NETWORKING BASICS What is a Computer Network? A computer network allows sharing of resources and information among interconnected devices. In the 1960s, the Advanced Research Projects Agency (ARPA) started funding the design of the Advanced Research Projects Agency Network (ARPANET) for the United States Department of Defense. It was the first computer network in the world.[1] Development of the network began in 1969, based on designs developed during the 1960s. Computer networks can be used for a variety of purposes: Facilitating communications. Using a network, people can communicate efficiently and easily via email, instant messaging, chat rooms, telephone, video telephone calls, and video conferencing. Sharing hardware. In a networked environment, each computer on a network may access and use hardware resources on the network, such as printing a document on a shared network printer. Sharing files, data, and information. In a network environment, authorized user may access data and information stored on other computers on the network. The capability of
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
NETWORKING BASICS
What is a Computer Network?
A computer network allows sharing of resources and information among interconnected
devices. In the 1960s, the Advanced Research Projects Agency (ARPA) started funding the
design of the Advanced Research Projects Agency Network (ARPANET) for the United States
Department of Defense. It was the first computer network in the world.[1] Development of the
network began in 1969, based on designs developed during the 1960s.
Computer networks can be used for a variety of purposes:
Facilitating communications. Using a network, people can communicate efficiently and
easily via email, instant messaging, chat rooms, telephone, video telephone calls, and
video conferencing.
Sharing hardware. In a networked environment, each computer on a network may access
and use hardware resources on the network, such as printing a document on a shared
network printer.
Sharing files, data, and information. In a network environment, authorized user may
access data and information stored on other computers on the network. The capability of
providing access to data and information on shared storage devices is an important
feature of many networks.
Sharing software. Users connected to a network may run application programs on remote
computers.
Information preservation.
Security.
Speed up.
What is a Networking?
Networking is a common synonym for developing and maintaining contacts and personal
connections with a variety of people who might be helpful to you and your career.
Networking is the practice of linking two or more computing devices together for the purpose of
sharing data. Networks are built with a mix of computer hardware and computer software. It is
an especially important aspect of career management in the financial services industry, since it is
helps you keep abreast of:
Types of networks
Local area network
A local area network (LAN) is a network that connects computers and devices in a limited
geographical area such as home, school, computer laboratory, office building, or closely
positioned group of buildings. Each computer or device on the network is a node. Current wired
LANs are most likely to be based on Ethernet technology, although new standards like ITU-T
G.hn also provide a way to create a wired LAN using existing home wires (coaxial cables, phone
lines and power lines)
Personal area network
A personal area network (PAN) is a computer network used for communication among computer
and different information technological devices close to one person. Some examples of devices
that are used in a PAN are personal computers, printers, fax machines, telephones, PDAs,
scanners, and even video game consoles. A PAN may include wired and wireless devices. The
reach of a PAN typically extends to 10 meters.[4] A wired PAN is usually constructed with USB
and Firewire connections while technologies such as Bluetooth and infrared communication
typically form a wireless PAN.
Home area network
A home area network (HAN) is a residential LAN which is used for communication between
digital devices typically deployed in the home, usually a small number of personal computers
and accessories, such as printers and mobile computing devices. An important function is the
sharing of Internet access, often a broadband service through a CATV or Digital Subscriber Line
(DSL) provider. It can also be referred to as an office area network (OAN).
Wide area network
A wide area network (WAN) is a computer network that covers a large geographic area such as a
city, country, or spans even intercontinental distances, using a communications channel that
combines many types of media such as telephone lines, cables, and air waves. A WAN often
uses transmission facilities provided by common carriers, such as telephone companies. WAN
technologies generally function at the lower three layers of the OSI reference model: the physical
layer, the data link layer, and the network layer.
Campus Network
A campus network is a computer network made up of an interconnection of local area networks
(LAN's) within a limited geographical area. The networking equipments (switches, routers) and
transmission media (optical fiber, copper plant, Cat5 cabling etc.) are almost entirely owned (by
the campus tenant / owner: an enterprise, university, government etc.).
In the case of a university campus-based campus network, the network is likely to link a variety
of campus buildings including; academic departments, the university library and student
residence halls.
Metropolitan area network
A Metropolitan area network is a large computer network that usually spans a city or a large
campus.
Virtual private network
A virtual private network (VPN) is a computer network in which some of the links between
nodes are carried by open connections or virtual circuits in some larger network (e.g., the
Internet) instead of by physical wires. The data link layer protocols of the virtual network are
said to be tunneled through the larger network when this is the case. One common application is
secure communications through the public Internet, but a VPN need not have explicit security
features, such as authentication or content encryption. VPNs, for example, can be used to
separate the traffic of different user communities over an underlying network with strong
security features.
What is network topology?
Network topology is the layout pattern of interconnections of the various elements (links, nodes,
etc.) of a computer network.[1][2] Network topologies may be physical or logical. Physical
topology means the physical design of a network including the devices, location and cable
installation. Logical topology refers to how data is actually transferred in a network as opposed
to its physical design.
Various topologies ::
Bus topology
Many devices connect to a single cable "backbone". If the backbone is broken, the entire
segment fails. Bus topologies are relatively easy to install and don't require much cabling
compared to the alternatives.
Ring Topology
In a ring network, every device has exactly two neighbours for communication purposes. All
messages travel through a ring in the same direction. Like the bus topology, a failure in any cable
or device breaks the loop and will take down the entire segment. A disadvantage of the ring is
that if any device is added to or removed from the ring, the ring is broken and the segment fails
until it is "reforged" (by dwarfish goldsmiths?) It is also considerably more expensive than
other topologies.
Star Topology
A star network has a central connection point - like a hub or switch. While it takes more cable,
the benefit is that if a cable fails, only one node will be brought down.
All traffic emanates from the hub of the star. The central site is in control of all the nodes
attached to it. The central hub is usually a fast, self contained computer and is responsible for
routing all traffic to other nodes. The main advantages of a star network is that one
malfunctioning node does not affect the rest of the network. However this type of network can be
prone to bottleneck and failure problems at the central site.
Tree Topology
Also known as the 'Hierarchical topology', the tree topology is a combination of bus and star
topologies. They are very common in larger networks. A typical scenario is: a file server is
connected to a backbone cable (e.g. coaxial) that runs through the building, from which switches
are connected, branching out to workstations.
Mesh topology
In the topologies shown above, there is only one possible path from one node to another node. If
any cable in that path is broken, the nodes cannot communicate.
Mesh topology uses lots of cables to connect every node with every other node. It is very
expensive to wire up, but if any cable fails, there are many other ways for two nodes to
communicate. Some WANs, like the Internet, employ mesh routing. In fact the Internet was
deliberately designed like this to allow sites to communicate even during a nuclear war.
Hybrid Topology
Hybrid network is the combination of different topologies such as star, Ring, Mesh, Bus etc. For
example, if a department uses a Bus network, second department uses the ring network, third
department uses the Mesh network and fourth department uses the star network. All the networks
of different types (of four departments) can be connected together through a central hub (in the
form of star network) as shown in the figure below.
Basic networking devices
Computer networking devices are units that mediate data in a computer network. Computer
networking devices are also called network equipment, Intermediate Systems (IS) or
InterWorking Unit (IWU). Units which are the last receiver or generate data are called hosts or
data terminal equipment.
Routers
A router is a communication device that is used to connect two logically and physically different
networks, two LANs, two WANs and a LAN with WAN. The main function of the router is to
sorting and the distribution of the data packets to their destinations based on their IP addresses.
Routers provides the connectivity between the enterprise businesses, ISPs and in the internet
infrastructure, router is a main device. Cisco routers are widely used in the world. Every router
has routing software, which is known as IOS. Router operates at the network layer of the OSI
model. Router does not broadcast the data packets.
We have two types of router:
1.Hardware
2.software. – this router is provided by RRAS SERVICE.
Switches
Like the router, a switch is an intelligent device that maps the IP address with the MAC address
of the LAN card. Unlike the hubs, a switch does not broadcast the data to all the computers, it
sends the data packets only to the destined computer. Switches are used in the LAN, MAN and
WAN. In an Ethernet network, computers are directly connected with the switch via twisted pair
cables. In a network, switches use the three methods to transmit the data i.e. store and forward,
cut through and fragment free.
We have two types of switch.
1.Mangeable switch: it has console port by using this we can mange this switch according to
our need .
2.non-mangeable : it ha no console port we use this switch as we purchase it.
Hubs
The central connecting device in a computer network is known as a hub. There are two types of
a hub i.e. active hub and passive hub. Every computer is directly connected with the hub. When
data packets arrives at hub, it broadcast them to all the LAN cards in a network and the destined
recipient picks them and all other computers discard the data packets. Hub has five, eight,
sixteen and more ports and one port is known as uplink port, which is used to connect with the
next hub.
Modems
A modem is a communication device that is used to provide the connectivity with the internet.
Modem works in two ways i.e. Modulation and Demodulation. It converts the digital data into
the analogue and analogue to digital.
LAN Cards
LAN cards or network adapters are the building blocks of a computer network. No computer can
communicate without a properly installed and configured LAN card. Every LAN card is
provided with a unique IP address, subnet mask, gateway and DNS (if applicable). An UTP/STP
cable connects a computer with the hub or switch. Both ends of the cable have the RJ-45
connectors one is inserted into the LAN card and one in the hub/switch. LAN cards are inserted
into the expansion slots inside the computer. Different LAN cards support different speed from
10/100 to 10/1000.
Ethernet = speed 10mbps
Fast Ethernet = 100mbps
Giga Ethernet = 1000mbps
Fastgiga Ethernet = 10000mbps
Network Repeater
A repeater connects two segments of your network cable. It retimes and regenerates the signals
to proper amplitudes and sends them to the other segments. When talking about, ethernet
topology, you are probably talking about using a hub as a repeater. Repeaters require a small
amount of time to regenerate the signal. This can cause a propagation delay which can affect
network communication when there are several repeaters in a row. Many network architectures
limit the number of repeaters that can be used in a row. Repeaters work only at the physical layer
of the OSI network model.
Bridge
A bridge reads the outermost section of data on the data packet, to tell where the message is
going. It reduces the traffic on other network segments, since it does not send all packets.
Bridges can be programmed to reject packets from particular networks. Bridging occurs at the
data link layer of the OSI model, which means the bridge cannot read IP addresses, but only the
outermost hardware address of the packet. In our case the bridge can read the ethernet data which
gives the hardware address of the destination address, not the IP address. Bridges forward all
broadcast messages. Only a special bridge called a translation bridge will allow two networks of
different architectures to be connected. Bridges do not normally allow connection of networks
with different architectures.
The hardware address is also called the MAC (media access control) address. To determine the
network segment a MAC address belongs to, bridges use one of:
Transparent Bridging - They build a table of addresses (bridging table) as they receive packets. If
the address is not in the bridging table, the packet is forwarded to all segments other than the one
it came from. This type of bridge is used on ethernet networks.
Source route bridging - The source computer provides path information inside the packet. This is
used on Token Ring networks.
Gateway
A gateway can translate information between different network data formats or network
architectures. It can translate TCP/IP to AppleTalk so computers supporting TCP/IP can
communicate with Apple brand computers. Most gateways operate at the application layer, but
can operate at the network or session layer of the OSI model. Gateways will start at the lower
level and strip information until it gets to the required level and repackage the information and
work its way back toward the hardware layer of the OSI model. To confuse issues, when talking
about a router that is used to interface to another network, the word gateway is often used. This
does not mean the routing machine is a gateway as defined here, although it could be.
Network Models
When dealing with networking, you may hear the terms "network model" and "network layer"
used often. Network models define a set of network layers and how they interact. There are
several different network models depending on what organization or company started them. The
most important two are:
The TCP/IP Model - This model is sometimes called the DOD model since it was designed for
the department of defense It is also called the internet model because TCP/IP is the protocol used
on the internet.
OSI Network Model - The International Standards Organization (ISO) has defined a standard
called the Open Systems Interconnection (OSI) reference model. This is a seven layer
architecture listed in the next section.
Layers in the TCP/IP model
Application Layer (process-to-process): This is the scope within which applications create user
data and communicate this data to other processes or applications on another or the same host.
The communications partners are often called peers. This is where the "higher level" protocols
such as SMTP, FTP, SSH, HTTP, etc. operate.
Transport Layer (host-to-host): The Transport Layer constitutes the networking regime
between two network hosts, either on the local network or on remote networks separated by
routers.
Internet Layer (internetworking): The Internet Layer has the task of exchanging datagrams
across network boundaries. It is therefore also referred to as the layer that establishes
internetworking, indeed, it defines and establishes the Internet. This layer defines the addressing
and routing structures used for the TCP/IP protocol suite.
Link Layer: This layer defines the networking methods with the scope of the local network link
on which hosts communicate without intervening routers. This layer describes the protocols used
to describe the local network topology and the interfaces needed to affect transmission of
Internet Layer datagrams to next-neighbor hosts.
OSI Model
The OSI, or Open System Interconnection, model defines a networking framework for
implementing protocols in seven layers. Control is passed from one layer to the next, starting at
the application layer in one station, and proceeding to the bottom layer, over the channel to the
next station and back up the hierarchy.
Application (Layer 7)
This layer supports application and end-user processes. Communication partners are identified,
quality of service is identified, user authentication and privacy are considered, and any
constraints on data syntax are identified.
Presentation (Layer 6)
This layer provides independence from differences in data representation (e.g., encryption) by
translating from application to network format, and vice versa.
Session (Layer 5)
This layer establishes, manages and terminates connections between applications. The session
layer sets up, coordinates, and terminates conversations, exchanges, and dialogues between the
applications at each end. It deals with session and connection coordination.
Transport (Layer 4)
This layer provides transparent transfer of data between end systems, or hosts, and is responsible
for end-to-end error recovery and flow control. It ensures complete data transfer.
Network (Layer 3)
This layer provides switching and routing technologies, creating logical paths, known as virtual
circuits, for transmitting data from node to node.
Data Link (Layer 2)
At this layer, data packets are encoded and decoded into bits. It furnishes transmission protocol
knowledge and management and handles errors in the physical layer, flow control and frame
synchronization. The data link layer is divided into two sub layers: The Media Access Control
(MAC) layer and the Logical Link Control (LLC) layer.
Physical (Layer 1)
This layer conveys the bit stream - electrical impulse, light or radio signal -- through the network
at the electrical and mechanical level. .
TCP/IP Model vs OSI Model
Sr.
No.TCP/IP Reference Model OSI Reference Model
1 Defined after the advent of Internet. Defined before advent of internet.
2Service interface and protocols were not clearly
distinguished before
Service interface and protocols are
clearly distinguished
3 TCP/IP supports Internet working Internet working not supported
4 Loosely layered Strict layering
5 Protocol Dependant standard Protocol independent standard
6 More Credible Less Credible
7TCP reliably delivers packets, IP does not
reliably deliver packetsAll packets are reliably delivered
Basic Networking Cables
Networking Cables are used to connect one network device to other or to connect two or more
computers to share printer, scanner etc. Different types of network cables like Coaxial
cable, Optical fiber cable, Twisted Pair cables are used depending on the
network's topology, protocol and size. The devices can be separated by a few meters (e.g.
via Ethernet) or nearly unlimited distances (e.g. via the interconnections of the Internet).
While wireless may be the wave of the future, most computer network today still utilize cables to
transfer signals from one point to another
Twisted pair
Twisted pair cabling is a type of wiring in which two conductors (the forward and return
conductors of a single circuit) are twisted together for the purposes of canceling
out electromagnetic interference (EMI) from external sources; for instance, electromagnetic
radiation from unshielded twisted pair (UTP) cables, and crosstalk between neighboring pairs. It