Module 6 Networking. Why Network? Despite the costs of implementation and maintenance, networks actually save organizations money by allowing them to:

Slides:



Advertisements
Similar presentations
Introduction to Computer Administration. Computer Network - Basic Concepts Computer Networks Computer Networks Communication Model Communication Model.
Advertisements

Networks & Components Discuss the components required for successful communications Explain the purpose of communications software Identify various sending.
Information Technology Foundations-BIT 112 TECHNOLOGY GUIDE FOUR Basics of Telecommunications and Networks.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Communicating over the Network Network Fundamentals – Chapter 2.
99 CHAPTER COMMUNICATIONS AND NETWORKS. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved. 9-2 Competencies Discuss connectivity, the wireless.
Telecommunications Chapter 5 Chapter 5 Telecommunications
Chapter 3 _2 Making the Connection: The Basics of Networking.
1 Chapter 7 Networking: Computer Connections. Basic Components of a Network Sending device Communications link Receiving device.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Networks “Each time you use the telephone you use the world’s largest computer network – the telephone system”
D-1 Management Information Systems for the Information Age Second Canadian Edition Copyright 2004 The McGraw-Hill Companies, Inc. All rights reserved.
CHAPTER Copyright 2003 The McGraw-Hill Companies, Inc.Copyright 2003 The McGraw-Hill Companies, Inc. 1 Connectivity, the Wireless Revolution, and Communications.
Chapter Preview  In this chapter, we will study:  The basic components of a telecomm system  The technologies used in telecomm systems  Various ways.
Chapter 9 Communications and Network Tyler Clutts.
For more notes and topics visit: eITnotes.com.
Information Technology in Business: Telecommunications, Networks and Internet Basics.
Module 4 - Networking MIS5122: Enterprise Architecture for the IT Auditor.
Lead Black Slide Powered by DeSiaMore1. 2 Chapter 6 Information System Networks and the Internet.
Communications & Networks
Computer communication
LANs Cabling Topologies Segments and bridges Switches and routers.
Chapter 5 Networks Communicating and Sharing Resources
LECTURE 9 CT1303 LAN. LAN DEVICES Network: Nodes: Service units: PC Interface processing Modules: it doesn’t generate data, but just it process it and.
Networks and Telecommunications
Chapter 9A Network Basics.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco PublicNew CCNA Jianxin Tang IT 1 V4.0 Ch8. Fundamental Networks.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Data Communication. 2 Data Communications Data communication system components: Message Message Information (data) to be communicated. Sender Sender Device.
Communications and Networks © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials 2013.
Chapter 7 Networking: Computer Connections. Networks n Network - a computer system that uses communications equipment to connect two or more computers.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Connecting to the Network Networking for Home and Small Businesses.
ACM 511 Chapter 2. Communication Communicating the Messages The best approach is to divide the data into smaller, more manageable pieces to send over.
Communications and Networks Chapter 8. 2 Introduction We live in a truly connected society. Increased connectivity potentially means increased productivity,
Chapter 2 Communications Networks. Introduction Look at: –Telephony Networks (2.2) –OSI Reference Model(2.3) –The Internet (2.4) –Asynchronous Transfer.
Extended Learning Module D
Module 2: Information Technology Infrastructure
Basic Concepts of a Computer Network
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
Living Online Module Lesson 23 — Networks and Telecommunication
Linux+ Guide to Linux Certification, Second Edition Chapter 14 Network Configuration.
$100 $200 $300 $400 $500 Network topologies Client Architecture Physical Transmission Media Uses of Tele communications Misc. Network Misc. Network.
1 CHAPTER 8 TELECOMMUNICATIONSANDNETWORKS. 2 TELECOMMUNICATIONS Telecommunications: Communication of all types of information, including digital data,
Lecture 11 Network Basics. 2 Network Definition Set of technologies that connects computers –Hardware, software & media Allows users to –communicate and.
What is a Network? Living Online Lesson 1 Mrs. Elzey.
First, by sending smaller individual pieces from source to destination, many different conversations can be interleaved on the network. The process.
Summary - Part 2 - Objectives The purpose of this basic IP technology training is to explain video over IP network. This training describes how video can.
Reference :Understanding Computers
Computer Networking Dinesh Kumar Ram PGT Comp.Sc. KV NAD Aluva.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Connecting to the Network Introduction to Networking Concepts.
Living Online Module Lesson 23 — Networks and Telecommunication Computer Literacy BASICS.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Networking… By: Allan Joe Next page.
Communications and Networks Chapter 9 9-1Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Communicating over the Network Network Fundamentals – Chapter 2.
Rehab AlFallaj.  Network:  Nodes: Service units: PC Interface processing Modules: it doesn’t generate data, but just it process it and do specific task.
Chapter 9 Communications and Networks McGraw-Hill/Irwin Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved.
ITE PC v4.0 Chapter 8 1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public  Networks are systems that are formed by links.  People use different.
How Information Flows via the Internet By: Lee Farrell.
Computer Networks and Internet. 2 Objectives Computer Networks Computer Networks Internet Internet.
Network media, protocols and networking standards, networking hardware.
Win Phillips, Ph.D Win Phillips, Ph.D. Clinical Assistant Professor University of Missouri Columbia, MO.
99 CHAPTER COMMUNICATIONS AND NETWORKS. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved. 9-2 Competencies Discuss connectivity, the wireless.
COMMUNICATION AND NETWORKS 99 computing ESSENTIALS
Chapter Objectives In this chapter, you will learn:
Module 1: Understanding Local Area Networks
Chapter 4 Computer Networks – Part 2
CT1303 LAN Rehab AlFallaj.
Computer Technology Notes #4
Intro To Computer Networks
Introduction to Computer Administration
Presentation transcript:

Module 6 Networking

Why Network? Despite the costs of implementation and maintenance, networks actually save organizations money by allowing them to: Consolidate (centralize) data storage Share peripheral devices like printers Increase internal and external communications Increase productivity and collaboration

Networking A network is a group of computers that can share information through their interconnections. 1.Computers (nodes or hosts). 2.Transmission media provides a path for electrical signals between devices. 3.Network interfaces are devices that send and receive electrical signals. 4.Protocols are rules or standards that describe how hosts communicate and exchange data.

Networking Network Type Description Peer-to-peer In peer-to-peer networking (also called workgroups), each computer controls access to its own resources. Security controls on each computer identify who can have access to the computer's resources. Client/server In client/server networking, shared resources reside on special computers called servers. Other computers, called clients connect to the server to access resources. Security controls on the server identify which clients can have resource access. Windows computers use the concept of a domain for client/server networking. The domain identifies a group of computers with the same security and administrative boundaries. Active Directory is a service that provides a centralized database of resources within a domain.

Protocols A protocol is a rule that identifies some aspect of how computers communicate on a network. For two computers to communicate, they must be using the same protocols. Protocols are grouped into protocol suites, or sets of related protocols. Virtually all operating systems today provide native (built-in) support for TCP/IP. Most older versions of some operating systems used a different protocol as the default protocol suite. For example, older NetWare servers used IPX/SPX, while Mac OS systems used AppleTalk. – Older operating systems without native TCP/IP support enabled TCP/IP communications by either installing the protocol stack or through a process known as encapsulation or tunneling. With this process, non- TCP/IP packets are re-packaged as TCP/IP packets at the sending device. The receiving device strips off the TCP/IP headers to reveal the original packets.

Protocols ProtocolDescription HTTP HyperText Transfer Protocol is used by Web browsers and Web servers to exchange files (Web pages) through the World Wide Web and intranets. HTTP can be described as an information requesting and responding protocol. HTML HyperText Markup Language is a data format that is used to create hypertext documents that can be viewed from multiple platforms. HTML has become a common language used for programming information in a format that is readable by web browsers. DNS Domain Name System is a system that is distributed throughout the Internet to provide Host name/IP address resolution. For example, the name would be identified with a specific IP address.

Protocols ProtocolDescription Telnet Remote Terminal Emulation allows an attached computer to act as a dumb terminal, with data processing taking place on the TCP/IP host computer. SSH Secure Shell allows for secure interactive control of remote systems. SSH is a secure and acceptable alternative to Telnet. SSL Secure Sockets Layer secures messages being transmitted on the Internet. It uses RSA for authentication and encryption. Web browsers use SSL (Secure Sockets Layer) to ensure safe Web transactions. URLs that begin with trigger your Web browser to use SSL. HTTPS HyperText Transfer Protocol over Secure Socket Layer or HTTP over SSL. HTTPS is a secure form of HTTP that uses SSL as a sublayer for security.

Addressing Network devices use addresses to identify other devices. These addresses are used to send and receive packets of electronic data over the network. The addresses used depend on the physical make-up of the network as well as the protocol suite being used. Each network device is identified using a: physical address or MAC (like a serial number) logical network address (subnet) identifies a network segment. – All devices on the same network segment share the same logical network address. logical host address (name) identifies a specific host on the network. – Each device must have a unique logical host address.

Physical Addressing (MAC) Each network device is identified using a physical address. Ethernet networks use a MAC Address (physical device address) The MAC address is a unique hexadecimal identifier burned into the ROM (physically assigned address) of every network interface. When you change the network card, the host will have a new physical device address. When you move a device to another network, the physical address remains the same (as long as the network card has not been changed). The MAC address is guaranteed unique through design. – The first half (first 6 digits) of the MAC address is assigned to each manufacturer. – The manufacturer determines the rest of the address, assigning a unique value which identifies the host address.

Logical Network Address With TCP/IP, the logical network and logical host addresses are combined into a single address called the IP address. An IP address is a 32-bit binary number represented as four octets (four 8-bit numbers). Each octet is separated by a period. A subnet mask is used to differentiate the network and host addresses. Each IP address has a default class that includes a default subnet mask value. The class defines the default network address portion of the IP address. For example, an IP address of with a default mask of The network address is and the host address is 11. Instead of using the default subnet mask, you can use custom subnet masks to define different network addresses. This process is called subnetting. Note: The address range from to is reserved for broadcast messages to the current network. The address range from to is reserved for loopback addresses to the local host.

Logical Host Address Humans remember names (or hostnames) much easier than numbers (especially binary numbers). A hostname is a label (name) assigned to a device connected to a computer network. Hostnames are used to identify the device in a Domain Name System (DNS) such as the World Wide Web. Hostnames that include DNS domains are often stored in the Domain Name System together with the IP addresses of the host they represent for the purpose of mapping the hostname to an address, or the reverse process.

Networking Devices ComponentDescription Media The networking medium is the pathway for signals to pass between two devices.  Copper cables use electrical signals.  Fiber optic cables use light pulses.  Wireless networks use radio waves with the air being the transmission medium. Network adapter A network adapter creates the signals that are sent along the networking medium.  The term network interface card (NIC) typically describes an adapter that uses a cable medium (such as copper or fiber optic cables).  A modem (modulator/de-modulator) converts binary data to an analog signal.  A wireless network adapter sends radio waves.

Networking Devices ComponentDescription Hub A hub provides a central connection for multiple media segments on the same subnet. The hub repeats a signal received on one port out all other ports. Hubs operate in half-duplex mode because the path between devices is shared and can only send when no other devices are sending data. Bridge A bridge connects two segments within the same subnet that use different media types. For example, use a bridge to connect wireless clients to wired clients on the same network.

Networking Devices ComponentDescription Switch A switch provides a central connection for multiple media segments on the same subnet. The switch receives a signal on one port, and forwards that signal only to the port where the destination device is connected. Switches use the MAC address to send frames to the destination device. Switches can operate in full duplex mode where a device uses a different channel for sending and receiving, and where the transmission paths are dedicated to only the communicating devices. When possible, use switches instead of hubs.

Networking Devices ComponentDescription Router A router connects two network segments that have a different subnet addresses. A router has multiple network connections, with each connection being on a different subnet. Routers use the IP address within a packet to move packets between networks. Routers maintain a list of known networks and the next router in the path to reach the destination network.

Networking Standards MethodDescription Ethernet Ethernet is the most common local area networking standard for wired networks. Ethernet can use copper and fiber optic cables. Ethernet uses network interface cards, hubs, switches, and routers to connect devices. Wireless Wireless networking uses radio waves for sending network data within a local area network. An access point with an integrated router allows wireless clients to communicate with hosts on different networks (such as the Internet). Dialup A dialup connection uses a modem connected to the phone line to communicate with another host through a wide area connection. Dialup connections are available anywhere a dialup telephone line exists. Data transfer rate 56 Kbps. Dialup connections cannot be used for both voice (phone calls) and data at the same time.

Networking Standards MethodDescription (DSL) Digital Subscriber Line provides broadband digital data transmission over existing telephone lines. A DSL router (sometimes called a DSL modem) connects the computer to the telephone line. DSL is not available to every location; the end location must be within a fixed distance of telephone switching equipment. Cable Cable networking uses a cable TV connection to create a wide area connection to the Internet. A cable modem (router) connects the computer to the cable network for sending networking signals. Cellular Cellular networking uses a digital mobile phone for Internet access. Mobile phones with digital data plans use cellular calls to connect to the Internet. You can install a cellular adapter in a notebook computer to provide cellular access. Satellite Satellite networking uses radio signals sent and received from a satellite. Requires direct line of sight (dish placement is crucial). Is subject to mild atmospheric and weather conditions (fog or slight wind can disrupt service). Provides nearly 100% global coverage.

Coaxial Cable Coaxial cable is an older technology that is usually implemented with a bus topology. Advantages Highly resistant to Electromagnetic Interference (EMI) Highly resistant to physical damage Disadvantages Expensive Inflexible construction (difficult to install) Unsupported by newer networking standards

Twisted Pair cable Twisted pair cables support a wide variety of fast, modern network standards Advantages Inexpensive compared to other media types Easy to install and manage Very common (media and tools are easy to obtain) Disadvantages Most susceptible to EMI of all the media types Cables are more easily damaged than other types

Fiber Optic Cable With fiber optic cabling the plastic or glass core carries the signal. Advantages Totally immune to Electromagnetic Interference (EMI) Highly resistant to eavesdropping Supports extremely high data transmission rates Allows greater cable distances without a repeater Disadvantages Very expensive Difficult to work with and requires special training