+ All Categories
Home > Documents > dinisoft 1 Chapter 2 Networking Fundamentals

dinisoft 1 Chapter 2 Networking Fundamentals

Date post: 20-Jan-2015
Category:
Upload: networkingcentral
View: 820 times
Download: 0 times
Share this document with a friend
Description:
 
Popular Tags:
65
dinisoft 1 Chapter 2 Networking Fundamentals Problem for Call us: Shahajahan babu 01716718039
Transcript
Page 1: dinisoft 1 Chapter 2 Networking Fundamentals

dinisoft 1 Chapter 2

Networking Fundamentals

Problem for Call us:

Shahajahan babu

01716718039

Page 2: dinisoft 1 Chapter 2 Networking Fundamentals

Objectives

• Networking terminology

• Bandwidth

• Networking models

Page 3: dinisoft 1 Chapter 2 Networking Fundamentals

Data Networks

• Developed as a result of business applications that were written for microcomputer

• The microcomputers were not connected so there was no efficient way to share data among them

• It was not efficient or cost-effective for businesses to use floppy disks to share data

Page 4: dinisoft 1 Chapter 2 Networking Fundamentals

• Businesses needed a solution that would successfully address the following three problems:

- how to avoid duplication of equipment and resources

- how to communicate efficiently

- how to set up and manage a network

Page 5: dinisoft 1 Chapter 2 Networking Fundamentals

• Data networking solutions– Local-area networks– Wide-area networks

Page 6: dinisoft 1 Chapter 2 Networking Fundamentals

Networking History

• The history of computer networking is complex• It has involved many people from all over the world over

the past 35 years • In the 1940s computers were large electromechanical

devices that were prone to failure• In 1947 the invention of a semiconductor transistor

opened up many possibilities for making smaller, more reliable computers

• In the 1950s large institutions began to use mainframe computers, which were run by punched card programs

Page 7: dinisoft 1 Chapter 2 Networking Fundamentals

• In the 1960s mainframes with terminals and integrated circuits were widely used.

• In the late 1960s and 1970s smaller computers called minicomputers were created

• In the mid-1980s PC users began to use modems to share files with other computers. This was referred to as point-to-point, or dial-up communication

• In 1977 the Apple Computer Company introduced the microcomputer, which was also known as the Mac.

Page 8: dinisoft 1 Chapter 2 Networking Fundamentals

• In 1981 IBM introduced its first PC• The user-friendly Mac, the open-architecture IBM PC,

and the further micro-miniaturization of integrated circuits led to widespread use of personal computers in homes and businesses

• From the 1960s to the 1990s the U.S. Department of Defense (DoD) developed large, reliable, wide-area networks (WANs) for military and scientific reasons

Page 9: dinisoft 1 Chapter 2 Networking Fundamentals

Networking History

Page 10: dinisoft 1 Chapter 2 Networking Fundamentals

Networking Devices

• Equipment that connects directly to a network segment is referred to as a device. These devices are broken up into two classifications. The first classification is end-user devices. The second classification is network devices.

Page 11: dinisoft 1 Chapter 2 Networking Fundamentals

Repeater

• A repeater is a network device used to regenerate a analog or digital signals that are distorted by transmission loss due to attenuation

• A repeater does not make intelligent decision concerning forwarding packets like a router or bridge

Page 12: dinisoft 1 Chapter 2 Networking Fundamentals

Hub

• Hubs concentrate connections• In other words, they take a group of hosts and allow the

network to see them as a single unit• This is done passively, without any other effect on the data

transmission• Active hubs concentrate hosts and also regenerate signals.

Page 13: dinisoft 1 Chapter 2 Networking Fundamentals

Bridge

• Bridges convert network data formats and perform basic data transmission management

• Bridges provide connections between LANs• Bridges also check data to determine if it should cross the

bridge• This makes each part of the network more efficient.

Page 14: dinisoft 1 Chapter 2 Networking Fundamentals

Switch

• Switches add more intelligence to data transfer management

• They can determine if data should remain on a LAN and transfer data only to the connection that needs it

• Another difference between a bridge and switch is that a switch does not convert data transmission formats

Page 15: dinisoft 1 Chapter 2 Networking Fundamentals

Router

• Routers have all the capabilities listed above• Routers can regenerate signals, concentrate multiple

connections, convert data transmission formats, and manage data transfers

• They can also connect to a WAN, which allows them to connect LANs that are separated by great distances

• None of the other devices can provide this type of connection

Page 16: dinisoft 1 Chapter 2 Networking Fundamentals

Network Topology

• Network topology defines the structure of the network. The physical topology, which is the actual layout of the wire or media, and the logical topology, which defines how the media is accessed by the hosts for sending data.

Page 17: dinisoft 1 Chapter 2 Networking Fundamentals

Physical Topology

• A bus topology uses a single backbone cable that is terminated at both ends. All the hosts connect directly to this backbone

• A ring topology connects one host to the next and the last host to the first. This creates a physical ring of cable.

• A star topology connects all cables to a central point. • An extended star topology links individual stars together

by connecting the hubs or switches. • A hierarchical topology is similar to an extended star.

However, instead of linking the hubs or switches together, the system is linked to a computer that controls the traffic on the topology

Page 18: dinisoft 1 Chapter 2 Networking Fundamentals

Logical Topology

Broadcast topology

• Each host sends its data to all other hosts on the network medium

• There is no order that the stations must follow to use the network

• It is first come, first serve. Ethernet works this way as will be explained later in the course.

Page 19: dinisoft 1 Chapter 2 Networking Fundamentals

Token passing

• An electronic token is passed sequentially to each host• When a host receives the token, that host can send data

on the network• If the host has no data to send, it passes the token to the

next host and the process repeats itself Examples: Token Ring and Fiber Distributed Data

Interface (FDDI)

Page 20: dinisoft 1 Chapter 2 Networking Fundamentals

Network Protocols

• A protocol is a formal description of a set of rules and conventions that govern a particular aspect of how devices on a network communicate

• Protocol suites are collections of protocols that enable network communication from one host through the network to another host

Page 21: dinisoft 1 Chapter 2 Networking Fundamentals

• Rules are created and maintained by many different organizations and committees:

- The Institute of Electrical and Electronic Engineers (IEEE)

- American National Standards Institute (ANSI)

- Telecommunications Industry Association (TIA)

- Electronic Industries Alliance (EIA)

- International Telecommunications Union (ITU)

Page 22: dinisoft 1 Chapter 2 Networking Fundamentals

LANs

• Operate within a limited geographic area• Allow many users to access high-bandwidth media• Provide full-time connectivity to local services• Connect physically adjacent devices

Page 23: dinisoft 1 Chapter 2 Networking Fundamentals

LAN Components

• Computers • Network interface cards • Peripheral devices • Networking media

• Network devices

Page 24: dinisoft 1 Chapter 2 Networking Fundamentals

LAN Technologies

• Ethernet• Token Ring • Fiber distributed data interface (FDDI)

Page 25: dinisoft 1 Chapter 2 Networking Fundamentals

LAN Devices

Page 26: dinisoft 1 Chapter 2 Networking Fundamentals

WAN Technologies

• Analog modems• Integrated Services Digital Network (ISDN)• Digital Subscriber Line (DSL)• Frame Relay• Asynchronous Transfer Mode (ATM)• T (US) and E (Europe) carrier series: T1, E1, T3, E3• Synchronous Optical Network (SONET)

Page 27: dinisoft 1 Chapter 2 Networking Fundamentals

WAN Devices

Page 28: dinisoft 1 Chapter 2 Networking Fundamentals

Metropolitan-Area Networks (MANs)

• A MAN is a network that spans a metropolitan area such as a city or suburban area.

• A MAN usually consists of two or more LANs in a common geographic area.

Page 29: dinisoft 1 Chapter 2 Networking Fundamentals

Storage-Area Networks (SANs)

• A SAN is a dedicated, high-performance network used to move data between servers and storage resources

• Because it is a separate, dedicated network, it avoids any traffic conflict between clients and servers

Page 30: dinisoft 1 Chapter 2 Networking Fundamentals

Virtual Private Networks (VPNs)

• A VPN is a private network that is constructed within a public network infrastructure such as the global Internet

Page 31: dinisoft 1 Chapter 2 Networking Fundamentals

Benefits of VPNs

• A VPN is a service that offers secure, reliable connectivity over a shared public network infrastructure such as the Internet.

• VPNs maintain the same security and management policies as a private network.

• They are the most cost-effective method of establishing a point-to-point connection between remote users and an enterprise customer's network.

Page 32: dinisoft 1 Chapter 2 Networking Fundamentals

VPN Types

There are three main types of VPNs:• Intranet VPNs • Extranet VPNs • Access VPNs

Page 33: dinisoft 1 Chapter 2 Networking Fundamentals

Intranets and Extranets

• Intranets are designed to permit access by users who have access privileges to the internal LAN of the organization

• Extranets refer to applications and services that are Intranet based, but that use extended, secure access to external users or enterprises

Page 34: dinisoft 1 Chapter 2 Networking Fundamentals

Bandwidth

• Bandwidth is defined as the amount of information that can flow through a network connection in a given period of time

• Bandwidth is limited by the laws of physics and by the technologies used to place information on the media

Example: Bandwidth of a conventional modem is limited to about 56 kbps

Page 35: dinisoft 1 Chapter 2 Networking Fundamentals

Importance of Bandwidth

Page 36: dinisoft 1 Chapter 2 Networking Fundamentals

Digital Bandwidth

• Two analogies that describe digital bandwidth– Width of a pipe– Number of lanes on a highway

• Media bandwidth differences– Category 5 UTP – 100 meters maximum physical

distance– Multimode (62.5/125um) optical fiber – 2000

meters– Modem – 56 kbps = 0.056 Mbps– T1 – 1.544 Mbps

Page 37: dinisoft 1 Chapter 2 Networking Fundamentals

Throughput

• Refers to actual measured bandwidth, at a specific time of day, using specific Internet routes, and while a specific set of data is transmitted on the network

• Throughput is often far less than the maximum possible digital bandwidth of the medium that is being used

Page 38: dinisoft 1 Chapter 2 Networking Fundamentals

• Factors that determine throughput are:

- Internetworking devices - Type of data being transferred- Network topology- Number of users on the network- User computer- Server computer

Page 39: dinisoft 1 Chapter 2 Networking Fundamentals

Bandwidth Pipe Analogy

Page 40: dinisoft 1 Chapter 2 Networking Fundamentals

Bandwidth Highway Analogy

Page 41: dinisoft 1 Chapter 2 Networking Fundamentals

Bandwidth Measurements

Page 42: dinisoft 1 Chapter 2 Networking Fundamentals

Media Bandwidth

Page 43: dinisoft 1 Chapter 2 Networking Fundamentals

Digital Transfer Calculation

Page 44: dinisoft 1 Chapter 2 Networking Fundamentals

Digital vs. Analog

• Analog bandwidth is measured by how much of the electromagnetic spectrum is occupied by each signal

• In digital signaling, all information is sent as bits,

regardless of the kind of information it is.

Page 45: dinisoft 1 Chapter 2 Networking Fundamentals

Using Layers to Describe Communication

• Source, destination, and data packets– All communications originate at a source and travel

to a destination.– Information that travels on a network is referred to as

a data, packet, or data packet.

Page 46: dinisoft 1 Chapter 2 Networking Fundamentals

Using Layers to Describe Communication

• Media– Telephone wires (UTP)– Category 5 UTP (used for 10BASE-T Ethernet)– Coaxial cables– Optical fibers (thin glass fibers that carry light)

• Protocol – All devices on a network need to speak the same

language.– Set of rules that makes communication both possible

and more efficient.

Page 47: dinisoft 1 Chapter 2 Networking Fundamentals

The Purpose of the OSI Reference Model

• It breaks network communication into smaller, simpler parts that are easier to develop

• It facilitates standardization of network components to allow multiple-vendor development and support

• It allows different types of network hardware and software to communicate with each other

• It prevents changes in one layer from affecting the other layers so that they can develop more quickly

• It breaks network communication into smaller parts to make learning it easier to understand

Page 48: dinisoft 1 Chapter 2 Networking Fundamentals

Seven Layers of the OSI Reference Model

• Layer 7: Application• Layer 6: Presentation• Layer 5: Session• Layer 4: Transport• Layer 3: Network• Layer 2: Data link• Layer 1: Physical

Page 49: dinisoft 1 Chapter 2 Networking Fundamentals

Why a Layered Model?

Page 50: dinisoft 1 Chapter 2 Networking Fundamentals

Layers with Functions

Page 51: dinisoft 1 Chapter 2 Networking Fundamentals

The Seven Layers of the OSI Reference Model

• The application (upper) layers– Layer 7: Application– Layer 6: Presentation– Layer 5: Session

• The data-flow (lower) layers– Layer 4: Transport– Layer 3: Network– Layer 2: Data link– Layer 1: Physical

Page 52: dinisoft 1 Chapter 2 Networking Fundamentals

The Application (Upper) Layers• Application

– User interface– Examples – Telnet, HTTP

• Presentation– How data is presented– Special processing, such as encryption– Examples – ASCII, EMCDIC, JPEG

• Session– Keeping different applications’ data separate– Examples – Operating system/application access

scheduling

Page 53: dinisoft 1 Chapter 2 Networking Fundamentals

The Data-Flow (Lower) Layers

• Transport – Reliable or unreliable delivery– Error correction before transmit– Examples: TCP, UDP, SPX

• Network– Provide logical addressing which routers use for path

determination– Examples: IP, IPX

Page 54: dinisoft 1 Chapter 2 Networking Fundamentals

The Lower Layers (cont.)

• Data link– Combines bits into bytes and bytes into frames– Access to media using MAC address– Error detection not correction– Examples: 802.3/802.2, HDLN

• Physical– Moves bits between devices– Specifies voltage, wire speed, and pin out cables– Examples: EIA/TIA-232, V.35

Page 55: dinisoft 1 Chapter 2 Networking Fundamentals

The OSI Model

• Application – Think of browsers.• Presentation – Think of common data format.• Session – Think of dialogs and conversations.• Transport – Think of flow control and reliability.• Network – Think of path selection, routing, and logical

addressing.• Data Link – Think of frames and media access control.• Physical – Think of signals and media.

Page 56: dinisoft 1 Chapter 2 Networking Fundamentals

Peer-to-Peer Communication

• For data to travel from the source to the destination, each layer of the OSI model at the source must communicate with its peer layer at the destination.

• During this process, the protocols of each layer exchange information, called protocol data units (PDUs), between peer layers.

• Each layer of communication on the source computer communicates with a layer-specific PDU, and with its peer layer on the destination computer.

Page 57: dinisoft 1 Chapter 2 Networking Fundamentals

The TCP/IP Reference Model

Page 58: dinisoft 1 Chapter 2 Networking Fundamentals

TCP/IP Protocol Graph

Page 59: dinisoft 1 Chapter 2 Networking Fundamentals

Applications

• FTP – File Transfer Protocol• HTTP – Hypertext Transfer Protocol• SMTP – Simple Mail Transfer Protocol• DNS – Domain Name System• TFTP – Trivial File Transfer Protocol

Page 60: dinisoft 1 Chapter 2 Networking Fundamentals

OSI Model and TCP/IP Model

Page 61: dinisoft 1 Chapter 2 Networking Fundamentals

Use of the OSI Model in the CCNA Curriculum

Page 62: dinisoft 1 Chapter 2 Networking Fundamentals

Encapsulation The lower layers use encapsulation to put the protocol data unit (PDU) from the upper layer into its data field and to add headers and trailers that the layer can use to perform its function.

Page 63: dinisoft 1 Chapter 2 Networking Fundamentals

Names for Data at Each Layer

Page 64: dinisoft 1 Chapter 2 Networking Fundamentals

De-Encapsulation

• When the data link layer receives the frame, it does the following:– It reads the physical address and other control

information provided by the directly connected peer data link layer.

– It strips the control information from the frame, thereby creating a datagram.

– It passes the datagram up to the next layer, following the instructions that appeared in the control portion of the frame.

Page 65: dinisoft 1 Chapter 2 Networking Fundamentals

Thank You


Recommended