0% found this document useful (0 votes)
10 views

Networking Essentials

Copyright
© © All Rights Reserved
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views

Networking Essentials

Copyright
© © All Rights Reserved
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 89

TOPICS :

 WHAT IS NETWORK?
 DIFFERENT BETWEEN NETWORK & NETWORKING
 BENEFITS OF NETWORKING
 TYPES OF NETWORKS
 NETWORK MODELS
 NETWORK TOPOLOGIES
 COMMUNICATION MEDIA
 NETWORKING DEVICES
 OSI MODEL
 PROTOCOLS
 IP ADDRESSES
WHAT IS NETWORK?

 A Network is collection of computers connected


together.
(or)
 A Network consists of two or more computers that
are linked in order to share resources such as
printers, CD-ROMs, files & folders.
NETWORK vs NETWORKING

Network:-
Is a collection of computers connected together.

Networking:-
Is a process of communication between the
interconnected computers.
Systems connected together Process of communication b/w
the interconnected systems.
BENEFITS OF NETWORKING
 Speed: Sharing and transferring files within Networks can be done
through process rate of @ 1Gbps which saves our time.

 Security: We can secure confidential, sensitive files and programs in


our network with password protected. By restricting access to
Unauthorized users.

 Resource Sharing: Resources such as printers, modems, Drives can


be shared.

 Flexible Access: We can access the files from computers throughout


our organization / firm.

 Electronic mails: E-mail on a network can enable the users to


communicate and sending information formally.
TYPES OF NETWORKS

The Networks are differentiated as,

1.LAN(Local Area Network)


2.MAN(Metropolitan Area Network)
3.WAN(Wide Area Network)
4.CAN(Campus Area Network)
LAN:-

A network is said to be Local Area Network if it all


the systems are connected within the same geographical
area, expanding not more than a mile apart to other
computers.

SYSTEMS CONNECTED WITHIN THE ORGANIZATION


MAN:-
A network is said to be Metropolitan Area Network if the
systems are connected between the cities i.e connecting two or
more branches between the cities. OFC’s are used to link their
sites.

Router Fire ware Router Fire ware


CAN:-
A network is said to be Campus/Corporate Area Network, if it is
made up of interconnection of LAN’s within the limited geographical
area.CAN covers larger area than a LAN.

Building-2

LAN2
Building-3

Building-1 LAN3
LAN1

Systems connected b/w the LAN’s within a campus.


WAN:-
The network which covers or connects larger
geographical area such as countries London, UK, India etc
is said to be called as Wide Area Network.

Web DC,
server DNS

Switch WAN
Router
Router

Switch
NETWORK MODELS
There are two types of network models:

1) Work-Group Model
2) Domain Model

Work-Group Model:-

Is also called as Peer-Peer network. It is a collection of computers


connected together to share the resources without any centralized
administration where each user administers their own computer.

-There is no dedicated server.


-There is no hierarchy among the computers.
-No administrator required.
-Is less expensive.
Domain Model:-
In this model there is dedicated server which is optimized to
accept the service requests from the network clients and sending the data
as per the client request. So, it is also called as Server-Based/Client-Server
Network.
-It provides centralized administration.
-It manages the security credentials.
-It can supports more number of clients which are in different
locations.
Server
The server is a central system in a network that serves the specific
requests from all the network clients.

Client
A Client is a computer which uses the resources of the server in
which the client sends the request to the server and the server responds to
the client’s request on security basis.
IP : 172.16.0.3 IP : 172.16.0.4 IP : 172.16.0.5
IP : 172.16.0.2
Sub: 255.0.0.0 Sub: 255.0.0.0 Sub: 255.0.0.0
Sub: 255.0.0.0
G.WAY : 172.16.0.1 G.WAY : 172.16.0.1 G.WAY : 172.16.0.1
G.WAY : 172.16.0.1
P.DNS: 172.16.0.2 P.DNS: 172.16.0.2 P.DNS: 172.16.0.2
P.DNS: 172.16.0.2

172.16.0. 192.168.19.25
1

VIZ- VIZ- VIZ- VIZ- VIZ-


CL1 CL2 CL3 CL4 CL5

IP : 172.16.0.22 IP : 172.16.0.23 IP : 172.16.0.24 IP : 172.16.0.25


IP : 172.16.0.21
Sub: 255.0.0.0 Sub: 255.0.0.0 Sub: 255.0.0.0 Sub: 255.0.0.0
Sub: 255.0.0.0
G.WAY : 172.16.0.1 G.WAY : 172.16.0.1 G.WAY : 172.16.0.1 G.WAY : 172.16.0.1
G.WAY : 172.16.0.1
P.DNS: 172.16.0.2 P.DNS: 172.16.0.2 P.DNS: 172.16.0.2 P.DNS: 172.16.0.2
P.DNS: 172.16.0.2
IP : 172.16.0.3 IP : 172.16.0.4 IP : 172.16.0.5
IP : 172.16.0.2
Sub: 255.0.0.0 Sub: 255.0.0.0 Sub: 255.0.0.0
Sub: 255.0.0.0
G.WAY : 172.16.0.1 G.WAY : 172.16.0.1 G.WAY : 172.16.0.1
G.WAY : 172.16.0.1
P.DNS: 172.16.0.2 P.DNS: 172.16.0.2 P.DNS: 172.16.0.2
P.DNS: 172.16.0.2

172.16.0. 192.168.19.25
1

VIZ- VIZ- VIZ- VIZ- VIZ-


CL1 CL2 CL3 CL4 CL5

IP : 172.16.0.22 IP : 172.16.0.24 IP : 172.16.0.25


IP : 172.16.0.21 IP : 172.16.0.23
Sub: 255.0.0.0 Sub: 255.0.0.0 Sub: 255.0.0.0
Sub: 255.0.0.0 Sub: 255.0.0.0
G.WAY : 172.16.0.1 G.WAY : 172.16.0.1 G.WAY : 172.16.0.1
G.WAY : 172.16.0.1 G.WAY : 172.16.0.1
P.DNS: 172.16.0.2 P.DNS: 172.16.0.2 P.DNS: 172.16.0.2
P.DNS: 172.16.0.2 P.DNS: 172.16.0.2
NETWORK TOPOLOGIES
Topology:
The way of cabling is called a topology. So, network
topology refers to the physical arrangement of a network where
all the devices are interconnected to communicate on the network.

The different types of topologies are:

 BUS TOPOLOGY
 RING TOPOLOGY
 STAR TOPOLOGY
 MESH TOPOLOGY
 HYBRID TOPOLOGY
Bus Topology:
The way of cabling held in this topology is single
cable where multiple computers and network devices are
connected in a single line. It is shown as,

Terminator Terminator
Ring Topology:-

In this topology, all the systems are connected to one another


forming a large circle in a closed loop.

-If any one station is down, the entire ring will get disturbed.
-In this network , it uses a special type of device called Media
Access Control which receives data through one port and
transmits data through another port.
Star Topology:-
In this topology each system is connected to a centralized network
device i.e. Hub, Switch. This is the most common network setup where the
central device joins all the different nodes together and controls the
communication b/w the systems on network.
-Easy to implement and expands our network.
-Security can be implemented in the switch used.

Clients

Centralized Device Hub/Switch

File
server
Clients

Network Printer
Mesh Topology:-

In this topology each of the systems and network devices are


interconnected with one another in a network for the data transmission.

-If one of the connection breaks, still the network will operate .
-A high-speed exchange of information is possible b/w the source
and destination.
-This type of topology is mainly used in Defense.
-It has a complex physical layout.
Hybrid Topology:-

The Hybrid topology is a combination of


multiple topologies into one large topology.

-One of the combination is Star Bus topology.


-Another combination can be Star Ring topology.

STAR BUS TOPOLOGY STAR RING TOPAOLOGY


COMMUNICATION MEDIA
TYPES OF MEDIA CABLES

The different types of media cable are:


 Twisted Pair
 Co-axial
 Fiber optical
Twisted Pair :-

-There are two varieties of twisted pair cabling. They are:


1)Unshielded Twisted Pair(UTP).
2)Shielded Twisted Pair(STP).

UNSHIELDED TWISTED PAIR:-

-UTP cabling consists of two unshielded wires twisted around each


other that contain no shielding.

-The standard connector used is RJ-45 connector.


UTP CATEGORIES:

• Category 1  only voice communication(telephone calls), transmits 1Mbps.

• Category 2  Modern Networks, Local calls, transmits 4Mbps.

• Category 3  used for 10Mbps Ethernet, 4Mbps Token Ring networks.

• Category 4  used for 16Mps Token Ring, 10Mbps Ethernet networks.

• Category 5  transmit data @ 100Mbps for LAN networks.

• Category 5e  carry additional voice and video conversations.

• Category 6  transmits data @ 1Gbps for Gigabit Ethernet.


CO-AXIAL CABLE:-
This is a primary type of cabling used mostly by the cable
television industry and also used for computer networks.

-It is expensive and also carry additional data like voice, video with
the
help of BNC which is a connector used for data transfer in co-axial
cabling.

Where BNC Bayonet Neill Conector


Fiber Optic cable:-

This is the standard cable used for connecting networks


between buildings as it is good for high-speed, high capacity data
transmission.

This Fiber optic cable has been classified into two types:
1)Single-mode.
2)Multi-mode.
TYPES OF MEDIA CONNECTORS

The different types of media connectors are:

RJ-11
RJ-45
SC connector
LC connector
BNC
Cabling Methods
1.Straight-through Cable.
2.Cross-over cable.

1.Straight-through cabling:- Used to connect unlike devices.


-PC to Switch or Hub
-Router to switch or hub

2.Cross-over cabling:-Used to connect like devices.


-Switch to Switch
-PC to PC
-Hub to Hub
STRAIGHT-THROUGH CABLING COLOR
CODING:-

Orange white Orange white


Orange Orange
Green white Green white
Blue Blue
Blue white Blue white
Green Green
Brown white Brown white
Brown Brown
CROSS-OVER CABLING COLOR CODING:-

Orange white Green white


Orange Green
Green white Orange white
Blue Blue
Blue white Blue white
Green Orange
Brown white Brown white
Brown Brown
NETWORKING DEVICES
COMMUNICATION DEVICES

Non-Intelligent Intelligent

1)HUBS 1)SWITCHES
2)REPEATERS 2)ROUTERS
3)BRIDGES
Non-Intelligent Devices
HUBS:-
Hub is a centralized device used for communication b/w the
computers interconnected.

The main disadvantage of a Hub is, when we want


to transfer some data from one system to another system & if our
N/W has 30 systems the data packet instead of being sent only to
the destination system, it is being send to all the systems in the
network i.e Hub allows broadcasting.
REPEATERS:-
Repeaters are used for boosting up the signals. If
two computers are at a 2 km distance and we need to
make the communication possible, as we having the
cable of 1½ km. In such case we will connect the
remaining ½ km cable with the help of repeaters.
INTELLIGENT DEVICES
SWITCHES:-

It is an advanced version and the main role of


switch is unicasting. The data packets are transmitted
directly to the target computer.

Switch maintains a table called


MIT(Mac Information Table)which acts like a index. This
table contains port. no, IP Address and MAC Address.
Difference Between Switch And Hub
SWITCH HUB

As per the OSI model, network switches are As per the OSI model, a hub is a Physical
classified as Data Link Layer devices, i.e. they Layer device, i.e. it operates at Layer 1.
operate at Layer 2.

A switch is a more sophisticated network A hub is a very primitive device and is


device and is more expensive than a hub. comparatively much cheaper.

A switch is an intelligent. Where hub is a dumb device.

Switch is a uni-cast. Hub is a broadcast device.

Switches are full-duplex devices . Hubs are half-duplex.

Security is much better compared to hub. There is no security in hub.

Ports in switch-8,16,24,48. Ports in hub-8,16,24,48.

In switch MAC address is fixed, if switch goes Where as hub is centralized device
off network is going to failure.
In switch there are two types manageable, Non- In hub there are two types active and passive.
manageable.
IOS

 Cisco IOS (originally Internetwork Operating System) is


software used on most Cisco Systems routers and current
Cisco network switches. (Earlier switches ran CatOS.)

 IOS is a package of routing, switching, internetworking and


telecommunications functions integrated into a
multitasking operating system
 IOS software releases the format A,B,C,D

 A,B, and C are number's. D(if present)is a letter

 A,B is a major class

 C is the maintenance version. it fixes bugs

 D (omitted from general releases) is the


interim build number.
ROUTERS:-

Router is a device which connects two different networks. In


other cases connecting of Class A network with Class C network.
A router forwards packets across multiple networks through the
most optimal path. It performs the role of a post-man.

Router front panel Router-Back panel


BRIDGES:-

Bridge is a physical units with two ports.


- Bridges reduce the amount of traffic on a LAN by dividing it into two
segments.
- Bridges operate at the data link layer (Layer 2) of the OSI model.
- Bridges inspect incoming traffic and decide whether to forward or discard it.
Difference Between Router And
Switch
ROUTER SWITCH
Router connects two or more different A switch on the other hand, connects different
networks. computers within one network.

Router is a network layer device Switch operates at layer 2


Routers are much more sophisticated and In comparison with routers, switches are less
intelligent network devices, as compared to sophisticated and less intelligent.
switches.

A router works on the principle of IP addresses. A switch works on the basis of MAC
addresses.

A router's inbuilt hardware makes use of A switch does not perform any such activities.
routing algorithms to compute the best possible
path for routing data packets across different
computer networks.

Routers have their own inbuilt operating Most switches do not require any prior
systems and they need to be configured before configuration and are usually 'ready-to-use'.
use.
OSI MODEL

 The Open System Interconnection Model was


developed by ISO which defines the networking
framework for implementing protocols.

 The OSI Model is an architecture which divides the


network communication into seven layers.
SEVEN LAYERS OF OSI MODEL
Application  HTTP, SMTP, FTP, TELNET.

Presentation  Data Conversion, Data compression, Data Encryption

Session  NFT, SQL, ASP

Transport  TCP,UDP

Network  IP, Router

Data Link  MAC, L2TP, PPP

Physical  Sends and receives the bits acts as a physical medium.


PROTOCOLS
 Protocol:- protocol is a set of rules & instructions

- It is a combination of logical and physical address.


- There are two types of protocols. They are:

1)Open protocol - Open to all TCP/IP.


2)Vendor Specific protocol - Vendor will specify the
protocol, dependent on the platform.

- The IP address is called as the Logical address.


- The MAC address is called as the Physical address.
IP Address:-
IP address is also called as 32-bit address which
contains 4 octets. A single octet contains 8-bits. It can be
written as,

w.x.y.z
MAC Address:-
MAC Address is the address burnt in the NIC card by
the manufacturer. It contains 48-bits in the form of
hexadecimal, which determines the physical location of a
system. It can be written as,

MM-MM-MM-SS-SS-SS
IMPORTANT PORT NUMBERS

- HTTP ---- 80
- FTP ---- 20,21
- TelNet ---- 23
- SMTP ---- 25
- DNS ---- 53
- TFTP ---- 69
- SNMP ---- 161
- RIP ---- 520
- IMAP 4 ---- 143
- IMAP 3 ---- 220
- RPC ---- 135
- LDAP ---- 389
- Net Stat ---- 15
- WINS ---- 42
- BootP ---- 67
- DHCP ---- 68
- POP2 ---- 109
- POP3 ---- 110
- Net BIOS ---- 139
- SSL(HTTPS) ---- 443
- SQL Server ---- 1433
- NFS ---- 2049
- SSH ---- 22
- RAP ---- 38
- BGP ---- 179
- IEEE 802.1 Bridging (networking) and Network Management

- IEEE 802.2 Logical link control (upper part of data link layer)

- IEEE 802.3 Ethernet (CSMA/CD)

- IEEE 802.4 Token bus (disbanded)

- IEEE 802.5 Defines the MAC layer for a Token Ring (inactive)

- IEEE 802.6 Metropolitan Area Networks (disbanded)

- IEEE 802.7 Broadband LAN using Coaxial Cable (disbanded)

- IEEE 802.8 Fiber Optic TAG (disbanded)

- IEEE 802.9 Integrated Services LAN (disbanded)


- IEEE 802.10 Interoperable LAN Security (disbanded)

- IEEE 802.11 Wireless LAN & Mesh (Wi-Fi certification)

- IEEE 802.12 demand priority (disbanded)

- IEEE 802.13 Not Used

- IEEE 802.14 Cable modems (disbanded)

- IEEE 802.15 Wireless PAN

- IEEE 802.15.1 (Bluetooth certification)

- IEEE 802.15.4 (ZigBee certification)

- IEEE 802.16 Broadband Wireless Access (WiMAX certification)


- IEEE 802.16e (Mobile) Broadband Wireless Access

- IEEE 802.17 Resilient packet ring

- IEEE 802.18 Radio Regulatory TAG

- IEEE 802.19 Coexistence TAG

- IEEE 802.20 Mobile Broadband Wireless Access

- IEEE 802.21 Media Independent Handoff

- IEEE 802.22 Wireless Regional Area Network


IP address is short for Internet Protocol (IP) address.

An IP address is an identifier for a computer or device on a TCP/IP network.


Networks using the TCP/IP protocol route messages based on the IP address
of the destination.

Internet Protocol Address (or IP Address) is an unique address that computing


devices use to identify itself and communicate with other devices in the
Internet Protocol network. Any device connected to the IP network must have
an unique IP address within its network
IPV4 and IPV6
IPV4 IPV6
It’s a 32 bit length. V6 is a 128 bit length.
IPV4 are binary numbers IPV6 are binary numbers
represented in decimals. represented in hexadecimals.

IPSec supports only optional. Inbuilt IPSec support.


Fragmentation is done by sender Fragmentation is done by sender
and forwarding routers. only.

Checksum field is available in No checksum field in IPv6 header.


IPv4 header.

Options fields are available in No option fields, but IPv6 extension


IPv4 header. headers are available.

Broadcast messages are Broadcast messages are not


available available
An IP address has two components, the network address and the host address.
A subnet mask separates the IP address into the network and host addresses
(<network><host>).
MAC, Media Access Control, address is a globally unique identifier assigned
to network devices, and therefore it is often referred to as hardware or
physical address. MAC addresses are 6-byte (48-bits) in length, and are
written in MM:MM:MM:SS:SS:SS format. The first 3-bytes are ID number of
the manufacturer, which is assigned by an Internet standards body. The
second 3-bytes are serial number assigned by the manufacturer.
TCP/IP, Transmission Control Protocol/InternetProtocol, is a suite of
communications protocols used to interconnect network devices on the
Internet. TCP/IP implements layers of protocol stacks, and each layer
provides a well-defined network services to the upper layer protocol. TCP
and IP are the two protocols used by TCP/IP, as well as the (higher)
application, (lower) data link and (lower) physical layer protocols.
TCP/IP, Transmission Control Protocol/InternetProtocol, is a suite of
communications protocols used to interconnect network devices on the
Internet. TCP/IP implements layers of protocol stacks, and each layer
provides a well-defined network services to the upper layer protocol. TCP
and IP are the two protocols used by TCP/IP, as well as the (higher)
application, (lower) data link and (lower) physical layer protocols.
What is Ethernet ?

Ethernet is the most widely used local area network (LAN) technology, that
defines wiring and signaling standards for the physical layer of TCP/IP.
Ethernet was originally standardized as IEEE 802.3 with a data transmission
rate of 10 Mb/s. Newer versions of Ethernet were introduced lately to offer
higher data rates. Fast Ethernet and Gigabit Ethernet support data rates of
100 Mbps and 1 Gbps (1000 Mbps) respectively. An Ethernet LAN may use
coaxial cable (10Base2), unshielded twisted pair wiring (10BaseT,
100BaseT and 1000BaseT), or fiber optic cable. Ethernet devices compete
for access to the network using a protocol called Carrier Sense Multiple
Access with Collision Detection (CSMA/CD). With prosperity of Internet, Wi-
Fi, the wireless LAN technology standardized by IEEE 802.11, is used in
hybrid with Ethernet LAN to offer portability.

Ethernet Standards
IEEE 802.3 is the signaling standards for Ethernet, and IEEE 802.11 is the
standards for Wi-Fi
Loopback IP:
An address that sends outgoing signals back to the same
computer for testing. In a TCP/IP network, the loopback IP
address is 127.0.0.1, and pinging this address will always
return a reply unless the firewall prevents it. The loopback
address allows a network administrator to treat the local
machine as if it were a remote machine. See ping,
loopback plug and localhost.
Ipconfig is a MS-DOS command-line tool used to display and manage the
network settings of your computer. Ipconfig is available on Windows
machines, and it displays the current network connection details
and DHCP client settings.
Ipconfig is an external MS-DOS command, and is available on Windows 95,
Windows 98, ME, NT, 2000, XP and Windows Vista Operating Systems. On
Windows 9x machines, a graphical tools such as "winipconfig" or "winipcfg"
may be used instead. On Linux machine, the ifconfig command performs
equivalent function.
 Commands to Know your system IP Address and
MAC Address ……

 ipconfig
 ipconfig/all
 getmac
 hostname
 dcpromo
 Ping 127.0.0.1
 Net users
 Ipconfigur /registerdns
 nslookup
Securities
 A network security system typically relies on layers
of protection and consists of multiple components
including networking monitoring and security
software in addition to hardware and appliances.

 All components work together to increase the


overall security of the computer network.
ATTACKS In SECURITIES

 There are two types of Securities attacks in Network

 Passive Network
○ wiretapping
○ Port scanner
○ Idle scan
 Active
Denial-of-service attack
Spoofing
Man in the middle
ARP poisoning
Smurf attack
Buffer overflow
Heap overflow
Format string attack
SQL injection
cyber attack

You might also like