SlideShare ist ein Scribd-Unternehmen logo
1 von 27
CSC339 – NETWORK
FUNDAMENTAL
Jahan University
Computer Science Department
Lecturer: Islahuddin Jalal
Master in Cyber Security
10/16/2015Jahan University 1
Class Policy
 A student must reach the class-room in time. Late comers may join the class
but are not entitled to be marked present.
 Attendance shall be marked at the start of the class and students failing to
secure 75% attendance will not be allowed to sit in final exam.
 The assignment submission deadline must be observed. In case of late
submission, ten percent may be deducted from each day.
 Those who are absent on the announcement date of the assignment/test.
Must get the topic/chapter of test/assignment confirmed through their peers.
 Mobile phones must be switched-off in the class-rooms.
10/16/2015Jahan University 2
Grading Evaluation for Network fundamental
Internal Evaluation
Midterm Exam 20%
Attendance 5%
Assignment/Presentations 5%
Quizzes/Tests 10%
Total Internal Evaluation 40%
Final-term Examination
Final-term Exam 60%
Total Marks 100%
10/16/2015Jahan University 3
Topics to be discussed
 What is network?
 Advantages of Network
 Types of network
 Network Architecture
 Wiring Schema (Topology of Network)
10/16/2015Jahan University 4
What is Network?
 A collection of computing devices that are connected in various ways in order
to communicate and share resources
Usually, the connections between computers in a network are made using
physical wires or cables
However, some connections are wireless, using radio waves or infrared signals
 The generic term node or host refers to any device on a network
 Data transfer rate The speed with which data is moved from one place on a
network to another
 Data transfer rate is a key issue in computer networks
10/16/2015Jahan University 5
What is Network?
10/16/2015Jahan University 6
Advantage of Computer Networks
 Sharing of devices such as printer and scanner
 Sharing of program /software
 Sharing of files
 Sharing of data
 Sharing of information
 Sharing of single high-speed internet connection
 Provide facility to access server centered database
10/16/2015Jahan University 7
Types of Network
 There are different types of Networks
 LAN
 CAN
 MAN
 WAN
10/16/2015Jahan University 8
Types of Network
 LAN A network that connects a relatively small number
of machines in a relatively close geographical area
10/16/2015Jahan University 9
Types of Network
10/16/2015Jahan University 10
 CAN – Campus Area Network
 A network spread between multiple contiguous buildings.
Types of Network
 MAN A network spread between multiple non-
contiguous buildings within the single metropolitan
area.
10/16/2015Jahan University 11
Types of Network
 WAN A network that connects two or more local-area networks over a
potentially large geographic distance
10/16/2015Jahan University 12
Network Architecture
 Overall design of a computer network that describes how a computer network
is configured and what strategies are being used
 It is mainly focuses on the function of the networks.
 It is also known as network model or network design
 Types of network architecture:
 Client /Server Network
 Peer to Peer Network
10/16/2015Jahan University 13
Types of Network Architecture
 Client/Server
 In a client/Server network each hosts will act specifically as a server (the provider
of resources) or a client (the receiver of resources).
10/16/2015Jahan University 14
Types of Network Architecture
 Peer-to-Peer
 In Peer-to-Peer network every host will act as a client and a server.
10/16/2015Jahan University 15
The Differences between Client / Server
and Peer-to-Peer
10/16/2015Jahan University 16
Network Topologies (wiring Schema)
 Network Topology: Physical layout of a network is called network topology.
 There are different types of network topologies
 Star Topology
 Bus Topology
 Ring Topology
 Mesh Topology
 Hybrid topology
10/16/2015Jahan University 17
Star Topology
 All the computers are connected through a central connection point (hub,
switch etc)
 A single break in the cable would only take down communication to one
computer
 As hub failure would take down the entire network
10/16/2015Jahan University 18
Bus Topology
 All the computers are connected in straight line
 Terminators must be used at each end of a bus segment to prevent signals
from bouncing
 A single break in the cable would take down the entire network
10/16/2015Jahan University 19
Ring Topology
 All the computers are connected in circular fashion
 Data is passed around the ring from computers to computer
 A break in the cable would take down the entire network
10/16/2015Jahan University 20
Mesh Topology
 All the computers are connected to all other computers
 Typically used in a WAN environment
 Provides fault tolerance in the event of a connection failure
10/16/2015Jahan University 21
Hybrid Topology
 Different types of topologies can be used together to form a hybrid topology.
10/16/2015Jahan University 22
Questions Regarding Topologies
 Which kinds of network topologies connect all devices to a central device?
 What kind of network topology is this?
 What kind of network topologies is used in 802.11 wireless network?
10/16/2015Jahan University 23
Basic Network
10/16/2015Jahan University 24
Hub
Pamir Khkula
How would you say the
PC named Pamir
communicates with the
PC named Khkula?
“Hey Khkula, I love you”
or
“Hey 192.168.0.3, I love
you”
Which one is right?
Both are wrong But why?
Basic Networking
 Because Pamir is actually going to use Khkula’s MAC address
 But what would happen if pamir only knows her name and doesn’t know her IP
address and Mac Address?
 Pamir query
Khkula Response
10/16/2015Jahan University 25
This Problem is solved by
ARP
Source Destination protocol Info
192.168.0.2 Broadcast ARP Who has 192.168.0.3? Tell 192.168.0.2
Source Destination protocol Info
192.168.0.3 192.168.0.2 ARP 192.168.0.3 is at 00:0b:db:99:d3:5e
192.168.0.3 192.168.0.2 NBNS Name query response NB 192.168.0.3
Questions
 What would happen if the network grows and grows and become a large
network?
 What would be the solution?
 What is the Process to split a larger network into a smaller Networks?
 Which devices are needed for network Segmentation?
10/16/2015Jahan University 26
The Network speed become low
To split the network into a smaller Network
Network Segmentation
Routers, Switches and Bridges
END
Thanks for
hearing…………………….

Weitere ähnliche Inhalte

Was ist angesagt?

Networking Cables & Connectors
Networking Cables & ConnectorsNetworking Cables & Connectors
Networking Cables & ConnectorsShamima Akther
 
Introduction to Data Communication
Introduction to Data CommunicationIntroduction to Data Communication
Introduction to Data Communication'Rafid RezA'
 
CN_lec 1_Introduction
CN_lec 1_IntroductionCN_lec 1_Introduction
CN_lec 1_IntroductionRijutha Kumar
 
Seamless ho within wifi wimax
Seamless ho within wifi wimaxSeamless ho within wifi wimax
Seamless ho within wifi wimaxWily Langit
 
TYPES OF COMPUTER NETWORK CABLES
TYPES OF COMPUTER NETWORK CABLES TYPES OF COMPUTER NETWORK CABLES
TYPES OF COMPUTER NETWORK CABLES Sayma Sultana
 
Introduction to Computers Lecture # 14
Introduction to Computers Lecture # 14Introduction to Computers Lecture # 14
Introduction to Computers Lecture # 14Sehrish Rafiq
 
Computer Communication Architecture
Computer Communication ArchitectureComputer Communication Architecture
Computer Communication ArchitectureKamal Acharya
 
network topology
network topologynetwork topology
network topologyJency Pj
 
DISTRIBUTED NETWORKING - By Hansa Edirisinghe
DISTRIBUTED NETWORKING - By Hansa EdirisingheDISTRIBUTED NETWORKING - By Hansa Edirisinghe
DISTRIBUTED NETWORKING - By Hansa EdirisingheHansa Edirisinghe
 
NETWORK STANDARD
NETWORK STANDARDNETWORK STANDARD
NETWORK STANDARDKak Yong
 
Datacom module 3: Data Communications Circuits, Arrangements, and Networks
Datacom module 3:  Data Communications Circuits, Arrangements, and NetworksDatacom module 3:  Data Communications Circuits, Arrangements, and Networks
Datacom module 3: Data Communications Circuits, Arrangements, and NetworksJeffrey Des Binwag
 
Datacom module 2: Data Communication Architecture, Protocols, and Standards
Datacom module 2:  Data Communication Architecture, Protocols, and StandardsDatacom module 2:  Data Communication Architecture, Protocols, and Standards
Datacom module 2: Data Communication Architecture, Protocols, and StandardsJeffrey Des Binwag
 

Was ist angesagt? (20)

PACE-IT: The Transport Layer Plus ICMP
PACE-IT: The Transport Layer Plus ICMPPACE-IT: The Transport Layer Plus ICMP
PACE-IT: The Transport Layer Plus ICMP
 
Networking Cables & Connectors
Networking Cables & ConnectorsNetworking Cables & Connectors
Networking Cables & Connectors
 
Introduction to Data Communication
Introduction to Data CommunicationIntroduction to Data Communication
Introduction to Data Communication
 
Cable Connectors
Cable ConnectorsCable Connectors
Cable Connectors
 
CN_lec 1_Introduction
CN_lec 1_IntroductionCN_lec 1_Introduction
CN_lec 1_Introduction
 
Seamless ho within wifi wimax
Seamless ho within wifi wimaxSeamless ho within wifi wimax
Seamless ho within wifi wimax
 
TYPES OF COMPUTER NETWORK CABLES
TYPES OF COMPUTER NETWORK CABLES TYPES OF COMPUTER NETWORK CABLES
TYPES OF COMPUTER NETWORK CABLES
 
Network Topology
Network TopologyNetwork Topology
Network Topology
 
Introduction to Computers Lecture # 14
Introduction to Computers Lecture # 14Introduction to Computers Lecture # 14
Introduction to Computers Lecture # 14
 
Computer Communication Architecture
Computer Communication ArchitectureComputer Communication Architecture
Computer Communication Architecture
 
network topology
network topologynetwork topology
network topology
 
Introduction to computer networks
 Introduction to computer networks Introduction to computer networks
Introduction to computer networks
 
DISTRIBUTED NETWORKING - By Hansa Edirisinghe
DISTRIBUTED NETWORKING - By Hansa EdirisingheDISTRIBUTED NETWORKING - By Hansa Edirisinghe
DISTRIBUTED NETWORKING - By Hansa Edirisinghe
 
Network Topologies in Simple (Logical, Physical and Types)
Network Topologies in Simple (Logical, Physical and Types)Network Topologies in Simple (Logical, Physical and Types)
Network Topologies in Simple (Logical, Physical and Types)
 
Network Topologies
Network TopologiesNetwork Topologies
Network Topologies
 
PACE-IT: Wan Technologies (part 3) - N10-006
PACE-IT: Wan Technologies (part 3) - N10-006 PACE-IT: Wan Technologies (part 3) - N10-006
PACE-IT: Wan Technologies (part 3) - N10-006
 
Network Chap1
Network Chap1Network Chap1
Network Chap1
 
NETWORK STANDARD
NETWORK STANDARDNETWORK STANDARD
NETWORK STANDARD
 
Datacom module 3: Data Communications Circuits, Arrangements, and Networks
Datacom module 3:  Data Communications Circuits, Arrangements, and NetworksDatacom module 3:  Data Communications Circuits, Arrangements, and Networks
Datacom module 3: Data Communications Circuits, Arrangements, and Networks
 
Datacom module 2: Data Communication Architecture, Protocols, and Standards
Datacom module 2:  Data Communication Architecture, Protocols, and StandardsDatacom module 2:  Data Communication Architecture, Protocols, and Standards
Datacom module 2: Data Communication Architecture, Protocols, and Standards
 

Andere mochten auch

Cisco network fundamental
Cisco network fundamentalCisco network fundamental
Cisco network fundamentallucky prasetiyo
 
Introduction to research data management; Lecture 01 for GRAD521
Introduction to research data management; Lecture 01 for GRAD521Introduction to research data management; Lecture 01 for GRAD521
Introduction to research data management; Lecture 01 for GRAD521Amanda Whitmire
 
BIS2C. Biodiversity and the Tree of Life. 2014. L1. Introduction and Overview.
BIS2C. Biodiversity and the Tree of Life. 2014. L1. Introduction and Overview. BIS2C. Biodiversity and the Tree of Life. 2014. L1. Introduction and Overview.
BIS2C. Biodiversity and the Tree of Life. 2014. L1. Introduction and Overview. Jonathan Eisen
 
Studi Kasus Konfigurasi RIP dan Cisco Access Control List (ACL)
Studi Kasus Konfigurasi RIP dan Cisco Access Control List (ACL)Studi Kasus Konfigurasi RIP dan Cisco Access Control List (ACL)
Studi Kasus Konfigurasi RIP dan Cisco Access Control List (ACL)I Putu Hariyadi
 
Pembahasan NETCOM Beginner Level Skill Pretest
Pembahasan NETCOM Beginner Level Skill PretestPembahasan NETCOM Beginner Level Skill Pretest
Pembahasan NETCOM Beginner Level Skill PretestI Putu Hariyadi
 
CCNA Exploration 4 - Chapter 2
CCNA Exploration 4 - Chapter 2CCNA Exploration 4 - Chapter 2
CCNA Exploration 4 - Chapter 2Irsandi Hasan
 
CCNA Exploration 4 - Chapter 1
CCNA Exploration 4 - Chapter 1CCNA Exploration 4 - Chapter 1
CCNA Exploration 4 - Chapter 1Irsandi Hasan
 
Pembahasan Cisco Packet Tracer Challenge LKS SMK Provinsi NTB 2016
Pembahasan Cisco Packet Tracer Challenge LKS SMK Provinsi NTB 2016Pembahasan Cisco Packet Tracer Challenge LKS SMK Provinsi NTB 2016
Pembahasan Cisco Packet Tracer Challenge LKS SMK Provinsi NTB 2016I Putu Hariyadi
 
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and ConfigurationLAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and ConfigurationAbdelkhalik Mosa
 
Data communication and network Chapter - 2
Data communication and network Chapter - 2Data communication and network Chapter - 2
Data communication and network Chapter - 2Zafar Ayub
 
Pembahasan Solusi Soal UKK SMK TKJ Paket 3 Tahun 2017
Pembahasan Solusi Soal UKK SMK TKJ Paket 3 Tahun 2017Pembahasan Solusi Soal UKK SMK TKJ Paket 3 Tahun 2017
Pembahasan Solusi Soal UKK SMK TKJ Paket 3 Tahun 2017I Putu Hariyadi
 
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and Configuration
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and ConfigurationLAN Switching and Wireless: Ch2 - Basic Switch Concepts and Configuration
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and ConfigurationAbdelkhalik Mosa
 
LAN Switching and Wireless: Ch1 - LAN Design
LAN Switching and Wireless: Ch1 - LAN DesignLAN Switching and Wireless: Ch1 - LAN Design
LAN Switching and Wireless: Ch1 - LAN DesignAbdelkhalik Mosa
 
LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)
LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)
LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)Abdelkhalik Mosa
 
LAN Switching and Wireless: Ch3 - Virtual Local Area Networks (VLANs)
LAN Switching and Wireless: Ch3 - Virtual Local Area Networks (VLANs)LAN Switching and Wireless: Ch3 - Virtual Local Area Networks (VLANs)
LAN Switching and Wireless: Ch3 - Virtual Local Area Networks (VLANs)Abdelkhalik Mosa
 
Lecture 1: Human-Computer Interaction Introduction (2014)
Lecture 1: Human-Computer Interaction Introduction (2014)Lecture 1: Human-Computer Interaction Introduction (2014)
Lecture 1: Human-Computer Interaction Introduction (2014)Lora Aroyo
 

Andere mochten auch (20)

Cisco network fundamental
Cisco network fundamentalCisco network fundamental
Cisco network fundamental
 
Introduction to research data management; Lecture 01 for GRAD521
Introduction to research data management; Lecture 01 for GRAD521Introduction to research data management; Lecture 01 for GRAD521
Introduction to research data management; Lecture 01 for GRAD521
 
BIS2C. Biodiversity and the Tree of Life. 2014. L1. Introduction and Overview.
BIS2C. Biodiversity and the Tree of Life. 2014. L1. Introduction and Overview. BIS2C. Biodiversity and the Tree of Life. 2014. L1. Introduction and Overview.
BIS2C. Biodiversity and the Tree of Life. 2014. L1. Introduction and Overview.
 
Computer network definition
Computer network definitionComputer network definition
Computer network definition
 
Chapter1 rev1.0
Chapter1   rev1.0Chapter1   rev1.0
Chapter1 rev1.0
 
HCI-Lecture-1
HCI-Lecture-1HCI-Lecture-1
HCI-Lecture-1
 
Studi Kasus Konfigurasi RIP dan Cisco Access Control List (ACL)
Studi Kasus Konfigurasi RIP dan Cisco Access Control List (ACL)Studi Kasus Konfigurasi RIP dan Cisco Access Control List (ACL)
Studi Kasus Konfigurasi RIP dan Cisco Access Control List (ACL)
 
Pembahasan NETCOM Beginner Level Skill Pretest
Pembahasan NETCOM Beginner Level Skill PretestPembahasan NETCOM Beginner Level Skill Pretest
Pembahasan NETCOM Beginner Level Skill Pretest
 
CCNA Exploration 4 - Chapter 2
CCNA Exploration 4 - Chapter 2CCNA Exploration 4 - Chapter 2
CCNA Exploration 4 - Chapter 2
 
Chapter 2 point-to-point protocol (ppp)
Chapter 2   point-to-point protocol (ppp)Chapter 2   point-to-point protocol (ppp)
Chapter 2 point-to-point protocol (ppp)
 
CCNA Exploration 4 - Chapter 1
CCNA Exploration 4 - Chapter 1CCNA Exploration 4 - Chapter 1
CCNA Exploration 4 - Chapter 1
 
Pembahasan Cisco Packet Tracer Challenge LKS SMK Provinsi NTB 2016
Pembahasan Cisco Packet Tracer Challenge LKS SMK Provinsi NTB 2016Pembahasan Cisco Packet Tracer Challenge LKS SMK Provinsi NTB 2016
Pembahasan Cisco Packet Tracer Challenge LKS SMK Provinsi NTB 2016
 
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and ConfigurationLAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
 
Data communication and network Chapter - 2
Data communication and network Chapter - 2Data communication and network Chapter - 2
Data communication and network Chapter - 2
 
Pembahasan Solusi Soal UKK SMK TKJ Paket 3 Tahun 2017
Pembahasan Solusi Soal UKK SMK TKJ Paket 3 Tahun 2017Pembahasan Solusi Soal UKK SMK TKJ Paket 3 Tahun 2017
Pembahasan Solusi Soal UKK SMK TKJ Paket 3 Tahun 2017
 
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and Configuration
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and ConfigurationLAN Switching and Wireless: Ch2 - Basic Switch Concepts and Configuration
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and Configuration
 
LAN Switching and Wireless: Ch1 - LAN Design
LAN Switching and Wireless: Ch1 - LAN DesignLAN Switching and Wireless: Ch1 - LAN Design
LAN Switching and Wireless: Ch1 - LAN Design
 
LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)
LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)
LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)
 
LAN Switching and Wireless: Ch3 - Virtual Local Area Networks (VLANs)
LAN Switching and Wireless: Ch3 - Virtual Local Area Networks (VLANs)LAN Switching and Wireless: Ch3 - Virtual Local Area Networks (VLANs)
LAN Switching and Wireless: Ch3 - Virtual Local Area Networks (VLANs)
 
Lecture 1: Human-Computer Interaction Introduction (2014)
Lecture 1: Human-Computer Interaction Introduction (2014)Lecture 1: Human-Computer Interaction Introduction (2014)
Lecture 1: Human-Computer Interaction Introduction (2014)
 

Ähnlich wie Csc339 – lecture 1 network fundamental

Dr. J. VijiPriya - Information Communication and Technology Chapter 7 Data Co...
Dr. J. VijiPriya - Information Communication and Technology Chapter 7 Data Co...Dr. J. VijiPriya - Information Communication and Technology Chapter 7 Data Co...
Dr. J. VijiPriya - Information Communication and Technology Chapter 7 Data Co...VijiPriya Jeyamani
 
Ch # 08 communication devices, network typologies , network protocol
Ch # 08 communication devices, network typologies , network protocolCh # 08 communication devices, network typologies , network protocol
Ch # 08 communication devices, network typologies , network protocolMuhammadRobeel3
 
Presentation for slideshare
Presentation for slidesharePresentation for slideshare
Presentation for slideshareBSITstudents
 
Information systems 365 lecture eight
Information systems 365 lecture eightInformation systems 365 lecture eight
Information systems 365 lecture eightNicholas Davis
 
Design and performance evaluation of a campus network based on routing protoc...
Design and performance evaluation of a campus network based on routing protoc...Design and performance evaluation of a campus network based on routing protoc...
Design and performance evaluation of a campus network based on routing protoc...Chowdhury Mohammad Masum Refat
 
Computer Networks - Unit 1 PPT
Computer Networks - Unit 1 PPTComputer Networks - Unit 1 PPT
Computer Networks - Unit 1 PPTKalpanaC14
 
CN_lec 2_Network_Types
CN_lec 2_Network_TypesCN_lec 2_Network_Types
CN_lec 2_Network_TypesRijutha Kumar
 
COMPUTER NETWORK
COMPUTER NETWORKCOMPUTER NETWORK
COMPUTER NETWORKiqbalrahman
 
Network Models.pptx
Network  Models.pptxNetwork  Models.pptx
Network Models.pptxAhmadAbba6
 
CN_lec 3_Protocol_Layering
CN_lec 3_Protocol_LayeringCN_lec 3_Protocol_Layering
CN_lec 3_Protocol_LayeringRijutha Kumar
 
Training Report on CCNA
Training Report on CCNA Training Report on CCNA
Training Report on CCNA AnuragSharma781
 
Design and Analysis of a Broadcast Network Using Logical Segmentation
Design and Analysis of a Broadcast Network Using Logical SegmentationDesign and Analysis of a Broadcast Network Using Logical Segmentation
Design and Analysis of a Broadcast Network Using Logical SegmentationTELKOMNIKA JOURNAL
 
PPT on computer networks and communication
PPT on computer networks and communicationPPT on computer networks and communication
PPT on computer networks and communicationMuhammadAhsanAnsari5
 
Internet of Things.pdf
Internet of Things.pdfInternet of Things.pdf
Internet of Things.pdfsateeshka
 
Westermo webinar: Learning the Basics of Ethernet Networking
Westermo webinar: Learning the Basics of Ethernet NetworkingWestermo webinar: Learning the Basics of Ethernet Networking
Westermo webinar: Learning the Basics of Ethernet NetworkingWestermo Network Technologies
 

Ähnlich wie Csc339 – lecture 1 network fundamental (20)

Dr. J. VijiPriya - Information Communication and Technology Chapter 7 Data Co...
Dr. J. VijiPriya - Information Communication and Technology Chapter 7 Data Co...Dr. J. VijiPriya - Information Communication and Technology Chapter 7 Data Co...
Dr. J. VijiPriya - Information Communication and Technology Chapter 7 Data Co...
 
CIS 321 ch1.ppt
CIS 321 ch1.pptCIS 321 ch1.ppt
CIS 321 ch1.ppt
 
Ch # 08 communication devices, network typologies , network protocol
Ch # 08 communication devices, network typologies , network protocolCh # 08 communication devices, network typologies , network protocol
Ch # 08 communication devices, network typologies , network protocol
 
Presentation for slideshare
Presentation for slidesharePresentation for slideshare
Presentation for slideshare
 
Information systems 365 lecture eight
Information systems 365 lecture eightInformation systems 365 lecture eight
Information systems 365 lecture eight
 
Design and performance evaluation of a campus network based on routing protoc...
Design and performance evaluation of a campus network based on routing protoc...Design and performance evaluation of a campus network based on routing protoc...
Design and performance evaluation of a campus network based on routing protoc...
 
Computer Networks - Unit 1 PPT
Computer Networks - Unit 1 PPTComputer Networks - Unit 1 PPT
Computer Networks - Unit 1 PPT
 
CN_lec 2_Network_Types
CN_lec 2_Network_TypesCN_lec 2_Network_Types
CN_lec 2_Network_Types
 
Network topology
Network topologyNetwork topology
Network topology
 
COMPUTER NETWORK
COMPUTER NETWORKCOMPUTER NETWORK
COMPUTER NETWORK
 
Network Models.pptx
Network  Models.pptxNetwork  Models.pptx
Network Models.pptx
 
Network topology
Network topologyNetwork topology
Network topology
 
CN_lec 3_Protocol_Layering
CN_lec 3_Protocol_LayeringCN_lec 3_Protocol_Layering
CN_lec 3_Protocol_Layering
 
CCNA CHAPTER 1 BY jetarvind kumar madhukar
CCNA CHAPTER 1 BY jetarvind kumar madhukarCCNA CHAPTER 1 BY jetarvind kumar madhukar
CCNA CHAPTER 1 BY jetarvind kumar madhukar
 
CCNA CHAPTER 1 BY jetarvind kumar madhukar
CCNA CHAPTER 1 BY jetarvind kumar madhukarCCNA CHAPTER 1 BY jetarvind kumar madhukar
CCNA CHAPTER 1 BY jetarvind kumar madhukar
 
Training Report on CCNA
Training Report on CCNA Training Report on CCNA
Training Report on CCNA
 
Design and Analysis of a Broadcast Network Using Logical Segmentation
Design and Analysis of a Broadcast Network Using Logical SegmentationDesign and Analysis of a Broadcast Network Using Logical Segmentation
Design and Analysis of a Broadcast Network Using Logical Segmentation
 
PPT on computer networks and communication
PPT on computer networks and communicationPPT on computer networks and communication
PPT on computer networks and communication
 
Internet of Things.pdf
Internet of Things.pdfInternet of Things.pdf
Internet of Things.pdf
 
Westermo webinar: Learning the Basics of Ethernet Networking
Westermo webinar: Learning the Basics of Ethernet NetworkingWestermo webinar: Learning the Basics of Ethernet Networking
Westermo webinar: Learning the Basics of Ethernet Networking
 

Mehr von Kabul Education University

Mehr von Kabul Education University (20)

Cryptography and Network security # Lecture 8
Cryptography and Network security # Lecture 8Cryptography and Network security # Lecture 8
Cryptography and Network security # Lecture 8
 
ITIL # Lecture 9
ITIL # Lecture 9ITIL # Lecture 9
ITIL # Lecture 9
 
Cryptography and Network security # Lecture 7
Cryptography and Network security # Lecture 7Cryptography and Network security # Lecture 7
Cryptography and Network security # Lecture 7
 
ITIL # Lecture 8
ITIL # Lecture 8ITIL # Lecture 8
ITIL # Lecture 8
 
Cryptography and Network security # Lecture 6
Cryptography and Network security # Lecture 6Cryptography and Network security # Lecture 6
Cryptography and Network security # Lecture 6
 
ITIL # Lecture 7
ITIL # Lecture 7ITIL # Lecture 7
ITIL # Lecture 7
 
Cryptography and Network security # Lecture 5
Cryptography and Network security # Lecture 5Cryptography and Network security # Lecture 5
Cryptography and Network security # Lecture 5
 
Cyber Security # Lec 5
Cyber Security # Lec 5Cyber Security # Lec 5
Cyber Security # Lec 5
 
ITIL # Lecture 6
ITIL # Lecture 6ITIL # Lecture 6
ITIL # Lecture 6
 
Cyber Security # Lec 4
Cyber Security # Lec 4 Cyber Security # Lec 4
Cyber Security # Lec 4
 
ITIL # Lecture 5
ITIL # Lecture 5ITIL # Lecture 5
ITIL # Lecture 5
 
Cyber Security # Lec 3
Cyber Security # Lec 3 Cyber Security # Lec 3
Cyber Security # Lec 3
 
ITIL # Lecture 4
ITIL # Lecture 4ITIL # Lecture 4
ITIL # Lecture 4
 
Cryptography and Network security # Lecture 4
Cryptography and Network security # Lecture 4Cryptography and Network security # Lecture 4
Cryptography and Network security # Lecture 4
 
Cyber Security # Lec 2
Cyber Security # Lec 2Cyber Security # Lec 2
Cyber Security # Lec 2
 
ITIL # Lecture 3
ITIL # Lecture 3ITIL # Lecture 3
ITIL # Lecture 3
 
Cryptography and Network security # Lecture 3
Cryptography and Network security # Lecture 3Cryptography and Network security # Lecture 3
Cryptography and Network security # Lecture 3
 
ITIL # Lecture 2
ITIL # Lecture 2ITIL # Lecture 2
ITIL # Lecture 2
 
Cryptography and Network Security # Lecture 2
Cryptography and Network Security # Lecture 2Cryptography and Network Security # Lecture 2
Cryptography and Network Security # Lecture 2
 
ITIL # Lecture 1
ITIL # Lecture 1ITIL # Lecture 1
ITIL # Lecture 1
 

Kürzlich hochgeladen

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 

Kürzlich hochgeladen (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

Csc339 – lecture 1 network fundamental

  • 1. CSC339 – NETWORK FUNDAMENTAL Jahan University Computer Science Department Lecturer: Islahuddin Jalal Master in Cyber Security 10/16/2015Jahan University 1
  • 2. Class Policy  A student must reach the class-room in time. Late comers may join the class but are not entitled to be marked present.  Attendance shall be marked at the start of the class and students failing to secure 75% attendance will not be allowed to sit in final exam.  The assignment submission deadline must be observed. In case of late submission, ten percent may be deducted from each day.  Those who are absent on the announcement date of the assignment/test. Must get the topic/chapter of test/assignment confirmed through their peers.  Mobile phones must be switched-off in the class-rooms. 10/16/2015Jahan University 2
  • 3. Grading Evaluation for Network fundamental Internal Evaluation Midterm Exam 20% Attendance 5% Assignment/Presentations 5% Quizzes/Tests 10% Total Internal Evaluation 40% Final-term Examination Final-term Exam 60% Total Marks 100% 10/16/2015Jahan University 3
  • 4. Topics to be discussed  What is network?  Advantages of Network  Types of network  Network Architecture  Wiring Schema (Topology of Network) 10/16/2015Jahan University 4
  • 5. What is Network?  A collection of computing devices that are connected in various ways in order to communicate and share resources Usually, the connections between computers in a network are made using physical wires or cables However, some connections are wireless, using radio waves or infrared signals  The generic term node or host refers to any device on a network  Data transfer rate The speed with which data is moved from one place on a network to another  Data transfer rate is a key issue in computer networks 10/16/2015Jahan University 5
  • 7. Advantage of Computer Networks  Sharing of devices such as printer and scanner  Sharing of program /software  Sharing of files  Sharing of data  Sharing of information  Sharing of single high-speed internet connection  Provide facility to access server centered database 10/16/2015Jahan University 7
  • 8. Types of Network  There are different types of Networks  LAN  CAN  MAN  WAN 10/16/2015Jahan University 8
  • 9. Types of Network  LAN A network that connects a relatively small number of machines in a relatively close geographical area 10/16/2015Jahan University 9
  • 10. Types of Network 10/16/2015Jahan University 10  CAN – Campus Area Network  A network spread between multiple contiguous buildings.
  • 11. Types of Network  MAN A network spread between multiple non- contiguous buildings within the single metropolitan area. 10/16/2015Jahan University 11
  • 12. Types of Network  WAN A network that connects two or more local-area networks over a potentially large geographic distance 10/16/2015Jahan University 12
  • 13. Network Architecture  Overall design of a computer network that describes how a computer network is configured and what strategies are being used  It is mainly focuses on the function of the networks.  It is also known as network model or network design  Types of network architecture:  Client /Server Network  Peer to Peer Network 10/16/2015Jahan University 13
  • 14. Types of Network Architecture  Client/Server  In a client/Server network each hosts will act specifically as a server (the provider of resources) or a client (the receiver of resources). 10/16/2015Jahan University 14
  • 15. Types of Network Architecture  Peer-to-Peer  In Peer-to-Peer network every host will act as a client and a server. 10/16/2015Jahan University 15
  • 16. The Differences between Client / Server and Peer-to-Peer 10/16/2015Jahan University 16
  • 17. Network Topologies (wiring Schema)  Network Topology: Physical layout of a network is called network topology.  There are different types of network topologies  Star Topology  Bus Topology  Ring Topology  Mesh Topology  Hybrid topology 10/16/2015Jahan University 17
  • 18. Star Topology  All the computers are connected through a central connection point (hub, switch etc)  A single break in the cable would only take down communication to one computer  As hub failure would take down the entire network 10/16/2015Jahan University 18
  • 19. Bus Topology  All the computers are connected in straight line  Terminators must be used at each end of a bus segment to prevent signals from bouncing  A single break in the cable would take down the entire network 10/16/2015Jahan University 19
  • 20. Ring Topology  All the computers are connected in circular fashion  Data is passed around the ring from computers to computer  A break in the cable would take down the entire network 10/16/2015Jahan University 20
  • 21. Mesh Topology  All the computers are connected to all other computers  Typically used in a WAN environment  Provides fault tolerance in the event of a connection failure 10/16/2015Jahan University 21
  • 22. Hybrid Topology  Different types of topologies can be used together to form a hybrid topology. 10/16/2015Jahan University 22
  • 23. Questions Regarding Topologies  Which kinds of network topologies connect all devices to a central device?  What kind of network topology is this?  What kind of network topologies is used in 802.11 wireless network? 10/16/2015Jahan University 23
  • 24. Basic Network 10/16/2015Jahan University 24 Hub Pamir Khkula How would you say the PC named Pamir communicates with the PC named Khkula? “Hey Khkula, I love you” or “Hey 192.168.0.3, I love you” Which one is right? Both are wrong But why?
  • 25. Basic Networking  Because Pamir is actually going to use Khkula’s MAC address  But what would happen if pamir only knows her name and doesn’t know her IP address and Mac Address?  Pamir query Khkula Response 10/16/2015Jahan University 25 This Problem is solved by ARP Source Destination protocol Info 192.168.0.2 Broadcast ARP Who has 192.168.0.3? Tell 192.168.0.2 Source Destination protocol Info 192.168.0.3 192.168.0.2 ARP 192.168.0.3 is at 00:0b:db:99:d3:5e 192.168.0.3 192.168.0.2 NBNS Name query response NB 192.168.0.3
  • 26. Questions  What would happen if the network grows and grows and become a large network?  What would be the solution?  What is the Process to split a larger network into a smaller Networks?  Which devices are needed for network Segmentation? 10/16/2015Jahan University 26 The Network speed become low To split the network into a smaller Network Network Segmentation Routers, Switches and Bridges