Unit 1 Introduction To Computer Networks.pdf

aida818570 9 views 126 slides Oct 28, 2025
Slide 1
Slide 1 of 126
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31
Slide 32
32
Slide 33
33
Slide 34
34
Slide 35
35
Slide 36
36
Slide 37
37
Slide 38
38
Slide 39
39
Slide 40
40
Slide 41
41
Slide 42
42
Slide 43
43
Slide 44
44
Slide 45
45
Slide 46
46
Slide 47
47
Slide 48
48
Slide 49
49
Slide 50
50
Slide 51
51
Slide 52
52
Slide 53
53
Slide 54
54
Slide 55
55
Slide 56
56
Slide 57
57
Slide 58
58
Slide 59
59
Slide 60
60
Slide 61
61
Slide 62
62
Slide 63
63
Slide 64
64
Slide 65
65
Slide 66
66
Slide 67
67
Slide 68
68
Slide 69
69
Slide 70
70
Slide 71
71
Slide 72
72
Slide 73
73
Slide 74
74
Slide 75
75
Slide 76
76
Slide 77
77
Slide 78
78
Slide 79
79
Slide 80
80
Slide 81
81
Slide 82
82
Slide 83
83
Slide 84
84
Slide 85
85
Slide 86
86
Slide 87
87
Slide 88
88
Slide 89
89
Slide 90
90
Slide 91
91
Slide 92
92
Slide 93
93
Slide 94
94
Slide 95
95
Slide 96
96
Slide 97
97
Slide 98
98
Slide 99
99
Slide 100
100
Slide 101
101
Slide 102
102
Slide 103
103
Slide 104
104
Slide 105
105
Slide 106
106
Slide 107
107
Slide 108
108
Slide 109
109
Slide 110
110
Slide 111
111
Slide 112
112
Slide 113
113
Slide 114
114
Slide 115
115
Slide 116
116
Slide 117
117
Slide 118
118
Slide 119
119
Slide 120
120
Slide 121
121
Slide 122
122
Slide 123
123
Slide 124
124
Slide 125
125
Slide 126
126

About This Presentation

Intro to Network


Slide Content

Unit 1
Introduction to computer network
T1 -Overview of computer network
IT45103
NETWORKING

Definition of Computer
Network
•A computer network is an interconnection of
computers and computing equipment using either
wires or radio waves and can share data and
computing resources.
•Computer networks that use radio waves are termed
wireless and can involve broadcast radio, microwaves
or satellite transmissions.
Networking
2

Networking
3

Types of computer
networks
•Networks spanning an area of several meters around
an individual are called personal area networks
(PANs). Most common is Bluetooth for headphones etc
•Networks a little larger in geographic size such as
spanning a room, a floor within a building, a building
or a campus are called Local Area Networks (LANs).
Networking
4

Types of computer
networks (cont..)
•Networks that serve an area up to roughly 50
kilometers approximately the area of a typical city are
called metropolitan area networks (MANs).
•high-speed networks that interconnect businesses with
other businesses and the Internet.
•Usually is a business service offered by telcos/ISPs
•Large networks encompassing parts of states, multiple
states, countries and the world are wide area
networks (WANs). e.g. Internet
Networking
5

Networking
6

Advantages of
computer network
•Sharing of peripheral devices: Laser printer, disk
drives and scanner are examples of peripheral devices
– that is, hardware that is connected to a computer.
•Sharing of program and data: In most organizations,
people use the same software and need access to the
same information.
•Better communications: One of the greatest features of
networks is electronic mail. Also instant messaging
and calling apps such as WhatsApp are becoming
critical.
Networking
7

Advantages of
computer network
(cont..)
•Security of information: data would be backed up or
duplicated on a networked storage device secured by
password.
•Access to databases: enable users to tap into
numerous databases, whether the private databases of
a company or the public databases of online services.
Networking
8

The big picture of
networks
•The most important in LANs include the following
hardware:
•Workstations, which are personal
computers/microcomputers (desktops, laptops, net
books, hand helds, etc) where users reside.
•Servers which are the computers that store network
software and shared public or private user files.
•Switches, which are the collection points for the wires
that interconnect the workstations.
•Routers, which are the connecting devices between local
area networks and wide area networks.
Networking
9

The big picture of
networks
•Wide area networks include the following
components:
•Nodes, which are the computing devices that allow
workstations to connect to the network and make
decisions about where to route a data.
•Some type of high-speed transmission line, which runs
from one node to another.
•A subnetwork or cloud which contains the nodes and
transmission lines, considered as a cohesive unit.
Networking
10

•Capacity of a medium to carry
data.
•Measured in kilobits per
second (kbps) or megabits
per second (Mbps).
Bandwidth
•The measure of the transfer of
bits across the media over a
given period of time.
•Many factors influence
throughput ; amount and type of
traffic, number of network
devices encountered on network
Throughput
•Is the measure of usable data
transferred over a given period of
time
Goodput
Data transfer can
be measured in
three ways:
Networking
11

Units of bandwidth,
throughput and
goodput
Networking
12

Example
•Consider two hosts on a LAN transferring a
file.
•The bandwidth of the LAN is 100 Mbps.
•Due to the sharing and media overhead the through
put between the computers may be only 60 Mbps.
•With the overhead of the encapsulation process of
the TCP/IP stack, the actual rate of the data
received by the destination computer, goodput, may
be only 40Mbps.
Networking
13

Data throughput and
goodput
Networking
14

Unit 1
Introduction to computer network
T2 - Network Models
IT45103
NETWORKING

Networking
Network Models
•A network model defines how and where resources
are shared and how access to these resources is
regulated
•Fall into two major types
•Peer-to-peer network: Most computers function
as clients or servers (no centralized control over
who has access to network resources)
•Server-based network: Certain computers take on
specialized roles and function mainly as servers,
and ordinary users’ machines tend to function
mainly as clients
16

Networking
Peer-to-Peer/Workgroup
Model
•Computers on a peer-to-peer network can take both a
client and a server role
•Any user can share resources on his/her computer
with any other user’s computer
•Every user must act as the administrator of his/her
computer
•Can give everyone else unlimited access to their
resources or grant restricted access to other users
•Usernames and passwords (credentials) are used to
control that access
17

Networking
Peer-to-Peer/Workgroup
Model
•Problems with Peer-to-peer networks:
•Must remember multiple sets of identifications to access
resources spread out over several computers
•Desktop PCs and the OSs installed on them aren’t made to
provide network services as efficiently as dedicated
network servers
•Data organization: If every machine can be a server, how
can users keep track of what information is stored on which
machine?
•Peer-to-peer networks are best suited for small organizations
that have small networks and small operating budgets
18

Networking
19

Server/Domain-Based
Model
•Server-based networks provide centralized
control over network resources
•Users log on to the network with a single set
of identifications maintained by one or more
servers running a server OS
•In most cases, servers are dedicated to
running network services and should not be
used to run user applications
Networking
20

Server/Domain-Based
Model
•A domain is a collection of users and computers whose
accounts are managed by Windows servers called
domain controllers
•Users and computers in a domain are subject to network
access and security policies defined by a network
administrator
•The software that manages this security is referred to as a
directory service
•On Windows servers, the directory service software is
Active Directory
Networking
21

A client/server network keeps resources centralized
Networking
22

Peer-to-Peer Networks
Networking
23
Advantages
•Use less expensive
computer
hardware.
•Easy to administer.
•No network
operating system
required.
•More built-in
redundancy.
Disadvantages
•Might impact
user’s
performance
•Not very secure
•Difficult to back up
•Hard to maintain
version control

Client/Server Networks
Advantages
•Very secure
•Better performance
•Centralized backup
•Very reliable
Disadvantages
•Require professional
administration
•More hardware-
intensive
Networking
24

Quiz:
1) Computer networks that use _________ as transmission
signal is known as wireless. (1 mark)
2) i. Device that connect between Local Area
Network(LAN) and Wide Area Network (WAN) is
__________. (1 mark)
ii. Computer that share public or private users files is
called a ___________. (1 mark)
3) What are the differences between PAN and MAN?
(2 marks)
4) There are TWO(2) types of network model? Briefly
describe them with the aid of diagram. (8 marks)
5) Define goodput and throughput. (2 marks)
Networking
25

Unit 1
Introduction to computer network
T3 -Network Topologies
IT45103
NETWORKING

•Topology basically means shape.
•Network topology refers how a network is physically
laid out and how signals travel from one device to
another.
•Broken down into TWO topologies.
•The arrangement of cabling and how cables connect one
device to another in a network is considered the
network’s physical topology.
•The path data travel between computers on a network is
considered the network’s logical topology.
Networking
2

Bus Topology
•The first topology used in local area networking was
the bus topology
•A bus topology, more completely called a common bus
multipoint topology, is a network where, basically, a
single network cable is used from one end of the
network to the other, with different network devices
(called nodes) connected to the cable at different
locations.
•This topology is seldom used in modern networks
Networking
3

Bus Topology
•Bus topology networks use coaxial cable.
•Each end of each segment of the network had a special
cable terminator on it, without which the network will
not function.
Networking
4

Bus Topology
•From a device's viewpoint, all other systems
communicate through the same, shared path.
•Because it is a shared media technology, mechanisms
must be put into place to determine network traffic
over the cable.
•Typically, collision detection (CD) or collision
avoidance (CA) algorithms are used in bus topologies
to determine network access along with concepts such
as "broadcasts" to reach every device on the cable.
•The biggest issue was that any cable break or issue
put the whole network offline
Networking
5

Star Topology
•Every node on the LAN has a dedicated cable that is
pulled back to a centralized point, typically a wiring
closet.
•All cables are terminated in a network component
such as a switch or hub.
•The network switch (or hub) is a single point of failure
•Each device has a dedicated wire to the switch to
implement the star.
•This is the topology used in all current LANs
Networking
6

A star topology
network
Networking
7
Switch

Star Topology
•If you use wireless Ethernet (Wi-Fi) for part or your
entire network, the infrastructure for a wireless
network also uses a star topology but with these
differences:
•A wireless access point (AP) replaces the switch.
•Radio waves, rather than network cables, connect clients
to the wireless access point.
•In some ways this is similar
to the bus topology as the
medium (air) is shared
Networking
8

Ring Topology
•A ring topology may actually be a physical
arrangement of a network cable
•The network behaves like a ring, where the
network signals travel around the ring to each
node in turn.
•Ring topology LANs are based on Token Ring
•Like bus topology, ring topology is seldom
used in modern networks
Networking
9

A sample ring topology network
Networking
10

Point-to-Point Topology
•Direct link between two devices
•Mostly used in WANs
•Wireless bridge
•Used to connect two computers
•In mobile networks it is often used to connect base
stations back to the core network
Networking
11

Mesh Topology
•Connects each device to every other device in a
network
•Multiple point-to-point connections for the purposes of
redundancy and fault tolerance
•Purpose of creating a mesh topology is to ensure that
if one or more connections fail, there’s another path
for reaching all devices on the network
•Expensive due to multiple interfaces and cabling
•Found in large WANs and internetworks
•Internet is a large mesh network but every point is not
connected directly to every other point
•This is often called a partial mesh network
Networking
12

Networking
Mesh Topology 13

Unit 1
Introduction to computer network
T4 - Network Media
IT45103
NETWORKING

Network cable
•Cable is the medium through which information
usually moves from one network device to another.
Three major groups of cabling connect the major
networks:
•Coaxial Cable
•no longer common
•Twisted-pair
•unshielded and
shielded cable
•Fiber-optic cable
•Becoming common for
connections to ISP
Networking
15

Coaxial Cable
•Is a single wire wrapped in foam insulation, surrounded by a braided
metal shield, and then covered in a plastic jacket.
•The braided metal shield is very good at blocking electromagnetic
signals from entering the cable and producing noise.
•Coaxial cable is good at carrying analog signals with a wide range of
frequencies.
•For example, it can transmit large numbers of video channels, such as
those found on the cable television services that are delivered into
homes and businesses.
•Now used mostly for satellite services like Astro and for connections to
antennas
Networking
16

Networking
17

Coaxial Cable (cont..)
•Two major coaxial cable technologies exist and are distinguished
by the type of signal each carries; baseband and broadband.
•Baseband coaxial technology uses digital signaling in which the
cable carries only one channel of digital data. The common
application for baseband used to be the interconnection of
switches within a local area network. It carry one 10 to 100mbps
signal and require repeaters every few hundred kilometers.
Currently, replaced by fiber optic cable as the preferred method
for interconnecting LAN hubs.
•Broadband coaxial technology typically transmits analog
signals and is capable of supporting multiple channels of data
simultaneously. For example; coaxial cable that transmits cable
or satellite television. Most broadband coax systems have now
switched to digital baseband
Networking
18

Coaxial Cable (cont..)
•Coaxial cable also is available in a variety of thicknesses with two
primary types; thick coaxial cable and thin coaxial cable.
•Thick coaxial cable ranges in size from approximately 6 to 10mm in
diameter. It typically carries broadband signals and better noise
protection. Generally used for the transmission of analog data, such as
single or multiple video channels.
•Seldom used in modern systems
•Thin coaxial cable is approximately 4 mm in diameter. It typically
carries baseband signals. It also has limited noise isolation.
•Most commonly seen in Malaysia for Astro satellite dish connections
Networking
19

Coaxial Cable (cont..)
Networking
20

Twisted-pair (unshielded
and shielded) cable
•Currently the most commonly used data
transmission medium.
•Used for most LANs and telephone
connections
•Consists of pairs of copper wires twisted
together to create magnetic field and thus
reduce interference.
•Two types of twisted pair are Shielded Twisted
Pair (STP) and Unshielded Twisted Pair (UTP).
Networking
21

Shielded Twisted-Pair (STP)
Cable
•Consists of twisted wire pairs that are individually insulated and
surrounded by shielding made of metallic substance.
•Provides better noise protection than UTP cabling, however at a
significantly higher price.
•More expensive, heavier, and difficult to bend when installing
(compared to UTP).
•For many years, STP was the cabling structure specified for use
in Token Ring network installations.
•Seldom used in modern networks
Networking
22

Networking
23

Unshielded Twisted Pair (UTP)
•Unshielded
Twisted Pair
(UTP) consists
one or more
insulated wire
pairs encased in
a plastic sheath.
It does not
contain
additional
shielding.
Networking
24

Unshielded Twisted Pair (UTP)
•The UTP cable used in LANs consists of four
pairs of insulated wires, other UTP types
contain fewer pairs.
•Also used for telphone wire, with only 2 pairs,
because voice applications are much less
demanding than networking in bandwidth and
signal quality.
•There are many different categories of UTP as
shown in the next slide
Networking
25

UTP Category Typical useMaximum Data
Transfer Rate
Maximum
Transmission
Range
Advantages Disadvantages
Category 1 Telephone
wire
<100 kbps 5-6 kilometers (3-
4 miles)
Inexpensive, easy to
install and interface
Security noise,
obsolete
Category 2 T-1, ISDN < 2Mbps 5-6 kilometers (3-
4 miles)
Same as category 1Security noise,
obsolete
Category 3 Telephone
circuits
10 Mbps 100 m (328 ft) Same as category 1,
with less noise
Security noise,
obsolete
Category 4 LANs 20 Mbps 100 m (328 ft) Same as category 1,
with less noise
Security noise,
obsolete
Category 5 LANs 100 Mbps
(100 MHz)
100 m (328 ft) Same as category 1,
with less noise
Security, noise
Category 5e LANs 250 Mbps per pair
(125MHz)
100 m (328 ft) Same as Category 5.
Also includes
specifications for
connectors, patch
cords, and other
components.
Security, noise
Category 6 LANs 250 Mbps per pair
(250 MHz)
100 m (328 ft) Higher rates than
Category 5e, less
noise
Security, noise,
cost
Category 7 LANs 600MHz 100 m (328 ft) High data rates Security, noise,
cost
Networking
26

UTP connectors
•UTP uses a connection called the RJ-45 connector. It
looks similar to a common telephone connector (RJ-
11) except it is slightly larger.
•The RJ-45 has 8 pins while the RJ-11 has only 4.
•The RJ-11 connector can
plug into the RJ-45
socket and connect the
4 wires correctly
Networking
27

TIA/EIA Cable Pinouts
Networking
28
TIA/EIA 568B is the most
commonly used

Straight-Through Vs Crossover
Cable
•The following are main cable types that are obtained by
using specific wiring conventions:
•Straight-through
•Crossover
Networking
29

Use straight-through cables for the following
connections:
•Switch to a router Ethernet port
•Computer to switch
Crossover cables directly connect the following
devices on a LAN:
•Switch to switch
•Router to router Ethernet port connection
•Computer to computer
•Computer to a router Ethernet port
Modern equipment can usually use either type of
cable
•The electronics automatically detects transmitter and receiver using
a technology called Auto-MDIX
Networking
30

Fiber-Optic Cable
•Consists of an extremely thin cylinder of glass,
called the core surrounded by a concentric layer
of glass, known as cladding. Diameter is
0.125mm
•The fibers are sometimes made of plastic.
•Plastic is easier to install, but cannot carry the
light pulses for long distances like glass.
Networking 31

Fiber-Optic Cable
•Fiber-optic cable is capable of
supporting millions of bits per
second for 1000s of meters.
•Fiber optic cable can carry the
highest data rate for the longest
distances.
•The cost is more expensive than
twisted pair and coaxial cable.
Networking
32

33
Networking

Summary of characteristics of network cables.
Networking
34

Quiz:
1)Compare Shielded Twisted-Pair (STP) and Unshielded Twisted-Pair
(UTP) cable. (6 marks)
2)List the color of cable pinouts for T568A and T568B. (8 marks)
3)Define cladding for Fiber-Optic cable. (1 mark)
Networking
35

Unit 1
Introduction to computer network
T5 -Wireless Media
IT45103
NETWORKING

Wireless Media
•Radio, satellite transmissions, and infrared light are all
different forms of electromagnetic waves that are used to
transmit data
•In wireless transmissions, space is the medium
•Note in the following figure how each source occupies a
different set of frequencies
Networking
2

These radio bands are defined by the ITU (International
Telecommunications Union) on a world-wide basis.
Individual countries have a more detailed breakdown for
each band
Band NumberSymbol Frequency Common Use
4 VLF (very low frequency)3- 30 kHz Radio navigation
systems
5 LF (low frequency) 30-300 kHz Radio beacons
6 MF (medium frequency)300 kHz-3 MHzAM radio
7 HF (high frequency) 3-30 MHz CB radio, Short Wave
radio
8 VHF (very high frequency)3-300 MHz VHF TV, FM radio
9 UHF(ultra high frequency)300 MHz-3 GHzUHF TV, cell phones,
pagers
10 SHF (superhigh frequency)3-30 GHz Satellite
11 EHF (extremely high freq)30-300 GHz Satellite, radar systems
Networking
3

Terrestrial Microwave Transmission
•Land-based, line-of-sight transmission
•Approximately 30-50kms between
towers
•Transmits data at hundreds of
millions of bits per second
•Signals will not pass through solid
objects
•Popular with telephone companies
and business to business
transmissions
Networking
4

Satellite Microwave Transmission
•Similar to terrestrial microwave except the signal
travels from a ground station on earth to a satellite
and back to another ground station
•Can also transmit signals from one satellite to another
•Satellites can be classified by how far out into orbit
each one is (LEO, MEO, GEO, and HEO)
•Adds some delay due to length of transmission path
Networking
5

6
Satellite Microwave Transmission
(continued)
Networking

Satellite Microwave Transmission (continued)
•LEO (Low-Earth-Orbit) – 100 to 1000 miles out
•Used for wireless e-mail, special mobile telephones, pagers, spying,
videoconferencing
•MEO (Middle-Earth-Orbit) – 1000 to 22,300 miles
•Used for GPS (global positioning systems) and government
•GEO (Geosynchronous-Earth-Orbit) – 22,300 miles
•Always over the same position on earth (and always over the
equator)
•Used for weather, television, government operations
•HEO (Highly Elliptical Earth orbit) – satellite follows an
elliptical orbit
•Used by the military for spying and by scientific organizations for
photographing celestial bodies
Networking
7

Cellular Telephones
•Wireless telephone service, also called mobile telephone,
cell phone, and Personal Communications Services (PCS)
•To support multiple users in a metropolitan area is broken
into cells (honeycomb-like pattern)
•Each cell has its own transmission tower and set of
assignable channels
Networking
8

Cellular Telephones (continued)
Mobile Exchange
Mobile Exchange
Mobile Backhaul
Microwave or Fibre
Mobile Exchange
Mobile Exchange
Networking
9

Cellular Telephones (cont..)
•Four basic generations of cellular telephone systems
currently exist:
•first generation (analog cellular telephone),
•second generation – 2G (GSM, Digital personal
communications services (PCS),
•third generation – 3G (Convergence of data signals with
voice signals)
•fourth generation – 4G (LTE technology).
•fifth generation – 5G (Coming to Malaysia soon)
Networking
10

Infrared Transmissions
•Transmissions that use a focused ray of light in the infrared
frequency range
•Very common with remote control devices, but was also
used for device-to-device transfers, such as mobile phone to
computer
Networking
11

WiMax - Broadband Wireless
Systems
•Mostly now replaced by 4G technology
•Delivered Internet services into homes, businesses and
mobile devices
•Designed to bypass the local loop telephone line
•Transmits voice, data, and video over high frequency radio
signals
•Maximum range of 20-30 miles and transmission speeds in
Mbps
•IEEE 802.16 set of standards
Networking
12

Bluetooth
•Bluetooth is a specification for short-range, point-to-point
or point-to-multipoint voice and data transfer
•Bluetooth can transmit through solid, non-metal objects
•Its typical link range is from 10 cm to 10 m, but can be
extended to 100 m by increasing the power
•Bluetooth enables users to connect to a wide range of
computing and telecommunication devices without the
need of connecting cables
•Typical uses include phones, headsets, notebooks and some
desktop computers
Networking
13

Wireless Local Area Networks
(IEEE 802.11)
•This technology transmits data between workstations and local
area networks using high-speed radio frequencies
•Current technologies allow up to 100 Mbps (theoretical) data
transfer at distances up to hundreds of feet
•Five popular standards: IEEE 802.11b, a, g, n, ac and ax)
Wi - Fi standard Release
Date
Frequency
range
Data Transfer rate -
bandwidth (Max)
Transmission range
(Indoor)
802.11a 1999 5.0GHz 54Mbps 25M
802.11b 1999 2.4GHz 11Mbps 40M
802.11g 2003 2.4GHz 54Mbps 100 feet
802.11n (WiFi4)2007 2.4GHz 450Mbps 325 feet
802.11ac (WiFi5)2014 2.4 & 5.0GHz1000 Mbps 325 feet
802.11ax (WiFi6)2020 2.4 & 5.0GHz2000 Mbps 325 feet
Networking
14

Unit 1
Introduction to computer network
T6 - Network Devices
IT45103
NETWORKING

An Overview
•Network devices are responsible for moving data from
one network cable to another.
•A good network design uses the correct device for
each of the various jobs the network must fulfill.
Networking
16

Network Interface Card
•Network interface cards (also called NICs, network
adapters or network cards)
•Connectivity devices that enable a workstation, server,
printer or other node to receive and transmit data
over the network media.
•All NICs contain a data transceiver, the device that
transmits and receives data signals.
Networking
17

NICs
•Modern Desktops and laptops usually have NICs built
in to motherboard
•USB NICs are also available
Networking
18

Repeater
•Device that extends the distance of a particular
network run.
•It takes a weak network signal in on one side, boosts
the signal, and then sends it out its other side.
•A good example of the use of repeaters would be in a
local area network using a star topology with
unshielded twisted-pair cabling.
•Not commonly used in modern network practice
Networking
19

A repeater extends the distance a network can cover
Networking
20

Hub
•Non-intelligent device that simply and immediately
retransmits the data it receives from any workstation
out to all other workstations.
•Could be considered as a multi-port repeater.
•It does not filter out any data frames, and it does not
perform any routing.
•Each hub is a separate collision domain
•All packets are transmitted immediately when received
and so there can be collisions
Networking
21

Hub (cont..)
•Total network bandwidth is limited to the speed of the
hub.
•A 10Base-T hub provides 10Mb bandwidth maximum,
no matter how many ports it has.
•Supports half duplex only
•The devices can both transmit and receive on the media
but cannot do so simultaneously.
•Seldom used in modern networks
Networking
22

Networking
23

Switches
•Switches, can be considered as intelligent hubs.
•Can be used to interconnect multiple workstations on
a single LAN or to interconnect multiple LANs.
•The primary function to direct the data frame to only
the addressed receiver.
•Thus, the switch needs to know where all the devices
are so that it can send the data out on the appropriate
link.
•It learns this by watching incoming traffic
Networking
24

Switches (cont..)
•Acts as a filter.
•Reduces traffic and collisions over the network.
•Total network bandwidth is determined by the
number of ports on the switch.
•For example, an 8 port 100Mb switch can support up to
800 Mbps bandwidth.
•Supports full duplex communications. This allows
devices to both transmit and receive data at the same
time.
•Can buffer frames if output port is busy.
•Switch have, in practice, replaced hubs.
Networking
25

Networking
26

Router
•Connects local area networks to wide area network and
between transmission links within a wide area network.
•Performs security functions and must be properly
programmed to accept or reject certain types of incoming
and outgoing data packets.
•Also determines the shortest route to a destination and use
it.
•Has the ability to break up broadcast domains and collision
domains.
Networking
27

Differences between router and
switch
•Routers connect LANs; switches connect
computers
•Routers work with logical (IP) addresses; switches
work with physical (MAC) addresses
•Routers work with packets; switches with frames
•Routers don’t forward broadcasts; switches do
•Routers use routing tables; switches use switching
tables
Networking
28

•https://community.fs.com/blog/do-you-know-the-
differences-between-hubs-switches-and-routers.html
Networking
29

Routers interconnect LANs
to from the Internet
Each router interface
creates a broadcast domain
Networking
30

Routers
Switches
Networking
31

Unit 1
Introduction to Computer Network
T7 -TCP/IP Model
IT45103
NETWORKING

TCP/IP model
The goal was to create an open architecture that would allow virtually all
networks to inter-communicate.
The Internet model is commonly referred to as the TCP/IP model
Four layers;
Application
Transport
Internet
Network
Access
Networking2

Not commonly used in
modern networks
Networking3

Application Layer
Supports the network applications.
Common network applications include web browsing, e-
mail, file transfers, remote logins and network
management.
Protocols involved;
Hypertext Transfer Protocol (HTTP) to allow Web browsers and
servers to send and receive World Wide Web pages.
Simple Mail Transfer Protocol (SMTP) to allow users to send
and receive electronic mail.
File Transfer Protocol (FTP) to transfer files from one computer
system to another.
Telnet to allow a remote user to log in to another computer system
Simple Network Management Protocol (SNMP) to allow the numerous
elements within a computer network to be managed from a single point.
Networking4

Commonly uses the Transmission Control
Protocol (TCP) to maintain an error-free end-to-end
connection.
TCP implements
packet sequencing control so that the packets stay in the proper
order
error control in case one packet from a sequence of packets does
not arrive at the final destination or is received damaged
User Datagram Protocol (UDP) is an alternative
used for voice and other real time applications
It forwards packets quickly without sequence or error management.
The application layer protocol will implement any control necessary
Transport Layer
Networking5

Protocol used at this layer is the Internet Protocol (IP).
Internet Protocol is the software that prepares a packet
of data so that it can move from one network to another
on the Internet or within a set of corporate networks.
Most important is the addition of source and destination
information
Internet Layer
Network Access Layer
Prepares a data packet (called a frame at this layer) for
transmission from the user workstation to a router
connecting the local area network to the Internet or
another LAN
Networking6

The complete communication process includes these
steps:
Creation of data at the application layer of the originating source
end device.
Segmentation and encapsulation of data as it passes down the
protocol stack in the source end device.
Generation of the data onto the media at the network access layer
of the stack
Transportation of the data through the internetwork, which
consists of media and any intermediary devices
Reception of the data at the network access layer of the destination
end device
Decapsulation and reassembly of the data as it passes up the
stack in the destination device.
Passing this data to the destination application at the Application
layer of the destination end device
Networking7

During encapsulation
Each succeeding layer encapsulates the PDU (Protocol Data Unit)
that it receives from the layer above in accordance with the protocol
being used.
Networking8

During decapsulation
Decapsulation
Networking9

Unit 1
Introduction to Computer Network
T8 - OSI Model
IT45103
NETWORKING

Open Systems Interconnection (OSI) model
Where the application using the network resides
Performs a series of various functions necessary for
presenting the data package to the sender or receiver.
Responsible for establishing sessions between source and
destination applications.
Ensures that the data packet that arrives at the final destination is
identical to the data packet that left the originating station.
Provides services to exchange the individual pieces of data over
the network between identified end devices.
Prepares Network layer packets for transmission and to control
access to the physical media.
Handles the transmission of bits over a communications channel.
Networking11

X
X
X
Seldom used
in modern
networks
X
X
X
Networking12

Layer 7 : Application Layer
Provides the interface between the applications.
Exchanges data between programs running on the
source and destination hosts.
Covers applications such as electronic mail, file
transfer systems, remote login systems and Web
browsing.
Networking13

The Presentation layer has three primary functions:
Coding and conversion of Application layer data to ensure
that data from the source device can be interpreted by the
appropriate application on the destination device.
Compression of the data in a manner that can be
decompressed by the destination device.
Encryption of the data for transmission and the decryption of
data upon receipt by the destination.
The standards for video, audio and graphics are examples.
Video – Motion Picture Experts Group (MP4).
Audio – MP3, AC3 etc
Graphic image -Graphics Interchange Format (GIF), Joint
Photographic Experts Group (JPEG).
Layer 6 : Presentation Layer
Networking14

Session layer handles the exchange of information
to initiate dialogs, keep them active, and to restart
sessions that are disrupted.
For example, while transmitting a large document
such as an electronic book, the session layer may
insert a synchronization point at the end of each
chapter. If any error occurs during transmission, both
sender and receiver can back up to the last
synchronization point and start retransmission from
there.
Layer 5 : Session Layer
Networking15

To ensure no transmission errors, the data arrives in
the same order as it was transmitted, and there is no
duplication of data.
Includes these functions:
Enables multiple applications to communicate over the
network at the same time on a single device
Ensures that, if required, all the data is received reliably
and in order by the correct application
Employs error handling mechanisms
Layer 4 : Transport Layer
Networking16

To accomplish this end-to-end transport, Layer 3
uses four basic processes:
Addressing
Identifies source and destination addresses
Encapsulation
Splits data into packets as necessary
Routing
Finds a route from source to destination
Decapsulation
Re-assembles data as necessary
Layer 3 : Network Layer
Networking17

The Data Link layer performs two basic services:
Allows the upper layers to access the media using
techniques such as framing.
Controls how data is placed onto the media and is
received from the media using techniques such as media
access control and error detection.
Usually implemented in a physical device, such as a
NIC with associated driver software.
This performs the functions of preparing data for
transmission and encoding the data as signals to be
sent on the associated media.
Layer 2 : Data Link Layer
Networking18

Data Link layer is often divided into two sublayers:
Logical Link Control (LLC) places information in the
frame that identifies which Network layer protocol is
being used for the frame.
Media Access Control (MAC) provides Data Link layer
addressing and delimiting of data according to the
physical signaling requirements of the medium and the
type of Data Link layer protocol in use.
Layer 2 : Data Link Layer
Networking19

Networking20

Networking21

To perform this transmission of bits, the physical
layer handles voltage levels, plug and connector
dimensions, pin configurations and other electrical
and mechanical issues.
There are currently three basic forms of network
media on which data is represented: Copper cable,
Fiber, Wireless.
These all, of course, use very different forms of
electromagnetic signals, voltage levels, plugs etc.
Layer 1 : Physical Layer
Networking22

Networking23

Networking24

Comparing OSI model and TCP/IP model
Note that the TCP/IP
Transport layer
includes some of the
OSI Session layer
functions
Networking25

Unit 1
Introduction to computer network
T9 -IP Addresses
IT45103
NETWORKING
Networking1

Introduction
Each device on a network must be uniquely defined.
At the Network layer, the packets of the communication
need to be identified with the source and destination
addresses of the two end systems.
These addresses are used in the data network as binary
patterns.
For us humans, a string of 32 bits is difficult to interpret
and even more difficult to remember.
01011010110011000110100110100101
Therefore, IPv4 addresses are written using dotted
decimal format.
202.23.12.42
Networking2

Dotted decimal
3
Binary patterns representing IPv4 addresses are
expressed as dotted decimals by separating each byte of
the binary pattern, called an octet, with a dot. It is called
an octet because each decimal number represents one
byte or 8 bits.
For example, the address:
Networking

Dotted decimal
The logical 32-bit IPv4 address is classified and is made up of two parts.
The first part identifies the network and the second part identifies a host
on that network.
Networking4

Keep these steps in mind:
➢Divide the 32 bits into 4 octets.
➢Convert each octet to decimal.
➢Add a "dot" between each
decimal.
Convert Binary to Decimal number
5
In the example, the binary number:
10101100000100000000010000010100
converts to:
172.16.4.20
Networking

Convert Decimal to Binary
Networking6

IP ADDRESS CLASSES
There were five basic classes of an IP address:
Class A, B, C, D and E
In practice these classes are no longer used,
network addresses are set to different sizes as
necessary
Addres
s Type
Beginning
Bit
Pattern
First
Decimal
Value
Network Address
(net ID)
Host Address
(host ID)
Class A0 0 - 127 128 addresses (7 bits)16,777,216
addresses (24 bits)
Class B10 128 - 191 16,384 addresses (14
bits)
65,536 addresses
(16 bits)
Class C110 192 – 223 2,097,152 addresses
(21 bits)
256 addresses (8
bits)
Class D1110 224 – 239 Multicast address
Class E1111 240 - 255 Reserved address
Networking7

IPv6
8
IP addresses are 32 bits which is a total of about 4 billion
addresses
The world population is now almost 8 billion
We are in the process of moving to a new system called
IPv6
This has 128 bits which gives a total of
340,282,366,920,938,463,463,374,607,431,768,211,456
addresses
These addresses are written in HEX notation
www.google.com is 2404:6800:4001:80f::2004
www.facebook.com is 2a03:2880:f12a:183:face:b00c:0:25de
Networking

IPv6
Address is 128 bits written as 32 hex digits in groups
of 4 separated by colon :
2001:0045:0000:0000:ef01:2345:0000:0abc
Addresses should be written with lower case letters
Leading zeros should be omitted
2001:45:0000:0000:ef01:2345:0000:abc
Groups of all zeros should be omitted
2001:45:0:0:ef01:2345:0:abc
Consecutive all zero groups should be omitted but
only once per address
2001:45::ef01:2345:0:abc
Networking9

Exercise
Shorten the following addresses per the
recommendations
2001:00fe:0000:1224:5600:0078:0001:0001
2001:00e0:0000:2345:6700:0055:0000:0003
2001:0123:0045:6789:0000:0000:0000:0000
Examples
2001:0000:839f:1234:0045:0000:abcd:0ace
2001:0:839f:1234:45:0:abcd:ace
2001:0000:0000:1234:0045:0000:0000:0ace
2001::1234:45:0:0:ace
Networking
Tags