An Introduction to Networking Chapter 1. Part I: Basic Networks Concepts Concepts we will see throughout the book.

Slides:



Advertisements
Similar presentations
Any Questions?.
Advertisements

© 2009 Pearson Education, Inc. Publishing as Prentice Hall An Introduction to Networking Chapter 1 Raymond Panko’s Business Data Networks and Telecommunications,
© 2007 Cisco Systems, Inc. All rights reserved. 1 Network Addressing Networking for Home and Small Businesses – Chapter 5.
BTT 101 / 2O1 Lesson 10 Dundas Valley Secondary Mr. Young.
Computer networks SATISH MISHRA,PGT CS,KV TRIMULGHERRY.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Technology Focus: Network and Communications Technology.
Networking DSC340 Mike Pangburn. Networking: Computers on the Internet  1969 – 4  1971 – 15  1984 – 1000  1987 – 10,000  1989 – 100,000  1992 –
Networking Components
Introduction to Networking & Telecommunications School of Business Eastern Illinois University © Abdou Illia, Spring 2015 (January 14, 2015)
Copyright 2003 CCNA 1 Chapter 7 TCP/IP Protocol Suite and IP Addressing By Your Name.
Chapter Overview TCP/IP Protocols IP Addressing.
Networking Components Chad Benedict – LTEC
Introduction Chapter 1 Panko’s Business Data Networks and Telecommunications, 5th edition Copyright 2005 Prentice-Hall.
Case Study: Pat Lee’s Home PC Network Chapter 1a Updated January 2007 Panko’s Business Data Networks and Telecommunications, 6th edition Copyright 2007.
An Introduction to Networking Chapter 1 Updated January 2007 Panko’s Business Data Networks and Telecommunications, 6 th edition Copyright 2007 Prentice-Hall.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.0 Module 9 TCP/IP Protocol Suite and IP Addressing.
Basic Network Training. Cable/DSL Modem The modem is the first link in the chain It is usually provided by the ISP and often has a coax cable connector.
15-1 More Chapter 15 Goals Compare and contrast various technologies for home Internet connections Explain packet switching Describe the basic roles of.
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
EMerge Browser Managed Security Platform Module 1 Networking for eMerge.
Chapter 2 The Infrastructure. Copyright © 2003, Addison Wesley Understand the structure & elements As a business student, it is important that you understand.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Spring 2007.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Addressing Networking for Home and Small Businesses – Chapter 5.
Computer Networking Part 1 CS 1 Rick Graziani Cabrillo College Fall 2005.
Networks LANS,. FastPoll True Questions Answer A for True and B for False A wireless infrastructure network uses a centralized broadcasting device, such.
Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
CCNA 1 v3.0 Module 9 TCP/IP Protocol Suite and IP Addressing
Chapter 4. After completion of this chapter, you should be able to: Explain “what is the Internet? And how we connect to the Internet using an ISP. Explain.
© 2009 Pearson Education, Inc. Publishing as Prentice Hall An Introduction to Networking Chapter 1 Updated January 2009 Raymond Panko’s Business Data Networks.
Common Devices Used In Computer Networks
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Connecting to the Network Networking for Home and Small Businesses.
ACM 511 Chapter 2. Communication Communicating the Messages The best approach is to divide the data into smaller, more manageable pieces to send over.
Copyright © 2002 Pearson Education, Inc. Slide 3-1 CHAPTER 3 Created by, David Zolzer, Northwestern State University—Louisiana The Internet and World Wide.
Module 2: Information Technology Infrastructure
1 Chapter Overview Using the New Connection Wizard to configure network and Internet connections Using the New Connection Wizard to configure outbound.
Basic Concepts and Principles Chapter 1 Copyright 2001 Panko.
An Introduction to Networking Chapter 1 Panko’s Business Data Networks and Telecommunications, 6 th edition Copyright 2007 Prentice-Hall (Modified by Kevin.
An Introduction to Networking Chapter 1 Panko’s Business Data Networks and Telecommunications, 6 th edition Copyright 2007 Prentice-Hall May only be used.
© 2007 Cisco Systems, Inc. All rights reserved. 1 Network Addressing Networking for Home and Small Businesses – Chapter 5 Darren Shaver – Modified Fall.
15-1 Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources.
NETWORKING COMPONENTS AN OVERVIEW OF COMMONLY USED HARDWARE Christopher Johnson LTEC 4550.
1 TCP/IP Internetting ä Subnet layer ä Links stations on same subnet ä Often IEEE LAN standards ä PPP for telephone connections ä TCP/IP specifies.
Network Addresses, Switches and Routing Bob Bradley IS361 Fall 2005 Chapter 1 Part 2.
NETWORK COMPONENTS Assignment #3. Hub A hub is used in a wired network to connect Ethernet cables from a number of devices together. The hub allows each.
The Internet School of Business Eastern Illinois University © Abdou Illia, Fall 2002 (Week 15, Monday 12/02/2002 and Wednesday 12/04/2002)
1 Network Basics 1.The Nine Elements of a Network 2.LANs and WANs 3.Internets 4.Packet Switching vs. Circuit Switching.
1 Chapter 8 – TCP/IP Fundamentals TCP/IP Protocols IP Addressing.
INFS 361 Chapter 1 Notes UTM Bob Bradley Fall 2005.
© 2009 Pearson Education, Inc. Publishing as Prentice Hall An Introduction to Networking Chapter 1 Raymond Panko’s Business Data Networks and Telecommunications,
William Stallings Data and Computer Communications
CCNA 1 v3.0 Module 9 TCP/IP Protocol Suite and IP Addressing
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Connecting to the Network Introduction to Networking Concepts.
Accessing the World Wide Web from Home Many students access the World Wide Web from home Here is how it works, in terms of standards.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 4: Planning and Configuring Routing and Switching.
CSCI-235 Micro-Computer Applications The Network.
1 计算机网络 胥正川 ( XU Zhengchuan ) 管理学院 信息管理与信息系统系 办公室:思源楼 708 室,电话:
NT1210 Introduction to Networking
ITE PC v4.0 Chapter 8 1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public  Networks are systems that are formed by links.  People use different.
TCP/IP Protocol Suite and IP Addressing Presented By : Dupien AMS.
NT1210 Introduction to Networking
15-1 Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
An Introduction to Networking
An Introduction to Networking
Welcome to the Cloud Chapter 1 Panko and Panko
ADDRESSING Before you can send a message, you must know the destination address. It is extremely important to understand that each computer has several.
Web Development & Design Chapter 1, Sections 4, 5 & 6
Design Unit 26 Design a small or home office network
Review of TCP/IP Internetworking
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 4: Planning and Configuring Routing and Switching.
Presentation transcript:

An Introduction to Networking Chapter 1

Part I: Basic Networks Concepts Concepts we will see throughout the book

3 Figure 1-1: Basic Networking Concepts What Is a Network? –A network is a transmission system that connects two or more applications running on different computers. Network

4 Figure 1-1: Basic Networking Concepts Client/Server Applications –Most Internet applications are client/server applications –Clients receive service from servers –The client is often a browser Client Computer Server Computer Server Program Client Program Services

Part II: The Nine Elements of a Network Although the idea of “network” is simple, you must understand the nine elements found in most networks

6 Figure 1-3: Elements of a Network Wireless Access Point Mobile Client Router Outside World Server Computer Client Computer Switch 1 Switch 2 Switch 3 Message (Frame) Access Line Trunk Line Server ApplicationClient Application 1. Networks connect applications on different computers. 1. Networks connect applications on different computers. Networks connect computers: 2. Clients (fixed and mobile) and 3. Servers Networks connect computers: 2. Clients (fixed and mobile) and 3. Servers

7 Figure 1-3: Elements of a Network Wireless Access Point Mobile Client Router Outside World Server Computer Client Computer Switch 1 Switch 3 Message (Frame) Trunk Line Server ApplicationClient Application 4. Computers (and routers) usually communicate by sending messages called frames 4. Computers (and routers) usually communicate by sending messages called frames

8 Figure 1-3: Elements of a Network Wireless Access Point Mobile Client Router Outside World Server Computer Client Computer Switch 4 Message (Frame) Trunk Line Server ApplicationClient Application Switch 2 Switch 1 Switch 3 Client Sends Frame to Sw1 Client Sends Frame to Sw1 Sw1 Sends Frame to Sw2 Sw1 Sends Frame to Sw2 Sw2 Sends Frame To Sw3 Sw2 Sends Frame To Sw3 Sw3 Sends Frame to Server Sw3 Sends Frame to Server 5. Switches Forward Frames Sequentially 5. Switches Forward Frames Sequentially

9 Figure 1-5: Ethernet Switch Operation A1-44-D5-1F-AA-4CB2-CD-13-5B-E4-65 Switch D C4-B6-F9 C3-2D-55-3B-A9-4F Port 15 Frame to C3… A1- sends a frame to C3- Frame to C3… Switch sends frame to C3- Switching Table PortHost 10A1-44-D5-1F-AA-4C 13B2-CD-13-5B-E C3-2D-55-3B-A9-4F 16 D C4-B6-F9 Switching Table PortHost 10A1-44-D5-1F-AA-4C 13B2-CD-13-5B-E C3-2D-55-3B-A9-4F 16 D C4-B6-F9 15C3-2D-55-3B-A9-4F C3- is out Port

10 Figure 1-3: Elements of a Network Wireless Access Point Mobile Client Router Outside World Server Computer Client Computer Switch 1 Switch 2 Switch 3 Switch 4 Message (Frame) Access Line Trunk Line Server ApplicationClient Application 6. Wireless Access Points Connect Wireless Stations to Switches 6. Wireless Access Points Connect Wireless Stations to Switches

11 Figure 1-3: Elements of a Network Wireless Access Point Mobile Client Router Outside World Server Computer Client Computer Switch 1 Switch 2 Switch 3 Switch 4 Message (Frame) Access Line Trunk Line Server ApplicationClient Application 7. Routers connect networks to the outside world; Treated just like computers in single networks 7. Routers connect networks to the outside world; Treated just like computers in single networks Yes, single networks can contain routers

12 Figure 1-3: Elements of a Network Wireless Access Point Mobile Client Router Outside World Server Computer Client Computer Switch 1 Switch 2 Switch 3 Switch 4 Message (Frame) Access Line Trunk Line Server ApplicationClient Application 8. Access Lines Connect Computers to Switches 8. Access Lines Connect Computers to Switches 9. Trunk Lines Connect Switches to Switches and Switches to Routers 9. Trunk Lines Connect Switches to Switches and Switches to Routers

13 Figure 1-4: Packet Switching and Multiplexing Client Computer A Mobile Client Computer B Router D Server Computer C AC BD Access Line Trunk Line Multiplexed Packets Share Trunk Lines So Packet Switching Reduces the Cost of Trunk Lines Breaking Communications into Small Messages is Called Packet Switching, even if the Messages are Frames

Part III: Transmission Speed

15 Figure 1-6: Transmission Speed Measuring Transmission Speed –Measured in bits per second (bps) –In metric notation: Increasing factors of 1,000 … –Not factors of 1,024 Kilobits per second (kbps)-note the lowercase k Megabits per second (Mbps) Gigabits per second (Gbps) Terabits per second (Tbps)

16 Figure 1-6: Transmission Speed Measuring Transmission Speed –What is 23,000 bps in metric notation? –What is 3,000,000,000 in metric notation? –What is 15,100,000 bps in metric notation? Occasionally measured in bytes per second If so, written as Bps Usually seen in file download speeds

17 Figure 1-6: Transmission Speed Writing Transmission Speeds in Proper Form –The rule for writing speeds (and metric numbers in general) in proper form is that there should be 1 to 3 places before the decimal point –23.72 Mbps is correct (2 places before the decimal point). –2,300 Mbps has four places before the decimal point, so it should be rewritten as 2.3 Gbps (1 place). –0.5 Mbps has zero places to the left of the decimal point. It should be written as 500 kbps (3 places).

18 Figure 1-6: Transmission Speed Writing Transmission Speeds in Proper Form –How to convert 1,200 Mbps to proper form Divide the number 1,200 by 1000 –Move decimal point three places to the left: Multiply the metric suffix Mbps by 1,000 –Gbps Result: –1.2 Gbps

19 Figure 1-6: Transmission Speed Writing Transmission Speeds in Proper Form –How to convert Mbps to proper form Multiply the number by 1000 –Move decimal point three places to the right: 36 Divide the metric suffix Mbps by 1,000 –kbps Result: –36 kbps

20 Figure 1-6: Transmission Speed Writing Transmission Speeds in Proper Form –How should you write the following in proper form? kbps 0.47 Gbps 11,200 Mbps.0021 Gbps

21 Figure 1-6: Transmission Speed Rated Speed –The speed in bits per second that you should get (advertised or specified in the standard). Throughput –The speed you actually get –Almost always lower than the rated speed On Shared Transmission Lines –Aggregate throughput—total throughput for all users –Individual throughput—what individual users get

Part IV: LANs and WANs

23 Figure 1-8: LANs Versus WANs Characteristics Scope LANs WANs For transmission within a site. Campus, building, and SOHO (Small Office or Home Office) LANs For transmission within a site. Campus, building, and SOHO (Small Office or Home Office) LANs For transmission between sites For transmission between sites Building LAN Building LAN Home LAN Home LAN Campus LAN Campus LAN Wide Area Network

24 WANsCharacteristicsLANs Cost per bit TransmittedLowHigh Figure 1-8: LANs Versus WANs Typical Speed Unshared 100 Mbps to a gigabit per second to each desktop. Even faster trunk line speeds. Shared 128 kbps to several megabits per second trunk line speeds It’s simple economics. If the cost per unit is higher, the number of units demanded will be lower. Corporations cannot afford high-speed for most of their WAN transmission

25 Figure 1-8: LANs Versus WANs Characteristics Management LANs WANs On own premises, so firm builds and manages its own LAN or outsources the Work On own premises, so firm builds and manages its own LAN or outsources the Work Must use a carrier with rights of way for transmission in public Area. Carrier handles most work but Charges a high price. Must use a carrier with rights of way for transmission in public Area. Carrier handles most work but Charges a high price. Choices Unlimited Only those offered by carrier Only those offered by carrier

26 Figure 1-9: Local Area Network (LAN) in a Large Building Router Core Switch Workgroup Switch 2 Workgroup Switch 1 Wall Jack To WAN Wall Jack Server Client Frames from the client to the server go through Workgroup Switch 2, through the Core Switch, through Workgroup Switch 1, and then to the server

Part V: Internets

28 Figure 1-11: Internets Single LANs Versus Internets –In single networks (LANs and WANs), all devices connect to one another by switches—our focus so far. –In contrast, an internet is a group of networks connected by routers so that any application on any host on any single network can communicate with any application on any other host on any other network in the internet. LAN WAN LAN Application Router

29 Figure 1-11: Internets Internet Components –All computers in an internet are called hosts –Clients as well as servers Cat (Ignores Internet) Internet Client PC (Host) Cellphone (Host) VoIP Phone (Host) PDA (Host) Server (Host) Host

30 Figure 1-11: Internets Hosts Have Two Addresses IP Address –This is the host’s official address on its internet –32 bits long –Expressed for people in dotted decimal notation (e.g., ) Single-Network Addresses –This is the host’s address on its single network –Ethernet addresses, for instance, are 48 bits long –Expressed in hexadecimal notation (e.g., AF-23-9B- E )

31 Figure 1-11: Internets Networks are connected by devices called routers –Switches provide connections within networks, while routers provide connections between networks in an internet. Frames and Packets –In single networks, message are called frames –In internets, messages are called packets

32 Figure 1-11: Internets Packets are carried within frames –One packet is transmitted from the source host to the destination host across the internet Its IP destination address is that of the destination host Frame Packet LAN WAN LAN Router

33 Figure 1-11: Internets Packets are carried within frames –In each network, the packet is carried in (encapsulated in) a frame –If there are N networks between the source and destination hosts, there will be one packet and N networks between the source and destination hosts, there will be one packet and N frames for a transmission Frame Packet LAN WAN LAN Router

34 Figure 1-12: Internet with Three Networks Host B Host A Network X Network Y Network Z R1 R2 Route A-B Packet A packet goes all the way across the internet; It’s path is its route A packet goes all the way across the internet; It’s path is its route

35 Figure 1-12: Internet with Three Networks Mobile Client Host Server Host Switch X2 Switch X1 Switch Router R1 D6-EE-92-5F-C1-56 Network X Route A-B A route is a packet’s path through the internet A route is a packet’s path through the internet Details in Network X Details in Network X Data link A-R1 Data link A-R1 A data Link is a frame’s path through its single network A data Link is a frame’s path through its single network In Network X, the Packet is Placed in Frame X Packet Frame X Host A AB-23-D1-A8-34-DD

36 Figure 1-12: Internet with Three Networks Router R1 Router R2 AF-3B-E B5 Packet Frame Y To Network X To Network Z Network Y Data Link R1-R2 Route A-B Details in Network Y Details in Network Y

37 Figure 1-12: Internet with Three Networks Host B B-CC-D4-A7-56 Mobile Client Host Switch Z1 Switch Z2 Switch Packet Frame Z Network Z Router R2 Router Data Link R2-B Details in Network Z Details in Network Z Mobile Client Computer

38 Figure 1-12: Internet with Three Networks In this internet with three networks, in a transmission, –There is one packet –There are three frames (one in each network) If a packet in an internet must pass through 10 networks, –How many packets will be sent? –How many frames must carry the packet?

Figure 1-13: Converting IP Addresses into Dotted Decimal Notation Divided into 4 bytes. These are segments Dotted decimal notation (4 segments separated by dots) Dotted decimal notation (4 segments separated by dots) IP Address (32 bits long) Convert each byte to decimal (result will be between 0 and 255)* *The conversion process is described in the Hands On section at the end of the chapter

40 Figure 1-17: The Internet 2. User PC’s Internet Service Provider 2. Webserver’s Internet Service Provider ISP 1. User PC Host Computer 1. Webserver Host Computer 4. NAPs = Network Access Points Connect ISPs Router NAP ISP 3. Internet Backbone (Multiple ISP Carriers) Access Line Access Line

41 Figure 1-18: Subnets in an Internet LAN 1 LAN 2 LAN Subnet 10.1.x.x WAN Subnet 123.x.x.x LAN Subnet x LAN Subnet 10.2.x.x LAN Subnet 10.3.x.x LAN Subnet x LAN Subnet x Note: Subnets are single networks (collections of switches, transmission lines) Often drawn as simple lines to focus on routers for internetworking Router R1 Router R3 Router R4 Router R2 LAN Subnet x

42 Figure 1-19: Terminology Differences for Single- Network and Internet Professionals By Single-Network Professionals By Internet Professionals By Internet Professionals Single Networks Are Called Networks Subnets Internets Are Called Internets Networks In this book, we will usually call internets “internets” and subnets “single networks”

43 Figure 1-14: The Internet, internets, Intranets, and Extranets Lower-case internet –Any internet Upper-case Internet –The global Internet Intranet –An internet restricted to users within a single company Extranet –A group of resources that can be accessed by authorized people in a group of companies

44 Figure 1-20: IP Address Management Every Host Must Have a Unique IP address –Server hosts are given static IP addresses (unchanging) –Clients get dynamic (temporary) IP addresses that may be different each time they use an internet Dynamic Host Configuration Protocol (DHCP) (Figure 1-21) –Clients get these dynamic IP addresses from Dynamic Host Configuration Protocol (DHCP) servers (Figure 1- 21)

45 Figure 1-21: Dynamic Host Configuration Protocol (DHCP) Client PC A3-4E-CD F DHCP Server 1. DHCP Request Message: “My 48-bit Ethernet address is A3-4E-CD F”. Please give me a 32-bit IP address.” 2. Pool of IP Addresses 3. DHCP Response Message: “Computer at A3-4E-CD F, your 32-bit IP address is ”. (Usually other configuration parameters as well.)

46 Figure 1-20: IP Address Management Domain Name System (DNS) (Figure 1-22) –IP addresses are official addresses on the Internet and other internets –Hosts can also have host names (e.g., cnn.com) Not official—like nicknames –If you only know the host name of a host that you want to reach, your computer must learn its IP address DNS servers tell our computer the IP address of a target host whose name you know. (Figure 1-22)

47 Figure 1-22: The Domain Name System (DNS) Host NameIP Address…… Voyager.cba.hawaii.edu … Host NameIP Address…… Voyager.cba.hawaii.edu … DNS Table 1. Client Host wishes to reach Voyager.cba.hawaii.edu; Needs to know its IP Address 2. Sends DNS Request Message “The host name is Voyager.cba.hawaii.edu” Voyager.cba.hawaii.edu Local DNS Host

48 Figure 1-22: The Domain Name System (DNS) Host NameIP Address…… Voyager.cba.hawaii.edu … Host NameIP Address…… Voyager.cba.hawaii.edu … DNS Table 4. DNS Response Message “The IP address is ” Voyager.cba.hawaii.edu Client sends packets to DNS Host looks up the target host’s IP address DNS Host

49 Figure 1-22: The Domain Name System (DNS) Host NameIP Address…… Voyager.cba.hawaii.edu … Host NameIP Address…… Voyager.cba.hawaii.edu … DNS Table Client Host 1. DNS Request Message Anther DNS Host Local DNS Host 3. DNS Response Message The local DNS host sends back the response; the user is unaware that other DNS hosts were involved The local DNS host sends back the response; the user is unaware that other DNS hosts were involved If local DNS host does not have the target host’s IP address, it contacts other DNS hosts to get the IP address If local DNS host does not have the target host’s IP address, it contacts other DNS hosts to get the IP address 2. Request & Response

Part VI: Security

51 Figure 1-23: Firewall and Hardened Hosts Legitimate Host Legitimate Packet Border Firewall Hardened Server Allowed Legitimate Packet Hardened Client PC Internal Corporate Network Border firewall should pass legitimate packets Border firewall should pass legitimate packets The Internet Attacker Log File

52 Figure 1-23: Firewall and Hardened Hosts Legitimate Host Attack Packet Denied Attack Packet Hardened Server Hardened Client PC Internal Corporate Network Border firewall should deny (drop) and log attack packets Border firewall should deny (drop) and log attack packets The Internet Border Firewall Attacker Log File

53 Figure 1-23: Firewall and Hardened Hosts Legitimate Host Attacker Attack Packet Denied Attack Packet Internal Corporate Network The Internet Border Firewall Hardened Server Hardened Server Hardened Client PC Hardened Client PC Attack Packet Attack Packet Log File Hosts should be hardened against attack packets that get through Hosts should be hardened against attack packets that get through

54 Figure 1-24: Cryptographic Protections Cryptography –The use of mathematical operations to thwart attacks on message dialogues between pairs of communicating parties (people, programs, or devices) Initial Authentication –Determine the other party’s identity to thwart impostors

55 Figure 1-24: Cryptographic Protections Message-by-Message Protections –Encryption to provide confidentiality so that an eavesdropper cannot reach intercepted messages –Electronic signatures provide message-by-message authentication to prevent the insertion of messages by an impostor after initial authentication –Electronic signatures usually also provide message integrity; this tells the receiver whether anyone has changed the message en route