SlideShare a Scribd company logo
INTRODUCTION TO COMPUTER NETWORKS Navpreet Singh  Computer Centre Indian Institute of Technology Kanpur Kanpur INDIA   (Ph : 2597371, Email : navi@iitk.ac.in)
About Myself I am Network Manager at IIT Kanpur and I manage the Campus Network and Internet Services of IITK. IIT Kanpur has one of the largest networks in the country.  IITK Campus Network now has 6500 nodes providing connectivity to more than 5000 users in Academic Departments, Student Hostels and Residences. IITK has 45 Mbps Internet Connectivity.  All application servers (Mail, DNS, Proxy Caching, Web etc.) are maintained   in-house. B.Tech (1990) and M.Tech (1996) from IIT Kanpur Working in IIT Kanpur for more than 14 years About Myself
Course Content Lecture 1: Overview of the Course and Network Fundamentals: 2 Hour  Lecture 2: OSI Model& TCP/IP Model : 2 Hour Lecture 3: Physical Media (Copper, Fiber Optic and Wireless) : 2 Hour Lab 1: IIT Kanpur Datacenter Visit: 2 Hour  Lecture 4: UTP & Fiber Cabling: 2 Hour Lecture 5: LAN Technologies (Ethernet, Fast Ethernet, Gigabit Ethernet, Wireless LAN) : 2 Hour  Lab 2: Demo and Practice of UTP & Fiber Cabling: 2 Hour Lecture 6: LAN Technologies (contd.) : 2 Hour Course Content
Course Content Lecture 7: WAN Technologies (Dialup, Leased Line, ISDN, ADSL, Cable Modem, VSAT) : 2 Hour Lab 3: Demo and Practice of Ethernet & Wireless LAN Setup : 2 Hour Lecture 8: WAN Technologies (contd.) : 2 Hour Lecture 9: Internet Protocol (IP) and IP Addressing: 2 Hour Lab 4: Demo and Practice of Setting up Subnets and IP Address Assignment : 2 Hour  Lecture 10: Routing, VLAN, TCP and UDP: 2 Hour  Lecture 11: SNMP, Natting, Firewall and VPN: 2 Hour Lecture 12: Internet and Internet Applications (DNS, Email, Web..): 2 Hour Course Content
Course Content Lecture 13: Cisco Basics: 2 Hour  Lecture 14: Cisco Switch and Router Configuration : 2 Hour  Lab 5: Demo and Practice of Cisco Switch Configuration : 2 Hour Lab 6: Demo and Practice of Cisco Router Configuration : 2 Hour Lecture 15: DNS & Web Server Setup on Linux : 2 Hour  Lab 7: Demo and Practice of DNS and Web Server Setup : 2 Hour Lecture 16: Enterprise Network Implementation: 2 Hour  Course Content
Course Content Lecture 17: Mail Server, Proxy Server & Firewall Setup on Linux : 2 Hour Lab 8: Demo and Practice of Mail Server , Proxy Server and Firewall Setup : 2 Hour Course Content
References Andrew S. Tanenbaum,  Computer Network , Prentice-Hall Doughlas E. Comer, Computer Networks and Internet http://www.cisco.com /public/support/tac/documentation.html http://www.redhat.com/docs http://home.iitk.ac.in/~navi/sidbinetworkcourse Books
Grading Guidelines Two Exams: 40% each Lab Assignments: 20% Minimum 80% attendance and minimum 60% marks are necessary to clear the course. Grading
INTRODUCTION TO COMPUTER NETWORKS Introduction to Computer Networks
Computer Networks Computer network connects two or more autonomous computers. The computers can be geographically located anywhere. Introduction to Computer Networks
LAN, MAN & WAN Network in small geographical Area (Room, Building or a Campus) is called LAN (Local Area Network) Network in a City is call MAN (Metropolitan Area Network) Network spread geographically (Country or across Globe) is called WAN (Wide Area Network) Introduction to Computer Networks
Applications of Networks Resource Sharing Hardware (computing resources, disks, printers) Software (application software) Information Sharing Easy accessibility from anywhere (files, databases) Search Capability (WWW) Communication Email Message broadcast Remote computing Distributed processing (GRID Computing) Introduction to Computer Networks
Network Topology The network topology defines the way in which computers, printers, and other devices are connected. A network topology describes the layout of the wire and devices as well as the paths used by data transmissions.   Introduction to Computer Networks
Bus Topology Commonly referred to as a linear bus, all the devices on a bus topology are connected by one single cable. Introduction to Computer Networks
Star & Tree Topology The star topology is the most commonly used architecture in Ethernet LANs.  When installed, the star topology resembles spokes in a bicycle wheel. Larger networks use the extended star topology also called tree topology. When used with network devices that filter frames or packets, like bridges, switches, and routers, this topology significantly reduces the traffic on the wires by sending packets only to the wires of the destination host. Introduction to Computer Networks
Ring Topology A frame travels around the ring, stopping at each node. If a node wants to transmit data, it adds the data as well as the destination address to the frame.  The frame then continues around the ring until it finds the destination node, which takes the data out of the frame.  Single ring – All the devices on the network share a single cable   Dual ring – The dual ring topology allows data to be sent in both directions.  Introduction to Computer Networks
Mesh Topology The mesh topology connects all devices (nodes) to each other for redundancy and fault tolerance.  It is used in WANs to interconnect LANs and for mission critical networks like those used by banks and financial institutions.  Implementing the mesh topology is expensive and difficult.   Introduction to Computer Networks
Network Components Physical Media Interconnecting Devices Computers Networking Software Applications Introduction to Computer Networks
Networking Media Networking media can be defined simply as the means by which signals (data) are sent from one computer to another (either by cable or wireless means). Introduction to Computer Networks
Networking Devices HUB, Switches, Routers, Wireless Access Points, Modems etc. Introduction to Computer Networks
Computers: Clients and Servers In a client/server network arrangement, network services are located in a dedicated computer whose only function is to respond to the requests of clients.  The server contains the file, print, application, security, and other services in a central computer that is continuously available to respond   to client requests.  Introduction to Computer Networks
Networking Protocol: TCP/IP Introduction to Computer Networks
Applications E-mail Searchable Data (Web Sites) E-Commerce News Groups Internet Telephony (VoIP) Video Conferencing Chat Groups Instant Messengers  Internet Radio Introduction to Computer Networks
Ad

More Related Content

What's hot (20)

Local area network
Local area networkLocal area network
Local area network
Ayushi Gagneja
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networking
kieshore
 
Computer network
Computer networkComputer network
Computer network
Ketan Garg
 
Networking (2)
Networking (2)Networking (2)
Networking (2)
LALIT MAHATO
 
Computer network ppt communication
Computer network ppt communicationComputer network ppt communication
Computer network ppt communication
Kajal Sharma
 
Data Communication and Networking
Data Communication and NetworkingData Communication and Networking
Data Communication and Networking
Anjan Mahanta
 
NETWORK COMPONENTS
NETWORK COMPONENTSNETWORK COMPONENTS
NETWORK COMPONENTS
bwire sedrick
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
Mayank Jain
 
Network components
Network componentsNetwork components
Network components
Anas Karzoun
 
IP Address
IP AddressIP Address
IP Address
Rahul P
 
An introduction to networking
An introduction to networkingAn introduction to networking
An introduction to networking
Jafar Nesargi
 
Computer Networking - Its Advantages & Disadvantages
Computer Networking - Its Advantages & DisadvantagesComputer Networking - Its Advantages & Disadvantages
Computer Networking - Its Advantages & Disadvantages
Rita Gokani
 
Bandwidth
BandwidthBandwidth
Bandwidth
Christopher Brown
 
Types of Networks
Types of NetworksTypes of Networks
Types of Networks
Amity University | FMS - DU | IMT | Stratford University | KKMI International Institute | AIMA | DTU
 
Chapter 1 introduction to computer networks
Chapter 1 introduction to computer networksChapter 1 introduction to computer networks
Chapter 1 introduction to computer networks
Viku1985
 
ISDN & DSL
ISDN & DSLISDN & DSL
ISDN & DSL
Umair Arain
 
COMPUTER NETWORK
COMPUTER NETWORKCOMPUTER NETWORK
COMPUTER NETWORK
SindhuVelmukull
 
Unguided media
Unguided mediaUnguided media
Unguided media
mrzahidfaiz.blogspot.com
 
Computer network
Computer networkComputer network
Computer network
kainat fatima
 
Ethernet Computer network
Ethernet Computer networkEthernet Computer network
Ethernet Computer network
miteshppt
 

Similar to Networking Basics (20)

Lecture1
Lecture1Lecture1
Lecture1
Vedpal Yadav
 
lecture1 network fundamentals semester1.ppt
lecture1 network fundamentals semester1.pptlecture1 network fundamentals semester1.ppt
lecture1 network fundamentals semester1.ppt
tariqemadtariqemad
 
computer network technology ppt for basic
computer network technology ppt for basiccomputer network technology ppt for basic
computer network technology ppt for basic
AjayRaj912848
 
lecture ON COMPUTER NETWORKING WORKSHOP.ppt
lecture ON COMPUTER NETWORKING WORKSHOP.pptlecture ON COMPUTER NETWORKING WORKSHOP.ppt
lecture ON COMPUTER NETWORKING WORKSHOP.ppt
ShashankChaturvedi48
 
lecture1_computer_networks_Introduction.ppt
lecture1_computer_networks_Introduction.pptlecture1_computer_networks_Introduction.ppt
lecture1_computer_networks_Introduction.ppt
SATHYANARAYANAKB
 
Introduction to computer networks
Introduction to computer networksIntroduction to computer networks
Introduction to computer networks
KumailImran1
 
CN_lecture1.ppt
CN_lecture1.pptCN_lecture1.ppt
CN_lecture1.ppt
rajucs
 
Computer Networks lecture notes for engineering .ppt
Computer Networks lecture notes for engineering .pptComputer Networks lecture notes for engineering .ppt
Computer Networks lecture notes for engineering .ppt
csehod40
 
Computer networks with AI a tailor made.
Computer networks with AI a tailor made.Computer networks with AI a tailor made.
Computer networks with AI a tailor made.
AnuragAshokan
 
INTRODUCTION TO Computer Network .ppt
INTRODUCTION TO Computer Network .pptINTRODUCTION TO Computer Network .ppt
INTRODUCTION TO Computer Network .ppt
utkarshlodhi4
 
PGDCA CN NOTES MAHATMA JAYUTIBA PHULE UNIVERSITY
PGDCA CN NOTES MAHATMA JAYUTIBA PHULE UNIVERSITYPGDCA CN NOTES MAHATMA JAYUTIBA PHULE UNIVERSITY
PGDCA CN NOTES MAHATMA JAYUTIBA PHULE UNIVERSITY
rjgangwar1
 
INTRODUCTION TO COMPUTER NETWORKS
INTRODUCTION TO COMPUTER NETWORKSINTRODUCTION TO COMPUTER NETWORKS
INTRODUCTION TO COMPUTER NETWORKS
Wipro
 
networking
networking networking
networking
AmanyaLaban
 
My project-new-2
My project-new-2My project-new-2
My project-new-2
Udesh Lakshitha
 
Unit-1 intro to communication networks
Unit-1 intro to communication networksUnit-1 intro to communication networks
Unit-1 intro to communication networks
SSGMCE SHEGAON
 
uniti-lecture1-9-140329213708-phpapp02.pdf
uniti-lecture1-9-140329213708-phpapp02.pdfuniti-lecture1-9-140329213708-phpapp02.pdf
uniti-lecture1-9-140329213708-phpapp02.pdf
ThnhNguynVn97
 
This course introduces students to issues in IT infrastructu.docx
This course introduces students to issues in IT infrastructu.docxThis course introduces students to issues in IT infrastructu.docx
This course introduces students to issues in IT infrastructu.docx
christalgrieg
 
five-year-soluhhhhhhhhhhhhhhhhhtions.pdf
five-year-soluhhhhhhhhhhhhhhhhhtions.pdffive-year-soluhhhhhhhhhhhhhhhhhtions.pdf
five-year-soluhhhhhhhhhhhhhhhhhtions.pdf
AdityaSharma944496
 
CCNA Introducing Networks
CCNA Introducing NetworksCCNA Introducing Networks
CCNA Introducing Networks
Dsunte Wilson
 
76924356 synopsis-network
76924356 synopsis-network76924356 synopsis-network
76924356 synopsis-network
lklokesh
 
lecture1 network fundamentals semester1.ppt
lecture1 network fundamentals semester1.pptlecture1 network fundamentals semester1.ppt
lecture1 network fundamentals semester1.ppt
tariqemadtariqemad
 
computer network technology ppt for basic
computer network technology ppt for basiccomputer network technology ppt for basic
computer network technology ppt for basic
AjayRaj912848
 
lecture ON COMPUTER NETWORKING WORKSHOP.ppt
lecture ON COMPUTER NETWORKING WORKSHOP.pptlecture ON COMPUTER NETWORKING WORKSHOP.ppt
lecture ON COMPUTER NETWORKING WORKSHOP.ppt
ShashankChaturvedi48
 
lecture1_computer_networks_Introduction.ppt
lecture1_computer_networks_Introduction.pptlecture1_computer_networks_Introduction.ppt
lecture1_computer_networks_Introduction.ppt
SATHYANARAYANAKB
 
Introduction to computer networks
Introduction to computer networksIntroduction to computer networks
Introduction to computer networks
KumailImran1
 
CN_lecture1.ppt
CN_lecture1.pptCN_lecture1.ppt
CN_lecture1.ppt
rajucs
 
Computer Networks lecture notes for engineering .ppt
Computer Networks lecture notes for engineering .pptComputer Networks lecture notes for engineering .ppt
Computer Networks lecture notes for engineering .ppt
csehod40
 
Computer networks with AI a tailor made.
Computer networks with AI a tailor made.Computer networks with AI a tailor made.
Computer networks with AI a tailor made.
AnuragAshokan
 
INTRODUCTION TO Computer Network .ppt
INTRODUCTION TO Computer Network .pptINTRODUCTION TO Computer Network .ppt
INTRODUCTION TO Computer Network .ppt
utkarshlodhi4
 
PGDCA CN NOTES MAHATMA JAYUTIBA PHULE UNIVERSITY
PGDCA CN NOTES MAHATMA JAYUTIBA PHULE UNIVERSITYPGDCA CN NOTES MAHATMA JAYUTIBA PHULE UNIVERSITY
PGDCA CN NOTES MAHATMA JAYUTIBA PHULE UNIVERSITY
rjgangwar1
 
INTRODUCTION TO COMPUTER NETWORKS
INTRODUCTION TO COMPUTER NETWORKSINTRODUCTION TO COMPUTER NETWORKS
INTRODUCTION TO COMPUTER NETWORKS
Wipro
 
Unit-1 intro to communication networks
Unit-1 intro to communication networksUnit-1 intro to communication networks
Unit-1 intro to communication networks
SSGMCE SHEGAON
 
uniti-lecture1-9-140329213708-phpapp02.pdf
uniti-lecture1-9-140329213708-phpapp02.pdfuniti-lecture1-9-140329213708-phpapp02.pdf
uniti-lecture1-9-140329213708-phpapp02.pdf
ThnhNguynVn97
 
This course introduces students to issues in IT infrastructu.docx
This course introduces students to issues in IT infrastructu.docxThis course introduces students to issues in IT infrastructu.docx
This course introduces students to issues in IT infrastructu.docx
christalgrieg
 
five-year-soluhhhhhhhhhhhhhhhhhtions.pdf
five-year-soluhhhhhhhhhhhhhhhhhtions.pdffive-year-soluhhhhhhhhhhhhhhhhhtions.pdf
five-year-soluhhhhhhhhhhhhhhhhhtions.pdf
AdityaSharma944496
 
CCNA Introducing Networks
CCNA Introducing NetworksCCNA Introducing Networks
CCNA Introducing Networks
Dsunte Wilson
 
76924356 synopsis-network
76924356 synopsis-network76924356 synopsis-network
76924356 synopsis-network
lklokesh
 
Ad

Recently uploaded (20)

TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc
 
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-UmgebungenHCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
panagenda
 
Role of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered ManufacturingRole of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered Manufacturing
Andrew Leo
 
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptxSpecial Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
shyamraj55
 
How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?
Daniel Lehner
 
Cybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure ADCybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure AD
VICTOR MAESTRE RAMIREZ
 
Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)
Ortus Solutions, Corp
 
Drupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy ConsumptionDrupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy Consumption
Exove
 
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdfThe Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
Abi john
 
tecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdftecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdf
fjgm517
 
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Impelsys Inc.
 
Technology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data AnalyticsTechnology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data Analytics
InData Labs
 
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
organizerofv
 
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager APIUiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPathCommunity
 
HCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser EnvironmentsHCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser Environments
panagenda
 
Linux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdfLinux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdf
RHCSA Guru
 
Rusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond SparkRusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond Spark
carlyakerly1
 
Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025
Splunk
 
Heap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and DeletionHeap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and Deletion
Jaydeep Kale
 
AI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global TrendsAI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global Trends
InData Labs
 
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc
 
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-UmgebungenHCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
panagenda
 
Role of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered ManufacturingRole of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered Manufacturing
Andrew Leo
 
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptxSpecial Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
shyamraj55
 
How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?
Daniel Lehner
 
Cybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure ADCybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure AD
VICTOR MAESTRE RAMIREZ
 
Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)
Ortus Solutions, Corp
 
Drupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy ConsumptionDrupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy Consumption
Exove
 
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdfThe Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
Abi john
 
tecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdftecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdf
fjgm517
 
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Impelsys Inc.
 
Technology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data AnalyticsTechnology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data Analytics
InData Labs
 
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
organizerofv
 
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager APIUiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPathCommunity
 
HCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser EnvironmentsHCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser Environments
panagenda
 
Linux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdfLinux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdf
RHCSA Guru
 
Rusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond SparkRusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond Spark
carlyakerly1
 
Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025
Splunk
 
Heap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and DeletionHeap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and Deletion
Jaydeep Kale
 
AI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global TrendsAI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global Trends
InData Labs
 
Ad

Networking Basics

  • 1. INTRODUCTION TO COMPUTER NETWORKS Navpreet Singh Computer Centre Indian Institute of Technology Kanpur Kanpur INDIA (Ph : 2597371, Email : [email protected])
  • 2. About Myself I am Network Manager at IIT Kanpur and I manage the Campus Network and Internet Services of IITK. IIT Kanpur has one of the largest networks in the country. IITK Campus Network now has 6500 nodes providing connectivity to more than 5000 users in Academic Departments, Student Hostels and Residences. IITK has 45 Mbps Internet Connectivity. All application servers (Mail, DNS, Proxy Caching, Web etc.) are maintained in-house. B.Tech (1990) and M.Tech (1996) from IIT Kanpur Working in IIT Kanpur for more than 14 years About Myself
  • 3. Course Content Lecture 1: Overview of the Course and Network Fundamentals: 2 Hour Lecture 2: OSI Model& TCP/IP Model : 2 Hour Lecture 3: Physical Media (Copper, Fiber Optic and Wireless) : 2 Hour Lab 1: IIT Kanpur Datacenter Visit: 2 Hour Lecture 4: UTP & Fiber Cabling: 2 Hour Lecture 5: LAN Technologies (Ethernet, Fast Ethernet, Gigabit Ethernet, Wireless LAN) : 2 Hour Lab 2: Demo and Practice of UTP & Fiber Cabling: 2 Hour Lecture 6: LAN Technologies (contd.) : 2 Hour Course Content
  • 4. Course Content Lecture 7: WAN Technologies (Dialup, Leased Line, ISDN, ADSL, Cable Modem, VSAT) : 2 Hour Lab 3: Demo and Practice of Ethernet & Wireless LAN Setup : 2 Hour Lecture 8: WAN Technologies (contd.) : 2 Hour Lecture 9: Internet Protocol (IP) and IP Addressing: 2 Hour Lab 4: Demo and Practice of Setting up Subnets and IP Address Assignment : 2 Hour Lecture 10: Routing, VLAN, TCP and UDP: 2 Hour Lecture 11: SNMP, Natting, Firewall and VPN: 2 Hour Lecture 12: Internet and Internet Applications (DNS, Email, Web..): 2 Hour Course Content
  • 5. Course Content Lecture 13: Cisco Basics: 2 Hour Lecture 14: Cisco Switch and Router Configuration : 2 Hour Lab 5: Demo and Practice of Cisco Switch Configuration : 2 Hour Lab 6: Demo and Practice of Cisco Router Configuration : 2 Hour Lecture 15: DNS & Web Server Setup on Linux : 2 Hour Lab 7: Demo and Practice of DNS and Web Server Setup : 2 Hour Lecture 16: Enterprise Network Implementation: 2 Hour Course Content
  • 6. Course Content Lecture 17: Mail Server, Proxy Server & Firewall Setup on Linux : 2 Hour Lab 8: Demo and Practice of Mail Server , Proxy Server and Firewall Setup : 2 Hour Course Content
  • 7. References Andrew S. Tanenbaum, Computer Network , Prentice-Hall Doughlas E. Comer, Computer Networks and Internet http://www.cisco.com /public/support/tac/documentation.html http://www.redhat.com/docs http://home.iitk.ac.in/~navi/sidbinetworkcourse Books
  • 8. Grading Guidelines Two Exams: 40% each Lab Assignments: 20% Minimum 80% attendance and minimum 60% marks are necessary to clear the course. Grading
  • 9. INTRODUCTION TO COMPUTER NETWORKS Introduction to Computer Networks
  • 10. Computer Networks Computer network connects two or more autonomous computers. The computers can be geographically located anywhere. Introduction to Computer Networks
  • 11. LAN, MAN & WAN Network in small geographical Area (Room, Building or a Campus) is called LAN (Local Area Network) Network in a City is call MAN (Metropolitan Area Network) Network spread geographically (Country or across Globe) is called WAN (Wide Area Network) Introduction to Computer Networks
  • 12. Applications of Networks Resource Sharing Hardware (computing resources, disks, printers) Software (application software) Information Sharing Easy accessibility from anywhere (files, databases) Search Capability (WWW) Communication Email Message broadcast Remote computing Distributed processing (GRID Computing) Introduction to Computer Networks
  • 13. Network Topology The network topology defines the way in which computers, printers, and other devices are connected. A network topology describes the layout of the wire and devices as well as the paths used by data transmissions. Introduction to Computer Networks
  • 14. Bus Topology Commonly referred to as a linear bus, all the devices on a bus topology are connected by one single cable. Introduction to Computer Networks
  • 15. Star & Tree Topology The star topology is the most commonly used architecture in Ethernet LANs. When installed, the star topology resembles spokes in a bicycle wheel. Larger networks use the extended star topology also called tree topology. When used with network devices that filter frames or packets, like bridges, switches, and routers, this topology significantly reduces the traffic on the wires by sending packets only to the wires of the destination host. Introduction to Computer Networks
  • 16. Ring Topology A frame travels around the ring, stopping at each node. If a node wants to transmit data, it adds the data as well as the destination address to the frame. The frame then continues around the ring until it finds the destination node, which takes the data out of the frame. Single ring – All the devices on the network share a single cable Dual ring – The dual ring topology allows data to be sent in both directions. Introduction to Computer Networks
  • 17. Mesh Topology The mesh topology connects all devices (nodes) to each other for redundancy and fault tolerance. It is used in WANs to interconnect LANs and for mission critical networks like those used by banks and financial institutions. Implementing the mesh topology is expensive and difficult. Introduction to Computer Networks
  • 18. Network Components Physical Media Interconnecting Devices Computers Networking Software Applications Introduction to Computer Networks
  • 19. Networking Media Networking media can be defined simply as the means by which signals (data) are sent from one computer to another (either by cable or wireless means). Introduction to Computer Networks
  • 20. Networking Devices HUB, Switches, Routers, Wireless Access Points, Modems etc. Introduction to Computer Networks
  • 21. Computers: Clients and Servers In a client/server network arrangement, network services are located in a dedicated computer whose only function is to respond to the requests of clients. The server contains the file, print, application, security, and other services in a central computer that is continuously available to respond to client requests. Introduction to Computer Networks
  • 22. Networking Protocol: TCP/IP Introduction to Computer Networks
  • 23. Applications E-mail Searchable Data (Web Sites) E-Commerce News Groups Internet Telephony (VoIP) Video Conferencing Chat Groups Instant Messengers Internet Radio Introduction to Computer Networks