SlideShare ist ein Scribd-Unternehmen logo
1 von 31
1
Enterprise Network Management
& Administration
BBC
Makerere University Business School
2012-2013
BWIRE SEDRICK
Introduction to computer networking
Objective:
To be acquainted with:
• The definitions of networking and concepts
• Network topology
• Network peripherals, hardware and software
Why Study Networking?
Indispensable part of modern society
 Commercial – e-commerce, banking, inventorying,
telecommunications, archiving, health
 Social – critical infrastructure, homeland security,
policing
 Human interaction/communication – email, chat,
videoconferencing, social networking, entertainment
Appears in every facet of engineering
 Modern trend – Network every (electronic) device
(computers, phones, sensors, planes, cars, TVs,
appliances, heart monitors, …) 3
Definitions
A network can be defined as two or more
computing devices connected together in such a
way that they can share resources.
The purpose of a network is to share resources.
A resource may be:
 A file, A folder, A printer, A disk drive, Or just about
anything else that exists on a computer.
Definitions (cont..)
A network is simply a collection of computers or
other hardware devices that are connected
together, either physically or logically, using
special hardware and software, to allow them to
exchange information and cooperate. Networking
is the term that describes the processes involved
in designing, implementing, upgrading, managing
and otherwise working with networks and
network technologies.
Advantages of networking
Connectivity and Communication
Data Sharing
Hardware Sharing
Internet Access
Internet Access Sharing
Data Security and Management
Performance Enhancement and Balancing
Entertainment
The Disadvantages (Costs) of Networking
Network Hardware, Software and Setup Costs
Hardware and Software Management and
Administration Costs
Undesirable Sharing
Illegal or Undesirable Behavior
Data Security Concerns
Network Classifications
Networks can be classified by either network
geography or component roles within the network.
Classification by Network Geography - Networks
are frequently classified according to the
geographical boundaries spanned by the network
itself
A local area network (LAN) is a computer network
covering a small geographic area, like a home, office, or
group of buildings
Network Classifications Cont
Wide Area Network (WAN) is a computer network that covers a
broad area (i.e., any network whose communications links cross
metropolitan, regional, or national boundaries). Or, less formally, a
network that uses routers and public communications links. The largest
and most well-known example of a WAN is the Internet.
WANs are used to connect LANs and other types of networks together, so
that users and computers in one location can communicate with users and
computers in other locations
A Metropolitan Area Network (MAN) is a network that
interconnects users in a geographic area or region larger than that covered
by even a large local area network (LAN) but smaller than the area covered
by a wide area network (WAN). The term is applied to the
interconnection of networks in a city into a single larger network. It is also
used to mean the interconnection of several local area networks by
bridging them with backbone lines. The latter usage is also sometimes
referred to as a campus network.
Fundamental Network Classifications (cont)
Wide Area Network
Fundamental Network Classifications (cont)
Metropolitan Area Network (MAN)
Classification by Component Roles
Networks can also be classified according to the roles that the
networked computers play in the network’s operation.
Peer-to-peer, server-based, and client-based are the types of
roles into which networks are classified.
Classification by Component Roles
Peer-to-peer:
 In a peer-to-peer network, all computers are considered
equal. Each computer controls its own information and
is capable of functioning as either a client or a server
depending upon the requirement. Peer-to-peer networks
are inexpensive and easy to install.
 They are popular as home networks and for use in small
companies.
Classification by Component Roles
Peer-to-peer (continued):
 Most operating systems come with built-in peer-
to-peer networking capability.
 Peer-to-peer networks become difficult to manage
when more security is added to resources, since
the users control their security by password-
protecting shares.
 Shares can be document
folders, printers, peripherals, and any other
resource that they control on their computers.
Classification by Component Roles
Peer-to-peer network
Classification by Component Roles
Server-based:
 A server-based network offers centralized control
and is designed for secure operations. In a server-
based network, a dedicated server controls the
network.
 A dedicated server is one that services the
network by storing data, applications, resources,
and also provides access to resources required by
the client. These servers can also control the
network’s security from one centralized location
or share it with other specially configured servers.
Client/Server Networking (cont..)
Classification by Component Roles
Client-based:
 Client-based network servers process requests
from clients and return just the results.
 These networks take advantage of the powerful
processing capabilities of both the client and
the server.
 Application servers and communications
servers are examples of client-based networks.
Classification by Component Roles
Client-based network
Intranet and Internet Specifications
Intranet: An intranet is a private network that is contained within
an enterprise. It may consist of many interlinked local area
networks and also use leased lines in the wide area network. An
intranet uses TCP/IP, HTTP, and other Internet protocols and in
general looks like a private version of the Internet.
Extranet – a network that connects people within your company
with people who are outside your company--all within a secure,
password-protected network that can be accessed from anywhere
Internet: is a worldwide system of computer networks - a
network of networks in which users at any one computer can, if
they have permission, get information from any other computer
(and sometimes talk directly to users at other computers).
Network topology
A topology is a way of “laying out” the network. Topologies can
be either physical or logical.
Physical topologies describe how the cables are run.
Logical topologies describe how the network messages travel
Network topology (cont.)
Bus (can be both logical and physical)
Star (physical only)
Ring (can be both logical and physical)
Mesh (can be both logical and physical)
Network topology (cont.)
Bus
• A bus is the simplest physical topology. It consists of a
single cable that runs to every workstation. This topology
uses the least amount of cabling, but also covers the
shortest amount of distance.
• Each computer shares the same data and address path.
With a logical bus topology, messages pass through the
trunk, and each workstation checks to see if the message
is addressed to itself. If the address of the message matches
the workstation’s address, the network adapter copies the
message to the card’s on-board memory.
Network topology (cont.)
Star Topology
• A physical star topology branches each network device off
a central device called a hub, making it very easy to add a
new workstation.
• Also, if any workstation goes down it does not affect the
entire network. (But, as you might expect, if the central
device goes down, the entire network goes down.)
• Some types of Ethernet and ARCNet use a physical star
topology. Figure 8.7 gives an example of the organization
of the star network.
Network topology (cont.)
Star topologies are easy to install. A cable is run from each
workstation to the hub. The hub is placed in a central location
in the office.
Star topologies are more expensive to install than bus networks,
because there are several more cables that need to be installed,
plus the cost of the hubs that are needed.
Network topology (cont.)
Star Topology
Network topology (cont.)
Ring
• Each computer connects to two other computers,
joining them in a circle creating a unidirectional
path where messages move workstation to
workstation.
• Each entity participating in the ring reads a
message, then regenerates it and hands it to its
neighbor on a different network cable.
Network topology (cont.)
The ring makes it difficult to add new computers.
Unlike a star topology network, the ring topology network will
go down if one entity is removed from the ring.
Physical ring topology systems don’t exist much
anymore, mainly because the hardware involved was fairly
expensive and the fault tolerance was very low.
Network topology (cont.)
Mesh
• The mesh topology is the simplest logical topology in terms of data flow, but
it is the most complex in terms of physical design.
• In this physical topology, each device is connected to every other device .
This topology is rarely found in LANs, mainly because of the complexity of
the cabling.
• Because of its design, the physical mesh topology is very expensive to
install and maintain. Cables must be run from each device to every other
device. The advantage you gain from it is its high fault tolerance.
• With a logical mesh topology, however, there will always be a way of
getting the data from source to destination.
• It may not be able to take the direct route, but it can take an alternate,
indirect route. It is for this reason that the mesh topology is still found in
WANs to connect multiple sites across WAN links. It uses devices called
routersto search multiple routes through the mesh and determine the best
path.
Network topology (cont.)
Mesh Topology
Network topology (cont.)
Advantages and Disadvantages of Network Topologies
Topology Advantages Disadvantages
Bus Cheap. Easy to install. Difficult to reconfigure.
Break in bus disables entire network.
Star Cheap. Easy to install.
Easy to reconfigure. Fault tolerant.
More expensive than bus.
Ring Efficient. Easy to install. Reconfiguration difficult.
Very expensive.
Mesh Simplest. Most fault tolerant. Reconfiguration extremely difficult.
Extremely expensive. Very complex.

Weitere ähnliche Inhalte

Was ist angesagt?

Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer networkAshita Agrawal
 
Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardwareMziaulla
 
types of networks
types of networkstypes of networks
types of networksrdacs14
 
Networking Components
Networking ComponentsNetworking Components
Networking ComponentsAkNirojan
 
Types of Network Architecture
Types of Network ArchitectureTypes of Network Architecture
Types of Network Architecturesabari Giri
 
Network Types and Topologies
Network Types and TopologiesNetwork Types and Topologies
Network Types and TopologiesChristopher Brown
 
Network ppt
Network pptNetwork ppt
Network ppthlalu861
 
wired and wireless networks
wired and wireless networkswired and wireless networks
wired and wireless networksKavitha Ravi
 
Computer networking devices
Computer networking devicesComputer networking devices
Computer networking devicesRajesh Sadhukha
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networkingKhan Rahimeen
 
Network topologies
Network topologiesNetwork topologies
Network topologiesNorah Saad
 
Troubleshooting Your Network.pptx
Troubleshooting Your Network.pptxTroubleshooting Your Network.pptx
Troubleshooting Your Network.pptxssusere578aa
 
basic networking
basic networkingbasic networking
basic networkingAnmol Bagga
 
Introduction To Mobile Computing
Introduction To Mobile ComputingIntroduction To Mobile Computing
Introduction To Mobile ComputingMadhuri Badgujar
 
enterprise network design architecture
enterprise network design architectureenterprise network design architecture
enterprise network design architectureAmir Hossain
 
Networking Fundamentals
Networking  FundamentalsNetworking  Fundamentals
Networking FundamentalsManjit Chavda
 

Was ist angesagt? (20)

Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
 
WIRELES NETWORK
WIRELES NETWORKWIRELES NETWORK
WIRELES NETWORK
 
Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardware
 
types of networks
types of networkstypes of networks
types of networks
 
Networking Components
Networking ComponentsNetworking Components
Networking Components
 
Types of Network Architecture
Types of Network ArchitectureTypes of Network Architecture
Types of Network Architecture
 
Network Types and Topologies
Network Types and TopologiesNetwork Types and Topologies
Network Types and Topologies
 
Network ppt
Network pptNetwork ppt
Network ppt
 
wired and wireless networks
wired and wireless networkswired and wireless networks
wired and wireless networks
 
Computer networking devices
Computer networking devicesComputer networking devices
Computer networking devices
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
 
Network topologies
Network topologiesNetwork topologies
Network topologies
 
The Basics of Computer Networking
The Basics of Computer NetworkingThe Basics of Computer Networking
The Basics of Computer Networking
 
Troubleshooting Your Network.pptx
Troubleshooting Your Network.pptxTroubleshooting Your Network.pptx
Troubleshooting Your Network.pptx
 
basic networking
basic networkingbasic networking
basic networking
 
Introduction To Mobile Computing
Introduction To Mobile ComputingIntroduction To Mobile Computing
Introduction To Mobile Computing
 
Computer networks
Computer networks   Computer networks
Computer networks
 
Iot cyber security
Iot cyber securityIot cyber security
Iot cyber security
 
enterprise network design architecture
enterprise network design architectureenterprise network design architecture
enterprise network design architecture
 
Networking Fundamentals
Networking  FundamentalsNetworking  Fundamentals
Networking Fundamentals
 

Andere mochten auch

( Network topology) )final
( Network topology) )final( Network topology) )final
( Network topology) )finalJai Kumar
 
Ali hassan khan gurmani fiber optics
Ali hassan khan gurmani fiber opticsAli hassan khan gurmani fiber optics
Ali hassan khan gurmani fiber opticsali814
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networkingmartuj
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networkingBesar Limani
 
Data communication and computer networks
Data communication and computer networksData communication and computer networks
Data communication and computer networksmarwa_ma
 
A topic 2.1.2 classification of network
A topic 2.1.2 classification of networkA topic 2.1.2 classification of network
A topic 2.1.2 classification of networkhazirma
 
Advanced enterprise campus design. routed access (2015 milan)
Advanced enterprise campus design. routed access (2015 milan)Advanced enterprise campus design. routed access (2015 milan)
Advanced enterprise campus design. routed access (2015 milan)slide_site
 
Trends In Telecommunications
Trends In TelecommunicationsTrends In Telecommunications
Trends In TelecommunicationsMarlon Jamera
 
Multilayer Campus Architectures and Design Principles
Multilayer Campus Architectures and Design PrinciplesMultilayer Campus Architectures and Design Principles
Multilayer Campus Architectures and Design PrinciplesCisco Canada
 
Classification of Computer Networks
Classification of Computer Networks Classification of Computer Networks
Classification of Computer Networks Nazren Wak
 
Trends In Telecommunication Services
Trends In Telecommunication ServicesTrends In Telecommunication Services
Trends In Telecommunication ServicesChetan Kumar S
 
Classification of Networks & Network topologies
Classification of Networks & Network topologiesClassification of Networks & Network topologies
Classification of Networks & Network topologiesPriyanka Nain
 
Chapter 1 introduction to scaling networks
Chapter 1   introduction to scaling networksChapter 1   introduction to scaling networks
Chapter 1 introduction to scaling networksJosue Wuezo
 

Andere mochten auch (20)

( Network topology) )final
( Network topology) )final( Network topology) )final
( Network topology) )final
 
Traffic types in internet
Traffic types in internetTraffic types in internet
Traffic types in internet
 
Ali hassan khan gurmani fiber optics
Ali hassan khan gurmani fiber opticsAli hassan khan gurmani fiber optics
Ali hassan khan gurmani fiber optics
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
 
Topologia estrella
Topologia estrellaTopologia estrella
Topologia estrella
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
 
Data communication and computer networks
Data communication and computer networksData communication and computer networks
Data communication and computer networks
 
A topic 2.1.2 classification of network
A topic 2.1.2 classification of networkA topic 2.1.2 classification of network
A topic 2.1.2 classification of network
 
Topologies
TopologiesTopologies
Topologies
 
Components of client server application
Components of client server applicationComponents of client server application
Components of client server application
 
Advanced enterprise campus design. routed access (2015 milan)
Advanced enterprise campus design. routed access (2015 milan)Advanced enterprise campus design. routed access (2015 milan)
Advanced enterprise campus design. routed access (2015 milan)
 
Trends In Telecommunications
Trends In TelecommunicationsTrends In Telecommunications
Trends In Telecommunications
 
Multilayer Campus Architectures and Design Principles
Multilayer Campus Architectures and Design PrinciplesMultilayer Campus Architectures and Design Principles
Multilayer Campus Architectures and Design Principles
 
Classification of Computer Networks
Classification of Computer Networks Classification of Computer Networks
Classification of Computer Networks
 
Trends In Telecommunication Services
Trends In Telecommunication ServicesTrends In Telecommunication Services
Trends In Telecommunication Services
 
Classification of Networks & Network topologies
Classification of Networks & Network topologiesClassification of Networks & Network topologies
Classification of Networks & Network topologies
 
Chapter 1 introduction to scaling networks
Chapter 1   introduction to scaling networksChapter 1   introduction to scaling networks
Chapter 1 introduction to scaling networks
 
Personal area networks (PAN)
Personal area networks (PAN)Personal area networks (PAN)
Personal area networks (PAN)
 
Network topologies
Network topologiesNetwork topologies
Network topologies
 
Memory types
Memory typesMemory types
Memory types
 

Ähnlich wie ENTERPRISE NETWORKING

1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networkingshiv balapure
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networkingAnuja Lad
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networkingMayank Jain
 
Introduction to-computer-networking
Introduction to-computer-networkingIntroduction to-computer-networking
Introduction to-computer-networkingArdit Meti
 
1-introduction-to-computer-networking.ppt
1-introduction-to-computer-networking.ppt1-introduction-to-computer-networking.ppt
1-introduction-to-computer-networking.pptjeronimored
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networkingRozitarmizi Mohammad
 
1 introduction-to-computer-networking slide
1 introduction-to-computer-networking slide1 introduction-to-computer-networking slide
1 introduction-to-computer-networking slidenextgencyber cafe
 
introduction-to-computer-networking
introduction-to-computer-networkingintroduction-to-computer-networking
introduction-to-computer-networkingSithu PM
 
Cisco Certified Networking Associate(Project Report)
Cisco Certified Networking Associate(Project Report)Cisco Certified Networking Associate(Project Report)
Cisco Certified Networking Associate(Project Report)saurabh goel
 
Lecture 1_Introduction to Networking_1.ppt
Lecture 1_Introduction to Networking_1.pptLecture 1_Introduction to Networking_1.ppt
Lecture 1_Introduction to Networking_1.pptflyinimohamed
 
Networking Concepts.pdf
Networking Concepts.pdfNetworking Concepts.pdf
Networking Concepts.pdfODINARARCH
 
fundamental of information technology(1)
fundamental of information technology(1)fundamental of information technology(1)
fundamental of information technology(1)Sorath Peetamber
 
presentation_internet.pptx
presentation_internet.pptxpresentation_internet.pptx
presentation_internet.pptxbantisworld
 

Ähnlich wie ENTERPRISE NETWORKING (20)

1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
 
Introduction to-computer-networking
Introduction to-computer-networkingIntroduction to-computer-networking
Introduction to-computer-networking
 
1-introduction-to-computer-networking.ppt
1-introduction-to-computer-networking.ppt1-introduction-to-computer-networking.ppt
1-introduction-to-computer-networking.ppt
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
 
1 introduction-to-computer-networking slide
1 introduction-to-computer-networking slide1 introduction-to-computer-networking slide
1 introduction-to-computer-networking slide
 
introduction-to-computer-networking
introduction-to-computer-networkingintroduction-to-computer-networking
introduction-to-computer-networking
 
Networking
NetworkingNetworking
Networking
 
COMPUTER NETWORKING
COMPUTER NETWORKINGCOMPUTER NETWORKING
COMPUTER NETWORKING
 
Cisco Certified Networking Associate(Project Report)
Cisco Certified Networking Associate(Project Report)Cisco Certified Networking Associate(Project Report)
Cisco Certified Networking Associate(Project Report)
 
Computer Network - Unit 1
Computer Network - Unit 1Computer Network - Unit 1
Computer Network - Unit 1
 
Lecture 1_Introduction to Networking_1.ppt
Lecture 1_Introduction to Networking_1.pptLecture 1_Introduction to Networking_1.ppt
Lecture 1_Introduction to Networking_1.ppt
 
Networking Concepts.pdf
Networking Concepts.pdfNetworking Concepts.pdf
Networking Concepts.pdf
 
Networking concepts
Networking conceptsNetworking concepts
Networking concepts
 
Computer networks--networking
Computer networks--networkingComputer networks--networking
Computer networks--networking
 
fundamental of information technology(1)
fundamental of information technology(1)fundamental of information technology(1)
fundamental of information technology(1)
 
Computer network ppt
Computer network pptComputer network ppt
Computer network ppt
 
presentation_internet.pptx
presentation_internet.pptxpresentation_internet.pptx
presentation_internet.pptx
 
final NEtworking.pptx
final  NEtworking.pptxfinal  NEtworking.pptx
final NEtworking.pptx
 

Mehr von bwire sedrick

Effect of poor customer care on the image of police a case study of uganda po...
Effect of poor customer care on the image of police a case study of uganda po...Effect of poor customer care on the image of police a case study of uganda po...
Effect of poor customer care on the image of police a case study of uganda po...bwire sedrick
 
Planning for a good presentation
Planning for a good presentationPlanning for a good presentation
Planning for a good presentationbwire sedrick
 
Principles of ict concepts and data processing
Principles of ict   concepts and data processingPrinciples of ict   concepts and data processing
Principles of ict concepts and data processingbwire sedrick
 
Ura taxation handbook
Ura  taxation handbookUra  taxation handbook
Ura taxation handbookbwire sedrick
 
INTRODUCTION TO HTML
INTRODUCTION TO HTMLINTRODUCTION TO HTML
INTRODUCTION TO HTMLbwire sedrick
 
Lan access control methods
Lan access control methodsLan access control methods
Lan access control methodsbwire sedrick
 
Strategy implementation
Strategy implementationStrategy implementation
Strategy implementationbwire sedrick
 
Strategic management process
Strategic management processStrategic management process
Strategic management processbwire sedrick
 
Strategic management overview
Strategic management   overviewStrategic management   overview
Strategic management overviewbwire sedrick
 
Industry analysis, swot & portfolio analysis
Industry analysis, swot & portfolio analysisIndustry analysis, swot & portfolio analysis
Industry analysis, swot & portfolio analysisbwire sedrick
 
Industry analysis, swot & portfolio analysis spare
Industry analysis, swot & portfolio analysis   spareIndustry analysis, swot & portfolio analysis   spare
Industry analysis, swot & portfolio analysis sparebwire sedrick
 
Establishing sustainable markets for ugandan products
Establishing sustainable markets for ugandan productsEstablishing sustainable markets for ugandan products
Establishing sustainable markets for ugandan productsbwire sedrick
 

Mehr von bwire sedrick (20)

Effect of poor customer care on the image of police a case study of uganda po...
Effect of poor customer care on the image of police a case study of uganda po...Effect of poor customer care on the image of police a case study of uganda po...
Effect of poor customer care on the image of police a case study of uganda po...
 
Planning for a good presentation
Planning for a good presentationPlanning for a good presentation
Planning for a good presentation
 
Marketing channels
Marketing channelsMarketing channels
Marketing channels
 
Principles of ict concepts and data processing
Principles of ict   concepts and data processingPrinciples of ict   concepts and data processing
Principles of ict concepts and data processing
 
Computer systems
Computer systemsComputer systems
Computer systems
 
Ura taxation handbook
Ura  taxation handbookUra  taxation handbook
Ura taxation handbook
 
E learning slide
E learning slideE learning slide
E learning slide
 
INTRODUCTION TO HTML
INTRODUCTION TO HTMLINTRODUCTION TO HTML
INTRODUCTION TO HTML
 
NETWORK COMPONENTS
NETWORK COMPONENTSNETWORK COMPONENTS
NETWORK COMPONENTS
 
Osi model
Osi modelOsi model
Osi model
 
Lan access control methods
Lan access control methodsLan access control methods
Lan access control methods
 
Strategy implementation
Strategy implementationStrategy implementation
Strategy implementation
 
Strategic management process
Strategic management processStrategic management process
Strategic management process
 
Strategic management overview
Strategic management   overviewStrategic management   overview
Strategic management overview
 
Strategic choice
Strategic choiceStrategic choice
Strategic choice
 
Industry analysis, swot & portfolio analysis
Industry analysis, swot & portfolio analysisIndustry analysis, swot & portfolio analysis
Industry analysis, swot & portfolio analysis
 
Industry analysis, swot & portfolio analysis spare
Industry analysis, swot & portfolio analysis   spareIndustry analysis, swot & portfolio analysis   spare
Industry analysis, swot & portfolio analysis spare
 
Establishing sustainable markets for ugandan products
Establishing sustainable markets for ugandan productsEstablishing sustainable markets for ugandan products
Establishing sustainable markets for ugandan products
 
Course outline
Course outlineCourse outline
Course outline
 
Busgrowth
BusgrowthBusgrowth
Busgrowth
 

Kürzlich hochgeladen

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 

Kürzlich hochgeladen (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 

ENTERPRISE NETWORKING

  • 1. 1 Enterprise Network Management & Administration BBC Makerere University Business School 2012-2013 BWIRE SEDRICK
  • 2. Introduction to computer networking Objective: To be acquainted with: • The definitions of networking and concepts • Network topology • Network peripherals, hardware and software
  • 3. Why Study Networking? Indispensable part of modern society  Commercial – e-commerce, banking, inventorying, telecommunications, archiving, health  Social – critical infrastructure, homeland security, policing  Human interaction/communication – email, chat, videoconferencing, social networking, entertainment Appears in every facet of engineering  Modern trend – Network every (electronic) device (computers, phones, sensors, planes, cars, TVs, appliances, heart monitors, …) 3
  • 4. Definitions A network can be defined as two or more computing devices connected together in such a way that they can share resources. The purpose of a network is to share resources. A resource may be:  A file, A folder, A printer, A disk drive, Or just about anything else that exists on a computer.
  • 5. Definitions (cont..) A network is simply a collection of computers or other hardware devices that are connected together, either physically or logically, using special hardware and software, to allow them to exchange information and cooperate. Networking is the term that describes the processes involved in designing, implementing, upgrading, managing and otherwise working with networks and network technologies.
  • 6. Advantages of networking Connectivity and Communication Data Sharing Hardware Sharing Internet Access Internet Access Sharing Data Security and Management Performance Enhancement and Balancing Entertainment
  • 7. The Disadvantages (Costs) of Networking Network Hardware, Software and Setup Costs Hardware and Software Management and Administration Costs Undesirable Sharing Illegal or Undesirable Behavior Data Security Concerns
  • 8. Network Classifications Networks can be classified by either network geography or component roles within the network. Classification by Network Geography - Networks are frequently classified according to the geographical boundaries spanned by the network itself A local area network (LAN) is a computer network covering a small geographic area, like a home, office, or group of buildings
  • 9. Network Classifications Cont Wide Area Network (WAN) is a computer network that covers a broad area (i.e., any network whose communications links cross metropolitan, regional, or national boundaries). Or, less formally, a network that uses routers and public communications links. The largest and most well-known example of a WAN is the Internet. WANs are used to connect LANs and other types of networks together, so that users and computers in one location can communicate with users and computers in other locations A Metropolitan Area Network (MAN) is a network that interconnects users in a geographic area or region larger than that covered by even a large local area network (LAN) but smaller than the area covered by a wide area network (WAN). The term is applied to the interconnection of networks in a city into a single larger network. It is also used to mean the interconnection of several local area networks by bridging them with backbone lines. The latter usage is also sometimes referred to as a campus network.
  • 10. Fundamental Network Classifications (cont) Wide Area Network
  • 11. Fundamental Network Classifications (cont) Metropolitan Area Network (MAN)
  • 12. Classification by Component Roles Networks can also be classified according to the roles that the networked computers play in the network’s operation. Peer-to-peer, server-based, and client-based are the types of roles into which networks are classified.
  • 13. Classification by Component Roles Peer-to-peer:  In a peer-to-peer network, all computers are considered equal. Each computer controls its own information and is capable of functioning as either a client or a server depending upon the requirement. Peer-to-peer networks are inexpensive and easy to install.  They are popular as home networks and for use in small companies.
  • 14. Classification by Component Roles Peer-to-peer (continued):  Most operating systems come with built-in peer- to-peer networking capability.  Peer-to-peer networks become difficult to manage when more security is added to resources, since the users control their security by password- protecting shares.  Shares can be document folders, printers, peripherals, and any other resource that they control on their computers.
  • 15. Classification by Component Roles Peer-to-peer network
  • 16. Classification by Component Roles Server-based:  A server-based network offers centralized control and is designed for secure operations. In a server- based network, a dedicated server controls the network.  A dedicated server is one that services the network by storing data, applications, resources, and also provides access to resources required by the client. These servers can also control the network’s security from one centralized location or share it with other specially configured servers.
  • 18. Classification by Component Roles Client-based:  Client-based network servers process requests from clients and return just the results.  These networks take advantage of the powerful processing capabilities of both the client and the server.  Application servers and communications servers are examples of client-based networks.
  • 19. Classification by Component Roles Client-based network
  • 20. Intranet and Internet Specifications Intranet: An intranet is a private network that is contained within an enterprise. It may consist of many interlinked local area networks and also use leased lines in the wide area network. An intranet uses TCP/IP, HTTP, and other Internet protocols and in general looks like a private version of the Internet. Extranet – a network that connects people within your company with people who are outside your company--all within a secure, password-protected network that can be accessed from anywhere Internet: is a worldwide system of computer networks - a network of networks in which users at any one computer can, if they have permission, get information from any other computer (and sometimes talk directly to users at other computers).
  • 21. Network topology A topology is a way of “laying out” the network. Topologies can be either physical or logical. Physical topologies describe how the cables are run. Logical topologies describe how the network messages travel
  • 22. Network topology (cont.) Bus (can be both logical and physical) Star (physical only) Ring (can be both logical and physical) Mesh (can be both logical and physical)
  • 23. Network topology (cont.) Bus • A bus is the simplest physical topology. It consists of a single cable that runs to every workstation. This topology uses the least amount of cabling, but also covers the shortest amount of distance. • Each computer shares the same data and address path. With a logical bus topology, messages pass through the trunk, and each workstation checks to see if the message is addressed to itself. If the address of the message matches the workstation’s address, the network adapter copies the message to the card’s on-board memory.
  • 24. Network topology (cont.) Star Topology • A physical star topology branches each network device off a central device called a hub, making it very easy to add a new workstation. • Also, if any workstation goes down it does not affect the entire network. (But, as you might expect, if the central device goes down, the entire network goes down.) • Some types of Ethernet and ARCNet use a physical star topology. Figure 8.7 gives an example of the organization of the star network.
  • 25. Network topology (cont.) Star topologies are easy to install. A cable is run from each workstation to the hub. The hub is placed in a central location in the office. Star topologies are more expensive to install than bus networks, because there are several more cables that need to be installed, plus the cost of the hubs that are needed.
  • 27. Network topology (cont.) Ring • Each computer connects to two other computers, joining them in a circle creating a unidirectional path where messages move workstation to workstation. • Each entity participating in the ring reads a message, then regenerates it and hands it to its neighbor on a different network cable.
  • 28. Network topology (cont.) The ring makes it difficult to add new computers. Unlike a star topology network, the ring topology network will go down if one entity is removed from the ring. Physical ring topology systems don’t exist much anymore, mainly because the hardware involved was fairly expensive and the fault tolerance was very low.
  • 29. Network topology (cont.) Mesh • The mesh topology is the simplest logical topology in terms of data flow, but it is the most complex in terms of physical design. • In this physical topology, each device is connected to every other device . This topology is rarely found in LANs, mainly because of the complexity of the cabling. • Because of its design, the physical mesh topology is very expensive to install and maintain. Cables must be run from each device to every other device. The advantage you gain from it is its high fault tolerance. • With a logical mesh topology, however, there will always be a way of getting the data from source to destination. • It may not be able to take the direct route, but it can take an alternate, indirect route. It is for this reason that the mesh topology is still found in WANs to connect multiple sites across WAN links. It uses devices called routersto search multiple routes through the mesh and determine the best path.
  • 31. Network topology (cont.) Advantages and Disadvantages of Network Topologies Topology Advantages Disadvantages Bus Cheap. Easy to install. Difficult to reconfigure. Break in bus disables entire network. Star Cheap. Easy to install. Easy to reconfigure. Fault tolerant. More expensive than bus. Ring Efficient. Easy to install. Reconfiguration difficult. Very expensive. Mesh Simplest. Most fault tolerant. Reconfiguration extremely difficult. Extremely expensive. Very complex.