Networking Part 1
Networking Part 1
Networking Part 1
○ Devices
Devices Network
❖ Networking
○ Device Information (Data) Devices
Shared Devices Communication
Devices
Networking
❖ Networking Advantages
○ Sharing Data
○ Sharing Software
○ Sharing Hardware
❖ Networking Disadvantages
○ Data Unsecure
○ Unauthorized Access
○ Maintenance Problems
Network Nodes
(Server , Client (PCs) , Phones , etc..)
Network Protocols
(IP , TCP , IP , HTTP , FTP , etc..)
❖ Network Categories
○ Network Environment
Network
○ Network (4)
1. LAN
2. WAN
3. MAN
4. CAN
5. PAN
6. SAN
LAN
○ Local Area Network
○ (OR) Apartment Network
OR Networks Interconnect Internetwork
LAN Routers
○ Networks LAN
○ LAN High Speed Network
○ Ethernet LAN Network
○ SOHO (Small Office / Home Office) LAN
○ Internet WAN
○ Internet Sites
Network WAN
○ WAN Sites
○ WAN Speed LAN Speed
WAN Technologies
Baseband and Broadband
Packet Switching and Circuit Switching
POTS and ISDN Network
Synchronous Channel and Asynchronous Channel
MAN Technologies
Metro Ethernet
FDDI
ATM
SAN
○ Storage Area Network
○ Storage Devices Very High Speed Data
Network
○ SAN LAN or MAN or WAN Network Segment
LAN / MAN / WAN Data Stored Network Location
1. Physical Topology
2. Logical Topology
(Example, Ring Topology is Physical Star, Logical Bus)
Bus Components
○ Bus Network Coaxial Cable Create
○ Central Shared Cable (Bus Cable) Coaxial Cable
○ Bus Network Nodes Transceiver Transceiver
Bus Network Card
○ Transceiver Computer Digital Signals Bus Network
Signals
○ Network Nodes Central (Bus Cable) BNC Barrel Connector
OR T Connector (Vampire Tap)
○ Bus Network (Coaxial Cable) Signal Bounce
Terminator
Barrel Connector
Signal Bounce
○ Signal Bounce Data Network
Loop Data Package
Computer Data Package Signals 2 Bounce
Bus (Trunk) Signal 2
Data Lost Computers Retransmit
BNC Connectors
○ Bayonet Neil Concelman
○ Coaxial Cable
▪ Speed 10 Mbps
▪ Thinnet Bus Network 10Base2 Network
▪ Speed 10 Mbps
▪ Thicknet Bus Network 10Base5
▪ RG-59 Coaxial Cable Short Cable RG-6 Cable Long Distance Cable
▪ Cables
▪ Lower Costs to Establish
Full Mesh
○ Network Nodes Network Nodes One
Connection Connected
Full Mesh
○ Full Mesh are also used in highly available and highly fault-tolerance WAN Sites.
Partial Mesh
○ Client Computer
▪ Hardware Computers Desktop PCs
(Cloned / Branded / Workstation / All In One) Computers Laptop Computers
Server
○ Computer
▪ Computers Management
▪ Computers Resources / Services
▪ Computers Authentications
Authorizations
○ Server Computer
▪ Hardware High Performance Computers Server Hardware
Backbone
Node/Host
❖ Internet
○ A journey of a thousand sites.
○ Early….Sneaker net , 1960s … ARPANET is Created , 1980s …. Internet
○ Internet ARPANET (Advanced Research Projects Agency Network) Developed
❖ Extranet
○ Extranet Intranet Network Extranet
○ LANs Extranet
○ MAN Extranet
○ Extranet Company Company
Branch Sites Interconnect Network
❖ Ethernet
○ Ethernet Ethernet Twisted Pair (UTP) Cables
RJ45 Network
○ Ethernet Coaxial Cables Coaxial
Cables Networks Ethernet
○ Ethernet Mediums Cable Types
Latency
• Delay between source and destination.
• Delay occurs because of
▪ Distance
▪ Routing
▪ Interference / Noise
Jitter
• Variation in latency during an transmission
• Jitter impacts real-time applications like voice calling and video streaming
Bottleneck
• Bandwidth become slower at some where in network. EG ISP Link
• Ethernet permits only a single frame to be on a network segment at any one time.
• So, before a device in this network transmits, it listens to the wire to see if there is
currently any traffic being transmitted.
• If no traffic is detected, the networked device transmits its data. However, what if two
devices simultaneously had data to transmit?
• If they both listen to the wire at the same time, they could simultaneously, and
erroneously, conclude that it is safe to send their data.
• However, when both devices simultaneously send their data, a collision occurs.
• A collision cause data corruption.
• Ethernet was designed with a mechanism to detect collisions and allow the devices
whose transmissions collided to retransmit their data at different times.
• Specifically, after the devices notice that a collision occurred, they independently set
a random back off timer.
• Each device waits for this random amount of time to elapse before again attempting to
transmit.
Carrier sense: A device attached to an Ethernet network can listen to the wire, prior to
transmitting, to make sure that a frame is not currently being
transmitted on the network segment.
Multiple access: Unlike a deterministic method of network access (for example, the
method used by Token Ring), all Ethernet devices simultaneously
have access to an Ethernet segment.
Collision detect: If a collision occurs (perhaps because two devices were simultaneously
listening to the network and simultaneously concluded that it was safe
to transmit), Ethernet devices can detect that collision and set random
back off timers. After each device’s random timer expires, each device
again attempts to transmit its data.
Even with Ethernet’s CSMA/CD feature, Ethernet segments still suffer from scalability
limitations.
Broadcast Domain
• A standard switch is known as a layer 2 switch and is commonly found in nearly any
LAN
• Layer 3 or layer 4 switches require advanced technology and are more expensive, and
thus are usually only found in larger LANs or in special network environments.
Types of CAM
• There are two types of CAM (Hardware Architecture)
1. Binary CAM
(Used in L2 Switches, Two States 0 or 1)
2. Ternary CAM
(Used in L3 Switches and Routers, Three States 0 or 1 or care/don't care bit)
Layer 4 Switching
• Layer 4 switching means hardware-based layer 3 switching technology that can also
consider the type of network traffic (for example, distinguish between HTTP, FTP or
VoIP).
• Layer 4 switching provides additional datagram inspection by reading the port numbers
found in the Transport layer header to make routing decisions (i.e. ports used by UDP
or TCP).
• The largest benefit of layer 4 switching is that the network administrator can configure a
layer 4 switch to prioritize data traffic by application, which means a QoS can be defined
for each user.
○ Frames
Frame Valid Error
○ Frame Corrupted
Network Corrupted
Frames Bandwidth Loading
Frames Corrupted
Redundancy
○ Frame FCS
Forward
Store and Forward Switching Cut Through Switching
○ Entire Frame
Delay Collision
Frames Destination
• A link in a network is determined by two factors, bandwidth and speed. These are
usually the same but not always.
• Definition: Speed is bit rate of the circuit while bandwidth is the amount of “speed”
available for use.
• As an example, a 500 Megabit Ethernet MPLS service which uses a 1 Gigabit Ethernet
connection to site would have a bandwidth of 500Mbps and a speed of 1 Gbps.
1. De facto Standards
▪ De facto standards Based Standard All vendors
De facto standards Vendors
Network
2. Proprietary Standards
▪ Proprietary standards Vendor Create
Standard Vendor
▪ Vendor
3. Open Standards
▪ Open standards Vendor Create
Creation Vendors
Upgrade
▪ Vendors Create
○ Network Equipment
IEEE Working Group
IEEE 802.x
Inactive Groups
▪ 802.2 Logical Link Control Working Group
▪ 802.5 Token Ring Working Group
Disbanded Groups
▪ 802.4 Token Bus Working Group
▪ 802.6 Metropolitan Area Network Working Group
▪ 802.7 Broadband TAG
▪ 802.8 Fiber Optic TAG
▪ 802.9 Integrated Services LAN Working Group
▪ 802.10 Security Working Group
▪ 802.12 Demand Priority Working Group
▪ 802.14 Cable Modem Working Group
▪ QOS/FC Executive Committee Study Group
○ 1988 US Government
○ Playa Vista , California , US
○ Non-profit Organization
○ IANA Internet
▪ Global IP Address (IPv4 and IPv6 Addresses) Allocation
▪ Autonomous System (AS) Number Allocation
▪ Domain Name System Management (DNS) Root Zone Management
▪ MIME Type / Content Type (Media Types) Management
(Multipurpose Internet Mail Extensions)
▪ Internet Protocol Symbols and (Port) Numbers Management
▪ Time Zone Management
Internet-Drafts
○ Internet-Drafts IFTF Deploy
Information Data Documents
○ IP Address types 2
▪ IPv4 (Internet Protocol Version 4)
▪ IPv6 (Internet Protocol Version 6)
Address Space
○ IPv4 32 bits IPv4 Addresses Limits 232
IP Addresses 4,294,967,296 (Nearly 4.3 Billions) (109)
(4.3 Billions Addresses Block Private Network Addresses (18 Millions)
Multicast Addresses (270 Millions) Reserved )
Standardization
○ 1981 IPv4 IETF publication RFC 791 Standardized
○ 1995 128-bits IPv6 IETF publication RFC 2460
Standardized
Transmission Guarantee
○ IPv4 (Internet Protocol Version 4) Protocol IPv6 (Internet Protocol
Version 6) Protocol Connection Less Protocol Data Guarantee
IP Addresses Data Guarantee Upper Layer Protocol
TCP Protocol
ARIN