address Overview
The OSI Model and the TCP/IP Protocol Suite
Presentation transcript:

An Introduction to Networking Chapter 1 Updated January 2007 Panko’s Business Data Networks and Telecommunications, 6th edition Copyright 2007 Prentice-Hall May only be used by adopters of the book Copyright 2005 Prentice-Hall

Builds Slides with the “mouse click” icon in the upper right hand corner are “build” slides Not everything on the slide will appear at once Each time the mouse click icon is clicked, more information on the slide will appear. <This is a note primarily for you. However, students should understand builds it if they are working from copies of slides; otherwise, they may be confused when everything doesn’t appear at once.> <Read the slide.> Copyright 2005 Prentice-Hall

Part I: Basic Networks Concepts Concepts we will see throughout the book Copyright 2005 Prentice-Hall

Figure 1-1: Basic Networking Concepts What Is a Network? A network is a transmission system that connects two or more applications running on different computers. Network Copyright 2005 Prentice-Hall

Part II: The Nine Elements of a Network Although the idea of “network” is simple, you must understand the nine elements found in most networks Copyright 2005 Prentice-Hall

Figure 1-3: Elements of a Network Client Application Server Application Message (Frame) Switch 2 Access Line 1. Networks connect applications on different computers. Client Computer Server Computer Switch 1 Switch 3 Networks connect computers: 2. Clients (fixed and mobile) and 3. Servers Trunk Line Mobile Client Outside World Wireless Access Point Router Copyright 2005 Prentice-Hall

Figure 1-3: Elements of a Network Client Application Server Application Message (Frame) Client Computer Server Computer 4. Computers (and routers) usually communicate by sending messages called frames Switch 1 Switch 3 Trunk Line Mobile Client Outside World Wireless Access Point Router Copyright 2005 Prentice-Hall

Figure 1-3: Elements of a Network Client Application Server Application Message (Frame) Client Sends Frame to Sw1 Sw2 Sends Frame To Sw3 Sw1 Sends Frame to Sw2 Switch 2 Client Computer Server Computer Sw3 Sends Frame to Server Switch 1 Switch 3 Trunk Line Mobile Client 5. Switches Forward Frames Sequentially Switch 4 Outside World Wireless Access Point Router Copyright 2005 Prentice-Hall

Figure 1-5: Ethernet Switch Operation C3- is out Port 15 D4-47-55-C4-B6-F9 Switching Table Port Host 10 A1-44-D5-1F-AA-4C 13 B2-CD-13-5B-E4-65 15 C3-2D-55-3B-A9-4F 16 D4-47-55-C4-B6-F9 Switch 2 Port 15 3 Frame to C3… Frame to C3… 1 C3-2D-55-3B-A9-4F A1-44-D5-1F-AA-4C B2-CD-13-5B-E4-65 Switch sends frame to C3- A1- sends a frame to C3- Copyright 2005 Prentice-Hall

Figure 1-3: Elements of a Network Client Application Server Application Message (Frame) Switch 2 Access Line Client Computer Server Computer 6. Wireless Access Points Connect Wireless Stations to Switches Switch 1 Switch 3 Trunk Line Mobile Client Switch 4 Outside World Wireless Access Point Router Copyright 2005 Prentice-Hall

Figure 1-3: Elements of a Network Client Application Server Application Message (Frame) Switch 2 Access Line Client Computer Server Computer 7. Routers connect networks to the outside world; Treated just like computers in single networks Switch 1 Switch 3 Trunk Line Mobile Client Switch 4 Outside World Yes, single networks can contain routers Wireless Access Point Router Copyright 2005 Prentice-Hall

Figure 1-3: Elements of a Network Client Application 8. Access Lines Connect Computers to Switches Server Application Message (Frame) Access Line Switch 2 Client Computer Server Computer Switch 1 Switch 3 Trunk Line Mobile Client 9. Trunk Lines Connect Switches to Switches and Switches to Routers Switch 4 Outside World Wireless Access Point Router Copyright 2005 Prentice-Hall

Figure 1-4: Packet Switching and Multiplexing Breaking Communications into Small Messages is Called Packet Switching, even if the Messages are Frames AC AC Client Computer A AC Server Computer C AC AC BD AC Trunk Line Multiplexed Packets Share Trunk Lines So Packet Switching Reduces the Cost of Trunk Lines BD Access Line BD BD Router D Mobile Client Computer B Copyright 2005 Prentice-Hall

Network Elements: Recap Name the 9 Elements of Single networks. Without looking back through your handout Never talk about an innovation “reducing cost,” “increasing speed,” etc. without specifying which element is cheaper or faster. For example, multiplexing only reduces the cost of trunk lines; other costs are not decreased Copyright 2005 Prentice-Hall

Part III: Transmission Speed Copyright 2005 Prentice-Hall

Figure 1-6: Transmission Speed Measuring Transmission Speed Measured in bits per second (bps) In metric notation: Increasing factors of 1,000 … Not factors of 1,024 Kilobits per second (kbps)-note the lowercase k Megabits per second (Mbps) Gigabits per second (Gbps) Terabits per second (Tbps) Copyright 2005 Prentice-Hall

Figure 1-6: Transmission Speed Measuring Transmission Speed What is 23,000 bps in metric notation? What is 3,000,000,000 in metric notation? What is 15,100,000 bps in metric notation? Occasionally measured in bytes per second If so, written as Bps Usually seen in file download speeds Copyright 2005 Prentice-Hall

Figure 1-6: Transmission Speed Writing Transmission Speeds in Proper Form The rule for writing speeds (and metric numbers in general) in proper form is that there should be 1 to 3 places before the decimal point 23.72 Mbps is correct (2 places before the decimal point). 2,300 Mbps has four places before the decimal point, so it should be rewritten as 2.3 Gbps (1 place). 0.5 Mbps has zero places to the left of the decimal point. It should be written as 500 kbps (3 places). Copyright 2005 Prentice-Hall

Figure 1-6: Transmission Speed Writing Transmission Speeds in Proper Form How to convert 1,200 Mbps to proper form Divide the number 1,200 by 1000 Move decimal point three places to the left: 1.200 Multiply the metric suffix Mbps by 1,000 Gbps Result: 1.2 Gbps Copyright 2005 Prentice-Hall

Figure 1-6: Transmission Speed Writing Transmission Speeds in Proper Form How to convert 0.036 Mbps to proper form Multiply the number 0.036 by 1000 Move decimal point three places to the right: 36 Divide the metric suffix Mbps by 1,000 kbps Result: 36 kbps Copyright 2005 Prentice-Hall

Figure 1-6: Transmission Speed Writing Transmission Speeds in Proper Form How should you write the following in proper form? 549.73 kbps 0.47 Gbps 11,200 Mbps .0021 Gbps Copyright 2005 Prentice-Hall

Figure 1-6: Transmission Speed Rated Speed The speed in bits per second that you should get (advertised or specified in the standard). Throughput The speed you actually get Almost always lower than the rated speed On Shared Transmission Lines Aggregate throughput—total throughput for all users Individual throughput—what individual users get Copyright 2005 Prentice-Hall

Part IV: LANs and WANs Copyright 2005 Prentice-Hall

Figure 1-8: LANs Versus WANs Characteristics Scope LANs WANs For transmission within a site. Campus, building, and SOHO (Small Office or Home Office) LANs For transmission between sites Campus LAN Building LAN Wide Area Network Home LAN Copyright 2005 Prentice-Hall

Figure 1-8: LANs Versus WANs Characteristics LANs WANs Cost per bit Transmitted Low High Typical Speed Unshared 100 Mbps to a gigabit per second to each desktop. Even faster trunk line speeds. Shared 128 kbps to several megabits per second trunk line speeds It’s simple economics. If the cost per unit is higher, the number of units demanded will be lower. Corporations cannot afford high-speed for most of their WAN transmission Copyright 2005 Prentice-Hall

Figure 1-9: Local Area Network (LAN) in a Large Building Wall Jack Workgroup Switch 2 Client Server Workgroup Switch 1 Wall Jack To WAN Core Switch Router Frames from the client to the server go through Workgroup Switch 2, through the Core Switch, through Workgroup Switch 1, and then to the server Copyright 2005 Prentice-Hall

Part V: Internets Copyright 2005 Prentice-Hall

Figure 1-11: Internets Single LANs Versus Internets In single networks (LANs and WANs), all devices connect to one another by switches—our focus so far. In contrast, an internet is a group of networks connected by routers so that any application on any host on any single network can communicate with any application on any other host on any other network in the internet. Application Application WAN LAN LAN Router Copyright 2005 Prentice-Hall

Host Figure 1-11: Internets Internet Components All computers in an internet are called hosts Clients as well as servers Client PC (Host) Cellphone VoIP Phone PDA Server Internet Cat (Ignores Internet) Copyright 2005 Prentice-Hall

Figure 1-11: Internets Hosts Have Two Addresses IP Address This is the host’s official address on its internet 32 bits long Expressed for people in dotted decimal notation (e.g., 128.171.17.13) Single-Network Addresses This is the host’s address on its single network Ethernet addresses, for instance, are 48 bits long Expressed in hexadecimal notation (e.g., AF-23-9B-E8-67-47) Copyright 2005 Prentice-Hall

Figure 1-11: Internets Networks are connected by devices called routers Switches provide connections within networks, while routers provide connections between networks in an internet. Frames and Packets In single networks, message are called frames In internets, messages are called packets Copyright 2005 Prentice-Hall

Figure 1-11: Internets Packets are carried within frames One packet is transmitted from the source host to the destination host across the internet Its IP destination address is that of the destination host WAN LAN LAN Router Copyright 2005 Prentice-Hall

Figure 1-11: Internets Packets are carried within frames In each network, the packet is carried in (encapsulated in) a frame If there are N networks between the source and destination hosts, there will be one packet and N networks between the source and destination hosts, there will be one packet and N frames for a transmission WAN LAN LAN Router Copyright 2005 Prentice-Hall

Figure 1-12: Internet with Three Networks Host A R1 Packet Network X A packet goes all the way across the internet; It’s path is its route Network Y Route A-B Network Z R2 Host B Copyright 2005 Prentice-Hall

Figure 1-12: Internet with Three Networks In Network X, the Packet is Placed in Frame X Frame X Details in Network X Packet Switch Host A 10.0.0.23 AB-23-D1-A8-34-DD Switch Server Host Data link A-R1 A data Link is a frame’s path through its single network Switch X1 A route is a packet’s path through the internet Mobile Client Host Switch X2 Router R1 D6-EE-92-5F-C1-56 Route A-B Network X Copyright 2005 Prentice-Hall

Figure 1-12: Internet with Three Networks Details in Network Y To Network X Route A-B Router R1 Frame Y Data Link R1-R2 Packet To Network Z Router R2 AF-3B-E7-39-12-B5 Network Y Copyright 2005 Prentice-Hall

Figure 1-12: Internet with Three Networks Network Z Details in Network Z Frame Z Packet Data Link R2-B Switch Z1 Host B www.pukanui.com 1.3.45.111 55-6B-CC-D4-A7-56 Switch Router R2 Switch Z2 Switch Router Mobile Client Host Mobile Client Computer Copyright 2005 Prentice-Hall

Figure 1-12: Internet with Three Networks In this internet with three networks, in a transmission, There is one packet There are three frames (one in each network) If a packet in an internet must pass through 10 networks, How many packets will be sent? How many frames must carry the packet? Copyright 2005 Prentice-Hall

Figure 1-13: Converting IP Addresses into Dotted Decimal Notation IP Address (32 bits long) 10000000101010110001000100001101 Divided into 4 bytes. These are segments. 10000000 10101011 00010001 00001101 Convert each byte to decimal (result will be between 0 and 255)* 128 171 17 13 Dotted decimal notation (4 segments separated by dots) 128.171.17.13 *The conversion process is described in the Hands On section at the end of the chapter. Copyright 2005 Prentice-Hall

Figure 1-17: The Internet 1. Webserver Host Computer 1. User PC Host 3. Internet Backbone (Multiple ISP Carriers) Access Line Access Line Router NAP NAP ISP ISP ISP NAP ISP 2. User PC’s Internet Service Provider 2. Webserver’s Internet Service Provider 4. NAPs = Network Access Points Connect ISPs Copyright 2005 Prentice-Hall

Figure 1-14: The Internet, internets, Intranets, and Extranets Lower-case internet Any internet Upper-case Internet The global Internet Intranet An internet restricted to users within a single company Extranet A group of resources that can be accessed by authorized people in a group of companies Copyright 2005 Prentice-Hall

Figure 1-20: IP Address Management Every Host Must Have a Unique IP address Server hosts are given static IP addresses (unchanging) Clients get dynamic (temporary) IP addresses that may be different each time they use an internet Dynamic Host Configuration Protocol (DHCP) (Figure 1-21) Clients get these dynamic IP addresses from Dynamic Host Configuration Protocol (DHCP) servers (Figure 1- 21) Copyright 2005 Prentice-Hall

Figure 1-21: Dynamic Host Configuration Protocol (DHCP) 1. DHCP Request Message: “My 48-bit Ethernet address is A3-4E-CD-59-28-7F”. Please give me a 32-bit IP address.” 2. Pool of IP Addresses Client PC A3-4E-CD-59-28-7F DHCP Server 3. DHCP Response Message: “Computer at A3-4E-CD-59-28-7F, your 32-bit IP address is 11010000101111101010101100000010”. (Usually other configuration parameters as well.) Copyright 2005 Prentice-Hall

Figure 1-20: IP Address Management Domain Name System (DNS) (Figure 1-22) IP addresses are official addresses on the Internet and other internets Hosts can also have host names (e.g., cnn.com) Not official—like nicknames If you only know the host name of a host that you want to reach, your computer must learn its IP address DNS servers tell our computer the IP address of a target host whose name you know. (Figure 1-22) Copyright 2005 Prentice-Hall

Figure 1-22: The Domain Name System (DNS) 1. Client Host wishes to reach Voyager.cba.hawaii.edu; Needs to know its IP Address DNS Table Host Name IP Address … … Voyager.cba.hawaii.edu 128.171.17.13 2. Sends DNS Request Message “The host name is Voyager.cba.hawaii.edu” Local DNS Host Voyager.cba.hawaii.edu 128.171.17.13 Copyright 2005 Prentice-Hall

Figure 1-22: The Domain Name System (DNS) DNS Table 3. DNS Host looks up the target host’s IP address Host Name IP Address … … Voyager.cba.hawaii.edu 128.171.17.13 DNS Host 4. DNS Response Message “The IP address is 128.171.17.13” 5. Client sends packets to 128.171.17.13 Voyager.cba.hawaii.edu 128.171.17.13 Copyright 2005 Prentice-Hall

Figure 1-22: The Domain Name System (DNS) The local DNS host sends back the response; the user is unaware that other DNS hosts were involved DNS Table Host Name IP Address … … Voyager.cba.hawaii.edu 128.171.17.13 Client Host Local DNS Host 1. DNS Request Message 3. DNS Response Message 2. Request & Response If local DNS host does not have the target host’s IP address, it contacts other DNS hosts to get the IP address Anther DNS Host Copyright 2005 Prentice-Hall

Part VI: Security Copyright 2005 Prentice-Hall

Figure 1-23: Firewall and Hardened Hosts Allowed Legitimate Packet Border Firewall Attacker The Internet Hardened Server Border firewall should pass legitimate packets Legitimate Packet Hardened Client PC Legitimate Host Internal Corporate Network Log File Copyright 2005 Prentice-Hall

Figure 1-23: Firewall and Hardened Hosts Server Border firewall should deny (drop) and log attack packets Attack Packet Border Firewall Attacker The Internet Hardened Client PC Denied Attack Packet Legitimate Host Internal Corporate Network Log File Copyright 2005 Prentice-Hall

Figure 1-23: Firewall and Hardened Hosts Server Attack Packet Attack Packet Border Firewall Attacker The Internet Hosts should be hardened against attack packets that get through Attack Packet Denied Attack Packet Hardened Client PC Legitimate Host Internal Corporate Network Log File Copyright 2005 Prentice-Hall

Figure 1-24: Cryptographic Protections Cryptography The use of mathematical operations to thwart attacks on message dialogues between pairs of communicating parties (people, programs, or devices) Initial Authentication Determine the other party’s identity to thwart impostors Copyright 2005 Prentice-Hall

Figure 1-24: Cryptographic Protections Message-by-Message Protections Encryption to provide confidentiality so that an eavesdropper cannot reach intercepted messages Electronic signatures provide message-by-message authentication to prevent the insertion of messages by an impostor after initial authentication Electronic signatures usually also provide message integrity; this tells the receiver whether anyone has changed the message en route Copyright 2005 Prentice-Hall

Topics Covered Copyright 2005 Prentice-Hall

Network Elements: Recap Applications (the only element that users care about) Computers Clients Servers Switches and Routers Transmission Lines Trunk lines Access Lines Messages (Frames) Wireless Access Points Never talk about an innovation “reducing cost,” “increasing speed,” etc. without specifying which element is cheaper or faster. For example, multiplexing only reduces the cost of trunk lines; other costs are not decreased Copyright 2005 Prentice-Hall

Recap: LANs and WANs LANs transmit data within corporate sites WANs transmit data between corporate sites Each LAN or WAN is a single network LAN costs are low and speeds are high WAN costs are high and speeds are lower WAN Copyright 2005 Prentice-Hall

Recap: Internets Most firms have multiple LANs and WANs. They must create internets An internet is a collection of networks connected by routers so that any application on any host on any single network can communicate with any application on any other host on any other network in the internet. Application Application WAN LAN LAN Router Router Copyright 2005 Prentice-Hall

Recap: Internets Elements of an Internet Computers connected to the internet are called hosts Both servers and client PCs are hosts Routers connect the networks of the internet together In contrast, switches forward frames within individual networks Router Router WAN LAN LAN Client PC Host Server Host Copyright 2005 Prentice-Hall

Recap: Internets Hosts Have Two Addresses IP Address This is the host’s official address on its internet 32 bits long Expressed for people in dotted decimal notation (e.g., 128, 171, 17.13) Single Network Addresses This is the host’s address on its single network Ethernet addresses, for instance, are 48 bits long Expressed in hexadecimal notation, e.g., AF-23-9B-E8-67-47 Copyright 2005 Prentice-Hall

Recap: Internets Switches versus Routers Messages Switches move frames through a single network (LAN or WAN) Routers move packets through internets Messages Messages in single networks are called frames Messages in internets are called packets Packets are encapsulated within (carried inside) frames Copyright 2005 Prentice-Hall

Recap: Security Security Firewalls Hardened Hosts Cryptographic security for sensitive dialogues Initial authentication Encryption for confidentiality Electronic signatures for authentication and message integrity Copyright 2005 Prentice-Hall