SlideShare ist ein Scribd-Unternehmen logo
1 von 83
Downloaden Sie, um offline zu lesen
Networking
Arjun
Rahul
Sheeba
Tushar
ONGC
July 6, 2012
Outline
Introduction
ONGC
Our Experience
Network Devices
Modems
FDDI
802.3 - Ethernet
Networks
Topology
Network Interface Cards
Types of Network
IP Addressing
DNS
2 of 83
Acknowledgement
We like to thank Mrs Chaddha for her guidance throughout our
internship.
3 of 83
ONGC
Oil and Natural Gas Corporation Limited (ONGC) is an Indian
state-owned oil and gas company headquartered in Dehradun, India.
It is one of the largest Asia-based oil and gas exploration and
production companies, and produces around 77% of India’s crude oil
(equivalent to around 30% of the country’s total demand) and around
81% of its natural gas. ONGC is one of the largest publicly traded
companies by market capitalization in India. It is ranked 361st in the
2011 Fortune Global 500 list and is among the Top 250 Global Energy
Company by Platts.
4 of 83
Our Experience (1)
Through our intership at ONGC we were exposed to the inner
working of the server room at Telbhawan. We examined the working
of the following servers
• AD - Active Director, used for authentication of employees of the
ONGC by verifying theirs CPF numbers.
• DHCP - Dynamic Host Control Protocol, used to allocated
dynamic IP address.
• Anti-virus - It is used for verifying if the client has anti-virus
installed in it.
• IWSS - It is used for scanning the computers in the network
• Blue Coat - It is the Internet distribution proxy
5 of 83
Our Experience (2)
• WSUS - Windows System Update Server, used to update the
software of all the computers in the network.
• Websense - It filters the computers for possible threat
The ISP provider to ONGC is BSNL. Four lease lines of 2 Kbps is
connecting Delhi to Dehradun. The main router used in ONGC is IAS
from Cisco. At Dehradun, various routers & switch of Cisco are used.
The intranet of ONGC at Telbhawan is connected to KDMIP though
L3 switches. The optical fiber is extended to City Hospital.
We then visited KDMIP which uses SATCOM for communication.
The satellite works in the Ka Band channel with 3 GHz.
6 of 83
Modem (1)
A modem (modulator-demodulator) is a device that modulates an
analog carrier signal to encode digital information, and also
demodulates such a carrier signal to decode the transmitted
information. The goal is to produce a signal that can be transmitted
easily and decoded to reproduce the original digital data.
The most familiar example is a voice band modem that turns the
digital data of a personal computer into modulated electrical signals
in the voice frequency range of a telephone channel. These signals
can be transmitted over telephone lines and demodulated by another
modem at the receiver side to recover the digital data.
7 of 83
Modem (2)
Figure: Modem
Modems are generally classified by the amount of data they can send
in a given unit of time, usually expressed in bits per second (bit/s, or
bps). Modems can alternatively be classified by their symbol rate,
measured in baud. The baud unit denotes symbols per second, or the
number of times per second the modem sends a new signal. Modems
are of two types :
8 of 83
Modem (3)
Figure: Internal Modem
Figure: External Modem
9 of 83
Fiber Distributed Data Interface (1)
The Fiber Distributed Data Interface (FDDI) topology is ring with
two counter rotating rings for reliability with no hubs. Cable type is
fiber-optic. Connectors are specialized. The media access method is
token passing. The maximum length is 100 kilometers. The
maximum number of nodes on the network is 500. Speed is 100
Mbps. FDDI is normally used as a backbone to link other networks.
A typical FDDI network can include servers, concentrators, and links
to other networks.
Devices called concentrators provide functions similar to hubs. Most
concentrators use dual attachment station network cards but single
attachment concentrators may be used to attach more workstations
to the network.
10 of 83
Fiber Distributed Data Interface (2)
Figure: FDDI
11 of 83
Fiber Distributed Data Interface (3)
FDDI token passing allows multiple frames to circulate around the
ring at the same time. Priority levels of a data frame and token can
be set to allow servers to send more data frames. Time sensitive data
may also be given higher priority. The second ring in a FDDI network
is a method of adjusting when there are breaks in the cable. The
primary ring is normally used, but if the nearest downstream neighbor
stops responding the data is sent on the secondary ring in attempt to
reach the computer. Therefore a break in the cable will result in the
secondary ring being used.
12 of 83
Fiber Distributed Data Interface (4)
Figure: FDDI
13 of 83
Fiber Distributed Data Interface (5)
There are two network cards which are:
• Dual attachment stations (DAS) used for servers and concentrators
are attached to both rings.
• Single Attachment stations (SAS) attached to one ring and used
to attach workstations to concentrators.
A router or switch can link an FDDI network to a local area network
(LAN). Normally FDDI is used to link LANs together since it covers
long distances.
14 of 83
Ethernet (1)
In 1973, at Xerox Corporations Palo Alto Research Center (more
commonly known as PARC), researcher Bob Metcalfe designed and
tested the first Ethernet network. While working on a way to link
Xeroxs ”Alto” computer to a printer, Metcalfe developed the physical
method of cabling that connected devices on the Ethernet as well as
the standards that governed communication on the cable. Ethernet
has since become the most popular and most widely deployed network
technology in the world. Many of the issues involved with Ethernet
are common to many network technologies, and understanding how
Ethernet addressed these issues can provide a foundation that will
improve your understanding of networking in general.
15 of 83
Ethernet (2)
The Ethernet standard has grown to encompass new technologies as
computer networking has matured, but the mechanics of operation for
every Ethernet network today stem from Metcalfes original design.
The original Ethernet described communication over a single cable
shared by all devices on the network. Once a device attached to this
cable, it had the ability to communicate with any other attached
device. This allows the network to expand to accommodate new
devices without requiring any modification to those devices already on
the network.
16 of 83
17 of 83
Ethernet Cabling (1)
Figure: Ethernet Cabling
18 of 83
Ethernet Cabling (2)
Figure: The most common kinds of Ethernet cabling
19 of 83
Network Topologies
• Topology - Physical and logical network layout
◦ Physical actual layout of the computer cables and other network
devices
◦ Logical the way in which the network appears to the devices that use
it.
• Common topologies
◦ Bus, ring, star, mesh and wireless
20 of 83
Bus Topology
• Uses a trunk or backbone to which all of the computers on the
network connect.
• Uses a trunk or backbone to which all of the computers on the
network connect.
• Coaxial cablings ( 10Base-2, 10Base5) were popular options years
ago.
21 of 83
Advantages
• Cable faults are easily located,
making troubleshooting easier
• Ring network are moderately
easy to install
Disadvantages
• Expansion to the network can
cause network disruption
• A single break in the cable can
disrupt the entire network
Figure: Bus Topology
22 of 83
Star Topology
• All computers/devices connect to a central device called hub or
switch.
• Each device requires a single cable
• point-to-point connection between the device and hub.
• Most widely implemented
• Hub is the single point of failure
23 of 83
Figure: Star Topology
24 of 83
Advantages
• Easily expanded without
disruption to the network
• Cable failure affects only a
single user
• Easy to troubleshoot & isolate
problems
Disadvantages
• Requires more cable
• A central connecting device
allows for a single point of
failure
• More difficult to implement
25 of 83
Mesh Topology
• Each computer connects to every other
• High level of redundancy.
• Rarely used
◦ Wiring is very complicated
◦ Cabling cost is high
◦ Troubleshooting a failed cable is tricky
◦ A variation hybrid mesh create point to point connection between
specific network devices, often seen in WAN implementation.
26 of 83
Advantages
• Provides redundant path
between devices
• The network can be expanded
without to current uses
Disadvantages
• Requires more cable than the
other LAN topologies
• Complicated
Figure: Mesh Topology
27 of 83
Wireless
• Do not require physical cabling
• Particularly useful for remote access for laptop users
• Eliminate cable faults and cable breaks.
• Signal interference and security issue.
28 of 83
Advantages
• Allows for wireless remote
access
• Network can be expanded
without disruption to current
users
Disadvantages
• Potential security issues
associated with wireless
transmission
• Limited speed in comparison to
other network topologies
Figure: Wireless
29 of 83
NIC
• A network interface card, more commonly referred to as a NIC, is a
device that allows computers to be joined together in a LAN, or
local area network .
• The network interface card acts as the liaison for the machine to
both send and receive data on the LAN .
• In computer networking, a NIC provides the hardware interface
between a computer and a network.
30 of 83
Figure: Network cards are typically available in 10/100/1000 Mbit/s
varieties. This means they can support a notional maximum transfer rate of
10, 100 or 1000 Megabits per second
31 of 83
NIC
...Need
• Most computer networks transfer data across a medium at a fixed
rate, often faster than the speed at which computers can process
individual bits.
• To accommodate the mismatch in speed, each computer attached
to a network contain special purpose hardware known as a network
interface card (NIC).
• The NIC functions like an I/O device: it is built for a specific
network technology.
• It handles the details of frame transmission or reception without
requiring the CPU to process each bit.
32 of 83
NIC (1)
...Working
• A computer or device on a network can be reached by its MAC
(media access control) address through the NIC card.
• Every Ethernet network card has a unique 48-bit serial number
called a MAC address, which is stored in ROM carried on the card.
• The MACs on the network are used to direct traffic between the
computers.
• An example of a MAC address: A1B2C3D4E5F6
• The first 6 hex digits in the MAC address is the OUI
(organizationally unique identifier), assigned by the IEEE to each
manufacturer (e.g. Cisco, Intel etc).
33 of 83
NIC (2)
...Working
• The rest of the MAC address can be assigned in any way by the
manufacturer to the individual networking devices that it
manufactures
34 of 83
NIC
...Port
• The back plate of the network interface card features a port that
looks similar to a phone jack, but is slightly larger.
• A network card typically has a twisted pair, BNC, or AUI socket
where the network cable is connected, and a few LEDs to inform
the user of whether the network is active, and whether or not there
is data being transmitted on it.
• That port accommodates an Ethernet cable, which resembles a
thicker version of a standard telephone line.
35 of 83
36 of 83
Figure: Network Interface Card for connection of a computer to an Ethernet
Network
37 of 83
NIC
...on a Network
• The card implements the electronic circuitry required to
communicate using a specific physical layer and data link layer
standard such as Ethernet or token ring.
• This provides a base for a full network protocol stack, allowing
communication among small groups of computers on the same
LAN and large-scale network communications through routable
protocols, such as IP.
38 of 83
Types of Network
• Local Area Network
• Wide Area Netwok
• Metropolitan Area Network
• Wireless Networks
• Home Networks
• Internetworks
39 of 83
40 of 83
LAN
A LAN connects network devices over a relatively short distance. A
networked office building, school, or home usually contains a single
LAN, though sometimes one building will contain a few small LANs
(perhaps one per room), and occasionally a LAN will span a group of
nearby buildings.
In TCP/IP networking, a LAN is often but not always implemented as
a single IP subnet.
41 of 83
Figure: An isolated IAN connecting 12 computers to a hub in a closet
42 of 83
WAN
As the term implies, a WAN spans a large physical distance. The
Internet is the largest WAN, spanning the Earth.
A WAN is a geographically-dispersed collection of LANs. A network
device called a router connects LANs to a WAN. In IP networking, the
router maintains both a LAN address and a WAN address.
43 of 83
44 of 83
Wireless (1)
Wireless network refers to any type of computer network that is not
connected by cables of any kind. It is a method by which homes,
telecommunications networks and enterprise (business) installations
avoid the costly process of introducing cables into a building, or as a
connection between various equipment locations. Wireless
telecommunications networks are generally implemented and
administered using a transmission system called radio waves. This
implementation takes place at the physical level (layer) of the OSI
model network structure.
45 of 83
Wireless (2)
Figure: Wireless
46 of 83
Types of wireless networks (1)
• Wireless PAN
◦ Wireless personal area networks (WPANs) interconnect devices within
a relatively small area that is generally within a person’s reach. For
example, both Bluetooth radio and invisible infrared light provides a
WPAN for interconnecting a headset to a laptop. Wi-Fi PANs are
becoming commonplace as equipment designers start to integrate
Wi-Fi into a variety of consumer electronic devices.
47 of 83
Types of wireless networks (2)
• Wireless LANs
◦ A wireless local area network (WLAN) links two or more devices over
a short distance using a wireless distribution method, usually providing
a connection through an access point for Internet access. The use of
spread-spectrum or OFDM technologies may allow users to move
around within a local coverage area, and still remain connected to the
network. Products using the IEEE 802.11 WLAN standards are
marketed under the Wi-Fi brand name. Fixed wireless technology
implements point-to-point links between computers or networks at
two distant locations, often using dedicated microwave or modulated
laser light beams over line of sight paths. It is often used in cities to
connect networks in two or more buildings without installing a wired
link.
48 of 83
Types of wireless networks (3)
• Wireless mesh network
◦ A wireless mesh network is a wireless network made up of radio nodes
organized in a mesh topology. Each node forwards messages on behalf
of the other nodes. Mesh networks can ”self heal”, automatically
re-routing around a node that has lost power.
• Wireless MAN
◦ Wireless metropolitan area networks are a type of wireless network
that connects several wireless LANs. WiMAX is a type of Wireless
MAN and is described by the IEEE 802.16 standard.
49 of 83
Types of wireless networks (4)
• Wireless WAN
◦ Wireless wide area networks are wireless networks that typically cover
large areas, such as between neighboring towns and cities, or city and
suburb. These networks can be used to connect branch offices of
business or as a public internet access system. The wireless
connections between access points are usually point to point
microwave links using parabolic dishes on the 2.4GHz band, rather
than omnidirectional antennas used with smaller networks. A typical
system contains base station gateways, access points and wireless
bridging relays
50 of 83
Other Types of Area Networks (1)
• Metropolitan Area Network - a network spanning a physical area
larger than a LAN but smaller than a WAN, such as a city. A
MAN is typically owned an operated by a single entity such as a
government body or large corporation.
• Campus Area Network - a network spanning multiple LANs but
smaller than a MAN, such as on a university or local business
campus.
• Storage Area Network - connects servers to data storage devices
through a technology like Fibre Channel.
• System Area Network - links high-performance computers with
high-speed connections in a cluster configuration. Also known as
Cluster Area Network.
51 of 83
OSI Model
Virtually all networks in use today are based in some fashion on the
Open Systems Interconnection (OSI) standard. OSI was developed in
1984 by the International Organization for Standardization (ISO), a
global federation of national standards organizations representing
approximately 130 countries.
52 of 83
53 of 83
The Layers
Think of the seven layers as the assembly line in the computer. At
each layer, certain things happen to the data that prepare it for the
next layer.
54 of 83
Application Set
• Application - This is the layer that actually interacts with the
operating system or application whenever the user chooses to
transfer files, read messages or perform other network-related
activities.
• Presentation - Layer 6 takes the data provided by the Application
layer and converts it into a standard format that the other layers
can understand.
• Session - Layer 5 establishes, maintains and ends communication
with the receiving device.
55 of 83
Transport Set (1)
• Transport - This layer maintains flow control of data and provides
for error checking and recovery of data between the devices. Flow
control means that the Transport layer looks to see if data is
coming from more than one application and integrates each
application’s data into a single stream for the physical network.
• Network - The way that the data will be sent to the recipient
device is determined in this layer. Logical protocols, routing and
addressing are handled here.
• Data - In this layer, the appropriate physical protocol is assigned to
the data. Also, the type of network and the packet sequencing is
defined.
56 of 83
Transport Set (2)
• Physical - This is the level of the actual hardware. It defines the
physical characteristics of the network such as connections, voltage
levels and timing.
57 of 83
Benefits of the OSI Model
By separating the network communications into logical smaller pieces,
the OSI model simplifies how network protocols are designed. The
OSI model was designed to ensure different types of equipment (such
as network adapters, hubs, and routers) would all be compatible even
if built by different manufacturers. A product from one network
equipment vendor that implements OSI Layer 2 functionality, for
example, will be much more likely to interoperate with another
vendor’s OSI Layer 3 product because both vendors are following the
same model.
58 of 83
IPv4 Addressing
An IP address is an identifier that is assigned at the Internet layer to
an interface or a set of interfaces. Each IP address can identify the
source or destination of IP packets. For IPv4, every node on a network
has one or more interfaces, and you can enable TCP/IP on each of
those interfaces. When you enable TCP/IP on an interface, you
assign it one or more logical IPv4 addresses, either automatically or
manually. The IPv4 address is a logical address because it is assigned
at the Internet layer and has no relation to the addresses that are
used at the Network Interface layer. IPv4 addresses are 32 bits long
59 of 83
Figure: IPv4 Address Syntax
60 of 83
Types of IPv4 Addresses
Internet standards define the following types of IPv4 addresses:
• Unicast
Assigned to a single network interface located on a specific subnet;
used for one-to-one communication.
• Multicast
Assigned to one or more network interfaces located on various
subnets; used for one-to-many communication
• Broadcast
Assigned to all network interfaces located on a subnet; used for
one-to-everyone on a subnet communication.
61 of 83
Public address
• Most IP addresses are public addresses. Public addresses are
registered as belonging to a specific organization.
• Internet Service Providers (ISP) and extremely large organizations
in the U.S. obtain blocks of public addresses from the American
Registry for Internet Numbers (ARIN http://www.arin.net). Other
organizations obtain public addresses from their ISPs.
• There are ARIN counterparts in other parts of the world, and all of
these regional registration authorities are subject to the global
Internet Assigned Numbers Authority (IANA http://www.iana.org).
• Public IP addresses are routed across the Internet, so that hosts
with public addresses may freely communicate with one another
globally.
62 of 83
Private Address
• RFC 1918 designates the following as private addresses.
◦ Class A range: 10.0.0.0 through 10.255.255.255.
◦ Class B range: 172.16.0.0 through 172.31.255.255.
◦ Class C range: 192.168.0.0 through 192.168.255.255.
• Private addresses may be used by any organization, without any
requirement for registration.
• Because private addresses are ambiguous - cant tell where theyre
coming from or going to because anyone can use them - private
addresses are not permitted to be routed across the Internet
• ISPs block private addresses from being routed across their
infrastructure.
63 of 83
Classful IP Addressing (1)
Three main classes
• Class A networks
◦ First octet values range from 1 through 126.
◦ First octet starts with bit 0
◦ Network mask is 8 bits, written /8 or 255.0.0.0.
◦ 1.0.0.0 through 126.0.0.0 are class A networks with 16777214 hosts
each.
• Class B networks
◦ First octet values range from 128 through 191.
◦ First octet starts with binary pattern 10.
◦ Network mask is 16 bits, written /16 or 255.255.0.0.
◦ 128.0.0.0 through 191.255.0.0 are class B networks, with 65534 hosts
each.
64 of 83
Classful IP Addressing (2)
• Class C networks
◦ First octet values range from 192 through 223.
◦ First octet starts with binary pattern 110.
◦ Network mask is 24 bits, written /24 or 255.255.255.0.
◦ 192.0.0.0 through 223.255.255.0 are class C networks, with 254 hosts
each
65 of 83
Two additional classes and reserved addresses
• Class D addresses
◦ First octet values range from 224 through 239.
◦ First octet starts with binary pattern 1110.
◦ Class D addresses are multicast addresses, which will not be discussed
in this tutorial.
• Class E addresses
◦ Essentially everything thats left.
◦ Experimental class, which will not be discussed in this tutorial.
• Reserved addresses
◦ 0.0.0.0 is the default IP address, and it is used to specify a default
route. The default route will be discussed later.
◦ Addresses beginning with 127 are reserved for internal loopback
addresses. It is common to see 127.0.0.1 used as the internal
loopback address on many devices.
66 of 83
Subnet Masks (1)
Extending the classful network mask
• Subnet masks are used to make classful networks more manageable
and efficient, by creating smaller subnets and reducing the number
of host addresses per subnet to what is actually required.
• Subnet masks were first used on class boundaries.
• Example
◦ Take class A network 10.0.0.0 with network mask 255.0.0.0.
◦ Add additional 8 subnet bits to network mask.
◦ New subnet mask is 255.255.0.0.
◦ New subnets are 10.0.0.0, 10.1.0.0, 10.2.0.0, and so on with 65534
host addresses per subnet. Still too many hosts per subnet.
• Example
◦ Take class A network 10.0.0.0 with network mask 255.0.0.0.
67 of 83
Subnet Masks (2)
◦ Add additional 16 subnet bits to network mask.
◦ New subnet mask is 255.255.255.0
◦ New subnets are 10.0.0.0, 10.0.1.0, 10.0.2.0, ..., 10.1.0.0, 10.1.1.0,
10.1.2.0, ..., 10.2.0.0, 10.2.1.0, 10.2.2.0, and so on with 254 host
addresses per subnet.
• Example
◦ Take class B network 172.16.0.0 with network mask 255.255.0.0.
◦ Add additional 8 subnet bits to network mask.
◦ New subnet mask is 255.255.255.0
◦ New subnets are 172.16.0.0, 172.16.1.0, 172.16.2.0, and so on with
254 host addresses per subnet.
• As shown in these examples...
◦ A class A network can be subnetted to create 256 (28
) /16 subnets.
◦ A class A network can be subnetted to create 65536 (216
) /24 subnets.
◦ A class Bnetwork can be subnetted to create 256 (28
) /24 subnets.
68 of 83
DNS
Short for Domain Name System (or Service or Server), an Internet
service that translates domain names into IP addresses. Because
domain names are alphabetic, they’re easier to remember. The
Internet however, is really based on IP addresses.
Every time you use a domain name, therefore, a DNS service must
translate the name into the corresponding IP address. For example,
the domain name www.example.com might translate to
198.105.232.4.
69 of 83
Figure: DNS
70 of 83
Figure: The DNS client program sends a request to a DNS server to map
the e-mail address to the corresponding IP address
71 of 83
Namespace (1)
A name space that maps each address to a unique name can be
organized in two ways: flat or hierarchical.
Flat Name Space
In a flat name space, a name is assigned to an address. A name in
this space is a sequence of characters without structure. The main
disadvantage of a fiat name space is that it cannot be used in a large
system such as the Internet because it must be centrally controlled to
avoid ambiguity and duplication.
Hierarchical Name Space
In a hierarchical name space, each name is made of several parts.
The first part can define the nature of the organization, the second
72 of 83
Namespace (2)
part can define the name of an organization, the third part can define
departments in the organization, and so on. For example, assume two
colleges and a company call one of their computers challenger. The
first college is given a name by the central authority such as jhda.edu,
the second college is given the name berkeley.edu, and the company is
given the name smart. com. When these organizations add the name
challenger to the name they have already been given, the end result is
three distinguishable names: challenger.jhda.edu,
challenger.berkeley.edu, and challenger.smart.com. The names are
unique without the need for assignment by a central authority.
73 of 83
Figure: The domain names are always read from the node up to the root
74 of 83
Figure: The last label is the label of the root (null) as below
75 of 83
Domain
Figure: A domain is a subtree of the domain name space. The name of the
domain is the domain name of the node at the top of the subtree
76 of 83
DISTRIBUTION OF NAME SPACE
Hierarchy of Name Servers
The solution to these problems is to distribute the information
among many computers called DNS servers. One way to do this is to
divide the whole space into many domains based on the first level.
77 of 83
Zone
Since the complete domain name hierarchy cannot be stored on a
single server, it is divided among many servers. What a server is
responsible for or has authority over is called a zone. The server
makes a database called a zone file and keeps all the information for
every node under that domain.
78 of 83
Root Server
A root server is a server whose zone consists of the whole tree.
There are several root servers, each covering the whole domain name
space.
Primary and Secondary Servers
A primary server loads all information from the disk file; the
secondary server loads all information from the primary server. When
the secondary downloads information from the primary, it is called
zone transfer.
79 of 83
Figure: DNS is a protocol that can be used in different platforms. In the
Internet, the domain name space (tree) is divided into three different
sections: generic domains, country domains, and the inverse domain
80 of 83
Generic Domains
Figure: The generic domains define registered hosts according to their
generic behavior. Each node in the tree defines a domain, which is an index
to the domain name space database
81 of 83
Country Domains
Figure: The country domains section uses two-character country
abbreviations (e.g., us for United States). Second labels can be
organizational, or they can be more specific, national designations.
82 of 83
Inverse Domain
The inverse domain is used to map an address to a name. This may
happen, for example, when a server has received a request from a
client to do a task. Although the server has a file that contains a list
of authorized clients, only the IP address of the client (extracted from
the received IP packet) is listed. The server asks its resolver to send a
query to the DNS server to map an address to a name to determine if
the client is on the authorized list.
83 of 83

Weitere ähnliche Inhalte

Was ist angesagt?

Computer network Report
Computer network ReportComputer network Report
Computer network ReportAmitoj Kaur
 
Best fit topology - lo1 part iv
Best fit topology - lo1 part ivBest fit topology - lo1 part iv
Best fit topology - lo1 part ivAbenezer Abiti
 
Determine best fit topology
Determine best fit topologyDetermine best fit topology
Determine best fit topologyAbenezer Abiti
 
Presentation On Computer Network
Presentation On Computer NetworkPresentation On Computer Network
Presentation On Computer NetworkAvinash Ranjan
 
Determine best fit topology copy
Determine best fit topology   copyDetermine best fit topology   copy
Determine best fit topology copyJaleto Sunkemo
 
Telecommunications and networks
Telecommunications and networksTelecommunications and networks
Telecommunications and networksSopon Tumchota
 
Best fit topology - LO1 part II
Best fit topology - LO1 part IIBest fit topology - LO1 part II
Best fit topology - LO1 part IIAbenezer Abiti
 
Designing Local Area Network
Designing Local Area NetworkDesigning Local Area Network
Designing Local Area Networkzaisahil
 
Introduction to Computer Networks and Data Communications
Introduction to Computer Networks and Data CommunicationsIntroduction to Computer Networks and Data Communications
Introduction to Computer Networks and Data CommunicationsAngel G Diaz
 
Computer networks--introduction computer-networking
Computer networks--introduction computer-networkingComputer networks--introduction computer-networking
Computer networks--introduction computer-networkingVIJAY TRIPATHI (DSS Basti)
 
Telecommunications and networks
Telecommunications and networksTelecommunications and networks
Telecommunications and networksBikash Kumar
 
Comparative study of bluetooth, 802 and hiperlan
Comparative study of bluetooth, 802 and hiperlanComparative study of bluetooth, 802 and hiperlan
Comparative study of bluetooth, 802 and hiperlanIAEME Publication
 
Ethernet satellite dishinternational plastics, inc. c
Ethernet satellite dishinternational plastics, inc.    cEthernet satellite dishinternational plastics, inc.    c
Ethernet satellite dishinternational plastics, inc. coreo10
 

Was ist angesagt? (17)

Computer network Report
Computer network ReportComputer network Report
Computer network Report
 
Best fit topology - lo1 part iv
Best fit topology - lo1 part ivBest fit topology - lo1 part iv
Best fit topology - lo1 part iv
 
Determine best fit topology
Determine best fit topologyDetermine best fit topology
Determine best fit topology
 
8 network devices
8 network devices8 network devices
8 network devices
 
Presentation On Computer Network
Presentation On Computer NetworkPresentation On Computer Network
Presentation On Computer Network
 
Determine best fit topology copy
Determine best fit topology   copyDetermine best fit topology   copy
Determine best fit topology copy
 
Telecommunications and networks
Telecommunications and networksTelecommunications and networks
Telecommunications and networks
 
Best fit topology - LO1 part II
Best fit topology - LO1 part IIBest fit topology - LO1 part II
Best fit topology - LO1 part II
 
Designing Local Area Network
Designing Local Area NetworkDesigning Local Area Network
Designing Local Area Network
 
Introduction to Computer Networks and Data Communications
Introduction to Computer Networks and Data CommunicationsIntroduction to Computer Networks and Data Communications
Introduction to Computer Networks and Data Communications
 
Ccna report
Ccna reportCcna report
Ccna report
 
Networking / Internet and Web Technologies
Networking / Internet and Web TechnologiesNetworking / Internet and Web Technologies
Networking / Internet and Web Technologies
 
Computer networks--introduction computer-networking
Computer networks--introduction computer-networkingComputer networks--introduction computer-networking
Computer networks--introduction computer-networking
 
Telecommunications and networks
Telecommunications and networksTelecommunications and networks
Telecommunications and networks
 
Comparative study of bluetooth, 802 and hiperlan
Comparative study of bluetooth, 802 and hiperlanComparative study of bluetooth, 802 and hiperlan
Comparative study of bluetooth, 802 and hiperlan
 
Ethernet satellite dishinternational plastics, inc. c
Ethernet satellite dishinternational plastics, inc.    cEthernet satellite dishinternational plastics, inc.    c
Ethernet satellite dishinternational plastics, inc. c
 
01 - networking basics notes
01 - networking basics notes01 - networking basics notes
01 - networking basics notes
 

Andere mochten auch

The archived Canadian US Patent Competitive Intelligence Database (2014/5/27)
The archived Canadian US Patent Competitive Intelligence Database (2014/5/27) The archived Canadian US Patent Competitive Intelligence Database (2014/5/27)
The archived Canadian US Patent Competitive Intelligence Database (2014/5/27) Muchiu (Henry) Chang, PhD. Cantab
 
Hubspot Charts Graphs April2010
Hubspot Charts Graphs April2010Hubspot Charts Graphs April2010
Hubspot Charts Graphs April2010SocialOnline
 
The archived Canadian US Patent Competitive Intelligence Database (2014/7/8)
The archived Canadian US Patent Competitive Intelligence Database (2014/7/8) The archived Canadian US Patent Competitive Intelligence Database (2014/7/8)
The archived Canadian US Patent Competitive Intelligence Database (2014/7/8) Muchiu (Henry) Chang, PhD. Cantab
 
The archived Canadian US Patent Competitive Intelligence Database (2015/9/1)
The archived Canadian US Patent Competitive Intelligence Database (2015/9/1) The archived Canadian US Patent Competitive Intelligence Database (2015/9/1)
The archived Canadian US Patent Competitive Intelligence Database (2015/9/1) Muchiu (Henry) Chang, PhD. Cantab
 
The archived Canadian US Patent Competitive Intelligence Database (2013/11/26)
The archived Canadian US Patent Competitive Intelligence Database (2013/11/26) The archived Canadian US Patent Competitive Intelligence Database (2013/11/26)
The archived Canadian US Patent Competitive Intelligence Database (2013/11/26) Muchiu (Henry) Chang, PhD. Cantab
 
Maya Hansen Corset Trends 2012- Vitalmag
Maya Hansen Corset Trends 2012- VitalmagMaya Hansen Corset Trends 2012- Vitalmag
Maya Hansen Corset Trends 2012- VitalmagVitalMag
 
Belajar membuat blog
Belajar membuat blogBelajar membuat blog
Belajar membuat blogArifin Zaenul
 
The archived Canadian US Patent Competitive Intelligence Database (2013/12/17)
The archived Canadian US Patent Competitive Intelligence Database (2013/12/17) The archived Canadian US Patent Competitive Intelligence Database (2013/12/17)
The archived Canadian US Patent Competitive Intelligence Database (2013/12/17) Muchiu (Henry) Chang, PhD. Cantab
 
The Archived Canadian Patent Competitive Intelligence (2013/11/5)
The Archived Canadian Patent Competitive Intelligence (2013/11/5) The Archived Canadian Patent Competitive Intelligence (2013/11/5)
The Archived Canadian Patent Competitive Intelligence (2013/11/5) Muchiu (Henry) Chang, PhD. Cantab
 
[오픈소스컨설팅] Business Email How To
[오픈소스컨설팅] Business Email How To[오픈소스컨설팅] Business Email How To
[오픈소스컨설팅] Business Email How ToJi-Woong Choi
 
The archived Canadian US Patent Competitive Intelligence Database (2015/11/17)
The archived Canadian US Patent Competitive Intelligence Database (2015/11/17) The archived Canadian US Patent Competitive Intelligence Database (2015/11/17)
The archived Canadian US Patent Competitive Intelligence Database (2015/11/17) Muchiu (Henry) Chang, PhD. Cantab
 
The App Store Presentation Alex2
The App Store Presentation Alex2The App Store Presentation Alex2
The App Store Presentation Alex2Alexandru2010
 
The Archived Canadian Patent Competitive Intelligence (November 9, 2010)
The Archived Canadian Patent Competitive Intelligence (November 9, 2010)The Archived Canadian Patent Competitive Intelligence (November 9, 2010)
The Archived Canadian Patent Competitive Intelligence (November 9, 2010)Muchiu (Henry) Chang, PhD. Cantab
 
Presentatie Glenn Rayp
Presentatie Glenn RaypPresentatie Glenn Rayp
Presentatie Glenn RaypABVV
 
The archived Canadian US Patent Competitive Intelligence Database (2014/6/24)
The archived Canadian US Patent Competitive Intelligence Database (2014/6/24) The archived Canadian US Patent Competitive Intelligence Database (2014/6/24)
The archived Canadian US Patent Competitive Intelligence Database (2014/6/24) Muchiu (Henry) Chang, PhD. Cantab
 
intro for RailsGirls Ukraine
intro for RailsGirls Ukraineintro for RailsGirls Ukraine
intro for RailsGirls UkraineAlona Mekhovova
 
The archived Canadian US Patent Competitive Intelligence Database (2015/2/17)
The archived Canadian US Patent Competitive Intelligence Database (2015/2/17) The archived Canadian US Patent Competitive Intelligence Database (2015/2/17)
The archived Canadian US Patent Competitive Intelligence Database (2015/2/17) Muchiu (Henry) Chang, PhD. Cantab
 
The archived Canadian US Patent Competitive Intelligence Database (2014/10/7)
The archived Canadian US Patent Competitive Intelligence Database (2014/10/7) The archived Canadian US Patent Competitive Intelligence Database (2014/10/7)
The archived Canadian US Patent Competitive Intelligence Database (2014/10/7) Muchiu (Henry) Chang, PhD. Cantab
 
Social Marketing Analyse
Social Marketing AnalyseSocial Marketing Analyse
Social Marketing AnalyseSocialOnline
 

Andere mochten auch (20)

The archived Canadian US Patent Competitive Intelligence Database (2014/5/27)
The archived Canadian US Patent Competitive Intelligence Database (2014/5/27) The archived Canadian US Patent Competitive Intelligence Database (2014/5/27)
The archived Canadian US Patent Competitive Intelligence Database (2014/5/27)
 
Hubspot Charts Graphs April2010
Hubspot Charts Graphs April2010Hubspot Charts Graphs April2010
Hubspot Charts Graphs April2010
 
Yr 12 introduction to coursework
Yr 12 introduction to courseworkYr 12 introduction to coursework
Yr 12 introduction to coursework
 
The archived Canadian US Patent Competitive Intelligence Database (2014/7/8)
The archived Canadian US Patent Competitive Intelligence Database (2014/7/8) The archived Canadian US Patent Competitive Intelligence Database (2014/7/8)
The archived Canadian US Patent Competitive Intelligence Database (2014/7/8)
 
The archived Canadian US Patent Competitive Intelligence Database (2015/9/1)
The archived Canadian US Patent Competitive Intelligence Database (2015/9/1) The archived Canadian US Patent Competitive Intelligence Database (2015/9/1)
The archived Canadian US Patent Competitive Intelligence Database (2015/9/1)
 
The archived Canadian US Patent Competitive Intelligence Database (2013/11/26)
The archived Canadian US Patent Competitive Intelligence Database (2013/11/26) The archived Canadian US Patent Competitive Intelligence Database (2013/11/26)
The archived Canadian US Patent Competitive Intelligence Database (2013/11/26)
 
Maya Hansen Corset Trends 2012- Vitalmag
Maya Hansen Corset Trends 2012- VitalmagMaya Hansen Corset Trends 2012- Vitalmag
Maya Hansen Corset Trends 2012- Vitalmag
 
Belajar membuat blog
Belajar membuat blogBelajar membuat blog
Belajar membuat blog
 
The archived Canadian US Patent Competitive Intelligence Database (2013/12/17)
The archived Canadian US Patent Competitive Intelligence Database (2013/12/17) The archived Canadian US Patent Competitive Intelligence Database (2013/12/17)
The archived Canadian US Patent Competitive Intelligence Database (2013/12/17)
 
The Archived Canadian Patent Competitive Intelligence (2013/11/5)
The Archived Canadian Patent Competitive Intelligence (2013/11/5) The Archived Canadian Patent Competitive Intelligence (2013/11/5)
The Archived Canadian Patent Competitive Intelligence (2013/11/5)
 
[오픈소스컨설팅] Business Email How To
[오픈소스컨설팅] Business Email How To[오픈소스컨설팅] Business Email How To
[오픈소스컨설팅] Business Email How To
 
The archived Canadian US Patent Competitive Intelligence Database (2015/11/17)
The archived Canadian US Patent Competitive Intelligence Database (2015/11/17) The archived Canadian US Patent Competitive Intelligence Database (2015/11/17)
The archived Canadian US Patent Competitive Intelligence Database (2015/11/17)
 
The App Store Presentation Alex2
The App Store Presentation Alex2The App Store Presentation Alex2
The App Store Presentation Alex2
 
The Archived Canadian Patent Competitive Intelligence (November 9, 2010)
The Archived Canadian Patent Competitive Intelligence (November 9, 2010)The Archived Canadian Patent Competitive Intelligence (November 9, 2010)
The Archived Canadian Patent Competitive Intelligence (November 9, 2010)
 
Presentatie Glenn Rayp
Presentatie Glenn RaypPresentatie Glenn Rayp
Presentatie Glenn Rayp
 
The archived Canadian US Patent Competitive Intelligence Database (2014/6/24)
The archived Canadian US Patent Competitive Intelligence Database (2014/6/24) The archived Canadian US Patent Competitive Intelligence Database (2014/6/24)
The archived Canadian US Patent Competitive Intelligence Database (2014/6/24)
 
intro for RailsGirls Ukraine
intro for RailsGirls Ukraineintro for RailsGirls Ukraine
intro for RailsGirls Ukraine
 
The archived Canadian US Patent Competitive Intelligence Database (2015/2/17)
The archived Canadian US Patent Competitive Intelligence Database (2015/2/17) The archived Canadian US Patent Competitive Intelligence Database (2015/2/17)
The archived Canadian US Patent Competitive Intelligence Database (2015/2/17)
 
The archived Canadian US Patent Competitive Intelligence Database (2014/10/7)
The archived Canadian US Patent Competitive Intelligence Database (2014/10/7) The archived Canadian US Patent Competitive Intelligence Database (2014/10/7)
The archived Canadian US Patent Competitive Intelligence Database (2014/10/7)
 
Social Marketing Analyse
Social Marketing AnalyseSocial Marketing Analyse
Social Marketing Analyse
 

Ähnlich wie Intern

Ccna(routing &and switching)
Ccna(routing &and switching)Ccna(routing &and switching)
Ccna(routing &and switching)Shweta Kumari
 
Computer Networking
Computer NetworkingComputer Networking
Computer NetworkingAlisha Jain
 
Basic networking hardware pre final 1
Basic networking hardware pre final 1Basic networking hardware pre final 1
Basic networking hardware pre final 1Sujee Antony
 
NFPhysical Layer.pptx
NFPhysical Layer.pptxNFPhysical Layer.pptx
NFPhysical Layer.pptxmmmm11111
 
Install network cable module CSS NC2
Install network cable module CSS NC2Install network cable module CSS NC2
Install network cable module CSS NC2wilfredo dela cerna
 
Basic networking in power point by suprabha
Basic networking in power point by suprabhaBasic networking in power point by suprabha
Basic networking in power point by suprabhaSuprabha Sahoo
 
Computer Network, Internet, Computer Security and Cyber Ethics
Computer Network, Internet, Computer Security and Cyber EthicsComputer Network, Internet, Computer Security and Cyber Ethics
Computer Network, Internet, Computer Security and Cyber EthicsSubas Paudel
 
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...Soumen Santra
 
Networking tutorials introduction to networking
Networking tutorials   introduction to networkingNetworking tutorials   introduction to networking
Networking tutorials introduction to networkingVinod Jadhav
 
Computer network and its topologies
Computer network and its topologiesComputer network and its topologies
Computer network and its topologiesAyush0734
 
networking.ppt
networking.pptnetworking.ppt
networking.pptsuchita74
 
Cyber security training at ist apr-18
Cyber security training at ist apr-18Cyber security training at ist apr-18
Cyber security training at ist apr-18Sagar Walvekar
 
monotoring Basics2
monotoring Basics2monotoring Basics2
monotoring Basics2Programmer
 

Ähnlich wie Intern (20)

Ccna(routing &and switching)
Ccna(routing &and switching)Ccna(routing &and switching)
Ccna(routing &and switching)
 
Lan
LanLan
Lan
 
Computer networks
Computer networksComputer networks
Computer networks
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networking
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
 
Networking ppt
Networking ppt Networking ppt
Networking ppt
 
Basic networking hardware pre final 1
Basic networking hardware pre final 1Basic networking hardware pre final 1
Basic networking hardware pre final 1
 
Unit 2B.pdf
Unit 2B.pdfUnit 2B.pdf
Unit 2B.pdf
 
NFPhysical Layer.pptx
NFPhysical Layer.pptxNFPhysical Layer.pptx
NFPhysical Layer.pptx
 
Install network cable module CSS NC2
Install network cable module CSS NC2Install network cable module CSS NC2
Install network cable module CSS NC2
 
Basic networking in power point by suprabha
Basic networking in power point by suprabhaBasic networking in power point by suprabha
Basic networking in power point by suprabha
 
Cct203 lesson 10
Cct203 lesson 10Cct203 lesson 10
Cct203 lesson 10
 
Computer Network, Internet, Computer Security and Cyber Ethics
Computer Network, Internet, Computer Security and Cyber EthicsComputer Network, Internet, Computer Security and Cyber Ethics
Computer Network, Internet, Computer Security and Cyber Ethics
 
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
 
Networking tutorials introduction to networking
Networking tutorials   introduction to networkingNetworking tutorials   introduction to networking
Networking tutorials introduction to networking
 
Computer network and its topologies
Computer network and its topologiesComputer network and its topologies
Computer network and its topologies
 
networking.ppt
networking.pptnetworking.ppt
networking.ppt
 
Cyber security training at ist apr-18
Cyber security training at ist apr-18Cyber security training at ist apr-18
Cyber security training at ist apr-18
 
monotoring Basics2
monotoring Basics2monotoring Basics2
monotoring Basics2
 
Ccna
CcnaCcna
Ccna
 

Kürzlich hochgeladen

Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 

Kürzlich hochgeladen (20)

Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 

Intern

  • 2. Outline Introduction ONGC Our Experience Network Devices Modems FDDI 802.3 - Ethernet Networks Topology Network Interface Cards Types of Network IP Addressing DNS 2 of 83
  • 3. Acknowledgement We like to thank Mrs Chaddha for her guidance throughout our internship. 3 of 83
  • 4. ONGC Oil and Natural Gas Corporation Limited (ONGC) is an Indian state-owned oil and gas company headquartered in Dehradun, India. It is one of the largest Asia-based oil and gas exploration and production companies, and produces around 77% of India’s crude oil (equivalent to around 30% of the country’s total demand) and around 81% of its natural gas. ONGC is one of the largest publicly traded companies by market capitalization in India. It is ranked 361st in the 2011 Fortune Global 500 list and is among the Top 250 Global Energy Company by Platts. 4 of 83
  • 5. Our Experience (1) Through our intership at ONGC we were exposed to the inner working of the server room at Telbhawan. We examined the working of the following servers • AD - Active Director, used for authentication of employees of the ONGC by verifying theirs CPF numbers. • DHCP - Dynamic Host Control Protocol, used to allocated dynamic IP address. • Anti-virus - It is used for verifying if the client has anti-virus installed in it. • IWSS - It is used for scanning the computers in the network • Blue Coat - It is the Internet distribution proxy 5 of 83
  • 6. Our Experience (2) • WSUS - Windows System Update Server, used to update the software of all the computers in the network. • Websense - It filters the computers for possible threat The ISP provider to ONGC is BSNL. Four lease lines of 2 Kbps is connecting Delhi to Dehradun. The main router used in ONGC is IAS from Cisco. At Dehradun, various routers & switch of Cisco are used. The intranet of ONGC at Telbhawan is connected to KDMIP though L3 switches. The optical fiber is extended to City Hospital. We then visited KDMIP which uses SATCOM for communication. The satellite works in the Ka Band channel with 3 GHz. 6 of 83
  • 7. Modem (1) A modem (modulator-demodulator) is a device that modulates an analog carrier signal to encode digital information, and also demodulates such a carrier signal to decode the transmitted information. The goal is to produce a signal that can be transmitted easily and decoded to reproduce the original digital data. The most familiar example is a voice band modem that turns the digital data of a personal computer into modulated electrical signals in the voice frequency range of a telephone channel. These signals can be transmitted over telephone lines and demodulated by another modem at the receiver side to recover the digital data. 7 of 83
  • 8. Modem (2) Figure: Modem Modems are generally classified by the amount of data they can send in a given unit of time, usually expressed in bits per second (bit/s, or bps). Modems can alternatively be classified by their symbol rate, measured in baud. The baud unit denotes symbols per second, or the number of times per second the modem sends a new signal. Modems are of two types : 8 of 83
  • 9. Modem (3) Figure: Internal Modem Figure: External Modem 9 of 83
  • 10. Fiber Distributed Data Interface (1) The Fiber Distributed Data Interface (FDDI) topology is ring with two counter rotating rings for reliability with no hubs. Cable type is fiber-optic. Connectors are specialized. The media access method is token passing. The maximum length is 100 kilometers. The maximum number of nodes on the network is 500. Speed is 100 Mbps. FDDI is normally used as a backbone to link other networks. A typical FDDI network can include servers, concentrators, and links to other networks. Devices called concentrators provide functions similar to hubs. Most concentrators use dual attachment station network cards but single attachment concentrators may be used to attach more workstations to the network. 10 of 83
  • 11. Fiber Distributed Data Interface (2) Figure: FDDI 11 of 83
  • 12. Fiber Distributed Data Interface (3) FDDI token passing allows multiple frames to circulate around the ring at the same time. Priority levels of a data frame and token can be set to allow servers to send more data frames. Time sensitive data may also be given higher priority. The second ring in a FDDI network is a method of adjusting when there are breaks in the cable. The primary ring is normally used, but if the nearest downstream neighbor stops responding the data is sent on the secondary ring in attempt to reach the computer. Therefore a break in the cable will result in the secondary ring being used. 12 of 83
  • 13. Fiber Distributed Data Interface (4) Figure: FDDI 13 of 83
  • 14. Fiber Distributed Data Interface (5) There are two network cards which are: • Dual attachment stations (DAS) used for servers and concentrators are attached to both rings. • Single Attachment stations (SAS) attached to one ring and used to attach workstations to concentrators. A router or switch can link an FDDI network to a local area network (LAN). Normally FDDI is used to link LANs together since it covers long distances. 14 of 83
  • 15. Ethernet (1) In 1973, at Xerox Corporations Palo Alto Research Center (more commonly known as PARC), researcher Bob Metcalfe designed and tested the first Ethernet network. While working on a way to link Xeroxs ”Alto” computer to a printer, Metcalfe developed the physical method of cabling that connected devices on the Ethernet as well as the standards that governed communication on the cable. Ethernet has since become the most popular and most widely deployed network technology in the world. Many of the issues involved with Ethernet are common to many network technologies, and understanding how Ethernet addressed these issues can provide a foundation that will improve your understanding of networking in general. 15 of 83
  • 16. Ethernet (2) The Ethernet standard has grown to encompass new technologies as computer networking has matured, but the mechanics of operation for every Ethernet network today stem from Metcalfes original design. The original Ethernet described communication over a single cable shared by all devices on the network. Once a device attached to this cable, it had the ability to communicate with any other attached device. This allows the network to expand to accommodate new devices without requiring any modification to those devices already on the network. 16 of 83
  • 18. Ethernet Cabling (1) Figure: Ethernet Cabling 18 of 83
  • 19. Ethernet Cabling (2) Figure: The most common kinds of Ethernet cabling 19 of 83
  • 20. Network Topologies • Topology - Physical and logical network layout ◦ Physical actual layout of the computer cables and other network devices ◦ Logical the way in which the network appears to the devices that use it. • Common topologies ◦ Bus, ring, star, mesh and wireless 20 of 83
  • 21. Bus Topology • Uses a trunk or backbone to which all of the computers on the network connect. • Uses a trunk or backbone to which all of the computers on the network connect. • Coaxial cablings ( 10Base-2, 10Base5) were popular options years ago. 21 of 83
  • 22. Advantages • Cable faults are easily located, making troubleshooting easier • Ring network are moderately easy to install Disadvantages • Expansion to the network can cause network disruption • A single break in the cable can disrupt the entire network Figure: Bus Topology 22 of 83
  • 23. Star Topology • All computers/devices connect to a central device called hub or switch. • Each device requires a single cable • point-to-point connection between the device and hub. • Most widely implemented • Hub is the single point of failure 23 of 83
  • 25. Advantages • Easily expanded without disruption to the network • Cable failure affects only a single user • Easy to troubleshoot & isolate problems Disadvantages • Requires more cable • A central connecting device allows for a single point of failure • More difficult to implement 25 of 83
  • 26. Mesh Topology • Each computer connects to every other • High level of redundancy. • Rarely used ◦ Wiring is very complicated ◦ Cabling cost is high ◦ Troubleshooting a failed cable is tricky ◦ A variation hybrid mesh create point to point connection between specific network devices, often seen in WAN implementation. 26 of 83
  • 27. Advantages • Provides redundant path between devices • The network can be expanded without to current uses Disadvantages • Requires more cable than the other LAN topologies • Complicated Figure: Mesh Topology 27 of 83
  • 28. Wireless • Do not require physical cabling • Particularly useful for remote access for laptop users • Eliminate cable faults and cable breaks. • Signal interference and security issue. 28 of 83
  • 29. Advantages • Allows for wireless remote access • Network can be expanded without disruption to current users Disadvantages • Potential security issues associated with wireless transmission • Limited speed in comparison to other network topologies Figure: Wireless 29 of 83
  • 30. NIC • A network interface card, more commonly referred to as a NIC, is a device that allows computers to be joined together in a LAN, or local area network . • The network interface card acts as the liaison for the machine to both send and receive data on the LAN . • In computer networking, a NIC provides the hardware interface between a computer and a network. 30 of 83
  • 31. Figure: Network cards are typically available in 10/100/1000 Mbit/s varieties. This means they can support a notional maximum transfer rate of 10, 100 or 1000 Megabits per second 31 of 83
  • 32. NIC ...Need • Most computer networks transfer data across a medium at a fixed rate, often faster than the speed at which computers can process individual bits. • To accommodate the mismatch in speed, each computer attached to a network contain special purpose hardware known as a network interface card (NIC). • The NIC functions like an I/O device: it is built for a specific network technology. • It handles the details of frame transmission or reception without requiring the CPU to process each bit. 32 of 83
  • 33. NIC (1) ...Working • A computer or device on a network can be reached by its MAC (media access control) address through the NIC card. • Every Ethernet network card has a unique 48-bit serial number called a MAC address, which is stored in ROM carried on the card. • The MACs on the network are used to direct traffic between the computers. • An example of a MAC address: A1B2C3D4E5F6 • The first 6 hex digits in the MAC address is the OUI (organizationally unique identifier), assigned by the IEEE to each manufacturer (e.g. Cisco, Intel etc). 33 of 83
  • 34. NIC (2) ...Working • The rest of the MAC address can be assigned in any way by the manufacturer to the individual networking devices that it manufactures 34 of 83
  • 35. NIC ...Port • The back plate of the network interface card features a port that looks similar to a phone jack, but is slightly larger. • A network card typically has a twisted pair, BNC, or AUI socket where the network cable is connected, and a few LEDs to inform the user of whether the network is active, and whether or not there is data being transmitted on it. • That port accommodates an Ethernet cable, which resembles a thicker version of a standard telephone line. 35 of 83
  • 37. Figure: Network Interface Card for connection of a computer to an Ethernet Network 37 of 83
  • 38. NIC ...on a Network • The card implements the electronic circuitry required to communicate using a specific physical layer and data link layer standard such as Ethernet or token ring. • This provides a base for a full network protocol stack, allowing communication among small groups of computers on the same LAN and large-scale network communications through routable protocols, such as IP. 38 of 83
  • 39. Types of Network • Local Area Network • Wide Area Netwok • Metropolitan Area Network • Wireless Networks • Home Networks • Internetworks 39 of 83
  • 41. LAN A LAN connects network devices over a relatively short distance. A networked office building, school, or home usually contains a single LAN, though sometimes one building will contain a few small LANs (perhaps one per room), and occasionally a LAN will span a group of nearby buildings. In TCP/IP networking, a LAN is often but not always implemented as a single IP subnet. 41 of 83
  • 42. Figure: An isolated IAN connecting 12 computers to a hub in a closet 42 of 83
  • 43. WAN As the term implies, a WAN spans a large physical distance. The Internet is the largest WAN, spanning the Earth. A WAN is a geographically-dispersed collection of LANs. A network device called a router connects LANs to a WAN. In IP networking, the router maintains both a LAN address and a WAN address. 43 of 83
  • 45. Wireless (1) Wireless network refers to any type of computer network that is not connected by cables of any kind. It is a method by which homes, telecommunications networks and enterprise (business) installations avoid the costly process of introducing cables into a building, or as a connection between various equipment locations. Wireless telecommunications networks are generally implemented and administered using a transmission system called radio waves. This implementation takes place at the physical level (layer) of the OSI model network structure. 45 of 83
  • 47. Types of wireless networks (1) • Wireless PAN ◦ Wireless personal area networks (WPANs) interconnect devices within a relatively small area that is generally within a person’s reach. For example, both Bluetooth radio and invisible infrared light provides a WPAN for interconnecting a headset to a laptop. Wi-Fi PANs are becoming commonplace as equipment designers start to integrate Wi-Fi into a variety of consumer electronic devices. 47 of 83
  • 48. Types of wireless networks (2) • Wireless LANs ◦ A wireless local area network (WLAN) links two or more devices over a short distance using a wireless distribution method, usually providing a connection through an access point for Internet access. The use of spread-spectrum or OFDM technologies may allow users to move around within a local coverage area, and still remain connected to the network. Products using the IEEE 802.11 WLAN standards are marketed under the Wi-Fi brand name. Fixed wireless technology implements point-to-point links between computers or networks at two distant locations, often using dedicated microwave or modulated laser light beams over line of sight paths. It is often used in cities to connect networks in two or more buildings without installing a wired link. 48 of 83
  • 49. Types of wireless networks (3) • Wireless mesh network ◦ A wireless mesh network is a wireless network made up of radio nodes organized in a mesh topology. Each node forwards messages on behalf of the other nodes. Mesh networks can ”self heal”, automatically re-routing around a node that has lost power. • Wireless MAN ◦ Wireless metropolitan area networks are a type of wireless network that connects several wireless LANs. WiMAX is a type of Wireless MAN and is described by the IEEE 802.16 standard. 49 of 83
  • 50. Types of wireless networks (4) • Wireless WAN ◦ Wireless wide area networks are wireless networks that typically cover large areas, such as between neighboring towns and cities, or city and suburb. These networks can be used to connect branch offices of business or as a public internet access system. The wireless connections between access points are usually point to point microwave links using parabolic dishes on the 2.4GHz band, rather than omnidirectional antennas used with smaller networks. A typical system contains base station gateways, access points and wireless bridging relays 50 of 83
  • 51. Other Types of Area Networks (1) • Metropolitan Area Network - a network spanning a physical area larger than a LAN but smaller than a WAN, such as a city. A MAN is typically owned an operated by a single entity such as a government body or large corporation. • Campus Area Network - a network spanning multiple LANs but smaller than a MAN, such as on a university or local business campus. • Storage Area Network - connects servers to data storage devices through a technology like Fibre Channel. • System Area Network - links high-performance computers with high-speed connections in a cluster configuration. Also known as Cluster Area Network. 51 of 83
  • 52. OSI Model Virtually all networks in use today are based in some fashion on the Open Systems Interconnection (OSI) standard. OSI was developed in 1984 by the International Organization for Standardization (ISO), a global federation of national standards organizations representing approximately 130 countries. 52 of 83
  • 54. The Layers Think of the seven layers as the assembly line in the computer. At each layer, certain things happen to the data that prepare it for the next layer. 54 of 83
  • 55. Application Set • Application - This is the layer that actually interacts with the operating system or application whenever the user chooses to transfer files, read messages or perform other network-related activities. • Presentation - Layer 6 takes the data provided by the Application layer and converts it into a standard format that the other layers can understand. • Session - Layer 5 establishes, maintains and ends communication with the receiving device. 55 of 83
  • 56. Transport Set (1) • Transport - This layer maintains flow control of data and provides for error checking and recovery of data between the devices. Flow control means that the Transport layer looks to see if data is coming from more than one application and integrates each application’s data into a single stream for the physical network. • Network - The way that the data will be sent to the recipient device is determined in this layer. Logical protocols, routing and addressing are handled here. • Data - In this layer, the appropriate physical protocol is assigned to the data. Also, the type of network and the packet sequencing is defined. 56 of 83
  • 57. Transport Set (2) • Physical - This is the level of the actual hardware. It defines the physical characteristics of the network such as connections, voltage levels and timing. 57 of 83
  • 58. Benefits of the OSI Model By separating the network communications into logical smaller pieces, the OSI model simplifies how network protocols are designed. The OSI model was designed to ensure different types of equipment (such as network adapters, hubs, and routers) would all be compatible even if built by different manufacturers. A product from one network equipment vendor that implements OSI Layer 2 functionality, for example, will be much more likely to interoperate with another vendor’s OSI Layer 3 product because both vendors are following the same model. 58 of 83
  • 59. IPv4 Addressing An IP address is an identifier that is assigned at the Internet layer to an interface or a set of interfaces. Each IP address can identify the source or destination of IP packets. For IPv4, every node on a network has one or more interfaces, and you can enable TCP/IP on each of those interfaces. When you enable TCP/IP on an interface, you assign it one or more logical IPv4 addresses, either automatically or manually. The IPv4 address is a logical address because it is assigned at the Internet layer and has no relation to the addresses that are used at the Network Interface layer. IPv4 addresses are 32 bits long 59 of 83
  • 60. Figure: IPv4 Address Syntax 60 of 83
  • 61. Types of IPv4 Addresses Internet standards define the following types of IPv4 addresses: • Unicast Assigned to a single network interface located on a specific subnet; used for one-to-one communication. • Multicast Assigned to one or more network interfaces located on various subnets; used for one-to-many communication • Broadcast Assigned to all network interfaces located on a subnet; used for one-to-everyone on a subnet communication. 61 of 83
  • 62. Public address • Most IP addresses are public addresses. Public addresses are registered as belonging to a specific organization. • Internet Service Providers (ISP) and extremely large organizations in the U.S. obtain blocks of public addresses from the American Registry for Internet Numbers (ARIN http://www.arin.net). Other organizations obtain public addresses from their ISPs. • There are ARIN counterparts in other parts of the world, and all of these regional registration authorities are subject to the global Internet Assigned Numbers Authority (IANA http://www.iana.org). • Public IP addresses are routed across the Internet, so that hosts with public addresses may freely communicate with one another globally. 62 of 83
  • 63. Private Address • RFC 1918 designates the following as private addresses. ◦ Class A range: 10.0.0.0 through 10.255.255.255. ◦ Class B range: 172.16.0.0 through 172.31.255.255. ◦ Class C range: 192.168.0.0 through 192.168.255.255. • Private addresses may be used by any organization, without any requirement for registration. • Because private addresses are ambiguous - cant tell where theyre coming from or going to because anyone can use them - private addresses are not permitted to be routed across the Internet • ISPs block private addresses from being routed across their infrastructure. 63 of 83
  • 64. Classful IP Addressing (1) Three main classes • Class A networks ◦ First octet values range from 1 through 126. ◦ First octet starts with bit 0 ◦ Network mask is 8 bits, written /8 or 255.0.0.0. ◦ 1.0.0.0 through 126.0.0.0 are class A networks with 16777214 hosts each. • Class B networks ◦ First octet values range from 128 through 191. ◦ First octet starts with binary pattern 10. ◦ Network mask is 16 bits, written /16 or 255.255.0.0. ◦ 128.0.0.0 through 191.255.0.0 are class B networks, with 65534 hosts each. 64 of 83
  • 65. Classful IP Addressing (2) • Class C networks ◦ First octet values range from 192 through 223. ◦ First octet starts with binary pattern 110. ◦ Network mask is 24 bits, written /24 or 255.255.255.0. ◦ 192.0.0.0 through 223.255.255.0 are class C networks, with 254 hosts each 65 of 83
  • 66. Two additional classes and reserved addresses • Class D addresses ◦ First octet values range from 224 through 239. ◦ First octet starts with binary pattern 1110. ◦ Class D addresses are multicast addresses, which will not be discussed in this tutorial. • Class E addresses ◦ Essentially everything thats left. ◦ Experimental class, which will not be discussed in this tutorial. • Reserved addresses ◦ 0.0.0.0 is the default IP address, and it is used to specify a default route. The default route will be discussed later. ◦ Addresses beginning with 127 are reserved for internal loopback addresses. It is common to see 127.0.0.1 used as the internal loopback address on many devices. 66 of 83
  • 67. Subnet Masks (1) Extending the classful network mask • Subnet masks are used to make classful networks more manageable and efficient, by creating smaller subnets and reducing the number of host addresses per subnet to what is actually required. • Subnet masks were first used on class boundaries. • Example ◦ Take class A network 10.0.0.0 with network mask 255.0.0.0. ◦ Add additional 8 subnet bits to network mask. ◦ New subnet mask is 255.255.0.0. ◦ New subnets are 10.0.0.0, 10.1.0.0, 10.2.0.0, and so on with 65534 host addresses per subnet. Still too many hosts per subnet. • Example ◦ Take class A network 10.0.0.0 with network mask 255.0.0.0. 67 of 83
  • 68. Subnet Masks (2) ◦ Add additional 16 subnet bits to network mask. ◦ New subnet mask is 255.255.255.0 ◦ New subnets are 10.0.0.0, 10.0.1.0, 10.0.2.0, ..., 10.1.0.0, 10.1.1.0, 10.1.2.0, ..., 10.2.0.0, 10.2.1.0, 10.2.2.0, and so on with 254 host addresses per subnet. • Example ◦ Take class B network 172.16.0.0 with network mask 255.255.0.0. ◦ Add additional 8 subnet bits to network mask. ◦ New subnet mask is 255.255.255.0 ◦ New subnets are 172.16.0.0, 172.16.1.0, 172.16.2.0, and so on with 254 host addresses per subnet. • As shown in these examples... ◦ A class A network can be subnetted to create 256 (28 ) /16 subnets. ◦ A class A network can be subnetted to create 65536 (216 ) /24 subnets. ◦ A class Bnetwork can be subnetted to create 256 (28 ) /24 subnets. 68 of 83
  • 69. DNS Short for Domain Name System (or Service or Server), an Internet service that translates domain names into IP addresses. Because domain names are alphabetic, they’re easier to remember. The Internet however, is really based on IP addresses. Every time you use a domain name, therefore, a DNS service must translate the name into the corresponding IP address. For example, the domain name www.example.com might translate to 198.105.232.4. 69 of 83
  • 71. Figure: The DNS client program sends a request to a DNS server to map the e-mail address to the corresponding IP address 71 of 83
  • 72. Namespace (1) A name space that maps each address to a unique name can be organized in two ways: flat or hierarchical. Flat Name Space In a flat name space, a name is assigned to an address. A name in this space is a sequence of characters without structure. The main disadvantage of a fiat name space is that it cannot be used in a large system such as the Internet because it must be centrally controlled to avoid ambiguity and duplication. Hierarchical Name Space In a hierarchical name space, each name is made of several parts. The first part can define the nature of the organization, the second 72 of 83
  • 73. Namespace (2) part can define the name of an organization, the third part can define departments in the organization, and so on. For example, assume two colleges and a company call one of their computers challenger. The first college is given a name by the central authority such as jhda.edu, the second college is given the name berkeley.edu, and the company is given the name smart. com. When these organizations add the name challenger to the name they have already been given, the end result is three distinguishable names: challenger.jhda.edu, challenger.berkeley.edu, and challenger.smart.com. The names are unique without the need for assignment by a central authority. 73 of 83
  • 74. Figure: The domain names are always read from the node up to the root 74 of 83
  • 75. Figure: The last label is the label of the root (null) as below 75 of 83
  • 76. Domain Figure: A domain is a subtree of the domain name space. The name of the domain is the domain name of the node at the top of the subtree 76 of 83
  • 77. DISTRIBUTION OF NAME SPACE Hierarchy of Name Servers The solution to these problems is to distribute the information among many computers called DNS servers. One way to do this is to divide the whole space into many domains based on the first level. 77 of 83
  • 78. Zone Since the complete domain name hierarchy cannot be stored on a single server, it is divided among many servers. What a server is responsible for or has authority over is called a zone. The server makes a database called a zone file and keeps all the information for every node under that domain. 78 of 83
  • 79. Root Server A root server is a server whose zone consists of the whole tree. There are several root servers, each covering the whole domain name space. Primary and Secondary Servers A primary server loads all information from the disk file; the secondary server loads all information from the primary server. When the secondary downloads information from the primary, it is called zone transfer. 79 of 83
  • 80. Figure: DNS is a protocol that can be used in different platforms. In the Internet, the domain name space (tree) is divided into three different sections: generic domains, country domains, and the inverse domain 80 of 83
  • 81. Generic Domains Figure: The generic domains define registered hosts according to their generic behavior. Each node in the tree defines a domain, which is an index to the domain name space database 81 of 83
  • 82. Country Domains Figure: The country domains section uses two-character country abbreviations (e.g., us for United States). Second labels can be organizational, or they can be more specific, national designations. 82 of 83
  • 83. Inverse Domain The inverse domain is used to map an address to a name. This may happen, for example, when a server has received a request from a client to do a task. Although the server has a file that contains a list of authorized clients, only the IP address of the client (extracted from the received IP packet) is listed. The server asks its resolver to send a query to the DNS server to map an address to a name to determine if the client is on the authorized list. 83 of 83