+ All Categories
Home > Documents > 08 basic Basics of Networking

08 basic Basics of Networking

Date post: 03-Apr-2018
Category:
Upload: sareeee
View: 219 times
Download: 0 times
Share this document with a friend

of 35

Transcript
  • 7/27/2019 08 basic Basics of Networking

    1/35

    Data as on June,06 1

    www.gcl.in Gemini Communication Company Confidential Ver 1.0

    Gemini Communication Ltd.Gemini Communication Ltd.

    Innovation & Leadership Innovation & Leadership

    Basics of NetworkingRef. 1010001100

  • 7/27/2019 08 basic Basics of Networking

    2/35

    Data as on June,06 2

    www.gcl.in Gemini Communication Company Confidential Ver 1.0

    BASICS OF NETWORKING

  • 7/27/2019 08 basic Basics of Networking

    3/35

    Data as on June,06 3

    www.gcl.in Gemini Communication Company Confidential Ver 1.0

    BASIC NETWORKING DEVICESIN LAN SET UP.Hub

    BridgesSwitchRouterUTP CableSTP Cable.

    RJ 45 Connectors

  • 7/27/2019 08 basic Basics of Networking

    4/35

    Data as on June,06 4

    www.gcl.in Gemini Communication Company Confidential Ver 1.0

    A Hub is a passive and Layer 1 device, shared media, used instar topology network.

    Properties of Hub:They amplify signalsThey propagate signals through the networkThey do not require filteringThey do not require path determination or switching.Hub is a collision domain-The network area with which datapackets originate and collide is called collision domain.

    The Work Station handling capacity is limited.The totalbandwidth is presented at all the ports in a Hub.

    .CSMA-CD:

    HUB

  • 7/27/2019 08 basic Basics of Networking

    5/35

    Data as on June,06 5

    www.gcl.in Gemini Communication Company Confidential Ver 1.0

    BRIDGES

    Bridges operate at Layer 2,the data link layer

    Bridges eliminate unnecessary traffic and minimises the chances ofcollisions occurring on a network by dividing it into segments and filteringtraffic based on station or MAC address.It creates the MAC address table by self learning.

    They control broadcasts to the network .They maintain address tables.Bridges are software based and slower in nature.

  • 7/27/2019 08 basic Basics of Networking

    6/35

    Data as on June,06 6

    www.gcl.in Gemini Communication Company Confidential Ver 1.0

    SWITCH

    A switch is an active device which has the same characteristics of aBridge .The advantage of switch is hardware based and faster in nature.

  • 7/27/2019 08 basic Basics of Networking

    7/35

    Data as on June,06 7

    www.gcl.in Gemini Communication Company Confidential Ver 1.0

    ROUTERRouters are used to connect separate networks and toaccess the internet.Routers provide end to end routing by passing the datapackets and routing traffic between different networksbased on network protocol or Layer 3 information.Router matches information in the routing table with thedatas destination IP address and sends incoming data

    to correct subnetwork and host.

  • 7/27/2019 08 basic Basics of Networking

    8/35

    Data as on June,06 8

    www.gcl.in Gemini Communication Company Confidential Ver 1.0

    CSMA/CDIn Computer networking , Carrier Sense MultipleAccess, Collision Detection (CSMA/CD ) is a networkcontrol protocol in which a carrier sensing scheme isused.

    CSMA/CD is an access method that allows only onestation to transmit at a time on a shared medium.

  • 7/27/2019 08 basic Basics of Networking

    9/35

    Data as on June,06 9

    www.gcl.in Gemini Communication Company Confidential Ver 1.0

    ETHERNET STANDARDIt operates at a base band signaling rate of 10 Mbps,which is referred to as 10Base.

    10 Base 2 Known as thin ethernet allows networksegments up to 185 meters on coaxial cable.

    10 Base 5-Known as thick ethernet ,allows networksegments upto 500 meters on coaxial cable.

    10 Base T-Provides access using inexpensive UTP cablestypically upto 100 meters.

  • 7/27/2019 08 basic Basics of Networking

    10/35

    Data as on June,06 10

    www.gcl.in Gemini Communication Company Confidential Ver 1.0

    UTP CABLEUnshielded twisted pair (UTP) is the most commoncable used in computer networking .It is a thin, flexible cable that is easy to string betweenwalls. UTP costs less per foot than any other type ofLAN cable .It is more prone to electrical noise andinterference than other types of networking media. Its

    unrepeated length limit is 100 meters .

  • 7/27/2019 08 basic Basics of Networking

    11/35

    Data as on June,06 11

    www.gcl.in Gemini Communication Company Confidential Ver 1.0

    STP CABLESTP cabling includes metal shielding over eachindividual pair of copper wires. This type of shieldingprotects cable from external EMI (electromagneticinterferences )

    STP cables are more expensive than UTP cable.

  • 7/27/2019 08 basic Basics of Networking

    12/35

    Data as on June,06 12

    www.gcl.in Gemini Communication Company Confidential Ver 1.0

    UNICAST

    Unicastunicast is thesending ofinformation packetsto a singledestination .

  • 7/27/2019 08 basic Basics of Networking

    13/35

    Data as on June,06 13

    www.gcl.in Gemini Communication Company Confidential Ver 1.0

    MULTICASTMulticast is the delivery ofinformation to a group ofdestinations simultaneously usingthe most efficient strategy to deliver

    the messages over each link of thenetwork only once, creating copiesonly when the links to thedestinations split.

  • 7/27/2019 08 basic Basics of Networking

    14/35

    Data as on June,06 14

    www.gcl.in Gemini Communication Company Confidential Ver 1.0

    BROADCAST

    In computernetworking,broadcasting

    refers totransmitting apacket that will bereceived(conceptually) byevery device on thenetwork

  • 7/27/2019 08 basic Basics of Networking

    15/35

    Data as on June,06 15

    www.gcl.in Gemini Communication Company Confidential Ver 1.0

    PROTOCOLSA protocol is a set of messages with a specific format

    TYPES OF PROTOCOLSRouting ProtocolsRouted Protocols

  • 7/27/2019 08 basic Basics of Networking

    16/35

    Data as on June,06 16

    www.gcl.in Gemini Communication Company Confidential Ver 1.0

    ROUTED PROTOCOLSRouted Protocols provide enough information in itsnetwork layer address to allow a packet to be forwardedfrom host to host based on the addressing scheme.Packets generally are conveyed from end system toend system.TYPESAppleTalkIPX

    IP

  • 7/27/2019 08 basic Basics of Networking

    17/35

    Data as on June,06 17

    www.gcl.in Gemini Communication Company Confidential Ver 1.0

    ROUTING PROTOCOLSA routing protocol allows the routers to communicatewith other routers to update and maintain tables.Routing protocol messages move between routers.TYPESRIPIGRPOSPFEIGRP

  • 7/27/2019 08 basic Basics of Networking

    18/35

    Data as on June,06 18

    www.gcl.in Gemini Communication Company Confidential Ver 1.0

    VLANVLAN divides a single LAN into'X" number ofVirtual LANs.VLAN technology creates virtual LANs that utilizethe benefits of independent Lan, while retainingaccess to the entire LAN.A virtual LAN removes selected traffic and places itwithin a virtual LANThe result is less traffic on the entire LAN

  • 7/27/2019 08 basic Basics of Networking

    19/35

    Data as on June,06 19

    www.gcl.in Gemini Communication Company Confidential Ver 1.0

    VLAN CONNECTION

    SWITCH 1-Ports 1-3(Vlan 1)Ports 4-6(Vlan 2)

    SWITCH 2-Ports 1-3(Vlan 1)

    Ports 4-6(Vlan 2)

  • 7/27/2019 08 basic Basics of Networking

    20/35

    Data as on June,06 20

    www.gcl.in Gemini Communication Company Confidential Ver 1.0

    TYPES OF VLANS

    PORT BASED VLANSIP BASED VLANS

    MAC ADDRESS BASED VLANS

  • 7/27/2019 08 basic Basics of Networking

    21/35

    Data as on June,06 21

    www.gcl.in Gemini Communication Company Confidential Ver 1.0

    DIFFERENCE BETWEENL2 & L3 SWITCHES

    The only difference between Layer 2

    and Layer 3 is that Layer3 switchinghub support routing function

  • 7/27/2019 08 basic Basics of Networking

    22/35

    Data as on June,06 22

    www.gcl.in Gemini Communication Company Confidential Ver 1.0

    BENEFITS OF LAYER3SWITCHING

    INTER VLAN CONNECTIVITYENHANCED PERFORMANCESIMPLIFIED MANAGEMENTENHANCED SECURITY

    LOW COSTFLEXIBLE NETWORK SEGMENTATIONBETTER USE OF SERVER RESOURCES

  • 7/27/2019 08 basic Basics of Networking

    23/35

    Data as on June,06 23

    www.gcl.in Gemini Communication Company Confidential Ver 1.0

    LAYERS OF NETWORKING

  • 7/27/2019 08 basic Basics of Networking

    24/35

    Data as on June,06 24

    www.gcl.in Gemini Communication Company Confidential Ver 1.0

    Physical layerThe physical layer is the most basic network layer, providing onlythe means of transmitting raw bits rather than packets over aphysical data link connecting network nodes. No packet headers nortrailers are consequently added to the data by the physical layerData linkThis is the layer which transfers data between adjacent networknodes in a wide area network or between nodes on the same localarea network segments. The data link layer provides the functionaland procedural means to transfer data between network entities andmight provide the means to detect and possibly correct errors thatmay occur in the Physical layer. Examples of data link protocols areEthernet for local area networks and PPP, HDLC and ADCCP forpoint-to-point connections.Network layerThe network layer is level three of the seven level OSI model as wellas of the five layer. In the four layer TCP/IP reference model it iscalled Internet layer, which is the second layer from below. Itresponds to service requests from the transpot layer and issuesservice requests to the data link layer

  • 7/27/2019 08 basic Basics of Networking

    25/35

    Data as on June,06 25

    www.gcl.in Gemini Communication Company Confidential Ver 1.0

    Transport layer

    In computing and telecommunitaion , the transport layer is the second highestlayer in the four and five layer TCP/IP rrefrence odels, where it responds toservice requests from the application layer and issues service requests to thenetwork layer. It is also the name of layer four of the seven layer OSI model,where it responds to service requests from the session layer and issues servicerequests to the network layer. The definitions of the transport layer are slightlydifferent in these two models. The following text primarily refers to the TCP/IPmodelSession layerThe session layer is level five of the seven level OSI model It responds toservice requests from the presentation layer and issues service requests to thetransport layer.The Session layer provides the mechanism for managing thedialogue between end-user application processes. It provides for either fullduplex or half-duplex operation and establishes checkpointing, adjournment,termination, and restart procedurespresentation layerThe presentation layer is the sixth level of the seven layer OSI model. Itresponds to service requests from the application layer and issues service

    requests to the session layer.The presentation layer is responsible for thedelivery and formatting of information to the application layer for furtherprocessing or display. It relieves the application layer of concern regardingsyntactical differences in data representation within the end-user systems. Note: An example of a presentation service would be the conversion of an EBCDIC-coded text file to an ASCII-coded fileApplication layerThe application layer is the seventh level of the seven-layer OSI model. Itinterfaces directly to and performs common application services for theapplication processes; it also issues requests to the presentation layer.Thecommon a lication la er services rovide semantic conversion between

  • 7/27/2019 08 basic Basics of Networking

    26/35

    Data as on June,06 26

    www.gcl.in Gemini Communication Company Confidential Ver 1.0

    PORT NOS

    UDPTCPTransport Layer

    1611106925532380808021Port no

    SNMPPOP3TFTPSMTPDNSTELNETHTTPSHTTPFTPApplication

    Layer

    Port no are unique and industrystandard

  • 7/27/2019 08 basic Basics of Networking

    27/35

    Data as on June,06 27

    www.gcl.in Gemini Communication Company Confidential Ver 1.0

    IP ADDRESSAn IP address is 32 bit logical address.Each IP address is divided into 4 octets (8 bitseach)An IP address is based on the internet protocol.IP addresses exist at Layer 3,the network layerof the OSI reference model.Every LAN must have its own unique IPaddreess,an IP address is essential forinternetworking over WAN to take place.An IP address exists at Layer 3,the networklayer of OSI reference model.

  • 7/27/2019 08 basic Basics of Networking

    28/35

    Data as on June,06 28

    www.gcl.in Gemini Communication Company Confidential Ver 1.0

    MAC ADDRESS

    Media Access Control address (MAC address) is aunique identification attached to most networkadapters (NICs). It is a number that acts like a name fora particular network adapter, so, for example, thenetwork cards (or built-in network adapters) in twodifferent computers will have different names, or MACaddresses, as would an Ethernet adapter and a

    wireless adapter in the same computer, and as wouldmultiple network cards in a router.MAC address is 48

    bit in nature .

  • 7/27/2019 08 basic Basics of Networking

    29/35

    Data as on June,06 29

    www.gcl.in Gemini Communication Company Confidential Ver 1.0

    IP CLASSES

  • 7/27/2019 08 basic Basics of Networking

    30/35

    Data as on June,06 30

    www.gcl.in Gemini Communication Company Confidential Ver 1.0

    IP ADDRESS CLASSES

  • 7/27/2019 08 basic Basics of Networking

    31/35

    Data as on June,06 31

    www.gcl.in Gemini Communication Company Confidential Ver 1.0

    Subnet Mask

    The subnet mask is the network address plus the bitsreserved for identifying the sub network. (Byconvention, the bits for the network address are all setto 1, though it would also work if the bits were setexactly as in the network address.) In this case,

    therefore, the subnet mask would be11111111.11111111.11110000.00000000. It's called amask because it can be used to identify the subnet towhich an IP address belongs by performing a on themask and the IP address. The result is the sub networkaddress:Subnet Mask 255.255.240.00011111111.11111111.11110000.00000000IP Address 150.215.017.00910010110.11010111.00010001.00001001Subnet Address150.215.016.00010010110.11010111.00010000.00000000

  • 7/27/2019 08 basic Basics of Networking

    32/35

    Data as on June,06 32

    www.gcl.in Gemini Communication Company Confidential Ver 1.0

    NATNAT (Network Address Translation or Network AddressTranslator) is the translation of an Internet Protocol address(IP address) used within one network to a different IP address

    known within another network. One network is designatedthe inside network and the other is the outside . Typically, acompany maps its local inside network addresses to one or

    more global outside .

  • 7/27/2019 08 basic Basics of Networking

    33/35

    Data as on June,06 33

    www.gcl.in Gemini Communication Company Confidential Ver 1.0

    Types of NATStatic NAT is a one-to-one mapping between an unregistered IP address and a registered IP address .

    Static NAT

    Static NAT

    DynamicNAT

    More commonly, Dynamic NAT is implemented, where a pool of public IPaddresses is shared by an entire private IP subnet. When a private host initiatesa connection, a public IP address is selected. The mapping of the computersnon-routable IP address matched to the selected IP address is stored in the NATTable. As long as the outgoing connection is maintained, the private host canbe reached by incoming packets sent to the specified public address. When thebinding expires, the address is returned to the pool for reuse.

  • 7/27/2019 08 basic Basics of Networking

    34/35

    Data as on June,06 34

    www.gcl.in Gemini Communication Company Confidential Ver 1.0

    OverloadingA variation of Dynamic NAT known asNetwork Address Port Translation (NAPT)maps multiple unregistered IP addresses toa single registered IP address bymultiplexing streams differentiated by theTCP/UDP port number.

    TYPES OFNAT

  • 7/27/2019 08 basic Basics of Networking

    35/35

    Data as on June,06 35

    www.gcl.in Gemini Communication Company Confidential Ver 1.0

    Thank You

    Leave IT to usContact : [email protected]


Recommended