Networking Fundamentals

Similar documents
THE OSI REFERENCE MODEL LES M C LELLAN DEAN WHITTAKER SANDY WORKMAN

Protocol Data Units and Encapsulation

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

Zarządzanie sieciami telekomunikacyjnymi

The OSI and TCP/IP Models. Lesson 2

Computer Networks CS321

CSE 3461 / 5461: Computer Networking & Internet Technologies

Chapter 2 - The TCP/IP and OSI Networking Models

CSCI 362 Computer and Network Security

Communications and Computer Networks

UPPER LAYER SWITCHING

Data Communication and Computer Network

Computer Networks Vs. Distributed Systems

CCNA 1: Networking Basics. Cisco Networking Academy Program Version 3.0

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 2 An Introduction to Networking

Overview of Computer Networks

OPEN SYSTEMS INTERCONNECTION OVERVIEW OF PROTOCOL LAYERING AND OSI MODEL OF NETWORK STACKS

Chapter 8: Computer Networking. AIMS The aim of this chapter is to give a brief introduction to computer networking.

Mathatma Gandhi University

Network Models OSI vs. TCP/IP

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Data Communication Networks and Converged Networks

The OSI Model and the TCP/IP Protocol Suite

Communication Networks. MAP-TELE 2011/12 José Ruela

Protocols and Architecture. Protocol Architecture.

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, Lecturer: Kartik Krishnan Lecture 1-3

Introduction to Networking and the OSI Model

524 Computer Networks

Data Communications and Networking Overview

FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks

Chapter 1: Introduction

Data Communication Networks

Layered Architectures and Applications

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above

Top-Down Network Design

Computer Networking Networks

Introduction to Computer

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak

Ethernet. Ethernet. Network Devices

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

How To Use A Network Over The Internet (Networking) With A Network (Netware) And A Network On A Computer (Network)

EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst

WAN Technologies Based on CCNA 4 v3.1 Slides Compiled & modified by C. Pham

Networking Test 4 Study Guide

IT Data Communication and Networks (Optional)

MANAGEMENT INFORMATION SYSTEMS 8/E

Computer Networking: A Survey

What is CSG150 about? Fundamentals of Computer Networking. Course Outline. Lecture 1 Outline. Guevara Noubir noubir@ccs.neu.

IT4405 Computer Networks (Compulsory)

1.264 Lecture 37. Telecom: Enterprise networks, VPN

Chapter 5. Data Communication And Internet Technology

Topics. Computer Networks. Let s Get Started! Computer Networks: Our Definition. How are Networks Used by Computers? Computer Network Components

Network System Design Lesson Objectives

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Basic Network Configuration

NETWORK DRIVE MAPPING, SHARING,TESTING AND AN IMPLEMENTATION BY WRITING A PROGRAM TO RETRIEVE THE DATA FILE FROM A NETWORK DRIVE OF ANOTHER COMPUTER.

Lecture (02) Networking Model (TCP/IP) Networking Standard (OSI) (I)

Data Link Protocols. TCP/IP Suite and OSI Reference Model

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Lecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks

Chapter 7: Computer Networks, the Internet, and the World Wide Web. Invitation to Computer Science, C++ Version, Third Edition

COMPUTER NETWORK TECHNOLOGY (300)

The OSI Model and the TCP/IP Protocol Suite PROTOCOL LAYERS. Hierarchy. Services THE OSI MODEL

Computer Networks. By Hardeep Singh

Communication Networks. MAP-TELE 2011/12 José Ruela

OSI Reference Model: An Overview

COMPUTER NETWORKS SECOND EDITION. ANDREW S.fjANENBAUM. Vrije Universiteit Amsterdam, The Netherlands. Nachrichtentechnische Bib'iothek THD Inv.

Cisco Networking Professional-6Months Project Based Training

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network

WAN Technology. Heng Sovannarith

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software


The OSI Model: Understanding the Seven Layers of Computer Networks

Higher Computing Networking 1

Agenda. Distributed System Structures. Why Distributed Systems? Motivation

ICS 153 Introduction to Computer Networks. Inst: Chris Davison

Objectives of Lecture. Network Architecture. Protocols. Contents

Overview of Routing between Virtual LANs

PART IV. Network Layer

Discovering Computers Chapter 9 Communications and Networks

Communication Systems Internetworking (Bridges & Co)

2. What is the maximum value of each octet in an IP address? A. 28 B. 255 C. 256 D. None of the above

Planeamento e Gestão de Redes. Análise de Requisitos

Oct 15, Internet : the vast collection of interconnected networks that all use the TCP/IP protocols

Protocol Architecture

SSVP SIP School VoIP Professional Certification

TCP/IP Basis. OSI Model

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

How To Understand The Layered Architecture Of A Network

TCP/IP Network Essentials. Linux System Administration and IP Services

Introduction Chapter 1. Uses of Computer Networks

Slide 1 Introduction cnds@napier 1 Lecture 6 (Network Layer)

Computer Networks CCNA Module 1

2 Basic Concepts. Contents

Computer Networks III

PLANEAMENTO E GESTÃO DE REDES INFORMÁTICAS COMPUTER NETWORKS PLANNING AND MANAGEMENT

Lab VI Capturing and monitoring the network traffic

Transcription:

Networking Fundamentals CCNA 1 v3 Module 2 10/11/2005 NESCOT CATC 1

Networking Terminology End-user devices provide users with a connection to the network. Also referred to as hosts. Allow users to share, create, and obtain information. Network devices provide transport for data between enduser devices. Provide cable connections, extensions, concentration. Conversion of data formats, and management of data transfers NESCOT CATC 2

Physical Topologies Physical topology is the actual layout of the wire or media NESCOT CATC 3

Logical Topology Logical topology defines how media is accessed by hosts 1. Broadcast means that each host sends its data to all other hosts on the network medium. Non-deterministic - there is no order that the stations must follow to use the network. First come, first served. Example: Ethernet 2. Token Passing controls network access by passing an electronic token sequentially to each host. When a host receives the token, that host can send data on the network. If the host has no data to send, it passes the token to the next host and the process repeats itself. Examples: Token Ring, FDDI NESCOT CATC 4

NESCOT CATC 5

LAN MAN WAN SAN VPN Operate within limited geographical area Allow multi-access to high bandwidth media Control network privately under local administration Provide full-time connectivity to local services Connect physically adjacent devices Spans a metropolitan area such as a city or suburban area Usually consists of LANs in a common geographic area Example: a bank with multiple branches may utilize a MAN Operate over a large geographical area Allow access over serial interfaces operating at lower speeds Provide full-time and part-time connectivity Connect devices separated over wide areas High-performance network to move data to/from storage areas Separate, dedicated network avoids traffic conflict Private network constructed within public network such as Internet Access VPNs, Intranet VPNs, Extranet VPNs NESCOT CATC 6

Bandwidth Bandwidth is limited by physics and technology Bandwidth is not free Bandwidth requirements are growing at a rapid rate Bandwidth is critical to network performance NESCOT CATC 7

Throughput Throughput refers to actual measured bandwidth, at a specific time of day, using specific Internet routes, and while a specific set of data is transmitted on the network. Often far less than the maximum possible digital bandwidth. Factors that determine throughput: Internetworking devices Type of data being transferred Network topology Number of users on the network User computer Server computer Power conditions T = Time S = Size BW = Bandwidth P = Throughput NESCOT CATC 8

Networking Models The historical and technical standard of the Internet is the TCP/IP model The U.S. Department of Defence created the TCP/IP reference model, to design a network that could survive any conditions, including a nuclear war Application layer handles issues of representation, encoding, and dialog control. Transport layer deals with the quality of service issues of reliability, flow control, and error correction Internet layer is to divide TCP segments into packets and send them from any network. Best path determination and packet switching occur at this layer Network Access layer (aka host-to-network layer) concerned with all components, both physical and logical, that are required to make a physical link NESCOT CATC 9

OSI Model Reduces complexity Standardizes interfaces Facilitates modular engineering Ensures interoperable technology Accelerates evolution Simplifies teaching and learning The OSI reference model was released in 1984 to help network builders implement networks that could communicate (interoperability) The OSI reference model is the primary model for network communications The process of moving information between computers is divided into seven smaller and more manageable steps NESCOT CATC 10

Source Destination DATA Application Presentation Session Transport Network Data-Link Physical ENCAPSULATION SEGMENT PACKET FRAME BITS 0101010101010101010 DECAPSULATION Application Presentation Session Transport Network Data-Link Physical NESCOT CATC 11

OSI Top 3 Layers Application issues Application provides network services to the user's applications file, print, message, database and application services HTTP, SMTP, FTP Presentation responsible for manipulating data s appearance as needed by the Application layer Data encryption, compression and translation services JPEG, MIDI, QuickTime, EBCDIC to ASCII Session establish and maintain communication between two hosts Dialogue control NFS, SQL, RPC, X Window NESCOT CATC 12

OSI Lower 4 Layers Data Transport issues Transport PDU Segment the transport layer establishes, maintains, and tears down virtual circuits Windowing TCP and UDP Network PDU - Packet Routing Data packets and route update packets connectivity and path selection between two hosts Data-Link PDU - Frame physical addressing, network topology, network access, error notification, ordered delivery of frames, and flow control Ethernet LCC and MAC layers Physical PDU bits Cabling, standards NESCOT CATC 13