Unit 10 Setting up an IT Network

Slides:



Advertisements
Similar presentations
INTRODUCTION TO COMPUTER NETWORKS Zeeshan Abbas. Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS.
Advertisements

© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Communicating over the Network Network Fundamentals – Chapter 2.
Linux+ Guide to Linux Certification, Second Edition Chapter 14 Network Configuration.
Shalini Bhavanam. Key words: Basic Definitions Classification of Networks Types of networks Network Topologies Network Models.
1 Chapter 9 Computer Networks. 2 Chapter Topics OSI network layers Network Topology Media access control Addressing and routing Network hardware Network.
Chapter Extension 7 How the Internet Works © 2008 Prentice Hall, Experiencing MIS, David Kroenke.
Networking Theory (Part 1). Introduction Overview of the basic concepts of networking Also discusses essential topics of networking theory.
Prepared By E.Musa Alyaman1 Networking Theory Chapter 1.
1 25\10\2010 Unit-V Connecting LANs Unit – 5 Connecting DevicesConnecting Devices Backbone NetworksBackbone Networks Virtual LANsVirtual LANs.
INTRODUCTION TO COMPUTER NETWORKS INTRODUCTION Lecture # 1 (
COMPUTER NETWORKS.
Term 2, 2011 Week 1. CONTENTS Network communications standards – Ethernet – TCP/IP Other network protocols – The standard – Wireless application.
Network Protocols and Standards (Part 1). Network Protocols Understanding the concepts of networking protocols is critical to being able to troubleshoot.
IP Addressing Basics LAB 8.
LAN Review. What is a Network? A group of computers and devices connected together for the purpose of sharing resources and services.
IP Addressing Basics LAB 8.
30/11/ Q & A on Networking. Question No. 1 What is Networking? Two or more computers that are linked in order to share – Resources (such as printers.
Module 4 - Networking MIS5122: Enterprise Architecture for the IT Auditor.
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
LECTURE 9 CT1303 LAN. LAN DEVICES Network: Nodes: Service units: PC Interface processing Modules: it doesn’t generate data, but just it process it and.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Addressing Networking for Home and Small Businesses – Chapter 5.
Networks LANS,. FastPoll True Questions Answer A for True and B for False A wireless infrastructure network uses a centralized broadcasting device, such.
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
NetworkProtocols. Objectives Identify characteristics of TCP/IP, IPX/SPX, NetBIOS, and AppleTalk Understand position of network protocols in OSI Model.
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Connecting to the Network Networking for Home and Small Businesses.
1 A L L A H. Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS.
ACM 511 Chapter 2. Communication Communicating the Messages The best approach is to divide the data into smaller, more manageable pieces to send over.
 Network Segments  NICs  Repeaters  Hubs  Bridges  Switches  Routers and Brouters  Gateways 2.
Chapter Three Network Protocols By JD McGuire ARP Address Resolution Protocol Address Resolution Protocol The core protocol in the TCP/IP suite that.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 2: Configuring Network Protocols.
Linux+ Guide to Linux Certification, Second Edition Chapter 14 Network Configuration.
Computer Networks. A computer network is defined as the interconnection of 2 or more independent computers or/and peripherals. Computer Network.
LECTURE ON IP Addressing. What is Networking? –by ‘computer network’ we mean the interconnection between different computers. Why Networking? –to share.
Layer 3: Internet Protocol.  Content IP Address within the IP Header. IP Address Classes. Subnetting and Creating a Subnet. Network Layer and Path Determination.
Chapter2 Networking Fundamentals
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Linux Operations and Administration Chapter Eight Network Communications.
WEEK 11 – TOPOLOGIES, TCP/IP, SHARING & SECURITY IT1001- Personal Computer Hardware System & Operations.
ISDS 4120 Project 1 DWAYNE CARRAL JR 3/27/15. There are seven layers which make up the OSI (Open Systems Interconnection Model) which is the model for.
Rehab AlFallaj.  Network:  Nodes: Service units: PC Interface processing Modules: it doesn’t generate data, but just it process it and do specific task.
Voice Over Internet Protocol (VoIP) Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Presentation 5 – VoIP and the OSI Model.
ITE PC v4.0 Chapter 8 1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public  Networks are systems that are formed by links.  People use different.
The OSI Model. Understanding the OSI Model In early 1980s, manufacturers began to standardize networking so that networks from different manufacturers.
CIS 173 Networking Week #9 OBJECTIVES Chapter #6 Network Communications Protocols.
Computer Engineering and Networks, College of Engineering, Majmaah University INTRODUCTION TO COMPUTER NETWORKS Mohammed Saleem Bhat
INTRODUCTION TO COMPUTER NETWORKS BY: SAIKUMAR III MSCS, Nalanda College.
Instructor Materials Chapter 4: Network Addressing
Chapter Objectives In this chapter, you will learn:
Featrues of Compputer Networks
Computer Networks.
INTRODUCTION TO COMPUTER NETWORKS
Circuit Switching Circuit switching refers to a communication mechanism that establishes a path between a sender and receiver with guaranteed isolation.
NETWORK TOPOLOGIES There are three basic configurations used to connect computers they are the Bus Ring Star.
Lecture 6: TCP/IP Networking By: Adal Alashban
Introduction to Computers
CT1303 LAN Rehab AlFallaj.
The Open System Interconnection (OSI) Model & Network Protocols.
Computer Networks.
Chapter 5 Networks Communicating and Sharing Resources
Chapter 6 Networks Communicating and Sharing Resources
I. Basic Network Concepts
Computing Over Distance
Network Devices Hub Definition:
INTRODUCTION TO COMPUTER NETWORKS
INTRODUCTION TO COMPUTER NETWORKS
INTRODUCTION TO COMPUTER NETWORKS
INTRODUCTION TO COMPUTER NETWORKS
Objectives: 1.Identify different internet protocol (IP) 2.Configure sample of IP address 3.Appreciate and relate protocol in our life.
Presentation transcript:

Unit 10 Setting up an IT Network IP addresses, Protocols & Topologies

IP Address An IP address is a unique number that is used to identify a network device and is represented as a 32-bit binary number, divided into four octets (groups of eight bits): Example: 10111110.01100100.00000101.00110110 1 bit = a binary digit 1 byte = 8 binary digits long (an octet) 128, 64, 32,16,8,4,2,unit 8.3.2 Describe IP addressing An IP address is a number that is used to identify a device on the network. Each device on a network has a unique IP address. A network device is referred to as a host or node. Each host must have an IP address within the same network to be able to communicate with each other. The IP address is similar to the mailing address of a person. It is known as a logical address because it is logically assigned based on the host location. The IP address, or network address, is based on the local network and is assigned to each host by a network administrator. This process is similar to the local government assigning a street address based on the logical description of the city or village and neighborhood. An IP address consists of a series of 32 binary bits (ones and zeros). The 32 bits are grouped into four 8-bit bytes called octets. Example: 10111110.01100100.00000101.00110110 An IP address is also represented in a dotted decimal format. Example: the binary IP address shown above is 190.100.5.54 When a host is configured with an IP address, it is entered as a dotted decimal number, such as 192.168.1.5. Imagine if you had to enter the 32-bit binary equivalent of this: 11000000101010000000000100000101. If just one bit were mistyped, the address would be different and the host may not be able to communicate on the network. Unique IP addresses on a network ensure that data can be sent to and received from the correct network device. The logical 32-bit IP address is hierarchical and is composed of two parts. The first part identifies the network and the second part identifies a host on that network. Both parts are required in an IP address. As an example, if a host has IP address 192.168.18.57, the first three octets, 192.168.18, identify the network portion of the address, and the last octet, 57 identifies the host. This is known as hierarchical addressing, because the network portion indicates the network on which each unique host address is located. Routers only need to know how to reach each network and not the location of each individual host. Class A - Large networks, implemented by large companies and some countries. First octet is from 1-127. 127.0.0.0 is a special network reserved for testing. 127.0.0.1 is a loopback address. Class B - Medium-sized networks, implemented by universities. First octet is from 128-191. Class C - Small networks, implemented by ISP for customer subscriptions. First octet is from 192-223. Class D - Special use for multicasting. First octet is from 224-240. Class E - Used for experimental testing

IP Address An IP address is also represented in a dotted decimal format. Example: 190.100.5.54 When a host is configured with an IP address, it is entered as a dotted decimal number, such as 192.168.1.5. This IP address must be unique on a network to ensure data can be sent/received. 8.3.2 Describe IP addressing An IP address is a number that is used to identify a device on the network. Each device on a network has a unique IP address. A network device is referred to as a host or node. Each host must have an IP address within the same network to be able to communicate with each other. The IP address is similar to the mailing address of a person. It is known as a logical address because it is logically assigned based on the host location. The IP address, or network address, is based on the local network and is assigned to each host by a network administrator. This process is similar to the local government assigning a street address based on the logical description of the city or village and neighborhood. An IP address consists of a series of 32 binary bits (ones and zeros). The 32 bits are grouped into four 8-bit bytes called octets. Example: 10111110.01100100.00000101.00110110 An IP address is also represented in a dotted decimal format. Example: the binary IP address shown above is 190.100.5.54 When a host is configured with an IP address, it is entered as a dotted decimal number, such as 192.168.1.5. Imagine if you had to enter the 32-bit binary equivalent of this: 11000000101010000000000100000101. If just one bit were mistyped, the address would be different and the host may not be able to communicate on the network. Unique IP addresses on a network ensure that data can be sent to and received from the correct network device. The logical 32-bit IP address is hierarchical and is composed of two parts. The first part identifies the network and the second part identifies a host on that network. Both parts are required in an IP address. As an example, if a host has IP address 192.168.18.57, the first three octets, 192.168.18, identify the network portion of the address, and the last octet, 57 identifies the host. This is known as hierarchical addressing, because the network portion indicates the network on which each unique host address is located. Routers only need to know how to reach each network and not the location of each individual host. Class A - Large networks, implemented by large companies and some countries. First octet is from 1-127. 127.0.0.0 is a special network reserved for testing. 127.0.0.1 is a loopback address. Class B - Medium-sized networks, implemented by universities. First octet is from 128-191. Class C - Small networks, implemented by ISP for customer subscriptions. First octet is from 192-223. Class D - Special use for multicasting. First octet is from 224-240. Class E - Used for experimental testing

IP Classes Class A: Large networks, implemented by large companies and some countries, First octet = 1 – 127 Reserved for testing; first octet = 127 Class B: Medium-sized networks, implemented by universities, First octet =128-191 Class C: Small networks, implemented by ISP for customer subscriptions, First octet =192-223 Class D: Special use for multicasting, First octet =223-240 Class E: Used for experimental testing 8.3.2 Describe IP addressing An IP address is a number that is used to identify a device on the network. Each device on a network has a unique IP address. A network device is referred to as a host or node. Each host must have an IP address within the same network to be able to communicate with each other. The IP address is similar to the mailing address of a person. It is known as a logical address because it is logically assigned based on the host location. The IP address, or network address, is based on the local network and is assigned to each host by a network administrator. This process is similar to the local government assigning a street address based on the logical description of the city or village and neighborhood. An IP address consists of a series of 32 binary bits (ones and zeros). The 32 bits are grouped into four 8-bit bytes called octets. Example: 10111110.01100100.00000101.00110110 An IP address is also represented in a dotted decimal format. Example: the binary IP address shown above is 190.100.5.54 When a host is configured with an IP address, it is entered as a dotted decimal number, such as 192.168.1.5. Imagine if you had to enter the 32-bit binary equivalent of this: 11000000101010000000000100000101. If just one bit were mistyped, the address would be different and the host may not be able to communicate on the network. Unique IP addresses on a network ensure that data can be sent to and received from the correct network device. The logical 32-bit IP address is hierarchical and is composed of two parts. The first part identifies the network and the second part identifies a host on that network. Both parts are required in an IP address. As an example, if a host has IP address 192.168.18.57, the first three octets, 192.168.18, identify the network portion of the address, and the last octet, 57 identifies the host. This is known as hierarchical addressing, because the network portion indicates the network on which each unique host address is located. Routers only need to know how to reach each network and not the location of each individual host. Class A - Large networks, implemented by large companies and some countries. First octet is from 1-127. 127.0.0.0 is a special network reserved for testing. 127.0.0.1 is a loopback address. Class B - Medium-sized networks, implemented by universities. First octet is from 128-191. Class C - Small networks, implemented by ISP for customer subscriptions. First octet is from 192-223. Class D - Special use for multicasting. First octet is from 224-240. Class E - Used for experimental testing

Subnet Masks IP address used to indicate the network and the host portion of an IP address. Usually, all hosts within a broadcast domain of a LAN (bounded by routers) use the same subnet mask. The default subnet masks for three classes of IP addresses. 8.3.2 Describe IP addressing If an organization owns one Class B network but needs to provide IP addresses for four LANs, the organization will subdivide the Class B network into four smaller parts by using subnetting, which is a logical division of a network. The subnet mask specifies how it is subdivided. An experienced network administrator typically performs subnetting. After the subnetting scheme has been created, the proper IP addresses and subnet masks can be configured on the hosts in the four subnetted LANs. These skills are taught in the Cisco Networking Academy courses related to CCNA level networking skills. Manual IP address configuration In a network with a small number of hosts, it is easy to manually configure each device with the proper IP address. A network administrator who understands IP addressing should assign the addresses and should know how to choose a valid address for a particular network. To manually enter an IP address on a host, go to the TCP/IP settings in the Properties window for the Network Interface Card (NIC). The NIC is the hardware that enables a computer to connect to a network. It has an address called the Media Access Control (MAC) address. Whereas the IP address is a logical address that is defined by the network administrator, a MAC address is "burned-in" or permanently programmed into the NIC when it is manufactured. The IP address of a NIC can be changed, but the MAC address never changes. The main difference between an IP address and a MAC address is that the MAC address is used to deliver frames on the LAN, while an IP address is used to transport frames outside the LAN. A frame is a data packet, along with address information added to the beginning and end of the packet before transmission over the network. Once a frame is delivered to the destination LAN, the MAC address is used to deliver the frame to the end host on that LAN. Dynamic IP address configuration If more than a few computers comprise the LAN, manually configuring IP addresses for every host on the network can be time-consuming and prone to errors. In this case, the use of a Dynamic Host Configuration Protocol (DHCP) server would automatically assign IP addresses and greatly simplify the addressing process. Student Activity: The student course content includes worksheet, 8.3.2 Identify IP Address Classes. To complete this worksheet, students will specify the IP Address Class for each given IP address and mask.

Configuring An IP address can be configured: Manually: typing the proper IP address and subnet mask Dynamically: Using a Dynamic Host Configuration Protocol (DHCP) server. Network Interface Card (NIC) is the hardware that enables a computer to connect to a network and it has two addresses: The IP address is a logical address that can be changed. The Media Access Control (MAC) address that is "burned-in" or permanently programmed into the NIC when manufactured. 8.3.2 Describe IP addressing If an organization owns one Class B network but needs to provide IP addresses for four LANs, the organization will subdivide the Class B network into four smaller parts by using subnetting, which is a logical division of a network. The subnet mask specifies how it is subdivided. An experienced network administrator typically performs subnetting. After the subnetting scheme has been created, the proper IP addresses and subnet masks can be configured on the hosts in the four subnetted LANs. These skills are taught in the Cisco Networking Academy courses related to CCNA level networking skills. Manual IP address configuration In a network with a small number of hosts, it is easy to manually configure each device with the proper IP address. A network administrator who understands IP addressing should assign the addresses and should know how to choose a valid address for a particular network. To manually enter an IP address on a host, go to the TCP/IP settings in the Properties window for the Network Interface Card (NIC). The NIC is the hardware that enables a computer to connect to a network. It has an address called the Media Access Control (MAC) address. Whereas the IP address is a logical address that is defined by the network administrator, a MAC address is "burned-in" or permanently programmed into the NIC when it is manufactured. The IP address of a NIC can be changed, but the MAC address never changes. The main difference between an IP address and a MAC address is that the MAC address is used to deliver frames on the LAN, while an IP address is used to transport frames outside the LAN. A frame is a data packet, along with address information added to the beginning and end of the packet before transmission over the network. Once a frame is delivered to the destination LAN, the MAC address is used to deliver the frame to the end host on that LAN. Dynamic IP address configuration If more than a few computers comprise the LAN, manually configuring IP addresses for every host on the network can be time-consuming and prone to errors. In this case, the use of a Dynamic Host Configuration Protocol (DHCP) server would automatically assign IP addresses and greatly simplify the addressing process. Student Activity: The student course content includes worksheet, 8.3.2 Identify IP Address Classes. To complete this worksheet, students will specify the IP Address Class for each given IP address and mask.

Internet Protocols TCP/IP NETBEUI and NETBIOS IPX and SPX FTP SSH A protocol is a set of rules. Internet protocols govern communication within and between computers on a network. Many protocols consist of a suite (or group) of protocols stacked in layers. These layers depend on the operation of the other layers in the suite to function properly. The main functions of protocols: Identifying errors Compressing the data Deciding how data is to be sent Addressing data Deciding how to announce sent and received data Protocols used for browsing the web, sending and receiving e-mail, and transferring data files. 8.3.4 Describe Internet protocols and applications Timing is crucial to network operation. Protocols require messages to arrive within certain time intervals so that computers will not wait indefinitely for messages that may have been lost. Therefore, systems maintain one or more timers during transmission of data. Protocols also initiate alternative actions if the network does not meet the timing rules. These are the main functions of protocols: Identifying errors Compressing the data Deciding how data is to be sent Addressing data Deciding how to announce sent and received data Here is a summarized list of some of the more common protocols used on networks and the Internet. These protocols are used to browse the web, send and receive e-mail, and transfer data files. TCP/IP - A protocol used to transport data on the Internet. NETBEUI and NETBIOS – A small, fast protocol designed for a workgroup network that requires no connection to the Internet. IPX and SPX – A protocol used to transport data on a Novell Netware network. HTTP and HTTPS – A protocol that defines how files are exchanged on the Web. FTP – A protocol that provides services for file transfer and manipulation. SSH – A protocol that is used to connect computers together securely. Telnet – A protocol that uses a text-based connection to a remote computer. POP – A protocol used to download email messages from an email server. IMAP – A protocol used to download email messages from an email server. SMTP – A protocol used to send mail in a TCP/IP network. Student Activity: The student course content includes a matching activity, 8.3.4 Network Protocols. To complete this matching activity, students will match the definition to the appropriate protocol. TCP/IP NETBEUI and NETBIOS IPX and SPX FTP SSH Telnet POP IMAP SMTP HTTP and HTTPS

Two Types of LAN Topologies Physical topology is the physical layout of the components on the network 8.5 Describe LAN topologies and architectures Topologies and architectures are building blocks for designing a computer network. A technician needs to understand how networks are designed in order to work on computers that are part of a network. There are two types of LAN topologies: physical and logical. A physical topology is the physical layout of the components on the network. A logical topology determines how the hosts communicate across a medium, such as a cable or the airwaves. Topologies are commonly represented as network diagrams. A LAN architecture is built around a topology. LAN architecture comprises all the components that make up the structure of a communications system. These components include the hardware, software, protocols, and sequence of operations. After completing this section, students will meet these objectives: Describe LAN topologies Describe LAN architectures Logical topology determines how the hosts access the medium to communicate across the network

LAN Physical Topologies A physical topology defines the way in which computers, printers, and other devices are connected to a network. Bus Each computer connects to a common cable The ends of the cable have a terminator installed to prevent signal reflections and network errors. Only one computer can transmit data at a time or frames will collide and be destroyed. Ring Hosts are connected in a physical ring or circle. A special frame, a token, travels around the ring, stopping at each host to allow data transmission. There are two types of ring topologies: Single-ring and Dual-ring 8.5.1 Describe LAN topologies LAN Physical Topologies A physical topology defines the way in which computers, printers, and other devices are connected to a network. A logical topology describes how the hosts access the medium and communicate on the network. The type of topology determines the capabilities of the network, such as ease of setup, speed, and cable lengths. These are common LAN physical topologies: Bus Topology The cable connects one computer to the next, like a bus line going through a city. The terminator prevents signals from bouncing back and causing network errors. When this happens, the computers must resend the frames. This topology is rarely used and would only be suitable for a home office or small business with few hosts. Ring Topology In a ring topology, hosts are connected in a physical ring or circle. The ring topology has no beginning or end, so the cable does not need to be terminated. A specially-formatted frame, called a token, travels around the ring, stopping at each host. If a host wants to transmit data, the host adds the data and the destination address to the frame. The frame then continues around the ring until the frame stops at the host with the destination address. The destination host takes the data out of the frame. The advantage of using a ring topology is that there are no collisions. When electrical signals run into each other, they cancel each other out. This is called a collision. There are no collisions because the host with the token is the only host that is allowed to transmit data. There are two types of ring topologies: Single-ring - All the devices on the network connect to a single cable and the data travels in one direction only. Each device has an opportunity to send data over the network. Dual ring - All the devices on the network connect to two cables and the data travels in both directions. Only one cable is used at a time. In the event of a failure of one ring, data is transmitted on the other ring. A Token Ring network is the most common implementation of the ring topology. A Token Ring network uses a ring topology and a token-passing methodology to prevent collisions. Some characteristics of Token Ring networks are: Token Ring was developed by IBM and conforms to the Institute of Electrical and Electronics Engineers (IEEE) 802.5 standard. Token Ring networks typically operate at 4 or 16 Mbps.

LAN Physical Topologies (Continued) Star Has a central connection point : a hub, switch, or router. Easy to troubleshoot, since each host is connected to the central device with its own wire. Hierarchical or Extended Star Topology A star network with an additional networking device connected to the main networking device to increase the size of the network. Used for larger networks. Mesh Topology Connects all devices to each other. Used in WANs that interconnect LANs. The Internet is an example of a mesh topology. 8.5.1 Describe LAN topologies Star Topology Each host on a network has a cable segment that attaches the host directly to the central connection point. A star topology costs more to implement than the bus topology because more cable is used, and a central device is needed, such as a hub, switch, or router. If there is a problem with that cable, only that host is affected. The rest of the network remains operational. Hierarchical Star Topology A hierarchical or extended star topology is a star network with an additional networking device connected to the main networking device. Typically, a network cable connects to one hub, and then several other hubs connect to the first hub. A hierarchical star topology can be used with network devices that filter frames or packets, such as bridges, switches, and routers. This topology, when used with these devices, significantly reduces congestion by sending packets only to the network segment of the destination host. Larger networks, such as those of corporations or universities, use the hierarchical star topology. Mesh Topology The mesh topology connects all devices to each other. When every device is connected to every other device, a failure of any cable will not affect the network. Mesh topologies are expensive and difficult to install because of the amount of cable necessary to connect every device to every other device on the network. On the Internet, if one device breaks down, the data can be routed through another device. Mesh topologies are often used by governments when data must be available even in the event of a network failure

Logical Topologies The two most common types of logical topologies are broadcast and token passing. In a broadcast topology, there is no order that the hosts must follow to use the network – it is first come, first served for transmitting data on the network. Token passing controls network access by passing an electronic token sequentially to each host. When a host receives the token, it can send data on the network. If the host has no data to send, it passes the token to the next host and the process repeats itself. 8.5.1 Describe LAN topologies The two most common types of logical topologies are broadcast and token passing. In a broadcast topology, each host addresses either data to a particular host or to all hosts connected on a network. There is no order that the hosts must follow to use the network – it is first come, first served for transmitting data on the network. Token passing controls network access by passing an electronic token sequentially to each host. When a host receives the token, it can send data on the network. If the host has no data to send, it passes the token to the next host and the process repeats itself.