0% found this document useful (0 votes)
5 views

Introduction to Network Magement 2021 two

The document outlines the curriculum for a Network Management course at Jahan University, covering topics such as network types, the OSI model, TCP/IP fundamentals, and network topologies. It includes class policies, grading evaluation criteria, and details about network devices and their functions. Additionally, the document explains the OSI reference model and its seven layers, along with various networking concepts and appliances.

Uploaded by

wauyokutoyi
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views

Introduction to Network Magement 2021 two

The document outlines the curriculum for a Network Management course at Jahan University, covering topics such as network types, the OSI model, TCP/IP fundamentals, and network topologies. It includes class policies, grading evaluation criteria, and details about network devices and their functions. Additionally, the document explains the OSI reference model and its seven layers, along with various networking concepts and appliances.

Uploaded by

wauyokutoyi
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 44

CSC341 – NETWORK

MANAGEMENT
Jahan University
Computer Science Department
Lecturer: Islahuddin Jalal
Master in Cyber Security

Jahan University 10/2/2015 1


Topics to be discussed

 What is network? Types and levels of network


 Living in the OSI model world, h/w used in network
 Basic TCP/IP: fundamentals
 Basic TCP/IP:TCP and UDP communications

Jahan University 10/2/2015 2


Class Policy

 A student must reach the class-room in time. Late comers may join the class
but are not entitled to be marked present.
 Attendance shall be marked at the start of the class and students failing to
secure 75% attendance will not be allowed to sit in final exam.
 The assignment submission deadline must be observed. In case of late
submission, ten percent may be deducted from each day.
 Those who are absent on the announcement date of the assignment/test.
Must get the topic/chapter of test/assignment confirmed through their peers.
 Mobile phones must be switched-off in the class-rooms.

Jahan University 10/2/2015 3


Grading Evaluation for Network Management

Internal Evaluation
Midterm Exam 20%
Attendance 5%
Assignment/Presentations 5%
Quizzes/Tests 10%
Total Internal Evaluation 40%
Final-term Examination
Final-term Exam 60%
Total Marks 100%

Jahan University 10/2/2015 4


What is Network?

 A collection of computing devices that are connected in various ways in order


to communicate and share resources
Usually, the connections between computers in a network are made using
physical wires or cables
However, some connections are wireless, using radio waves or infrared signals
 The generic term node or host refers to any device on a network
 Data transfer rate The speed with which data is moved from one place on a
network to another
 Data transfer rate is a key issue in computer networks

Jahan University 10/2/2015 5


Types of Network
 There are three main types of Networks
 LAN A network that connects a relatively small number of
machines in a relatively close geographical area

 MAN The communication infrastructures that have been


developed in and around large cities
 WAN A network that connects two or more local-area
networks over a potentially large geographic distance
Often one particular node on a LAN is set up to serve as a
gateway to handle all communication going between that
LAN and other networks
Jahan University 10/2/2015 6
Types of Network

 HAN A network contained within a user's home that connects a


person's digital devices.
 VPN A network that is constructed by using public wires — usually
the Internet — to connect to a private network, such as a
company's internal network.
 SAN A high-speed network of storage devices that also connects
those storage devices with servers

Communication between networks is called internetworking


The Internet, as we know it today, is essentially the ultimate
wide-area network, spanning the entire globe
Jahan University 10/2/2015 7
Network Topologies

 Network Topology: Physical layout of a network is called network topology.


 There are different types of network topologies
 Star Topology
 Bus Topology
 Ring Topology
 Mesh Topology
 Hybrid topology

Jahan University 10/2/2015 8


Star Topology

 All the computers are connected through a central connection point (hub,
switch etc)
 A single break in the cable would only take down communication to one
computer
 As hub failure would take down the entire network

Jahan University 10/2/2015 9


Bus Topology

 All the computers are connected in straight line


 Terminators must be used at each end of a bus segment to prevent signals
from bouncing
 A single break in the cable would take down the entire network

Jahan University 10/2/2015 10


Ring Topology

 All the computers are connected in circular fashion


 Data is passed around the ring from computers to computer
 A break in the cable would take down the entire network

Jahan University 10/2/2015 11


Mesh Topology

 All the computers are connected to all other computers


 Typicallly used in a WAN environment
 Provides fault tolerance in the event of a connection failure

Jahan University 10/2/2015 12


Hybrid Topology

 Different types of topologies can be used together to form a hybrid topology.

Jahan University 10/2/2015 13


Questions Regarding Topologies

 Which kinds of network topologies connect all devices to a central device?


 What kind of network topology is this?

 What kind of network topologies is used in 802.11 wireless network?

Jahan University 10/2/2015 14


Basic Network

Pamir Khkula

How would you say the


“Hey Khkula, I love you”
PC named Pamir
or
communicates with the
“Hey 192.168.0.3, I love
PC named Khkula?
you”
Which one is right?
Hub
Both are wrong But why?

Jahan University 10/2/2015 15


Basic Networking

 Because Pamir is actually going to use Khkula’s MAC address


 But what would happen if pamir only knows her name and doesn’t know her IP
address and Mac Address?
 Pamir query This Problem is solved by
ARP

Source Destination protocol Info


192.168.0.2 Broadcast ARP Who has 192.168.0.3? Tell 192.168.0.2

Khkula Response
Source Destination protocol Info
192.168.0.3 192.168.0.2 ARP 192.168.0.3 is at 00:0b:db:99:d3:5e
192.168.0.3 192.168.0.2 NBNS Name query response NB 192.168.0.3
Jahan University 10/2/2015 16
Questions

 What would happen if the network grows and grows and become a large
network? The Network speed become low
 What would be the solution?

To split the network into a smaller Network


 What is the Process to split a larger network into a smaller Networks?
Network Segmentation
 Which devices are needed for network Segmentation?

Routers, Switches and Bridges

Jahan University 10/2/2015 17


Network Appliances

 Load balancer
 Proxy Server
 Content filter
 VPN Concentrator
 Cache Engine
 WAN Optimizer

Jahan University 10/2/2015 18


Load Balancer

 A load balancer is a device that acts as a reverse proxy and distributes


network or application traffic across a number of servers. Load balancers are
used to increase capacity (concurrent users) and reliability of applications.

Jahan University 10/2/2015 19


Proxy Server

 Functions as an intermediary b/w a web browser and the internet


 E.g. Tor (application)

Jahan University 10/2/2015 20


Content filter

 Can be S.W and H.W


 Prevent access to certain items harmful if opened or accessed
 The most common items to filter are executables, emails or websites.
 E.g Firewall

Jahan University 10/2/2015 21


VPN Concentrator

 Networking device like router


 Specifically designed for creating and managing VPN communication
infrastructures
 Provides secure creation of VPN connections and delivery of messages b/w
VPN nodes

Jahan University 10/2/2015 22


Cache Engine

 Also called cache server


 Save web pages or other internet content locally
 By placing previously requested information in temporary storage
 Speeds up access to data and reduces demand on an enterprise’s bandwidth.

Jahan University 10/2/2015 23


WAN Optimizer

 WAN Optimization = WAN acceleration


 It is a device used to maximize the efficiency of data flow across a WAN
 Increase the speed of access to critical applications and information

Jahan University 10/2/2015 24


Assignment (Network Devices)

 Define all Network devices along with their functions and advantages and
disadvantages using Internet, books, conference paper, journals etc.

Jahan University 10/2/2015 25


Internetworking Model

 OSI Reference Model (ISO)


 TCP/IP suite (DARPA)

Jahan University 10/2/2015 26


OSI Reference Model

Jahan University 10/2/2015 27


OSI Reference Model (late 1970)

 Why OSI model came into being?


 Before 1970s computers on the network communicate only with other computers of
the same manufacturer e.g IBM devices communicate only with IBM devices.
 To breakup this barrier, the ISO brought up OSI Model
What is OSI Reference Model?

 The OSI model is the primary architectural model for networks


 It describes how data and network information are communicated from an
application on computer, through the network media, to an application on
another computer.
 The OSI Reference model break up this approach into seven layers
Please Do Not Throw Sausage Pizza Away

 Physical Layer (1)


 Data Link Layer (2)
 Network Layer (3)
 Transport Layer (4)
 Session Layer (5)
 Presentation Layer (6)
 Application Layer (7)
Application Layer (7)

 Provide a user interface


 To allow access network resources
 Also responsible for identifying and establishing the availability of the
intended communication partner and determining whether sufficient
resources for the intended communication exist.
 Protocols are
 FTP, SMTP, HTTP etc
Presentation Layer (6)

 Presents data to the Application layer


 Responsible for
 data translation
 Data encryption and compression
 Protocols are
 ASCII, MPEG, JPEG etc
Session Layer (5)

 Responsible for setting up, managing and tearing down the sessions.
 It also provide dialogue control b/w devices or nodes
 It coordinates communication between systems, and serves to organize their
communication by offering three different modes such as
 Simplex
 Half duplex
 Full duplex
 Protocols are RPC, NFS (to allow transparent access to network resources) etc
Transport Layer (4)

 Segment and reassemble data into a data stream


 Establish a logical connection b/w sending host and receiving host
 Provides reliable or unreliable delivery
 Data integrity is ensured by maintaining flow control
 Performs error correction before retransmit
 Protocols are
 TCP
 UDP
 etc
Flow Control

 Data integrity is ensured


 Prevents a sending host from overflowing the buffer in the receiving host
 Properties of flow control
 The segments delivered are acknowledged back to the sender upon their reception
 Any segments not acknowledged are retransmitted
 Segments are sequenced back into their proper order upon arrival at their
destination
 A manageable data flow is maintained in order to avoid congestion, overloading
and data lost

Jahan University 10/2/2015 35


Connection-oriented communication

Jahan University 10/2/2015 36


Three-way Handshake

 The first “connection agreement” segment is a request for synchronization


 The next segments acknowledge the request and establish connection
parameters – the rules- b/w hosts. These segments request that the receiver’s
sequencing is synchronized here as well so that a bidirectional connection is
formed
 The final segment is also an acknowledgment. It notifies the destination host
that the connection agreement has been accepted and that the actual
connection has been established. Data transfer can now begin.

Jahan University 10/2/2015 37


Characteristics of connection oriented
communication
 A virtual circuit is set up
 It uses sequencing
 It uses acknowledgements
 It uses flow control

Jahan University 10/2/2015 38


TCP Flags (TCP control bits)

 SYN
 ACK
 PSH
 URG
 FIN
 RST

Jahan University 10/2/2015 39


Network Layer (3)

 Also called layer 3


 Provides logical addressing which routers use for path determination
 Track the location of the devices on the network, determine the best way to
move data
 Routers are specified at this layer
 Protocol is IP
Data Link Layer (2)

 Combine packets into bytes and bytes into frames


 Provides access to media using MAC address
 Performs error detection not correction
 Protocols are
 Ethernet (to share the same bandwidth among all hosts)
 Token Ring(circulating in the ring)
 etc
Sublayers of Data link layer

 MAC (Media Access Control):


 Defines how packets are placed on the media.
 Every one share the same bandwidth
 Error Notification is done here

 LLC (Logical Link Control)


 Identifying network layer protocols
 LLC header Inform the data link layer what to do with the frames when received.
 Also provide flow control and sequencing of control bits

Jahan University 10/2/2015 42


Physical Layer (1)

 Moves bits between devices


 Specifies voltage, wire speed
 Pin-out of cables
END

Thanks for
hearing…………………….

You might also like