Evolution of Networking Technologies: From Mainframes to Mobile

EstherQuite1 64 views 34 slides Sep 05, 2024
Slide 1
Slide 1 of 34
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31
Slide 32
32
Slide 33
33
Slide 34
34

About This Presentation

Networking concepts and networking technologies


Slide Content

Evolution of Networking Technologies: From Mainframes to Mobile A Comprehensive Journey Through the Development and Implementation of Networking Infrastructure

Evolution of Networking in Mainframe Computers Development of ARPANET and Network Routers Evolution of the Internet: 1971-1996 OSI Reference Model Overview Benefits of Implementing the OSI Stack Physical Layer Components in Networking Types of Cables and Bandwidth Capabilities Multi-Mode Fiber vs. Single Mode Fiber Importance of Patch Panels in Network Connectivity Implementing Redundant Vertical Cabling 01 02 03 04 05 06 07 08 09 10 Table of contents

Proper Cable Management and Leased Lines T and E Carrier Lines Overview Internet Access Technologies Network Interface Controllers and Data Link Layer Structure of an Ethernet Packet WLAN (Wi-Fi) Technology Role of Switches in Networking Full Duplex Communication and WAN Evolution Public Wireless Networks and Mobile Technologies Evolution of Mobile Telecommunications Technology 11 12 13 14 15 16 17 18 19 20 Table of contents

IP Protocol Overview IPv4 Addresses and Network Prefixes IP Network Classes and CIDR Notation Subnetting and Private IP Ranges Implementation of IPv6 MTU Discovery in IPv6 Deployment Models for IPv6 Secure Communication Protocols and SSL/TLS Application Layer Protocols and Infrastructure Ser… Network Security Measures and Intrusion Detection … 21 22 23 24 25 26 27 28 29 30 Table of contents

Mainframe Computers in the 1960s Mainframe computers were stand-alone machines. They did not require networking. Evolution of Networking Technologies: From Mainframes to Mobile Birth of the Internet ARPANET connected computers through network routers. This marked the beginning of the internet. Emergence of Time-Sharing Systems Time-sharing systems like UNIX emerged in the 1970s. Evolution of Networking in Mainframe Computers

Evolution of Networking Technologies: From Mainframes to Mobile Development of ARPANET and Network Routers ARPANET: The Beginning of the Internet ARPANET was implemented in the late 1960s. ARPANET connected multiple computers using network routers. ARPANET marked the beginning of the internet.

Evolution of Networking Technologies: From Mainframes to Mobile Connection of ARPANET to other networks Included PRNET and SATNET Expanded the reach of ARPANET Facilitated early forms of network interoperability Development of the File Transfer Protocol (FTP) Occurred in 1973 Enabled the transfer of files between computers Standardized file transfer methods Evolution of the Internet: 1971-1996 Introduction of LANs for sharing data between office PCs Occurred in the 1980s Facilitated local data sharing Improved office productivity Transition from Network Control Protocol (NCP) to TCP/IP Occurred in 1983 Standardized communication protocols Enabled the modern internet Implementation of the first e-mail system via ARPANET Occurred in 1971 Pioneered by Ray Tomlinson Allowed messages to be sent between computers

The OSI Reference Model The basis for network architecture. Consists of seven layers defining data travel stages. Layer Functions and Interactions Each layer has specific functions and interactions. Mnemonic for Layers "People Do Need To See Pamela Anderson" helps recall the seven layers. Efficiency in Data Travel The model ensures data travels efficiently across networks. Importance of Understanding the OSI Model Aids in network troubleshooting and design. Evolution of Networking Technologies: From Mainframes to Mobile OSI Reference Model Overview

Evolution of Networking Technologies: From Mainframes to Mobile Benefits of Implementing the OSI Stack Allows network components to work independently Ensures components work together Flexibility in implementing each layer independently Optimal network stack configurations based on usage Each layer's payload contains the protocol for the next layer

Network Interface Cards (NICs) Hardware component that connects a computer to a network. Can be wired or wireless. Essential for network communication. Evolution of Networking Technologies: From Mainframes to Mobile Fiber Optic Cables Uses light to transmit data. High-speed and long-distance communication. Immune to electromagnetic interference. Twisted Pair Cables (UTP) Commonly used in local area networks (LANs). Consists of pairs of wires twisted together. Reduces electromagnetic interference. Leased Lines Dedicated communication line. Provides constant and reliable bandwidth. Often used by businesses for internet and private networks. Physical Layer Components in Networking

Evolution of Networking Technologies: From Mainframes to Mobile Types of Cables and Bandwidth Capabilities Twisted Pair Cables in Networking Twisted pair cables are commonly used in networking. UTP cables have separate pairs for transmitting and receiving data. UTP cables are rated based on how tightly the copper wires are intertwined. Higher ratings indicate better resistance to interference and attenuation. Different categories of UTP cables exist with varying maximum bandwidth capabilities.

Multi-Mode Fiber Supports multiple light modes simultaneously. Larger core size compared to single-mode fiber. Ideal for shorter distances within buildings. Evolution of Networking Technologies: From Mainframes to Mobile Single Mode Fiber Supports a single light mode. Smaller core size for higher transmission speeds. Suitable for long-distance communication like in telecommunications. Multi-Mode Fiber vs. Single Mode Fiber

Evolution of Networking Technologies: From Mainframes to Mobile Importance of Patch Panels in Network Connectivity Patch Panels Patch panels are passive connecting devices used in network connectivity. They are installed in racks in data centers and patch closets in buildings. Patch panels allow for flexible addition, movement, replacement, or removal of cables without changing the building's cabling. Port locations on patch panels enable easy connection of systems using patch cables.

Importance of Redundant Vertical Cabling Implementing redundant vertical cabling is crucial for network reliability. Evolution of Networking Technologies: From Mainframes to Mobile Patch Panels and Patching Types Use separate patch panels for different types of patching like UTP Ethernet, analog telephone, and fiber optics. Physical Routes for Patch Panels Create two separate physical routes for connecting patch panels on each floor to the data center. Preferably use a ring layout to avoid redundancy in the same physical path. Avoid installing vertical cabling in elevator shafts to prevent damage during repairs. Cable Management Employ color coding for easy identification and organization of cables. Tangled patch cables can lead to difficulties in maintenance and accidental unplugging of components. Implementing Redundant Vertical Cabling

Evolution of Networking Technologies: From Mainframes to Mobile Overview of Leased Lines and Their Role in Network Connectivity Provides dedicated bandwidth Ensures reliable and consistent performance Used for point-to-point communication Benefits of Color Coding and Labeling Patch Cables Simplifies identification of connections Reduces the risk of errors Enhances network organization Proper Cable Management and Leased Lines Importance of Proper Cable Management in Networking Reduces clutter and confusion Improves airflow and cooling Facilitates easier troubleshooting and maintenance Bandwidth Capabilities of T and E Carrier Lines T1: 1.544 Mbps T3: 44.736 Mbps E1: 2.048 Mbps E3: 34.368 Mbps Different Types of Leased Lines, Including T and E Carrier Lines T-carrier lines (e.g., T1, T3) E-carrier lines (e.g., E1, E3) Used for high-capacity data transmission

T and E Carrier Lines T and E carrier lines consist of multiple individual channels. Leasing one or more individual channels is known as fractional access. T and E carrier lines have symmetric upload and download bandwidths. Evolution of Networking Technologies: From Mainframes to Mobile Optical Carrier (OC) Levels Optical Carrier (OC) levels specify bandwidth in fiber optic networks. SONET and SDH Protocols SONET and SDH protocols transfer data over optical fiber. SONET is used in the US and Canada, while SDH is used in the rest of the world. T and E Carrier Lines Overview

Evolution of Networking Technologies: From Mainframes to Mobile Benefits and Drawbacks of Public Wireless Networks Increased accessibility and convenience Potential security risks Variable connection quality Introduction of GSM, CDMA, GPRS, and EDGE GSM: Global System for Mobile Communications CDMA: Code Division Multiple Access GPRS: General Packet Radio Service EDGE: Enhanced Data rates for GSM Evolution Internet Access Technologies Importance of Mobility and Connectivity in Public Wireless Networks Enables real-time communication Supports remote work and telecommuting Facilitates access to information on the go Popularity of Wireless Networks Over Wired Networks Ease of installation and expansion Support for mobile devices Reduced infrastructure costs Evolution from 1G to 2G Mobile Technologies Introduction of analog communication in 1G Transition to digital communication in 2G Improved voice quality and capacity

Network Interface Controllers (NICs) Facilitate communication between a computer and a network. Data Link Layer Responsible for node-to-node data transfer within the network. NICs and Data Link Layer NICs operate at the Data Link Layer to transmit and receive data packets. MAC Addresses Used at the Data Link Layer to uniquely identify devices on a network. Ethernet A common technology used at the Data Link Layer for wired networks. Evolution of Networking Technologies: From Mainframes to Mobile Network Interface Controllers and Data Link Layer

Evolution of Networking Technologies: From Mainframes to Mobile Destination MAC Address 6 bytes Identifies the intended recipient. Preamble 8 bytes long Used for synchronization. Structure of an Ethernet Packet Type/Length Field Indicates the type of data or the length of the frame. Source MAC Address 6 bytes Identifies the sender. Ethernet Packet Structure Consists of a preamble, destination MAC address, source MAC address, type/length field, data, and CRC.

Evolution of Networking Technologies: From Mainframes to Mobile WLAN (Wi-Fi) Technology WLAN (Wi-Fi) Technology Enables wireless network connectivity for devices. Operates on radio waves, allowing devices to connect to the internet without physical cables. Provides flexibility and mobility for users within the network coverage area. Security protocols like WPA2 and WPA3 are used to secure WLAN networks. Common frequency bands for WLAN include 2.4 GHz and 5 GHz for different speeds and coverage.

Switches and Full Duplex Communication Switches enable full duplex communication in networking. They facilitate simultaneous transmission and reception in UTP cables. Switches play a crucial role in enhancing network efficiency. Full duplex communication allows for faster data transfer. Switches are fundamental components in modern network infrastructure. Evolution of Networking Technologies: From Mainframes to Mobile Role of Switches in Networking

Full Duplex Communication Enables simultaneous transmission and reception in UTP cables. Evolution of Networking Technologies: From Mainframes to Mobile Modern WAN Connections Rely on packet switching technologies for reliability and robust connections. Evolution of WANs Evolved from point-to-point connections with modems to digital leased lines like T1/E1 and ISDN. Secure WAN Connections Transitioned to VPNs running on various technologies for secure communication. Full Duplex Communication and WAN Evolution

Evolution of Networking Technologies: From Mainframes to Mobile Drawbacks of Public Wireless Networks Lower reliability compared to wired networks. Temporary loss of connectivity can occur. Generally lower bandwidth than wired connections. Benefits of Public Wireless Networks Enhanced mobility for users. Improved connectivity in various locations. Public Wireless Networks and Mobile Technologies Public Wireless Networks Gaining Popularity Public wireless networks are becoming more popular than wired networks. Increased demand for mobility and connectivity. LTE-Advanced (4G+) Offers significantly higher download speeds. Backward compatibility with older mobile technologies. Evolution of Mobile Technologies Transition from 1G and 2G technologies (GSM, CDMA, GPRS, EDGE). Advancement to LTE, UMTS, HSDPA.

GSM Technology Started with GSM technology providing data rates of 56 to 114 kbit/s. 2.5G - EDGE Enhanced Data rates for GSM Evolution (EDGE) offering data rates up to 384 kbit/s. 3G - UMTS Designed for maximum data transfer rates of 45 Mbit/s. HSDPA Part of UMTS, providing a maximum speed of 7.2 Mbit/s. 4G - LTE and LTE-Advanced LTE designed for data transport rather than voice, offering download rates of at least 100 Mbit/s. LTE-Advanced (4G+) further enhanced download speeds to at least 225 Mbit/s. Mentioned the need for adaptations in core networks to support newer technologies like LTE. Evolution of Networking Technologies: From Mainframes to Mobile Evolution of Mobile Telecommunications Technology

Evolution of Networking Technologies: From Mainframes to Mobile IP Protocol Overview IP Protocol Overview Internet Protocol (IP) is a fundamental protocol in computer networking. It provides the addressing and routing mechanism for data packets across networks. IPv4 is the most widely used version, utilizing 32-bit addresses. IPv6 is the newer version with 128-bit addresses, designed to address the limitations of IPv4. IP packets contain source and destination IP addresses for proper delivery.

Evolution of Networking Technologies: From Mainframes to Mobile Subnetting Subnetting allows for the division of IP networks into smaller subnets. Network Prefixes Network prefixes determine the network portion of an IP address. IPv4 Addresses and Network Prefixes Efficient IP Allocation Efficient IP address allocation is achieved through CIDR and subnetting. CIDR Notation CIDR notation enables routing based on variable-length prefixes. IPv4 Address Structure IPv4 addresses are 32-bit numbers divided into network and host portions.

IP Network Classes Class A Class B Class C CIDR Notation Variable-length subnet masking Classful Network Design Limitations Scarcity of Class B and Class A Networks Evolution to Classless Inter-Domain Routing (CIDR) Evolution of Networking Technologies: From Mainframes to Mobile IP Network Classes and CIDR Notation

Subnetting Allows for the division of a network into smaller subnets for efficient IP address allocation. Optimizes network performance by organizing IP addresses into smaller, manageable segments. Evolution of Networking Technologies: From Mainframes to Mobile Private IP Ranges Ranges such as 10.0.0.0 to 10.255.255.255 are reserved for internal network use. Ensure secure communication within a network without direct exposure to the internet. Subnetting and Private IP Ranges

Most obvious deployment models for IPv6 Use IPv6 on LAN and on dedicated WAN links Protocol translation Dual stack IPv6 over IPv4 tunnels Evolution of Networking Technologies: From Mainframes to Mobile IPv6 over IPv4 tunnels Encapsulates IPv6 packets within IPv4 for transmission Known as 6to4, utilizing IPv4 as a link layer for IPv6 Dual stack is crucial in early IPv6 deployment stages Enables devices to communicate with both IPv4 and IPv6 destinations Ensures compatibility during transition period Importance of dual stack Facilitates communication in early stages when most destinations are IPv4-only Implementation of IPv6

Evolution of Networking Technologies: From Mainframes to Mobile Path MTU Discovery (PMTUD) mechanism Discovers the smallest MTU along the path Uses ICMPv6 Packet Too Big messages Adjusts packet size dynamically MTU Discovery process for IPv6 packets Determines the optimal MTU size Uses ICMPv6 messages Avoids fragmentation MTU Discovery in IPv6 Fragmentation avoidance in IPv6 IPv6 routers do not fragment packets End hosts perform fragmentation if needed Relies on PMTUD to avoid fragmentation ICMPv6 Packet Too Big message Sent when a packet exceeds the MTU size Contains the maximum acceptable packet size Triggers PMTUD adjustments Maximum Transmission Unit (MTU) in IPv6 Defines the largest packet size that can be transmitted Ensures efficient data transmission Standard MTU size is 1280 bytes

Use IPv6 on LAN and Dedicated WAN Links Ensure all local area networks (LAN) are configured to support IPv6. Establish dedicated wide area network (WAN) links for IPv6 traffic. Implement Protocol Translation for IPv4 and IPv6 Use protocol translation mechanisms to enable communication between IPv4 and IPv6 networks. Ensure seamless interoperability between different IP versions. Deploy Dual Stack for Simultaneous IPv4 and IPv6 Operation Configure network devices to support both IPv4 and IPv6. Allow simultaneous operation of both IP versions on the same network. Utilize IPv6 over IPv4 Tunnels for Encapsulation Encapsulate IPv6 packets within IPv4 packets for transmission. Use tunneling techniques to facilitate IPv6 deployment over existing IPv4 infrastructure. Emphasize the Importance of Dual Stack in Early IPv6 Deployment Stages Highlight the benefits of dual stack during the transition period. Ensure a smooth transition from IPv4 to IPv6 by supporting both protocols. Evolution of Networking Technologies: From Mainframes to Mobile Deployment Models for IPv6

Evolution of Networking Technologies: From Mainframes to Mobile Development History of SSL and TLS SSL 1.0: Internal Netscape development, never released SSL 2.0: Released in 1995, deprecated due to security flaws SSL 3.0: Released in 1996, more secure but now considered obsolete TLS 1.0: Released in 1999 as an upgrade to SSL 3.0 TLS 1.1 and 1.2: Introduced in 2006 and 2008 respectively, with improved security features SSL and TLS Protocols Overview SSL: Secure Sockets Layer TLS: Transport Layer Security Purpose: Secure communication over a computer network Secure Communication Protocols and SSL/TLS Importance of TLS Versions 1.2 and 1.3 TLS 1.2: Introduced in 2008, widely adopted, supports modern cryptographic algorithms TLS 1.3: Introduced in 2018, faster and more secure, reduces handshake latency Security: Both versions address vulnerabilities found in earlier versions Adoption: Encouraged for all secure communications Differences Between SSL and TLS SSL: Older protocol, less secure TLS: Newer protocol, more secure Handshake process: TLS uses a more secure handshake process Cipher suites: TLS supports more modern cipher suites Secure Communication Protocols: PPTP, L2TP, IPsec PPTP: Point-to-Point Tunneling Protocol L2TP: Layer 2 Tunneling Protocol IPsec: Internet Protocol Security

HTTP Protocol HyperText Transfer Protocol Foundation of data communication on the web Operates on port 80 Stateless protocol DNS Service Domain Name System Translates domain names to IP addresses Operates on port 53 Hierarchical and decentralized DHCP Functionality Dynamic Host Configuration Protocol Assigns IP addresses to devices on a network Operates on port 67 and 68 Automates network configuration FTP Protocol File Transfer Protocol Transfers files between client and server Operates on port 21 Supports authentication SMTP Service Simple Mail Transfer Protocol Used for sending emails Operates on port 25 Supports relay functionality Evolution of Networking Technologies: From Mainframes to Mobile Application Layer Protocols and Infrastructure Services

Evolution of Networking Technologies: From Mainframes to Mobile Conducting Regular Security Audits and Vulnerability Assessments Security audits help identify weaknesses in the system. Vulnerability assessments evaluate the potential impact of threats. Regular assessments ensure up-to-date security measures. Utilizing Intrusion Detection Systems for Threat Monitoring IDS detect and respond to potential security breaches. They can be network-based or host-based. IDS provide real-time alerts and logs for analysis. Network Security Measures and Intrusion Detection Systems Implementing Encryption for Data Protection Encryption converts data into a secure format. It protects data during transmission and storage. Encryption keys must be managed securely. Enforcing Strong Access Control Policies Access control policies restrict unauthorized access. They include user authentication and authorization. Strong policies help protect sensitive information. Implementing Firewalls for Network Security Firewalls act as a barrier between trusted and untrusted networks. They monitor and control incoming and outgoing network traffic. Firewalls can be hardware-based, software-based, or a combination of both.