Chapter 01 Computer Networks and The Internet
Chapter 01 Computer Networks and The Internet
Objectives
Connecting to the Internet Networking terminology Some network architectures The importance of bandwidth Networking models: OSI vs TCP/IP
Internet Fundamentals
The Internet A network of Interconnected Networks Computers can exist without the Internet but the Internet cannot exist without computers The Internet can be thought of as a Tree The trunk and branches are the pathways connecting networks The leaves are the computers Computers connect to the internet in a number of ways, can you list them? Dial-up (Modem) ISDN DSL Cable Network
Networking Terminology
Evolution of Networking
Businesses needed a solution that would successfully address the following three problems: How to avoid duplication of equipment and resources How to communicate efficiently How to set up and manage a network Network history In the 1980s users with stand-alone computers started to share files using modems to connect to other computers. This was referred to as point-to-point, or dial-up communication Bulletin boards became the central point of communication in a dial-up connection. Drawbacks to this type of system were: That there was very little direct communication Availability was limited to only with those who knew about the location of the bulletin board Required one modem per connection. If five people connected simultaneously it would require five modems connected to five separate phone lines From the 1960s-1990s, the DoD developed large, reliable, WANs for military and scientific reasons. In 1990, the DoDs WAN eventually became the Internet
Evolution of Networking
Networking History
Networking History
Networking Devices
A device is an equipment that connects directly to a network segment. There are 2 types: End-user devices include computers, printers, scanners that provide services directly to the user. Network devices include all the devices that connect the enduser devices together to allow them to communicate. They provide: extension of cable connections, concentration of connections, conversion of data formats, management of data transfers A host is an end-user device that provide users with a connection to the network using a NIC
Networking Devices
Network Topology
Network topology defines the structure of the network. The physical topology, which is the actual layout of the wire or media. The logical topology, which defines how the media is accessed by the hosts for sending data.
Physical Topology
Bus Extended Star Uses a single backbone cable Links stars by linking hubs All hosts connect directly to or switches backbon Hierarchical Ring Similar to extended star Connects each host to the next, Links star LANs to a and the last to the first computer that controls Physical ring of cable network traffic Star Mesh Connects all cables to a central Each host is connected to point of concentration all other hosts Usually a hub or switch at center No breaks, ever!
Physical Topology
Logical Topology
Broadcast Each host sends its data to all other hosts First come, first served to use the network Ex: Ethernet Token Passing Controls access by passing token Host can send only when it has the token Ex:Token Ring and Fiber Distributed Data Interface (FDDI)
Broadcast
Token Passing
Network Protocols
Protocol suites are collections of protocols that enable network communication from one host through the network to another host. A protocol is a formal description of a set of rules and conventions that govern a particular aspect of how devices on a network communicate:
How the physical network is built How computers connect to the network How the data is formatted for transmission How that data is sent How to deal with errors
LANs
Features: Operate within a limited geographic area Allow many users to access high-bandwidth media Provide full-time connectivity to local services Connect physically adjacent devices Local Administration LANs consist of the following components: Computers Network interface cards Peripheral devices Networking media Network devices LANs make it possible to locally share files and printers efficiently. Examples of common LAN technologies are: Ethernet Token Ring FDDI
WANs
Features: Operate over a large geographically separated areas Allow users to have real-time communication capabilities with other users Provide full-time remote resources connected to local services Provide e-mail, World Wide Web, file transfer, and e-commerce services WANs interconnect LANs Some common WAN technologies are: Modems ISDN DSL Frame Relay T and E Carrier Series T1, E1, T3, E3 SONET
Bandwidth
Importance of Bandwidth
Bandwidth is the amount of information that can flow through a network connection in a given period of time. Bandwidth is finite: the bandwidth of a modem is limited to about 56 kbps by both the physical properties of twisted-pair phone wires and by modem technology Bandwidth is not free: For WAN connections bandwidth is purchased from a service provider A key factor in analyzing network performance and designing new networks The demand for bandwidth is ever increasing
Bandwidth Analogies
Bandwidth is like the width of a pipe: The water is like the data, and the pipe width is like the bandwidth Bandwidth is like the number of lanes on a highway: The data packets are the automobiles, and the bandwidth is comparable to the number of lanes on the highway. It is easy to see how low bandwidth connections can cause traffic to become congested all over the network
Digital Bandwidth
Bandwidth is the measure of how much information, or bits, can flow from one place to another in a given amount of time, or seconds. In digital systems, the basic unit of bandwidth is bits per second (bps) The actual bandwidth of a network is determined by a combination of the physical media and the technologies chosen for signaling and detecting network signals
Throughput
Throughput refers to actual measured bandwidth, at a specific time of day, using specific Internet routes, and while a specific set of data is transmitted on the network. Factors that determine throughput: Internetworking devices Type of data being transferred Network topology Number of users on the network User computer Server computer Power conditions
Networking Models
Communication
Transmission of information Examples:
Speaking. Smoke signal. Body language. Morse. Telephone. Broadcast systems (radio, television). Internet
Communication characteristics
Addresses
What are the source and the destination of a communication process?
Media
Where does the communication take place?
Protocols
How to make the communication process effectively? Packets
Protocols
Source Address
Medium
Destination Address
Media
Atmosphere
Protocol
Language Speed Handshaking
Data Communication
Address
Source address, Destination address
Media
Cable, Fiber, Atmosphere
Protocol
Format Procedure
Data Communication
Source, destination, and data packets
All communications originate at a source and travel to a destination. Information that travels on a network is referred to as a data, packet, or data packet.
Standard
Proprietary
TCP/IP
DECNET
OSI Model
The OSI model: a framework within which networking standards can be developed. It provided vendors with a set of standards that ensured greater compatibility and interoperability between the various types of network technologies that were produced by the many companies around the world.
Airmail
Peer-to-Peer Communication
For data to travel from the source to the destination, each layer of the OSI model at the source must communicate with its peer layer at the destination.
Peer-to-Peer Communication
During this process, the protocols of each layer exchange information, called protocol data units (PDUs), between peer layers. Each layer of communication on the source computer communicates with a layer-specific PDU, and with its peer layer on the destination computer.
Layer-to-layer communications
Provide services
Request services
It is important to note that some of the layers in the TCP/IP model have the same name as layers in the OSI model. Do not confuse the layers of the two models.
Encapsulation
The lower layers use encapsulation to put the protocol data unit (PDU) from the upper layer into its data field and to add headers and trailers that the layer can use to perform its function.
De-Encapsulation
When the data link layer receives the frame, it does the following:
It reads the physical address and other control information provided by the directly connected peer data link layer. It strips the control information from the frame, thereby creating a datagram. It passes the datagram up to the next layer, following the instructions that appeared in the control portion of the frame.
TCP/IP Configuration
To enable TCP/IP on the workstation, it must be configured using the operating system tools.
Ping Command
1. ping 127.0.0.1 - This ping is unique and is called an internal loopback test. It verifies the operation of the TCP/IP stack and NIC transmit/receive function. ping IP address of host computer - A ping to a host PC verifies the TCP/IP address configuration for the local host and connectivity to the host. ping default-gateway IP address - A ping to the default gateway verifies whether the router that connects the local network to other networks can be reached. ping remote destination IP address - A ping to a remote destination verifies connectivity to a remote host.
2.
3.
4.
Tracert
Traces the route traffic takes from source to destination
Number Systems
Knowing what base someone refers to Decimal uses 10 digits: 0, 1, 2, 3, 4, 5, 6, 7, 8, 9. Binary uses 2 digits: 0 and 1. Base conventions 101 in base 2 is spoken as one zero one. Working with exponents 103 = 10 X 10 X 10 = 1000 24 = 2 x 2 x 2 x 2 = 16 Binary numbers Use principle of place value just as decimal numbers do
ASCII
The American Standard Code for Information Interchange (ASCII) is the most commonly used code for representing alpha-numeric data in a computer.
Base 10 Numbers
Example:
Start the value row and position row with 1 in the rightmost box. Each subsequent value is the current value times the base (2 in this case).
27 128 1
26 64 1
25 32 0
24 16 0
23 8 1
22 4 1
21 2 0
20 1 1
Hexadecimal
Computers represent large numbers as Hexadecimal Has 16 symbols, numbers 0-9 and A, B,C, D, E, F representing 10 15.
IP Addressing
The 32-bit binary addresses used on the Internet are referred to as Internet Protocol (IP) addresses. An IP Address is a 32 bit address represented in Decimal notation for ease of reading, eg. 192.168.10.143 Has 2 parts
Network portion Host Portion
When IP addresses are assigned to computers, some of the bits on the left side of the 32-bit IP number are network bits, the bits on the right side are host bits.
SubnetMask
A subnet mask will always be all 1s until the network address is identified and then be all 0s from there to the right most bit of the mask. Subnet Mask is used to identify the network portion if the address
Converting the IP address 10.34.23.134 to binary would result in: 00001010.00100010.00010111.10000110 Performing a Boolean AND of the IP address 10.34.23.134 and the subnet mask 255.0.0.0 produces the network address of this host: 00001010.00100010.00010111.10000110 11111111.00000000.00000000.00000000 00001010.00000000.00000000.00000000 Network Address = 10.0.0.0
Performing a Boolean AND of the IP address 10.34.23.134 and the subnet mask 255.255.0.0 produces the network address of this host:
Computer IP Configuration
Open Network from Network and Dialup Connections
Computer IP Configuration
Computer IP Configuration
Configure IP address
DHCP
Static
Lab
PC Network TCP/IP Config Using ping and tracert Binary to decimal conversion Hexadecimal conversion