Module 4 - Networking MIS5122: Enterprise Architecture for the IT Auditor.

Slides:



Advertisements
Similar presentations
IST 201 Chapter 9. TCP/IP Model Application Transport Internet Network Access.
Advertisements

Network Certification Preparation. Module - 1 Communication methods OSI reference model and layered communication TCP/IP model TCP and UDP IP addressing.
BTT 101 / 2O1 Lesson 10 Dundas Valley Secondary Mr. Young.
IS 247 Introduction to Web Application Development Tim Wu.
Shalini Bhavanam. Key words: Basic Definitions Classification of Networks Types of networks Network Topologies Network Models.
1 Chapter 9 Computer Networks. 2 Chapter Topics OSI network layers Network Topology Media access control Addressing and routing Network hardware Network.
Chapter Extension 7 How the Internet Works © 2008 Prentice Hall, Experiencing MIS, David Kroenke.
Two Network Types Defined by DISTANCE LAN WAN. NETWORKS LAN LOCAL AREA NETWORK.
Internetworking School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 4, Tuesday 1/30/2007)
04/26/2004CSCI 315 Operating Systems Design1 Computer Networks.
Service Providers & Data Link & Physical layers Week 4 Lecture 1.
Bob Baker Communications Bob Baker September 1999.
LAN Risanuri Hidayat. LAN-Local Area Network A LAN is a high-speed data network that covers a relatively small geographic area. It typically connects.
Review on Networking Technologies Linda Wu (CMPT )
Computer Networks Eyad Husni Elshami. Computer Network A computer network is a group of interconnected computers to share data resources ( printer, data.
Prepared By E.Musa Alyaman1 Networking Theory Chapter 1.
Introduction to Computer Networking. Wireless Network.
Core 3: Communication Systems. On any network there are two types of computers present – servers and clients. By definition Client-Server architecture.
COMPUTER NETWORKS.
CECS 474 Computer Network Interoperability Tracy Bradley Maples, Ph.D. Computer Engineering & Computer Science Cal ifornia State University, Long Beach.
©Brooks/Cole, 2003 Chapter 6 Computer Networks. ©Brooks/Cole, 2003 Understand the rationale for the existence of networks. Distinguish between the three.
Lecturer: Tamanna Haque Nipa
1 Computer Networks Course: CIS 3003 Fundamental of Information Technology.
For more notes and topics visit: eITnotes.com.
Laudon & Laudon: Canadian Edition
Chapter 2 The Infrastructure. Copyright © 2003, Addison Wesley Understand the structure & elements As a business student, it is important that you understand.
Chapter 5 Networks Communicating and Sharing Resources
Managing Network connections. Network Cabling Ethernet Topology Bus topology – Connects each node in a line – Has no central connection point Star topology.
Networks and Telecommunications
Networking and the Internet © 2007 Pearson Addison-Wesley. All rights reserved.
Networks LANS,. FastPoll True Questions Answer A for True and B for False A wireless infrastructure network uses a centralized broadcasting device, such.
AS Computing F451 F451 Data Transmission. What data is transmitted? Phone SMS Radio TV Internet.
NetworkProtocols. Objectives Identify characteristics of TCP/IP, IPX/SPX, NetBIOS, and AppleTalk Understand position of network protocols in OSI Model.
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
ITED 328 Lecture 4 12 Feb 2004 Loosely covering Chapter 5 Internet and LAN Technology.
Computer Networks: Hands On Experience
The Infrastructure Technologies. Communication All communications require: Transmitters/Senders and receivers Transmission medium Rules of communication.
1 A L L A H. Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS.
ACM 511 Chapter 2. Communication Communicating the Messages The best approach is to divide the data into smaller, more manageable pieces to send over.
Huda AL_Omairl - Network 71 Protocols and Network Software.
15-1 Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources.
Linux+ Guide to Linux Certification, Second Edition Chapter 14 Network Configuration.
Today’s Topics Chapter 8: Networks Chapter 8: Networks HTML Introduction HTML Introduction.
Chapter 4 Networking and the Internet © 2007 Pearson Addison-Wesley. All rights reserved.
Chapter 6 Data Communications. Network Collection of computers Communicate with one another over transmission line Major types of network topologies What.
First, by sending smaller individual pieces from source to destination, many different conversations can be interleaved on the network. The process.
NETWORK HARDWARE CABLES NETWORK INTERFACE CARD (NIC)
Lecture (Mar 23, 2000) H/W Assignment 3 posted on Web –Due Tuesday March 28, 2000 Review of Data packets LANS WANS.
TCP/IP (Transmission Control Protocol / Internet Protocol)
Networking Material taken mainly from HowStuffWorks.com.
Networks Part 2: Infrastructure + Protocols NYU-Poly: HSWP Instructor: Mandy Galante.
1 Internet Protocols To support the Internet and all its services, many protocols are necessary Some of the protocols that we will look at: –Internet Protocol.
WEEK 11 – TOPOLOGIES, TCP/IP, SHARING & SECURITY IT1001- Personal Computer Hardware System & Operations.
نظام المحاضرات الالكترونينظام المحاضرات الالكتروني.
Welcome to Early Bird Class
Transmission Control Protocol (TCP) Internet Protocol (IP)
Internetworking School of Business Eastern Illinois University © Abdou Illia, Spring 2016 (February 3, 2016)
Voice Over Internet Protocol (VoIP) Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Presentation 5 – VoIP and the OSI Model.
Network Models. The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding.
Also known as hardware/physi cal address Customer Computer (Client) Internet Service Provider (ISP) MAC Address Each Computer has: Given by NIC card.
NETWORKS. Example Web Browsing application Software Protocols involved Software NIC / Modem Hardware Telephone line / Co-axial cable / Air interface.
ICT Unit 4: Network and the effects of using them
Chapter Objectives In this chapter, you will learn:
MIS5122: Enterprise Architecture for the IT Auditor
Computer Networks.
Unit 10 Setting up an IT Network
LAN Risanuri Hidayat.
Lecture 6: TCP/IP Networking By: Adal Alashban
e-business and Information Systems
Objectives: 1.Identify different internet protocol (IP) 2.Configure sample of IP address 3.Appreciate and relate protocol in our life.
Presentation transcript:

Module 4 - Networking MIS5122: Enterprise Architecture for the IT Auditor

Agenda Computer Networks –Network topology –Addressing and routing –Media access control –Network hardware –TCP/IP

Case Study – Focus on Networks LANs Switches Routers DNS & DHCP

Question What is “network topology”?

Network Topology What are the three basic geometric shapes upon which all network design is based?

Case Study – Topology Star? Bus? Ring?

What did you learn? What are the three basic topologies used for computer networks, ____, ___, and ____. A network using a physical ____ topology connects all nodes to a central device. starbus ring star

Addressing and Routing How messages sent by end nodes find their way through transmission lines and central nodes to their ultimate destination Local area networks (LANs) Wide area networks (WANs)

17 Example of a WAN including end nodes, LANs, zone networks, the campus backbone network, and central nodes.

Question? In your own words, what happens on an Ethernet network when network utilization gets high (i.e. > 70%)? Why?

In-Class Activity Don’t worry, this one won’t be embarrassing What is your telephone number? Tell me as quickly as you can –Person 1 speaks digits, one digit at a time and waits for acknowledgment –Person 2 acknowledges each digit 2 pairs of people but remember your manners! –Don’t speak while someone else is speaking –If two people speak at the same time, both must repeat themselves 10 pairs of people –Remember your manners!

Media Access Control What is a “media access control” protocol? What are the two types of media access control protocols you will most likely encounter?

What did you learn? When two messages are transmitted at the same time on a shared medium, a(n) ________ has occurred. Under the __________ media access strategy, collision can occur, but they are detected and corrected. collision CSMA/CD

BREAK TIME

Question? Why should you always talk about “Network Interface Cards (NICs)” and not “Network Interface Units (NIUs)”?

26 Network Hardware

Question? In your own words, which is better, a hub or a switch? Why?

Case Study – Switches & Hubs Connectivity Devices: Hubs Switches

Case Study – Switches & Hubs Connectivity Devices: Hubs Switches

Case Study – Routers Making backbone networks and WANS: Routers Bridges

What did you learn? A microcomputer or workstation hardware interface to a network transmission medium is called a(n) ____. NIC

What did you learn? When creating a LAN using the star topology, you will typically use either a ____ or a ______ as the connectivity device. When creating a WAN, you will typically use either a ______ or a ______ as the connectivity device. hubswitch router bridge

Question? How many of you have wireless networks at home? Have you secured your network? If so, how? If not, you better!

Association - communication that occurs between a station and an access point A station might choose a different access point through a process called re-association There are two types of scanning: active and passive In active scanning, the station transmits a special frame, known as a probe, on all available channels within its frequency range In passive scanning, a wireless station listens on all channels within its frequency range for a special signal, known as a beacon frame, issued from an access point Service Set Identifier (SSID), a unique character string used to identify an access point Wireless Networks

802.11b – 11 Mb/sec Also known as “Wi-Fi,” for Wireless Fidelity b was the first to take hold It is also the least expensive of all the WLAN technologies a – 54Mb/sec Faster but more expensive than b so not popular Not compatible with b or g g – 54 Mb/sec As fast as a but using the same basic, inexpensive technology as b Compatible with b n – 150 Mb/sec ac (still in draft), ad (expected February 2014) Wireless Networks (continued)

Case Study – Wireless How would you provide wireless connectivity?

TCP/IP The core Internet protocol suite Delivers most services associated with the Internet –File transfer via FTP –Remote login via Telnet protocol –Electronic mail distribution via SMTP –Access to Web pages via HTTP

TCP/IP The core Internet protocol suite Delivers most services associated with the Internet –File transfer via FTP –Remote login via Telnet protocol –Electronic mail distribution via SMTP –Access to Web pages via HTTP

Life and Death of an IP Packet…

What did you learn? Packet loss can't always be detected by a receiver if a(n) _____________ protocol is in use. Under TCP/IP, a _______________ is the basic data transfer unit. connectionless datagram or packet

Question? How many bits in an IP address? How many of these bits identify the network? How many of these bits identify the host on a particular network?

Two kinds of addresses: Logical or physical Logical (or Network layer) can be manually or automatically assigned and must follow rules set by the protocol standards Physical (or MAC, or hardware) addresses are assigned to a device’s network interface card at the factory by its manufacturer Addresses on TCP/IP-based networks are often called IP addresses TCP/IP Addressing

IP addresses are assigned and used according to very specific parameters Each IP address is a unique 32-bit number, divided into four octets, or sets of 8-bits, that are separated by periods An IP address contains two types of information: network and host From the first octet you can determine the network class Class A Class B Class C TCP/IP Addressing (continued)

Binary and Dotted Decimal Notation A decimal number between 0 and 255 represents each binary octet (for a total of 256 possibilities) The binary system is the way that computers interpret IP addresses In this system every piece of information is represented by 1s and 0s and each 1 or 0 constitutes a bit TCP/IP Addressing (continued)

In Class Activity – ipconfig /all IP Addresses & Default Gateway

Question? What technology do we use to hand out IP addresses? How to I check my current IP address and see which server handed it out? What technology do we use to map IP addresses to names? What technology do we use to map names to IP addresses? What tool do I use to query either a name or an IP address?

49 DHCP

In Class Activity – ipconfig /release & ipconfig /renew DHCP Servers

TCP/IP (continued)

DNS

In Class Activity - nslookup DNS Servers

What did you learn? Machines can be configured to utilize ______ which will hand out IP addresses from a pool of available IP addresses. When an application needs to map a name to an IP address or an IP address to a name, the application depends on services from ____. DHCP DNS

Case Study – Focus on Networks LANs Switches Routers DNS & DHCP

Review Computer Networks –Network topology –Addressing and routing –Media access control –Network hardware –TCP/IP