Computer-networking and Types of Network

maryannaomambac1 13 views 92 slides Mar 11, 2025
Slide 1
Slide 1 of 92
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31
Slide 32
32
Slide 33
33
Slide 34
34
Slide 35
35
Slide 36
36
Slide 37
37
Slide 38
38
Slide 39
39
Slide 40
40
Slide 41
41
Slide 42
42
Slide 43
43
Slide 44
44
Slide 45
45
Slide 46
46
Slide 47
47
Slide 48
48
Slide 49
49
Slide 50
50
Slide 51
51
Slide 52
52
Slide 53
53
Slide 54
54
Slide 55
55
Slide 56
56
Slide 57
57
Slide 58
58
Slide 59
59
Slide 60
60
Slide 61
61
Slide 62
62
Slide 63
63
Slide 64
64
Slide 65
65
Slide 66
66
Slide 67
67
Slide 68
68
Slide 69
69
Slide 70
70
Slide 71
71
Slide 72
72
Slide 73
73
Slide 74
74
Slide 75
75
Slide 76
76
Slide 77
77
Slide 78
78
Slide 79
79
Slide 80
80
Slide 81
81
Slide 82
82
Slide 83
83
Slide 84
84
Slide 85
85
Slide 86
86
Slide 87
87
Slide 88
88
Slide 89
89
Slide 90
90
Slide 91
91
Slide 92
92

About This Presentation

This presentation discuss about Computer Network and the Types of Network


Slide Content

LCB

Networking
•Computer network A collection of
computing devices that are connected in
various ways in order to communicate and
share resources
Usually, the connections between
computers in a network are made using
physical wires or cables
However, some connections are wireless,
using radio waves or infrared signals

Networking
•Computer networks have opened up an
entire boundary in the world of computing
called the client/server model

Networking
•The generic term node or host refers to
any device on a network
•Data transfer rate
The speed with which data is moved
from one place on a network to another

Networking
•File server
A computer that stores and manages files
for multiple users on a network
•Web server
A computer dedicated to responding to
requests (from the browser client) for web
pages

Types of Networks

Types of Networks
•Personal-area network (PAN)
is a
 computer network for
interconnecting devices
centered on an individual
person's workspace

Local-area network

Types of Networks
•Local-area network (LAN)
A network that connects a
relatively small number of
machines in a relatively
close geographical area

15-10
Types of Networks
•Various configurations, called topologies, have
been used to administer LANs

Ring topology
A configuration that connects all nodes in a closed loop on
which messages travel in one direction

Star topology
A configuration that centers around one node to which
all others are connected and through which all
messages are sent

Bus topology
All nodes are connected to a single communication line that
carries messages in both directions
15-13

Metropolitan-area network (MAN)

Types of Networks
•Metropolitan-area network (MAN)
The communication infrastructures that have been developed in
and around large cities
-essentially a LAN version of the larger size and usually
use the same technology to the LAN.
 
MAN can include corporate offices are located adjacent
or also a city and can be used for private purposes
(private) or public.
 MAN capable of supporting both
voice and data, can even relate to the cable television
network.
 

Wide-area network (WAN)

Types of Networks
•Wide-area network (WAN) A network that
connects two or more local-area networks over a
potentially large geographic distance
Often one particular node on a LAN is set up to serve as a
gateway to handle all communication going between that
LAN and other networks
Communication between networks is called
internetworking
The Internet, as we know it today, is essentially the ultimate
wide-area network, spanning the entire globe

15-18
QUIZ
1. A collection of computing devices that are connected in
various ways in order to communicate and share resources

15-19
QUIZ
2-4 Name at least 3 Types of
Network

15-20
QUIZ
5-6 Name at least 2 TOPOLOGY

15-21
QUIZ
7. A computer dedicated to responding to
requests (from the browser client) for web
pages

15-22
QUIZ
8-9. What are the data pathway
of packets

15-23
QUIZ
10. Also considered as the shipping
address of data going to our home
computer

15-24
Internet Connections
•Dial-up access is cheap but slow. A modem (internal or
external) connects to the Internet after the computer dials a phone
number.
  This analog signal is converted to digital via the modem
and sent over a land-line serviced by a public telephone network
•DSL stands for Digital Subscriber Line.
  It is an internet
connection that is always “on”.
 This uses 2 lines so your phone is
not tied up when your computer is connected.
  There is also no
need to dial a phone number to connect.
  DSL uses a router to
transport data and the range of connection speed, depending on the
service offered, is between 128K to 8 Mbps.

15-25
Internet Connections
•Cable provides an internet connection through a
cable modem and operates over cable TV lines.
 There
are different speeds depending on if you are uploading
data transmissions or downloading.
  Since the coax
cable provides a much greater bandwidth over dial-up or
DSL telephone lines, you can get faster access.
  

15-26
Internet Connections
•Wireless, or Wi-Fi, as the name suggests, does not
use telephone lines or cables to connect to the internet.
 
 Instead, it uses radio frequency.  Wireless is also an
always on connection and it can be accessed from just
about anywhere.
 
•Satellite accesses the internet via a satellite in
Earth’s orbit. The enormous distance that a signal travels
from earth to satellite and back again, provides a
delayed connection compared to cable and DSL.

15-27
Internet Connections
•Cellular technology provides wireless Internet access
through cell phones.
 The speeds vary depending on the
provider, but the most common are 3G and 4G speeds.
 

15-28
•Which is responsible for taking large
amounts of data, compiling it into packets
and sending them on their way to be
received?

15-29
TCP/IP
•TCP stands for Transmission Control Protocol
TCP software breaks messages into packets,
hands them off to the IP software for delivery,
and then orders and reassembles the packets
at their destination
•IP stands for Internet Protocol
IP software deals with the routing of packets
through the maze of interconnected networks
to their final destination

15-30
TCP/IP (cont.)
•UDP stands for User Datagram Protocol
–It is an alternative to TCP
–The main difference is that TCP is highly
reliable, at the cost of decreased
performance, while UDP is less reliable, but
generally faster

15-31
Which will filter ingoing and
outgoing messages?

15-32
Firewalls
•Firewall A machine and its software that
serve as a special gateway to a network,
protecting it from inappropriate access
–Filters the network traffic that comes in,
checking the validity of the messages as
much as possible and perhaps denying some
messages altogether
–Enforces an organization’s access control
policy

Firewalls
A firewall protecting a LAN

WO O,WG BLUE WB GREEN,
WB BROWN
15-34

15-35
Network Addresses
•Hostname A unique identification that
specifies a particular computer on the
Internet
For example
matisse.csc.villanova.edu
condor.develocorp.com

15-36
Network Addresses
•Network software translates a hostname
into its corresponding IP address
For example
205.39.145.18

Network Addresses
•An IP address can be split into
–network address, which specifies a specific network
–host number, which specifies a particular machine in
that network

15-38
Domain Name System
•A hostname consists of the computer name
followed by the domain name
•csc.villanova.edu is the domain name
–A domain name is separated into two or more
sections that specify the organization, and possibly a
subset of an organization, of which the computer is a
part
–Two organizations can have a computer named the
same thing because the domain name makes it clear
which one is being referred to

15-39
Domain Name System
•The domain name system (DNS) is
chiefly used to translate hostnames into
numeric IP addresses
–DNS is an example of a distributed database
–If that server can resolve the hostname, it
does so
–If not, that server asks another domain name
server

How to connect to other
computer network?

NETWORKING TOOLS
1.Crimping tools- is a
tool designed to
 
crimp 
or
connect a connector to the
end of a cable.
For example, network cables
and phone cables are
created using a crimping
tool to connect the
 RJ-
45
 and RJ-11 connectors to
the end of the cable

NETWORKING TOOLS
2. A
 
wire stripper 
is
a small, hand-held
device used to
strip the
 electrical
insulation
 from
electric
 wires.

NETWORKING TOOLS
3.  LAN tester 
is a device
that is used to test the
strength and
connectivity of a
particular type of cable
or other wired
assemblies..

NETWORKING TOOLS
4.
  
network hub 
is the most basic
networking
 device that
connects multiple
computers or other network
devices together. Unlike a
network
 switch or router, a
network hub has no routing
tables or intelligence on
where to send information
and
 broadcasts all network
data across each
connection

NETWORKING TOOLS
5.
  short for MODulator/
Demodulator, The Modem is
a hardware device that
enables a computer to send
and receive information
over
 telephone lines by
converting the
 digital data
used by your computer into
an analog signal used on
phone lines and then
converting it back once
received on the other end.

NETWORKING TOOLS
6. Wireless modem a
mobile broadband modem,
also known as a connect
card or data card, is a type
of modem that allows a
laptop, a personal computer
or a router to receive
Internet access via a mobile
broadband connection
instead of using telephone
or cable television lines..

NETWORKING TOOLS
7. UTP (Unshielded Twisted
Pair) cable refers to a certain
type of cable that consists of
two unshielded wires twisted
around each other. These
types of cables are found in
many Ethernet networks and
telephone systems and they
are used in computer
networks.

NETWORKING TOOLS
8. RJ-45 plug
- a connector standard for
telephone cables
- A type of
 modular
connector
 for computer
network (Ethernet) cables

Computer Networking

Identification
1._hostname_A unique identification that
specifies a particular computer on the
Internet
2._Node refers to any device on a network
3._ Data transfer rateThe speed with which
data is moved from one place on a
network to another
15-50

Identification
4.__Computer networks have opened up an
entire boundary in the world of computing
called the client/server model
5. _ Web server A computer dedicated to
responding to requests (from the browser
client) for web pages
15-51

Identification
6.__File serverm A computer that stores and
manages files for multiple users on a
network odel
7. _ IP a software deals with the routing of
packets through the maze of interconnected
networks to their final destination
8. _ LAN A network that connects a relatively small
number of machines in a relatively close
geographical area
15-52

Identification
9.__WAN A network that connects two or
more local-area networks over a potentially
large geographic distance
10. __TCP software breaks messages into
packets, hands them off to the IP software for
delivery, and then orders and reassembles the
packets at their destination
15-53

Enumerate
1-3 LAN topologies
4-5 types of Network
6-9 Internet Connection
10-15 Networking Tool
15-54

Explain Computer Networking
15-55

Network Design
•Network design refers to the planning of
the implementation of a computer network
infrastructure.
•Network design is generally performed by
network designers, engineers, IT
administrators and other related staff. It is
done before the implementation of a
network infrastructure.
15-56

Typically, network design includes the following:
•Logical map of the network to be designed
•Cabling structure
•Quantity, type and location of network devices
(router, switches, servers)
•IP addressing structure
•Network security architecture and overall
network security processes
15-57

Connection
•In networking, a connection refers to
pieces of related information that are
transferred through a network.
•This generally infers that a connection is
built before the data transfer (by following
the procedures laid out in a protocol) and
then is deconstructed at the at the end of
the data transfer.
15-58

Packet
•the most basic unit that is transferred over a
network. When communicating over a
network, packets are the envelopes that
carry your data (in pieces) from one end
point to the other.
•Packets have a header portion that contains
information about the packet including the
source and destination, timestamps, network
hops, etc.
15-59

Network Interface
•A network interface can refer to any kind
of software interface to networking
hardware.
•For instance, if you have two network
cards in your computer, you can control
and configure each network interface
associated with them individually.
15-60

Protocol
•A protocol is a set of rules and standards
that basically define a language that
devices can use to communicate.
•There are a great number of protocols in
use extensively in networking, and they
are often implemented in different layers.
15-61

Interface
•are networking communication points for
your computer. Each interface is
associated with a physical or virtual
networking device.
•Typically, your server will have one
configurable network interface for each
Ethernet or wireless internet card you
have.
15-62

Media Access Control
•is a communications protocol that is used
to distinguish specific devices.
•Each device is supposed to get a unique
MAC address during the manufacturing
process that differentiates it from every
other device on the internet.
15-63

Internet Protocol
•is one of the fundamental protocols that
allow the internet to work.
•IP addresses are unique on each network
and they allow machines to address each
other across a network. It is implemented
on the internet layer in the IP/TCP model.
15-64

ICMP
•stands for internet control message
protocol. It is used to send messages
between devices to indicate the availability
or error conditions.
•These packets are used in a variety of
network diagnostic tools, such as ping and
traceroute.
15-65

TCP
•is one of the protocols that encapsulates
data into packets. It then transfers these to
the remote end of the connection using the
methods available on the lower layers.
•On the other end, it can check for errors,
request certain pieces to be resent, and
reassemble the information into one logical
piece to send to the application layer.
15-66

HTTP
•stands for hypertext transfer protocol. It is
a protocol defined in the application layer
that forms the basis for communication on
the web.
15-67

FTP
•stands for file transfer protocol. It is also in
the application layer and provides a way of
transferring complete files from one host to
another.
•It is inherently insecure, so it is not
recommended for any externally facing
network unless it is implemented as a
public, download-only resource.
15-68

DNS
•stands for domain name system. It is an
application layer protocol used to provide
a human-friendly naming mechanism for
internet resources.
•It is what ties a domain name to an IP
address and allows you to access sites by
name in your browser.
15-69

IPv4 vs. IPv6 addresses
•IPv4
•The version of the Internet Protocol (IP) that is
commonly used is version
 4 (IPv4), which has
not changed substantially since RFC
 791 was
published in 1981.
•IPv4 is robust, easily implemented,
interoperable, and capable of scaling to a
global utility that can function with the Internet.
15-70

•IPv6
•IPv6 significantly increases the number of
addresses that are available.
•The most obvious difference between IPv6
and IPv4 is the size of the addresses. An
IPv4 address is 32
 bits long, and an IPv6
address is 128
 bits long, which is four
times longer than an IPv4 address
15-71
IPv4 vs. IPv6 addresses

Dynamic vs. static IP addresses
•Dynamic IP addresses
•Dynamic IP addresses are acquired from a
DHCP server, and they may change from
time to time.
•You can provide dynamic IP addresses to the
computers on your network by configuring
one or more DHCP servers. The DHCP
server must be assigned a static IP address.
15-72

•Static IP addresses
•A static IP address does not change. It is
assigned by the network administrator,
and it is manually entered into the
properties for the network adapter that is
on a server or on a client computer.
•A static IP address does not require that a
DHCP server is running on the network.
15-73
Dynamic vs. static IP addresses

•G1- network design
•Network address
• subnet
•G2
•Topology
•Router/wifi access point/repeater config
•Network Interface Card Setting
15-74

•G3-network cables
•Cable raceways/ducts
•Network connectivity
•G4 ipv4 and ipv6
•IP addressing
•Subnet Mask
15-75

•G5 -CONTINGENCY PROCEDURES IN RESPONSE
TO UNPLANNED EVENTS AND CONDITIONS
•REMOTE DESKTOP
•WIRELESS SETTING CONFIGURATION
•G6 – GATEWAYS
•SECURITY/FIREWALL/ADVANCED SETTING
CONFIGURATION
•CLOUD COMPUTING
15-76

•G7 –NETWORK CONNECTIVITY
TESTING
•DEVICE SYSTEM SETTINGS
CONFIGURATION
•LAN CONFIGURATION
•G8- WAN CONFIGURATION
•ROUTERS-MANAGE AND UNMANAGED
15-77

•G9 –SWITCH –MANAGE AND UNMANAGED
•REPEATERS
•NETWORK INTERFACE CARDS AND
CONFIGURATION SETTINGS
•G10 WIRELESS NETWORK INTERFACE CARD
•WIRED NETWORK INTERFACE CARD
•FIREWALL CONFIGURATION
15-78

•G11 – NETWORK INSPECTION
PROCEDURE
•SAFE COMPUTER NETWORK
•DOCUMENTATION PROCEDURES
15-79

Network connectivity
•Network connectivity describes the
extensive process of connecting various
parts of a network to one another, for
example, through the use of routers,
switches and gateways, and how that
process works.

15-80

Network connectivity
•Ping 
is a utility first developed by Michael
Muss
 in 1983 that is used to verify whether or
not a
 network data packet is capable of being
distributed to an address without errors. The
ping utility is commonly used to check for
network errors.
15-81

Network connectivity
•The image is an example of what happens when a ping
is sent. The user would first start by using the ping
command to ping the
 IP address 204.228.150.3. Next,
the request is sent over the network
 hub and router, in
this example, to the other
 computer with this IP
address. Once successfully received, the computer
replies to the ping with a
 pong response. The time
between these two transmissions is calculated to
generate an average response or
 latency time.

15-82

15-83

15-84

15-85

Network connectivity
15-86

Network connectivity
15-87
•The netstat
 command,
meaning
 
network statistics, is
a
 Command Prompt command used
to display
 
very 
detailed information
about how your computer is
communicating with other computers
or network devices.

Network connectivity
15-88
•Internet Protocol Configuration
(ipconfig) is a Windows console
application that has the ability to
gather all data regarding current
Transmission Control
Protocol/Internet Protocol (TCP/IP)
configuration values and then display
this data on a screen.

Network connectivity
15-89
•Ipconfig also refreshes the Domain
Name System (DNS) and Dynamic
Host Configuration Protocol (DHCP)
settings each time it is invoked. When
invoked without additional parameters,
ipconfig simply displays the IP address,
default gateway and subnet mask for
all available adapters.

15-90
1.refers to the planning of the
implementation of a computer
network infrastructure.
2.-3 network design includes the
following
4. is a communications protocol that is
used to distinguish specific devices.

15-91
6. are unique on each network and they
allow machines to address each other
across a network. -3 network design
includes the following
7. is a communications protocol that is
used to distinguish specific devices.

15-92
8. It is a protocol defined in the
application layer that forms the basis for
communication on the web.
9. ICMP
10. FTTP
11.FTP