Presentation is loading. Please wait.

Presentation is loading. Please wait.

Chapter 1.  Upon completion of this chapter, you should be able to:  Define & identify different types of networks  Describe the advantages & disadvantages.

Similar presentations


Presentation on theme: "Chapter 1.  Upon completion of this chapter, you should be able to:  Define & identify different types of networks  Describe the advantages & disadvantages."— Presentation transcript:

1 Chapter 1

2  Upon completion of this chapter, you should be able to:  Define & identify different types of networks  Describe the advantages & disadvantages of network types  Describe & identify topologies  Identify the OSI model, why it’s used, and what happens at each layer  Describe various protocols  Compare and contrast TCP and UDP  Convert binary to decimal to hexadecimal

3 1.1

4  What is a network?  Group of interconnected devices able to share info with each other  Networks consist of:  Hosts/Nodes  Connecting Media  Network interface  Protocols (standards)

5  Share peripherals  Consolidate storage  Group collaboration/communication  File sharing, email, social media, VoIP, websites

6  Hosts don’t have a specific role  Can provide & consume network services

7 ADVANTAGESDISADVANTAGES  Easy to implement  Inexpensive to implement  No special software to buy; use PC’s OS  Easy to configure to share storage & printing  Not scalable  Bigger = difficult to manage  Usually limited to 10  No centralized controls  Decentralized storage  Possible slower performance

8  Server  Provides a resource/service, like email or web pages Email server/web server  Client  Consumes network services  Requests & displays info from a server PC with web browser to display pages from web server

9 ADVANTAGESDISADVANTAGES  Very scalable  Easy to support  Centralized management  Data protection  Backup shared data on server  More expensive!  Advanced planning to setup

10  Addressing  Subnet  LAN  MAN  WAN  Internet  Intranet  Extranet Test Out 1.1.3 Watch video & take notes 10:58

11  Over a small area

12

13  Connected networks  Not owned by anyone  Organizations maintain it & standards

14

15  What type of network uses each device to share files with other devices on the network?  Peer to peer  What type of network do you assign specific hosts a role such as file storage and other hosts just access those resources?  Client-server  What connects a client PC to the network’s medium?  Network interface

16 1.2

17  Graphical layout of the network  Two types:  Physical topology Layout of how devices are physically connected  Logical topology How devices communicate/data transmitted Shows IP addresses & groups

18  Bus/Broadcast  Data sent to ALL devices connected to the cable  Each device looks at the data to see if it is addressed to it or not  Ring  Data is passed from computer to computer  Star  Data sent only to destination device

19  Bus  All connected to same cable, terminated at end  Broken cable= no one communicates  Ring  Each device connected to each other

20  Has a central connecting device  Most common

21  Each device connects to every other device  Redundancy  Used in backbone; not with PCs

22  Physical & logical topology ID handout

23  The physical layout of nodes on a network is known as the networks:  Topology  Which physical topology is most common today?  Star  How does data get passed in a logical ring topology?  Sent from one device to the next  How does data get passed in a logical bus topology?  Sent to all devices in network

24 1.3

25  Before 1983, network devices were proprietary  Had to buy all from same vendor or it wouldn’t work  OSI model created standards to follow  OSI model layers break down the communication process between devices

26

27 Layer #Layer NameDescription 7Application Provides network access to applications SMTP; HTTP; DHCP; FTP; Telnet 6PresentationTransforms data to a format 5SessionEstablishes, manages, terminates sessions 4Transport Reliable transport; flow control; retransmission; TCP; port numbers; segments 3NetworkRouting; Logical (IP) addressing; packet 2Data Link Physical (MAC) addressing; access to media frame 1PhysicalBits; electricity

28  The OSI Communications Process  Go to Test Out  View 1.3.3 & 1.3.4  Review 1.3.5 OSI Model Facts  1.3.6 Exam Questions

29

30

31 1.4

32  Encoding  Converting info for travel on media  Ex: bits into electricity, light, radio waves  Types of Signals:  Digital (bits) 0 volts= 0 +5 volts= 1  Analog Doesn’t represent bits But can be converted…

33  Converting digital signal to analog  Connect via phone line  FM (Frequency Modulation)  Varies the frequency (or hertz)  AM (Amplitude Modulation)  Adjusts the strength

34  Converting analog to digital  Modem (modulate-demodulate)  Baud- # time per second signal changes  Bit Rate- # of bits per second

35  Analog signals over multiple frequencies  Uses Multiplexing Mixing multiple signals over a cable’s bandwidth Usually outside of your network

36  Sends data in single channel using all bandwidth of the cable (one at a time)  Uses Time-Division Multiplexing  Each signal gets a specific time to send  Ethernet is baseband  Send/receive using all of the frequency

37  1.4.4 Quiz  What is the process for converting digital signals for travel on media?  Encoding  What is the process of converting signals on media to digital?  Decoding  What process allows multiple signals to be mixed over a cable’s bandwidth?  Multiplexing

38 1.5

39  What is a protocol?  Set of rules for communication  Protocol Suite  Set of protocols that work together  TCP/IP

40  Connection-oriented  Sends acknowledgements  Like tracking a FedEx delivery  Breaks messages into small segments  If sender doesn’t get an ACK of message received, it retransmits  Only portion lost is resent  On receiving host, TCP reassembles data  FTP & HTTP are examples of protocols using TCP

41  Connectionless  Used for faster transmissions  Low overhead  “Best effort delivery”  Regular mail / no guarantee of delivery  No ACK or retransmission  No error checking*  Used for streaming audio, video, VoIP  DNS, DHCP, TFTP, VoIP, Gaming, SNMP are examples of protocols that use UDP

42 TCPUDP  Guaranteed delivery  Connection-oriented  Acknowledgements  Slower bc of establishing a connection & acknowledging  Email, web, file transfer  Best effort delivery  Connectionless  No acknowledgements  Faster bc of no connection or acknowledgements  Audio/video streams

43

44 ProtocolInformation HTTP Connection to transfer web pages- TCP HTTPS Secure connection for web pages transmission- TCP Security created by SSL or TSL FTP File transfer- TCP TFTP File transfer- UDP Telnet Remote login- TCP SSH Secure remote login- TCP POP3 Transfer of email from email server to you; then deleted IMAP Transfer of email from email server to you; kept on server SMTP Used to send email between email servers

45 ProtocolInformation SFTP & SCP Secure file transfer DHCP Automatically assign IP/SM/DG/DNS server addresses- UDP DNS Translates names to IP addresses- TCP/UDP NTP Allows devices to sync their clocks through network- TCP/UDP SNMP Create alerts to monitor the network- UDP ICMP Can detect other devices & verify connectivity- PING

46

47  Review all protocols on 1.5.4  Take Quiz on 1.5.5

48  Web server  FTP server  DNS server  DHCP server  Directory Services  Directory of users on a network, resources, and access control  SSH Server  From client, you can connect remotely & securely to a device Review 1.5.2 1.5.3 1.5.4 Review 1.5.2 1.5.3 1.5.4

49  What type of network has centralized resources, such as central file storage?  Client-server  What type of network shares resources located on local computer hard drives?  Peer to peer  You type www.gcit.org into your web browser. A DNS request is created and then a we request is sent. What type of network is this?www.gcit.org  Client-server

50  Which protocol is used for web page transmission?  HTTP  You have a network of 100 devices. Which process will easily allow all computers to automatically be able to communicate on a network by assigning IP addresses?  DHCP  Which utility/protocol can test connectivity?  Ping/ICMP  Which protocol allows remote login, but is not secure?  Telnet

51 1.6

52  Add up the values of the binary 1’s  156  11100101  229 1286432168421 10011100

53  Binary to Decimal Conversions  Add up the bit values to come up with the decimal answer  Decimal to Binary Conversions  Convert the decimal number to bits  Binary Game  Play Now Play Now

54  Hex= MAC address  0-9, A-F (10-15)  Convert Hex to Binary, then to Decimal  Convert backwards too  AB

55  TestOut Quiz 1.6.3  Conversion Handout/Quiz

56  Complete the study guide handout  Take all quizzes on TestOut  Jeopardy review

57 Chapter 1


Download ppt "Chapter 1.  Upon completion of this chapter, you should be able to:  Define & identify different types of networks  Describe the advantages & disadvantages."

Similar presentations


Ads by Google