SlideShare ist ein Scribd-Unternehmen logo
1 von 79
Diploma in Information Technology

Module IV: Fundamentals in
Networking

By: Rasan Samarasinghe
Esoft Computer Studies (pvt) Ltd.
No 68/1, First Floor, Main Street, Pallegama, Embilipitiya.
Content
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.

What is a computer network?
Types of computer networks
Personal Area Network
Local Area Network
Metropolitan Area Network
Wide Area Network
Networking Topologies
Physical Topologies
Physical point to point
Physical bus topology
Physical ring topology
Physical star topology
Physical mesh topology
Physical hybrid topology
Logical Topologies

16.
17.
18.
19.
20.
21.
22.
23.
24.
25.
26.
27.
28.
29.
30.

Logical bus topology
Logical ring topology
Switching implemented…
Networking Cables
Coaxial Cables
Twisted Pair Cables
Fiber Optic Cables
Networking Devices
NIC-Network interface card
Hub
Network Switch
Router
Bridge
IP Address
Activities
What is a computer network?
Computer network is an interconnection of
two or more computers and other devices.
Devices on a network can be linked by cables,
telephone lines, radio waves or infrared
waves.
Advantages of computer networks
•
•
•
•

Files sharing
Devices sharing
Communication
Services sharing
Disadvantages of computer networks
• Virus attacks
• Hacker attacks
• Failures of a server may effect to the entire
network
Types of computer networks
Based on the network size, networks can be
categorized into several types
1.
2.
3.
4.

Personal Area Network (PAN)
Local Area Network (LAN)
Metropolitan Area Network (MAN)
Wide Area Network (WAN)
Personal Area Network (PAN)
PAN is wireless network connected with
mobile devices such as mobile phones, PDAs,
Bluetooth printers, Headsets, etc. The
technology using in here is Bluetooth or
infrared.
Local Area Network (LAN)
• Coverage is about within 1km.
• Ex: a company network within a building or
may be within two or more buildings
Metropolitan Area Network (MAN)
• Coverage is about more than 1km and less
than 10km.
• Ex: A network of a large town
Wide Area Network (WAN)
• Coverage is about more than 10km.
• Satellites may be use to expand this network.
• Ex: Internet
Networking Topologies
Topology is the way that we connect
computers and other devices. In other words
topology is the map of the network
Networking Topologies
Topologies can be divided into two sections
1. Physical Topologies
2. Logical Topologies
Physical Topologies
Physical arrangement of the network is known
as physical topology
Ex:
•
•
•
•
•
•

Physical point to point topology
Physical bus topology
Physical ring topology
Physical star topology
Physical mesh topology
Physical hybrid topology
Physical Point to Point Topology
This is the simplest topology that uses a
permanent link between two end devices. It
also known as peer to peer topology.
Physical Point to Point Topology
Characteristics
• Using twisted pair cables
• RJ-45 connectors
• Maximum segment length is 100m
Physical Point to Point Topology
Advantages
• Low cost
• No additional devices or servers needed
• Easy to implement
Physical Point to Point Topology
Disadvantages
• Maximum 2 computers can be connected
• Cable breaks will effect to the whole network
Physical Bus Topology
Each computers and devices are connected to
a single cable called “backbone”.
Physical Bus Topology
Characteristics
• Channel accessing method is CSMA/CD (carrier
sense multiple access / collision detection)
• Both thin net and thick net coaxial cables are
used
• Segment length of thin net coaxial cable is 200m
• Segment length of thick net coaxial cable is 500m
• BNC Connectors are used
• Maximum data transfer speed is 10mbps
Physical Bus Topology
Advantages
• Easy to implement
• Easy to expand
• Low cost (no additional devices)
Physical Bus Topology
Disadvantages
• Maximum speed is 10mbps only
• Number of PCs will effect to the performance
of the network
• If backbone breaks, the entire network will
down
• Not suitable for heavy traffic
• Hard to find faults of the network
Physical Ring Topology
Each computers and devices are connected
each other forming a large circle.
Physical Ring Topology
Characteristics
• Channel accessing method is “Token Passing”
• Using coaxial or twisted pair cables
• Connectors used BNC or RJ-45
• Maximum data transfer speed is between 4 16mbps
Physical Ring Topology
Advantages
• No collisions are occurred
• No need of a server
• Even the load of the network increases, it still
perform better than bus topology.
Physical Ring Topology
Disadvantages
• If the cable breaks, entire network will be
down
• If one station goes down, it will be affected to
the entire network.
• Low speed
Physical Star Topology
All the components of the network are
connected to the central device called hub or
switch
Physical Star Topology
Characteristics
• Twisted pair cables are using
• Connectors are RJ-45
• Channel accessing method is depends on the
central device
Physical Star Topology
Advantages
• Higher data transfer speed than previous
topologies. 100 – 1000mbps
• Central device make it easy to manage the
network
• Cable breaks will not effect to the entire network
• Easy to expand
• Can connect more computers and devices
Physical Star Topology
Disadvantages
• Single point of failure type network
• The central device using is increases the cost
of the network
Extended Star Topology

Extended Star

Tree
Physical Mesh Topology
Each networking node are interconnected
with each other
Physical Mesh Topology
Characteristics
• It allowing most transmissions to be
distributed, even one of the connections goes
down
• Uses in the internet
Physical Mesh Topology
Advantages
• Can use for high traffic
• Cable breaks will not effect to the
communication
• Expansions and modifications can be done
without disrupting other devices
Physical Mesh Topology
Disadvantages
• Overall cost of the network is high
• Setup, maintaining and administrating this
network is very tough
Physical Hybrid Topology
The combination of more topologies is known
as hybrid topology
Physical Hybrid Topology
Advantages
• Flexible to expand and modify
• Very effective
Disadvantages
• Very complex
• Costly infrastructure
Logical Topologies
Logical topology represents the way that data
travel through the computer
Ex:

• Logical bus topology
• Logical ring topology
• Switching implemented as physical star
Logical Bus Topology
In here, the central device called hub works as
data packet distributer similar in action of the
bus topology

Hub
Logical Bus Topology
Characteristics
• Channel accessing method is CSMA/CD
• Cable using is twisted pair
• Connector using is RJ-45
• Data transfer speed is 10mbps
• Cable breaks will not effect to the entire
network
• Single point of failure type network
Logical Ring Topology
The central device called MSAU acts very
similar to the ring architecture when data
packets are travelling.

MSAU
Logical Ring Topology
Characteristics
• Channel accessing method is token passing
• Cable type is twisted pair
• Connectors are RJ-45
• Maximum data transferring speed is 16mbps
• Cable breaks will not affect to the entire network
• No collisions occurred
• Single point of failure type network
Switching implemented as physical star
The central device using is networking switch.
It receives data packets from end devices and
forwarding them towards the particular
destination device or computer.

Switch
Switching implemented as physical star
Characteristics
• Channel accessing method is switching
• Maximum data transferring speed is 1001000mbps
• Using twisted pair cables
• Using RJ-45 connectors
• Cable breaks will not effect to the whole network
• Single point of failure type network
Networking Cables
There are several kind of networking cables
• Coaxial Cables
• Twisted Pair Cables
• Fiber Optic Cables
Coaxial Cables
Coaxial cables are two types
• Thin net coaxial cables
• Thick net coaxial cables
Outer cover

Outer copper shield

Inner inductor

Inner insulator
Thin net coaxial cables
• Use to connect computers and devices in bus
topology and ring topology
• Well flexible
• Maximum segment length is 200m (185m)
Thick net coaxial cables
• Used as backbone cables and outdoor laying
• Not well flexible
• Maximum segment length is 500m (485m)
Coaxial cable connectors

BNC Connectors
Twister Pair Cables
• Most popular network cable in networking
• There are two types called:
1. Unshielded twisted pair cables
2. Shielded twisted pair cables
• Maximum segment length is 100m
• Data transferring speed varied on cable
categories
Unshielded Twister Pair Cables (UTP)
Shielded Twister Pair Cables (STP)
Twisted pair cable categories
Category

Speed

CAT 1

Voice grade

CAT 2

4 Mbps

CAT 3

16Mbps

CAT 4

100Mbps

CAT 5

1000Mbps

CAT 5e

1000Mbps

CAT 6

1000Mbps

CAT 7

1000Mbps
Twisted pair cable connectors

RJ-45 Connectors

RJ-45 Base
Twisted Pair / RJ-45 Cabling Types
Fiber Optic Cables
• Fiber optic cables uses light pulses to send and
receive data.
• Have very higher data transfer speed. Ex:
10Gbps or 100Gbps
• There are two types of fiber optic cables
mainly
– Single Mode Fiber (SMF)
– Multi Mode Fiber (MMF)
Single Mode Fiber Optic Cables
• Transmit one light pulse at a time for one
direction
• Because of this reason devices need two
cables for full duplex communication
Multi Mode Fiber Optic Cables
• Transmit more than one light pulse
• Because of that full duplex communication
can achieve using a single cable
• These cables are not suitable for long distance
data transfer
Undersea Cable Map
Fiber Optic Media Converters
Fiber Optic Connectors
Networking Devices
•
•
•
•
•

NIC-Network interface card
Hub
Network Switch
Router
Bridge
Network Interface Card (NIC)
Network Interface Card (NIC)
• Every computer should have a network
interface card to connect to the network
• There are several things to consider before
buying a NIC
1. Network interface (connectors)
2. Internal interface (PCI, USB)
3. Network architecture
Hub
Hub
• Hub is use to connect all computers and other
devices together
• Hub is a broadcasting device
• Maximum data transfer speed is 10Mbps
• There are two types of hubs:
1. Active Hubs
2. Passive Hubs
Active Hubs
When active hubs receive a signal in one
port, it boost the signal and remove the
electromagnetic noises before send that to
other devices.
Passive Hubs
In passive hubs, it do not amplify the signal or
remove noise before send data to other
computers
Network Switch
Switches are also use to connect computers in
physical star topology and these devices are
intelligent than hubs.
How network switch works?
1. Switches maintain a small table in there RAM to
identify computers that related with the port
numbers.
2. When switch receives a data packet, it reads the
packet header to identify destination address.
3. After that it will search the entire table to find
the related port for that address.
4. Then it can directly forward that data packet to
the related computer rather than broadcasting.
Network Switch Types
• Layer 2 switches (unmanaged switches)
Using MAC addresses of connected devices.

• Layer 3 switches (managed switches)
Using IP addresses of connected devices.
Providing more features than layer 2 switches and
expensive.
Routers
Routers
• Routers are use to connect networks together.
• Routers are more intelligent devices and it use
IP addresses to deal with the packet.
• Routers are responsible for:
Identify proper networks and sub networks.
Forward data packets using the best path.
Destroying TTL data packets. Etc
Bridge
Bridge can use to connect different topologies
together or can use to connect different cable
types together.
IP Address (Internet Protocol)
• IP address is an unique address that use to
identify computers and devices.
• There are two IP versions called IPv4 and IPv6
• IPv4 is the common version that used in most
networks.
• IPv4 is made up with 4 decimal numbers and
each are separated by dots. (###.###.###.###)
and each number can be in between 0 to 255.
• IP versions, rules and regulations are created and
maintain by IANA (Internet Assigned Number
Authority)
IP Classes (IPv4)
•
•
•
•
•

Class A
Class B
Can use in our networks
Class C
Class D (reserved for multicasting purposes)
Class E (reserved for experimental purposes)
IP Address
IP Addresses are made up with two sections
1. Network Address (network portion)
2. Host Address (host portion)
Class A
N

H

H

Class B
H

N

N

H

Class C
H

Class D
N

N

N

N

N

N

Class E
H

N

N

N

H

H
IP Ranges in each classes
IP Class

First Octate

Received Bits

IP Address

Range (min-max)

Class A

0#######

00000000-01111111
(1-126)

Class B

10######

Class C

1-126

0-255

0-255 0-255

10000000-10111111
(128-191)

128-191 0-255

0-255 0-255

110#####

11000000-11011111
(192-223)

192-223 0-255

0-255 0-255

Class D

1110####

11100000-11101111
(224-239)

224-239 0-255

0-255 0-255

Class E

1111#####

11110000-11111111
(240-255)

240-255 0-255

0-255 0-255
Activities
Assigning IP address to connect two
computers
Sharing Files
Sharing Printer
The End

http://twitter.com/rasansmn

Weitere ähnliche Inhalte

Was ist angesagt?

Ethernet Computer network
Ethernet Computer networkEthernet Computer network
Ethernet Computer networkmiteshppt
 
Evolution of network - computer networks
Evolution of network - computer networksEvolution of network - computer networks
Evolution of network - computer networksSabarishSanjeevi
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer networkOnline
 
Network Components
Network ComponentsNetwork Components
Network ComponentsIfrad Mahbub
 
Computer Networking fundamentals
Computer Networking fundamentals Computer Networking fundamentals
Computer Networking fundamentals Kirti Verma
 
Network architecture
Network architectureNetwork architecture
Network architectureOnline
 
Introduction to network
Introduction to networkIntroduction to network
Introduction to networkDhani Ahmad
 
basic networking
basic networkingbasic networking
basic networkingAnmol Bagga
 
Networking Fundamentals
Networking  FundamentalsNetworking  Fundamentals
Networking FundamentalsManjit Chavda
 
Basic networking in power point by suprabha
Basic networking in power point by suprabhaBasic networking in power point by suprabha
Basic networking in power point by suprabhaSuprabha Sahoo
 
Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)Alan Mark
 
Data and Computer Communication
Data and Computer CommunicationData and Computer Communication
Data and Computer CommunicationNaqeeb Ullah Kakar
 
Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking FundamentalsRajet Veshin
 
Hot standby router protocol (hsrp) using
Hot standby router protocol (hsrp) usingHot standby router protocol (hsrp) using
Hot standby router protocol (hsrp) usingShubhiGupta94
 
Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardwareMziaulla
 
Introduction to data link layer
Introduction to data link layerIntroduction to data link layer
Introduction to data link layerswarna sudha
 

Was ist angesagt? (20)

Ethernet Computer network
Ethernet Computer networkEthernet Computer network
Ethernet Computer network
 
Evolution of network - computer networks
Evolution of network - computer networksEvolution of network - computer networks
Evolution of network - computer networks
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
 
Network Components
Network ComponentsNetwork Components
Network Components
 
Switching
SwitchingSwitching
Switching
 
Lan technologies
Lan technologiesLan technologies
Lan technologies
 
Computer Networking fundamentals
Computer Networking fundamentals Computer Networking fundamentals
Computer Networking fundamentals
 
Network architecture
Network architectureNetwork architecture
Network architecture
 
Introduction to network
Introduction to networkIntroduction to network
Introduction to network
 
basic networking
basic networkingbasic networking
basic networking
 
Networking Fundamentals
Networking  FundamentalsNetworking  Fundamentals
Networking Fundamentals
 
Basic networking in power point by suprabha
Basic networking in power point by suprabhaBasic networking in power point by suprabha
Basic networking in power point by suprabha
 
Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)
 
Networking ppt
Networking ppt Networking ppt
Networking ppt
 
Data and Computer Communication
Data and Computer CommunicationData and Computer Communication
Data and Computer Communication
 
Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking Fundamentals
 
Ethernet
EthernetEthernet
Ethernet
 
Hot standby router protocol (hsrp) using
Hot standby router protocol (hsrp) usingHot standby router protocol (hsrp) using
Hot standby router protocol (hsrp) using
 
Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardware
 
Introduction to data link layer
Introduction to data link layerIntroduction to data link layer
Introduction to data link layer
 

Andere mochten auch

DITEC - Fundamentals in Networking (updated)
DITEC - Fundamentals in Networking (updated)DITEC - Fundamentals in Networking (updated)
DITEC - Fundamentals in Networking (updated)Rasan Samarasinghe
 
DIWE - Working with MySQL Databases
DIWE - Working with MySQL DatabasesDIWE - Working with MySQL Databases
DIWE - Working with MySQL DatabasesRasan Samarasinghe
 
Tutorial transmission line details
Tutorial transmission line detailsTutorial transmission line details
Tutorial transmission line detailsDillian Jhair Staine
 
Network fundamental
Network fundamentalNetwork fundamental
Network fundamentalashrawi92
 
DITEC - Expose yourself to Internet & E-mail (second update)
DITEC - Expose yourself to Internet & E-mail (second update) DITEC - Expose yourself to Internet & E-mail (second update)
DITEC - Expose yourself to Internet & E-mail (second update) Rasan Samarasinghe
 
DITEC - Expose yourself to Internet & E-mail (updated)
DITEC - Expose yourself to Internet & E-mail (updated)DITEC - Expose yourself to Internet & E-mail (updated)
DITEC - Expose yourself to Internet & E-mail (updated)Rasan Samarasinghe
 
DITEC - Expose yourself to Internet & E-mail
DITEC - Expose yourself to Internet & E-mailDITEC - Expose yourself to Internet & E-mail
DITEC - Expose yourself to Internet & E-mailRasan Samarasinghe
 
DITEC - Programming with C#.NET
DITEC - Programming with C#.NETDITEC - Programming with C#.NET
DITEC - Programming with C#.NETRasan Samarasinghe
 
NIC AND HUB CONNECTING DEVICES
NIC AND HUB CONNECTING DEVICESNIC AND HUB CONNECTING DEVICES
NIC AND HUB CONNECTING DEVICESsreelakshmikv
 
Conducted and Wireless Media
Conducted and Wireless MediaConducted and Wireless Media
Conducted and Wireless MediaAngel G Diaz
 
DISE - Windows Based Application Development in C#
DISE - Windows Based Application Development in C#DISE - Windows Based Application Development in C#
DISE - Windows Based Application Development in C#Rasan Samarasinghe
 
DISE - Introduction to Software Engineering
DISE - Introduction to Software EngineeringDISE - Introduction to Software Engineering
DISE - Introduction to Software EngineeringRasan Samarasinghe
 
Presentation on topology by prince kushwaha(0902 ec101053) from RUSTAMJI INST...
Presentation on topology by prince kushwaha(0902 ec101053) from RUSTAMJI INST...Presentation on topology by prince kushwaha(0902 ec101053) from RUSTAMJI INST...
Presentation on topology by prince kushwaha(0902 ec101053) from RUSTAMJI INST...Rustamji Institute of Technology
 
Network topology....sajal
Network topology....sajalNetwork topology....sajal
Network topology....sajalSajal Das
 

Andere mochten auch (20)

DITEC - Software Engineering
DITEC - Software EngineeringDITEC - Software Engineering
DITEC - Software Engineering
 
DITEC - Fundamentals in Networking (updated)
DITEC - Fundamentals in Networking (updated)DITEC - Fundamentals in Networking (updated)
DITEC - Fundamentals in Networking (updated)
 
DIWE - Working with MySQL Databases
DIWE - Working with MySQL DatabasesDIWE - Working with MySQL Databases
DIWE - Working with MySQL Databases
 
CCNA Icnd110 s01l01
CCNA Icnd110 s01l01CCNA Icnd110 s01l01
CCNA Icnd110 s01l01
 
Tutorial transmission line details
Tutorial transmission line detailsTutorial transmission line details
Tutorial transmission line details
 
Network fundamental
Network fundamentalNetwork fundamental
Network fundamental
 
Csc339 – lecture 2 network fundamental
Csc339 – lecture 2 network fundamentalCsc339 – lecture 2 network fundamental
Csc339 – lecture 2 network fundamental
 
DITEC - Expose yourself to Internet & E-mail (second update)
DITEC - Expose yourself to Internet & E-mail (second update) DITEC - Expose yourself to Internet & E-mail (second update)
DITEC - Expose yourself to Internet & E-mail (second update)
 
DITEC - Expose yourself to Internet & E-mail (updated)
DITEC - Expose yourself to Internet & E-mail (updated)DITEC - Expose yourself to Internet & E-mail (updated)
DITEC - Expose yourself to Internet & E-mail (updated)
 
DITEC - Expose yourself to Internet & E-mail
DITEC - Expose yourself to Internet & E-mailDITEC - Expose yourself to Internet & E-mail
DITEC - Expose yourself to Internet & E-mail
 
DITEC - Programming with C#.NET
DITEC - Programming with C#.NETDITEC - Programming with C#.NET
DITEC - Programming with C#.NET
 
NIC AND HUB CONNECTING DEVICES
NIC AND HUB CONNECTING DEVICESNIC AND HUB CONNECTING DEVICES
NIC AND HUB CONNECTING DEVICES
 
Conducted and Wireless Media
Conducted and Wireless MediaConducted and Wireless Media
Conducted and Wireless Media
 
01. network topologies & cable
01. network topologies & cable01. network topologies & cable
01. network topologies & cable
 
DISE - Windows Based Application Development in C#
DISE - Windows Based Application Development in C#DISE - Windows Based Application Development in C#
DISE - Windows Based Application Development in C#
 
DISE - Introduction to Software Engineering
DISE - Introduction to Software EngineeringDISE - Introduction to Software Engineering
DISE - Introduction to Software Engineering
 
DISE - Programming Concepts
DISE - Programming ConceptsDISE - Programming Concepts
DISE - Programming Concepts
 
DITEC - E-Commerce & ASP.NET
DITEC - E-Commerce & ASP.NETDITEC - E-Commerce & ASP.NET
DITEC - E-Commerce & ASP.NET
 
Presentation on topology by prince kushwaha(0902 ec101053) from RUSTAMJI INST...
Presentation on topology by prince kushwaha(0902 ec101053) from RUSTAMJI INST...Presentation on topology by prince kushwaha(0902 ec101053) from RUSTAMJI INST...
Presentation on topology by prince kushwaha(0902 ec101053) from RUSTAMJI INST...
 
Network topology....sajal
Network topology....sajalNetwork topology....sajal
Network topology....sajal
 

Ähnlich wie DITEC - Fundamentals in Networking

NFPhysical Layer.pptx
NFPhysical Layer.pptxNFPhysical Layer.pptx
NFPhysical Layer.pptxmmmm11111
 
Network Topologies
Network Topologies Network Topologies
Network Topologies Ali Haider
 
Introduction of network
Introduction of networkIntroduction of network
Introduction of networksharone singh
 
Network topologies
Network topologiesNetwork topologies
Network topologiesvideo4shared
 
01 coms 525 tcpip - networking concepts review
01   coms 525 tcpip - networking concepts review01   coms 525 tcpip - networking concepts review
01 coms 525 tcpip - networking concepts reviewPalanivel Kuppusamy
 
Module 1 Introduction to Computer Networks.pptx
Module 1 Introduction to Computer Networks.pptxModule 1 Introduction to Computer Networks.pptx
Module 1 Introduction to Computer Networks.pptxAASTHAJAJOO
 
Topic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer networkTopic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer networkAtika Zaimi
 
Network topologies
Network topologiesNetwork topologies
Network topologiesChirag Nag
 
Introduction to data communications
Introduction to data communicationsIntroduction to data communications
Introduction to data communicationsArunaSekar1
 
Network topologies
Network topologiesNetwork topologies
Network topologiesNorah Saad
 
Cyber security training at ist apr-18
Cyber security training at ist apr-18Cyber security training at ist apr-18
Cyber security training at ist apr-18Sagar Walvekar
 

Ähnlich wie DITEC - Fundamentals in Networking (20)

NFPhysical Layer.pptx
NFPhysical Layer.pptxNFPhysical Layer.pptx
NFPhysical Layer.pptx
 
Network Topologies.pdf
Network Topologies.pdfNetwork Topologies.pdf
Network Topologies.pdf
 
Network Topologies
Network Topologies Network Topologies
Network Topologies
 
Introduction of network
Introduction of networkIntroduction of network
Introduction of network
 
Network topologies
Network topologiesNetwork topologies
Network topologies
 
Network topologies
Network topologiesNetwork topologies
Network topologies
 
Network topologies
Network topologiesNetwork topologies
Network topologies
 
01 coms 525 tcpip - networking concepts review
01   coms 525 tcpip - networking concepts review01   coms 525 tcpip - networking concepts review
01 coms 525 tcpip - networking concepts review
 
Network Topologies
Network TopologiesNetwork Topologies
Network Topologies
 
Module 1 Introduction to Computer Networks.pptx
Module 1 Introduction to Computer Networks.pptxModule 1 Introduction to Computer Networks.pptx
Module 1 Introduction to Computer Networks.pptx
 
Topic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer networkTopic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer network
 
Network topologies
Network topologiesNetwork topologies
Network topologies
 
Network protocol
Network protocolNetwork protocol
Network protocol
 
Unit2
Unit2Unit2
Unit2
 
Introduction to data communications
Introduction to data communicationsIntroduction to data communications
Introduction to data communications
 
Networks PPT
Networks PPTNetworks PPT
Networks PPT
 
Network topologies
Network topologiesNetwork topologies
Network topologies
 
Cyber security training at ist apr-18
Cyber security training at ist apr-18Cyber security training at ist apr-18
Cyber security training at ist apr-18
 
Network topologies
Network topologiesNetwork topologies
Network topologies
 
osi
osi osi
osi
 

Mehr von Rasan Samarasinghe

Managing the under performance in projects.pptx
Managing the under performance in projects.pptxManaging the under performance in projects.pptx
Managing the under performance in projects.pptxRasan Samarasinghe
 
Agile project management with scrum
Agile project management with scrumAgile project management with scrum
Agile project management with scrumRasan Samarasinghe
 
Application of Unified Modelling Language
Application of Unified Modelling LanguageApplication of Unified Modelling Language
Application of Unified Modelling LanguageRasan Samarasinghe
 
Advanced Web Development in PHP - Understanding REST API
Advanced Web Development in PHP - Understanding REST APIAdvanced Web Development in PHP - Understanding REST API
Advanced Web Development in PHP - Understanding REST APIRasan Samarasinghe
 
Advanced Web Development in PHP - Understanding Project Development Methodolo...
Advanced Web Development in PHP - Understanding Project Development Methodolo...Advanced Web Development in PHP - Understanding Project Development Methodolo...
Advanced Web Development in PHP - Understanding Project Development Methodolo...Rasan Samarasinghe
 
Advanced Web Development in PHP - Code Versioning and Branching with Git
Advanced Web Development in PHP - Code Versioning and Branching with GitAdvanced Web Development in PHP - Code Versioning and Branching with Git
Advanced Web Development in PHP - Code Versioning and Branching with GitRasan Samarasinghe
 
DIWE - Using Extensions and Image Manipulation
DIWE - Using Extensions and Image ManipulationDIWE - Using Extensions and Image Manipulation
DIWE - Using Extensions and Image ManipulationRasan Samarasinghe
 
DIWE - Programming with JavaScript
DIWE - Programming with JavaScriptDIWE - Programming with JavaScript
DIWE - Programming with JavaScriptRasan Samarasinghe
 
DIWE - Coding HTML for Basic Web Designing
DIWE - Coding HTML for Basic Web DesigningDIWE - Coding HTML for Basic Web Designing
DIWE - Coding HTML for Basic Web DesigningRasan Samarasinghe
 
DIWE - Multimedia Technologies
DIWE - Multimedia TechnologiesDIWE - Multimedia Technologies
DIWE - Multimedia TechnologiesRasan Samarasinghe
 
Esoft Metro Campus - Programming with C++
Esoft Metro Campus - Programming with C++Esoft Metro Campus - Programming with C++
Esoft Metro Campus - Programming with C++Rasan Samarasinghe
 
Esoft Metro Campus - Certificate in c / c++ programming
Esoft Metro Campus - Certificate in c / c++ programmingEsoft Metro Campus - Certificate in c / c++ programming
Esoft Metro Campus - Certificate in c / c++ programmingRasan Samarasinghe
 
Esoft Metro Campus - Certificate in java basics
Esoft Metro Campus - Certificate in java basicsEsoft Metro Campus - Certificate in java basics
Esoft Metro Campus - Certificate in java basicsRasan Samarasinghe
 
DISE - Software Testing and Quality Management
DISE - Software Testing and Quality ManagementDISE - Software Testing and Quality Management
DISE - Software Testing and Quality ManagementRasan Samarasinghe
 
DISE - Introduction to Project Management
DISE - Introduction to Project ManagementDISE - Introduction to Project Management
DISE - Introduction to Project ManagementRasan Samarasinghe
 

Mehr von Rasan Samarasinghe (20)

Managing the under performance in projects.pptx
Managing the under performance in projects.pptxManaging the under performance in projects.pptx
Managing the under performance in projects.pptx
 
Agile project management with scrum
Agile project management with scrumAgile project management with scrum
Agile project management with scrum
 
Introduction to Agile
Introduction to AgileIntroduction to Agile
Introduction to Agile
 
IT Introduction (en)
IT Introduction (en)IT Introduction (en)
IT Introduction (en)
 
Application of Unified Modelling Language
Application of Unified Modelling LanguageApplication of Unified Modelling Language
Application of Unified Modelling Language
 
Advanced Web Development in PHP - Understanding REST API
Advanced Web Development in PHP - Understanding REST APIAdvanced Web Development in PHP - Understanding REST API
Advanced Web Development in PHP - Understanding REST API
 
Advanced Web Development in PHP - Understanding Project Development Methodolo...
Advanced Web Development in PHP - Understanding Project Development Methodolo...Advanced Web Development in PHP - Understanding Project Development Methodolo...
Advanced Web Development in PHP - Understanding Project Development Methodolo...
 
Advanced Web Development in PHP - Code Versioning and Branching with Git
Advanced Web Development in PHP - Code Versioning and Branching with GitAdvanced Web Development in PHP - Code Versioning and Branching with Git
Advanced Web Development in PHP - Code Versioning and Branching with Git
 
DIWE - Using Extensions and Image Manipulation
DIWE - Using Extensions and Image ManipulationDIWE - Using Extensions and Image Manipulation
DIWE - Using Extensions and Image Manipulation
 
DIWE - File handling with PHP
DIWE - File handling with PHPDIWE - File handling with PHP
DIWE - File handling with PHP
 
DIWE - Advanced PHP Concepts
DIWE - Advanced PHP ConceptsDIWE - Advanced PHP Concepts
DIWE - Advanced PHP Concepts
 
DIWE - Fundamentals of PHP
DIWE - Fundamentals of PHPDIWE - Fundamentals of PHP
DIWE - Fundamentals of PHP
 
DIWE - Programming with JavaScript
DIWE - Programming with JavaScriptDIWE - Programming with JavaScript
DIWE - Programming with JavaScript
 
DIWE - Coding HTML for Basic Web Designing
DIWE - Coding HTML for Basic Web DesigningDIWE - Coding HTML for Basic Web Designing
DIWE - Coding HTML for Basic Web Designing
 
DIWE - Multimedia Technologies
DIWE - Multimedia TechnologiesDIWE - Multimedia Technologies
DIWE - Multimedia Technologies
 
Esoft Metro Campus - Programming with C++
Esoft Metro Campus - Programming with C++Esoft Metro Campus - Programming with C++
Esoft Metro Campus - Programming with C++
 
Esoft Metro Campus - Certificate in c / c++ programming
Esoft Metro Campus - Certificate in c / c++ programmingEsoft Metro Campus - Certificate in c / c++ programming
Esoft Metro Campus - Certificate in c / c++ programming
 
Esoft Metro Campus - Certificate in java basics
Esoft Metro Campus - Certificate in java basicsEsoft Metro Campus - Certificate in java basics
Esoft Metro Campus - Certificate in java basics
 
DISE - Software Testing and Quality Management
DISE - Software Testing and Quality ManagementDISE - Software Testing and Quality Management
DISE - Software Testing and Quality Management
 
DISE - Introduction to Project Management
DISE - Introduction to Project ManagementDISE - Introduction to Project Management
DISE - Introduction to Project Management
 

Kürzlich hochgeladen

Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 

Kürzlich hochgeladen (20)

Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 

DITEC - Fundamentals in Networking

  • 1. Diploma in Information Technology Module IV: Fundamentals in Networking By: Rasan Samarasinghe Esoft Computer Studies (pvt) Ltd. No 68/1, First Floor, Main Street, Pallegama, Embilipitiya.
  • 2. Content 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. What is a computer network? Types of computer networks Personal Area Network Local Area Network Metropolitan Area Network Wide Area Network Networking Topologies Physical Topologies Physical point to point Physical bus topology Physical ring topology Physical star topology Physical mesh topology Physical hybrid topology Logical Topologies 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. 26. 27. 28. 29. 30. Logical bus topology Logical ring topology Switching implemented… Networking Cables Coaxial Cables Twisted Pair Cables Fiber Optic Cables Networking Devices NIC-Network interface card Hub Network Switch Router Bridge IP Address Activities
  • 3. What is a computer network? Computer network is an interconnection of two or more computers and other devices. Devices on a network can be linked by cables, telephone lines, radio waves or infrared waves.
  • 4. Advantages of computer networks • • • • Files sharing Devices sharing Communication Services sharing
  • 5. Disadvantages of computer networks • Virus attacks • Hacker attacks • Failures of a server may effect to the entire network
  • 6. Types of computer networks Based on the network size, networks can be categorized into several types 1. 2. 3. 4. Personal Area Network (PAN) Local Area Network (LAN) Metropolitan Area Network (MAN) Wide Area Network (WAN)
  • 7. Personal Area Network (PAN) PAN is wireless network connected with mobile devices such as mobile phones, PDAs, Bluetooth printers, Headsets, etc. The technology using in here is Bluetooth or infrared.
  • 8. Local Area Network (LAN) • Coverage is about within 1km. • Ex: a company network within a building or may be within two or more buildings
  • 9. Metropolitan Area Network (MAN) • Coverage is about more than 1km and less than 10km. • Ex: A network of a large town
  • 10. Wide Area Network (WAN) • Coverage is about more than 10km. • Satellites may be use to expand this network. • Ex: Internet
  • 11. Networking Topologies Topology is the way that we connect computers and other devices. In other words topology is the map of the network
  • 12. Networking Topologies Topologies can be divided into two sections 1. Physical Topologies 2. Logical Topologies
  • 13. Physical Topologies Physical arrangement of the network is known as physical topology Ex: • • • • • • Physical point to point topology Physical bus topology Physical ring topology Physical star topology Physical mesh topology Physical hybrid topology
  • 14. Physical Point to Point Topology This is the simplest topology that uses a permanent link between two end devices. It also known as peer to peer topology.
  • 15. Physical Point to Point Topology Characteristics • Using twisted pair cables • RJ-45 connectors • Maximum segment length is 100m
  • 16. Physical Point to Point Topology Advantages • Low cost • No additional devices or servers needed • Easy to implement
  • 17. Physical Point to Point Topology Disadvantages • Maximum 2 computers can be connected • Cable breaks will effect to the whole network
  • 18. Physical Bus Topology Each computers and devices are connected to a single cable called “backbone”.
  • 19. Physical Bus Topology Characteristics • Channel accessing method is CSMA/CD (carrier sense multiple access / collision detection) • Both thin net and thick net coaxial cables are used • Segment length of thin net coaxial cable is 200m • Segment length of thick net coaxial cable is 500m • BNC Connectors are used • Maximum data transfer speed is 10mbps
  • 20. Physical Bus Topology Advantages • Easy to implement • Easy to expand • Low cost (no additional devices)
  • 21. Physical Bus Topology Disadvantages • Maximum speed is 10mbps only • Number of PCs will effect to the performance of the network • If backbone breaks, the entire network will down • Not suitable for heavy traffic • Hard to find faults of the network
  • 22. Physical Ring Topology Each computers and devices are connected each other forming a large circle.
  • 23. Physical Ring Topology Characteristics • Channel accessing method is “Token Passing” • Using coaxial or twisted pair cables • Connectors used BNC or RJ-45 • Maximum data transfer speed is between 4 16mbps
  • 24. Physical Ring Topology Advantages • No collisions are occurred • No need of a server • Even the load of the network increases, it still perform better than bus topology.
  • 25. Physical Ring Topology Disadvantages • If the cable breaks, entire network will be down • If one station goes down, it will be affected to the entire network. • Low speed
  • 26. Physical Star Topology All the components of the network are connected to the central device called hub or switch
  • 27. Physical Star Topology Characteristics • Twisted pair cables are using • Connectors are RJ-45 • Channel accessing method is depends on the central device
  • 28. Physical Star Topology Advantages • Higher data transfer speed than previous topologies. 100 – 1000mbps • Central device make it easy to manage the network • Cable breaks will not effect to the entire network • Easy to expand • Can connect more computers and devices
  • 29. Physical Star Topology Disadvantages • Single point of failure type network • The central device using is increases the cost of the network
  • 31. Physical Mesh Topology Each networking node are interconnected with each other
  • 32. Physical Mesh Topology Characteristics • It allowing most transmissions to be distributed, even one of the connections goes down • Uses in the internet
  • 33. Physical Mesh Topology Advantages • Can use for high traffic • Cable breaks will not effect to the communication • Expansions and modifications can be done without disrupting other devices
  • 34. Physical Mesh Topology Disadvantages • Overall cost of the network is high • Setup, maintaining and administrating this network is very tough
  • 35. Physical Hybrid Topology The combination of more topologies is known as hybrid topology
  • 36. Physical Hybrid Topology Advantages • Flexible to expand and modify • Very effective Disadvantages • Very complex • Costly infrastructure
  • 37. Logical Topologies Logical topology represents the way that data travel through the computer Ex: • Logical bus topology • Logical ring topology • Switching implemented as physical star
  • 38. Logical Bus Topology In here, the central device called hub works as data packet distributer similar in action of the bus topology Hub
  • 39. Logical Bus Topology Characteristics • Channel accessing method is CSMA/CD • Cable using is twisted pair • Connector using is RJ-45 • Data transfer speed is 10mbps • Cable breaks will not effect to the entire network • Single point of failure type network
  • 40. Logical Ring Topology The central device called MSAU acts very similar to the ring architecture when data packets are travelling. MSAU
  • 41. Logical Ring Topology Characteristics • Channel accessing method is token passing • Cable type is twisted pair • Connectors are RJ-45 • Maximum data transferring speed is 16mbps • Cable breaks will not affect to the entire network • No collisions occurred • Single point of failure type network
  • 42. Switching implemented as physical star The central device using is networking switch. It receives data packets from end devices and forwarding them towards the particular destination device or computer. Switch
  • 43. Switching implemented as physical star Characteristics • Channel accessing method is switching • Maximum data transferring speed is 1001000mbps • Using twisted pair cables • Using RJ-45 connectors • Cable breaks will not effect to the whole network • Single point of failure type network
  • 44. Networking Cables There are several kind of networking cables • Coaxial Cables • Twisted Pair Cables • Fiber Optic Cables
  • 45. Coaxial Cables Coaxial cables are two types • Thin net coaxial cables • Thick net coaxial cables Outer cover Outer copper shield Inner inductor Inner insulator
  • 46. Thin net coaxial cables • Use to connect computers and devices in bus topology and ring topology • Well flexible • Maximum segment length is 200m (185m)
  • 47. Thick net coaxial cables • Used as backbone cables and outdoor laying • Not well flexible • Maximum segment length is 500m (485m)
  • 49. Twister Pair Cables • Most popular network cable in networking • There are two types called: 1. Unshielded twisted pair cables 2. Shielded twisted pair cables • Maximum segment length is 100m • Data transferring speed varied on cable categories
  • 50. Unshielded Twister Pair Cables (UTP)
  • 51. Shielded Twister Pair Cables (STP)
  • 52. Twisted pair cable categories Category Speed CAT 1 Voice grade CAT 2 4 Mbps CAT 3 16Mbps CAT 4 100Mbps CAT 5 1000Mbps CAT 5e 1000Mbps CAT 6 1000Mbps CAT 7 1000Mbps
  • 53. Twisted pair cable connectors RJ-45 Connectors RJ-45 Base
  • 54. Twisted Pair / RJ-45 Cabling Types
  • 55. Fiber Optic Cables • Fiber optic cables uses light pulses to send and receive data. • Have very higher data transfer speed. Ex: 10Gbps or 100Gbps • There are two types of fiber optic cables mainly – Single Mode Fiber (SMF) – Multi Mode Fiber (MMF)
  • 56. Single Mode Fiber Optic Cables • Transmit one light pulse at a time for one direction • Because of this reason devices need two cables for full duplex communication
  • 57. Multi Mode Fiber Optic Cables • Transmit more than one light pulse • Because of that full duplex communication can achieve using a single cable • These cables are not suitable for long distance data transfer
  • 59. Fiber Optic Media Converters
  • 61. Networking Devices • • • • • NIC-Network interface card Hub Network Switch Router Bridge
  • 63. Network Interface Card (NIC) • Every computer should have a network interface card to connect to the network • There are several things to consider before buying a NIC 1. Network interface (connectors) 2. Internal interface (PCI, USB) 3. Network architecture
  • 64. Hub
  • 65. Hub • Hub is use to connect all computers and other devices together • Hub is a broadcasting device • Maximum data transfer speed is 10Mbps • There are two types of hubs: 1. Active Hubs 2. Passive Hubs
  • 66. Active Hubs When active hubs receive a signal in one port, it boost the signal and remove the electromagnetic noises before send that to other devices.
  • 67. Passive Hubs In passive hubs, it do not amplify the signal or remove noise before send data to other computers
  • 68. Network Switch Switches are also use to connect computers in physical star topology and these devices are intelligent than hubs.
  • 69. How network switch works? 1. Switches maintain a small table in there RAM to identify computers that related with the port numbers. 2. When switch receives a data packet, it reads the packet header to identify destination address. 3. After that it will search the entire table to find the related port for that address. 4. Then it can directly forward that data packet to the related computer rather than broadcasting.
  • 70. Network Switch Types • Layer 2 switches (unmanaged switches) Using MAC addresses of connected devices. • Layer 3 switches (managed switches) Using IP addresses of connected devices. Providing more features than layer 2 switches and expensive.
  • 72. Routers • Routers are use to connect networks together. • Routers are more intelligent devices and it use IP addresses to deal with the packet. • Routers are responsible for: Identify proper networks and sub networks. Forward data packets using the best path. Destroying TTL data packets. Etc
  • 73. Bridge Bridge can use to connect different topologies together or can use to connect different cable types together.
  • 74. IP Address (Internet Protocol) • IP address is an unique address that use to identify computers and devices. • There are two IP versions called IPv4 and IPv6 • IPv4 is the common version that used in most networks. • IPv4 is made up with 4 decimal numbers and each are separated by dots. (###.###.###.###) and each number can be in between 0 to 255. • IP versions, rules and regulations are created and maintain by IANA (Internet Assigned Number Authority)
  • 75. IP Classes (IPv4) • • • • • Class A Class B Can use in our networks Class C Class D (reserved for multicasting purposes) Class E (reserved for experimental purposes)
  • 76. IP Address IP Addresses are made up with two sections 1. Network Address (network portion) 2. Host Address (host portion) Class A N H H Class B H N N H Class C H Class D N N N N N N Class E H N N N H H
  • 77. IP Ranges in each classes IP Class First Octate Received Bits IP Address Range (min-max) Class A 0####### 00000000-01111111 (1-126) Class B 10###### Class C 1-126 0-255 0-255 0-255 10000000-10111111 (128-191) 128-191 0-255 0-255 0-255 110##### 11000000-11011111 (192-223) 192-223 0-255 0-255 0-255 Class D 1110#### 11100000-11101111 (224-239) 224-239 0-255 0-255 0-255 Class E 1111##### 11110000-11111111 (240-255) 240-255 0-255 0-255 0-255
  • 78. Activities Assigning IP address to connect two computers Sharing Files Sharing Printer