SlideShare ist ein Scribd-Unternehmen logo
1 von 28
Downloaden Sie, um offline zu lesen
1
Basic Networking Concepts
1. Introduction
2. Protocols
3. Protocol Layers
4. Network Interconnection/Internet
2
1. Introduction
-A network can be defined as a group of computers and other devices
connected in some ways so as to be able to exchange data.
-Each of the devices on the network can be thought of as a node; each
node has a unique address.
-Addresses are numeric quantities that are easy for computers to work
with, but not for humans to remember.
Example: 204.160.241.98
-Some networks also provide names that humans can more easily
remember than numbers.
Example: www.javasoft.com, corresponding to the above numeric
address.
NIC addr1 NIC addrNNIC addr2


3
Addressing
Internet address
Consists of 4 bytes separated by periods
Example: 136.102.233.49
-The R first bytes (R= 1,2,3) correspond to the network address;
-The remaining H bytes (H = 3,2,1) are used for the host machine.
-InterNIC Register: organization in charge of the allocation of the
address ranges corresponding to networks.
-Criteria considered:
→ Geographical area (country)
→ Organization, enterprise
→ Department
→ Host
Domain Name System (DNS)
-Mnemonic textual addresses are provided to facilitate the manipulation
of internet addresses.
-DNS servers are responsible for translating mnemonic textual Internet
addresses into hard numeric Internet addresses.
4
Ports
-An IP address identifies a host machine on the Internet.
-An IP port will identify a specific application running on an Internet host
machine.
-A port is identified by a number, the port number.
-The number of ports is not functionally limited, in contrast to serial
communications where only 4 ports are allowed.
-There are some port numbers which are dedicated for specific
applications.
79Finger
23Telnet
110POP3 (e-mail)
25SMTP (e-mail)
70Gopher
20 and 21FTP
80HTTP
Port numbersApplications
5
Data Transmission
-In modern networks, data are transferred using packet switching.
-Messages are broken into units called packets, and sent from one
computer to the other.
-At the destination, data are extracted from one or more packets and
used to reconstruct the original message.
-Each packet has a maximum size, and consists of a header and a data
area.
-The header contains the addresses of the source and destination
computers and sequencing information necessary to reassemble
the message at the destination.
1001
.101 00010000111
000000110001100
packet
header data
6
Types of Networks
There are two principle kinds of networks: Wide Area Networks
(WANs) and Local Area Networks (LANs).
WANs
-Cover cities, countries, and continents.
-Based on packet switching technology
-Examples of WAN technology: Asynchronous Transfer Mode (ATM),
Integrated Services Digital Network (ISDN)
LANs
-Cover buildings or a set of closely related buildings.
-Examples of LAN technology: Ethernet, Token Ring, and Fibber
Distributed Data Interconnect (FDDI).
Ethernet LANs: based on a bus topology and broadcast communication
Token ring LANs: based on ring topology
FDDI LANs: use optical fibbers and an improved token ring mechanism
based on two rings flowing in opposite directions.
7
Shared
bus
(a) Ethernet LAN
Ring
(b) Token Ring LAN
Dual ring
(c) FDDI LAN
8
Network connectivity type Speed Transmission time
for 10 Mbytes
(Telephone) dial-up modem 14.4 Kbps 90 min
ISDN modem 56/128 Kbps 45/12min
T1 connection 1.54 Mbps 50s
Ethernet 10 Mbps 9s
Token ring 4/16 Mbps
Fast Ethernet 100 Mbps
FDDI 100 Mbps
Gigabit Ethernet 1 Gbps
ATM 25Mbps/2.4Gbs
9
Interconnection
-Networks of low capacity may be connected together via a backbone
network which is a network of high capacity such as a FDDI network, a
WAN network etc.
-LANs and WANs can be interconnected via T1 or T3 digital leased
lines
-According to the protocols involved, networks interconnection is
achieved using one or several of the following devices:
→Bridge: a computer or device that links two similar LANs based on
the same protocol.
→ Router: a communication computer that connects different types of
networks using different protocols.
→ B-router or Bridge/Router: a single device that combines both the
functions of bridge and router.
→ Gateway: a network device that connects two different systems, using
direct and systematic translation between protocols.
10
Toronto branch
Ethernet LAN Router
Vancouver branch
Token Ring LAN
Gateway
Frame
Relay
ATM
T1 line
NY headquaters
Bridge/Route
Token Ring LAN
Router
Bridge
Bridge/Router
Ethernet
11
Network Topology Diagram
The specification of the network topology diagram requires the
definition of the characteristics and entities underlying the network:
-Geographical locations of the different components or subnets
involved in the network.
-Description of the LAN topology
-Description of the WAN topology
-Description of the network connectors such as routers, bridges,
repeaters, and gateways.
12
2. Protocols
-Define the rules that govern the communications between two
computers connected to the network.
-Roles: addressing and routing of messages, error detection and
recovery, sequence and flow controls etc.
-A protocol specification consists of the syntax, which defines the kinds
and formats of the messages exchanged, and the semantic, which
specifies the action taken by each entity when specific events occur.
Example: HTTP protocol for communication between web browsers
and servers.
13
S: MAIL FROM: Paul@Alpha.ARPA
R: 250 OK
S: RCPT TO: Jack@Beta.ARPA
R: 250 OK
S: DATA
R: 354 Beginning of mail; ending by <CRLF>.<CRLF>
S: Blah blah blah
S: 
etc.
S: <CRLF>.<CRLF>
R: 250 OK
Request For Comments (RFC): specifications of the protocols involved
in Internet Communications.
-Example: sample of RFC 821 describing communications between
SMTP server and client.
14
nth layer
(n-1)th layer


nth layer
(n-1)th layer


Network
-Protocols are designed based on a layered architecture such as the OSI
reference model.
-Each entity at a layer n communicates only with entities at layer n-1.
-The data exchanged, known as Protocol Data Unit (PDU), goes back
and forth through the layers, each layer adds or removes its own header
and vice-versa. Therefore a layer n PDU may become a layer n-1 data.
15
3. Protocol Layers
The OSI (Open Systems Interconnection) Data Model
-ISO standard for computer networks design and functioning.
-Involves at least 7 layers, each playing a specific role when
applications are communicating over the net.
-During the sending process, each layer (from top to down) will add
a specific header to the raw data.
-At the reception, headers are eliminated conversely until the data
arrived to the receiving application.
16
OSI Layers
Physical layer
(defines the physical characteristics of the network)
Data-link layer
(provides safe communication of data over the physical network)
Network layer
(handles connection to the network by the higher layers)
Transport layer
(provides end-to-end errors detection and correction)
Session layer
(manages sessions among applications)
Presentation layer
(provides standard data representations for applications)
Application layer
(applications connected to the network)
17
Physical layer: ensures a safe and efficient travel of data; consists of
electronic circuits for data transmission etc.
Data link layer: in charge of data encapsulation under the form of
packets and their interpretation at the physical layer.
Network layer: in charge of packets transmission from a source A to a
destination B.
Transport layer: in charge of the delivery of packets from a source A
to a destination B
Session layer: in charge of the management of network access.
Presentation layer: determines the format of the data transmitted to
applications, data compressing/decompressing, encrypting etc.
Application layer: contains the applications which are used by the
end-user, such as Java, Word etc.
18
The TCP/IP Model
-Consists of only 4 layers: application, transport, internet and network.
Layers
Application layer
(applications and processes running on the network)
Transport layer
(provides end-to-end data delivery services)
Internet layer
(makes datagrams and handles data routing)
Network layer
(provides routines allowing access to the physical network)
19
Network layer
-Provides the same functionality as the physical, the data link and
network layers in the OSI model.
-Mapping between IP addresses and network physical addresses.
-Encapsulation of IP datagrams, e.g packets, in format understandable
by the network.
Internet layer
-Lies at the heart of TCP/IP.
-Based on the Internet Protocol (IP), which provides the frame for
transmitting data from place A to place B.
Transport layer
-Based on two main protocols: TCP (Transmission Control Protocol)
and UDP (User Datagram protocol)
Application layer
-Combines the functions of the OSI application, presentation, and
session layers.
-Protocols involved in this layer: HTTP, FTP, SMTP etc.
20
4. Networks Interconnection/Internet
Concept of Network Interconnection
-First implemented in the Defense Advanced Research Project Agency
Network (Arpanet), in 1966 in USA.
-Consists of connecting several computer networks based on different
protocols
-Requires the definition of a common interconnection protocol on top
the local protocols.
-The Internet Protocol (IP) plays this role, by defining unique addresses
for a network and a host machine.
FTP Telnet SNMPSMTP
TCP/UDP
IP
Ethernet Arpanet Token ring
21
P2P1
P3P4
IP
22
Internet Protocol (IP)
Overview
-The IP protocol provides two main functionality:
→Decomposition of the initial information flow into packets of
standardized size, and reassembling at the destination.
→Routing of a packet through successive networks, from the source
machine to the destination identified by its IP address.
-Transmitted packets are not guaranteed to be delivered (datagram
protocol).
-The IP protocol does not request for connection (connectionless)
before sending data and does not make any error detection.
Functions
-Decompose the initial data (to be sent) into datagrams.
-Each datagram will have a header including, the IP address and the
port number of the destination.
-Datagrams are then sent to selected gateways, e.g IP routers, connected
at the same time to the local network and to an IP service provider
network.
23
Sender
Receiver
packet1
packet2
Routers
-Datagrams are transferred from gateways to gateways until they arrived
at their final destination.
24
Structure of an IP packet
-The fields at the beginning of the packet, called the frame header,
define the IP protocol’s functionality and limitations.
-32 bits are allocated for encoding source and destination addresses (32
bits for each of these address fields).
-The remainder of the header (16 bits) encodes various information such
as the total packet length in bytes.
-Hence an IP packet can be a maximum of 64Kb long.
0 10 12 16 20 24
Header
Checksum
Source address
Destination address
Options
Data
25
Transmission Control Protocol (TCP)
Overview
-TCP provides by using IP packets a basic service that does guarantee
safe delivery:
→error detection
→safe data transmission
→assurance that data are received in the correct order
-Before sending data, TCP requires that the computers communicating
establish a connection (connection-oriented protocol).
Client
ServerTCP
SYN
SYN_ACK
ACK
DATA
DATA
ACK
DATA
FIN
FIN
ACK
26
-TCP provides support for sending and receiving arbitrary amounts of
data as one big stream of byte data (IP is limited to 64Kb).
-TCP does so by breaking up the data stream into separate IP packets.
-Packets are numbered, and reassembled on arrival, using sequence and
sequence acknowledge numbers.
-TCP also improves the capability of IP by specifying port numbers.
→ There are 65,536 different TCP ports (sockets) through which every
TCP/IP machine can talk.
Structure of a TCP packet
0 2 4 8 12 20
Source port
Destination port
Sequence No.
Sequence Ack. No.
Misc. header
Data
27
User Datagram Protocol (UDP)
Overview
-Datagram protocol also built on top of IP.
-Has the same packet-size limit (64Kb) as IP, but allows for port
number specification.
-Provides also 65,536 different ports.
-Hence, every machine has two sets of 65,536 ports: one for TCP and the
other for UDP.
-Connectionless protocol, without any error detection facility.
-Provides only support for data transmission from one end to the other,
without any further verification.
-The main interest of UDP is that since it does not make further
verification, it is very fast.
-Useful for sending small size data in a repetitive way such as time
information.
28
4.5 Internet Application Protocols
On top of TCP/IP, several services have been developed in order to
homogenize applications of same nature:
-FTP (File Transfer Protocol) allows the transfer of collection of files
between two machines connected to the Internet.
-Telnet (Terminal Protocol) allows a user to connect to a remote host in
terminal mode.
-NNTP (Network News Transfer Protocol) allows the constitution of
communication groups (newsgroups) organized around specific topics.
-SMTP (Simple Mail Transfer Protocol) defines a basic service for
electronic mails.
-SNMP (Simple Network Management Protocol) allows the
management of the network.
FTP Telnet SNMPSMTP
TCP/UDP
IP
Ethernet Arpanet Token ring

Weitere Àhnliche Inhalte

Was ist angesagt?

Features of mobile ip
Features of mobile ipFeatures of mobile ip
Features of mobile ippriya Nithya
 
Computer Network - Network Layer
Computer Network - Network LayerComputer Network - Network Layer
Computer Network - Network LayerManoj Kumar
 
Physical layer OSI Model & Transmission Media
Physical layer OSI Model & Transmission MediaPhysical layer OSI Model & Transmission Media
Physical layer OSI Model & Transmission MediaMukesh Chinta
 
Subnet Masks
Subnet MasksSubnet Masks
Subnet Masksswascher
 
W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)Parvesh Taneja
 
Reference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IPReference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IPMukesh Chinta
 
Network Layer design Issues.pptx
Network Layer design Issues.pptxNetwork Layer design Issues.pptx
Network Layer design Issues.pptxAcad
 
Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteProtocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteAtharaw Deshmukh
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference ModelMukesh Tekwani
 
Basics of IP Addressing
Basics of IP AddressingBasics of IP Addressing
Basics of IP AddressingKushal Sheth
 
IP Addressing & subnetting strategy
IP Addressing & subnetting strategyIP Addressing & subnetting strategy
IP Addressing & subnetting strategyMustafa Salam
 
MAC Address – All you Need to Know About it
MAC Address – All you Need to Know About itMAC Address – All you Need to Know About it
MAC Address – All you Need to Know About itAsya Karapetyan
 
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSDr. SELVAGANESAN S
 
Email security
Email securityEmail security
Email securityBaliram Yadav
 

Was ist angesagt? (20)

Features of mobile ip
Features of mobile ipFeatures of mobile ip
Features of mobile ip
 
Computer Network - Network Layer
Computer Network - Network LayerComputer Network - Network Layer
Computer Network - Network Layer
 
Physical layer OSI Model & Transmission Media
Physical layer OSI Model & Transmission MediaPhysical layer OSI Model & Transmission Media
Physical layer OSI Model & Transmission Media
 
Ethernet
EthernetEthernet
Ethernet
 
Subnet Masks
Subnet MasksSubnet Masks
Subnet Masks
 
Token bus
Token busToken bus
Token bus
 
W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)
 
Reference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IPReference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IP
 
Addressing
AddressingAddressing
Addressing
 
IPv4 Addressing
 IPv4 Addressing   IPv4 Addressing
IPv4 Addressing
 
Network Layer design Issues.pptx
Network Layer design Issues.pptxNetwork Layer design Issues.pptx
Network Layer design Issues.pptx
 
Mobile IP
Mobile IPMobile IP
Mobile IP
 
Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteProtocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol Suite
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference Model
 
Basics of IP Addressing
Basics of IP AddressingBasics of IP Addressing
Basics of IP Addressing
 
Subnetting
SubnettingSubnetting
Subnetting
 
IP Addressing & subnetting strategy
IP Addressing & subnetting strategyIP Addressing & subnetting strategy
IP Addressing & subnetting strategy
 
MAC Address – All you Need to Know About it
MAC Address – All you Need to Know About itMAC Address – All you Need to Know About it
MAC Address – All you Need to Know About it
 
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
 
Email security
Email securityEmail security
Email security
 

Ähnlich wie Basic Networking Concepts Explained

Dist 03-4
Dist 03-4Dist 03-4
Dist 03-4jesuscried
 
Project report on mesh hybrid topology network vision
Project report on mesh hybrid topology network visionProject report on mesh hybrid topology network vision
Project report on mesh hybrid topology network visionJignesh Ameta
 
Class_notes_InternetTechnology
Class_notes_InternetTechnologyClass_notes_InternetTechnology
Class_notes_InternetTechnologyGulrez Khan
 
Concept of networking
Concept of networkingConcept of networking
Concept of networkingsumit dimri
 
Lecture 2 -_understanding_networks_with_presenter_notes
Lecture 2 -_understanding_networks_with_presenter_notesLecture 2 -_understanding_networks_with_presenter_notes
Lecture 2 -_understanding_networks_with_presenter_notesSerious_SamSoul
 
Introduction to Networks_v0.2
Introduction to Networks_v0.2Introduction to Networks_v0.2
Introduction to Networks_v0.2Sohail Gohir
 
Internet basics and Cloud Computing- Manish Jha
Internet basics and Cloud Computing- Manish JhaInternet basics and Cloud Computing- Manish Jha
Internet basics and Cloud Computing- Manish Jhamanish jha
 
Manish Jha- Research Scholar- Internet Basics Requriement
Manish Jha- Research Scholar- Internet Basics RequriementManish Jha- Research Scholar- Internet Basics Requriement
Manish Jha- Research Scholar- Internet Basics RequriementManish Jha
 
Network essentials chapter 3
Network essentials  chapter 3Network essentials  chapter 3
Network essentials chapter 3Raghu nath
 
Cisco doc
Cisco docCisco doc
Cisco docPrakash V
 
Network essentials chapter 4
Network essentials  chapter 4Network essentials  chapter 4
Network essentials chapter 4Raghu nath
 
Network essentials chapter 2
Network essentials  chapter 2Network essentials  chapter 2
Network essentials chapter 2Raghu nath
 
Networking fundamentals
Networking  fundamentalsNetworking  fundamentals
Networking fundamentalsThe Avi Sharma
 
Computer networks--networks
Computer networks--networksComputer networks--networks
Computer networks--networksNoor Azura Adnan
 
Automation Networking By Shivam Singh
Automation Networking By Shivam SinghAutomation Networking By Shivam Singh
Automation Networking By Shivam SinghShivam Singh
 
Ccna introduction
Ccna introductionCcna introduction
Ccna introductionMukesh Gautam
 

Ähnlich wie Basic Networking Concepts Explained (20)

Dist 03-4
Dist 03-4Dist 03-4
Dist 03-4
 
Project report on mesh hybrid topology network vision
Project report on mesh hybrid topology network visionProject report on mesh hybrid topology network vision
Project report on mesh hybrid topology network vision
 
Class_notes_InternetTechnology
Class_notes_InternetTechnologyClass_notes_InternetTechnology
Class_notes_InternetTechnology
 
Concept of networking
Concept of networkingConcept of networking
Concept of networking
 
Mohanccna
MohanccnaMohanccna
Mohanccna
 
Osi model
Osi modelOsi model
Osi model
 
Lecture 2 -_understanding_networks_with_presenter_notes
Lecture 2 -_understanding_networks_with_presenter_notesLecture 2 -_understanding_networks_with_presenter_notes
Lecture 2 -_understanding_networks_with_presenter_notes
 
Introduction to Networks_v0.2
Introduction to Networks_v0.2Introduction to Networks_v0.2
Introduction to Networks_v0.2
 
Internet basics and Cloud Computing- Manish Jha
Internet basics and Cloud Computing- Manish JhaInternet basics and Cloud Computing- Manish Jha
Internet basics and Cloud Computing- Manish Jha
 
Manish Jha- Research Scholar- Internet Basics Requriement
Manish Jha- Research Scholar- Internet Basics RequriementManish Jha- Research Scholar- Internet Basics Requriement
Manish Jha- Research Scholar- Internet Basics Requriement
 
Network essentials chapter 3
Network essentials  chapter 3Network essentials  chapter 3
Network essentials chapter 3
 
OSI model.pptx
OSI model.pptxOSI model.pptx
OSI model.pptx
 
Cisco doc
Cisco docCisco doc
Cisco doc
 
Network essentials chapter 4
Network essentials  chapter 4Network essentials  chapter 4
Network essentials chapter 4
 
Computer networking
Computer networkingComputer networking
Computer networking
 
Network essentials chapter 2
Network essentials  chapter 2Network essentials  chapter 2
Network essentials chapter 2
 
Networking fundamentals
Networking  fundamentalsNetworking  fundamentals
Networking fundamentals
 
Computer networks--networks
Computer networks--networksComputer networks--networks
Computer networks--networks
 
Automation Networking By Shivam Singh
Automation Networking By Shivam SinghAutomation Networking By Shivam Singh
Automation Networking By Shivam Singh
 
Ccna introduction
Ccna introductionCcna introduction
Ccna introduction
 

KĂŒrzlich hochgeladen

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...gurkirankumar98700
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 

KĂŒrzlich hochgeladen (20)

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 

Basic Networking Concepts Explained

  • 1. 1 Basic Networking Concepts 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet
  • 2. 2 1. Introduction -A network can be defined as a group of computers and other devices connected in some ways so as to be able to exchange data. -Each of the devices on the network can be thought of as a node; each node has a unique address. -Addresses are numeric quantities that are easy for computers to work with, but not for humans to remember. Example: 204.160.241.98 -Some networks also provide names that humans can more easily remember than numbers. Example: www.javasoft.com, corresponding to the above numeric address. NIC addr1 NIC addrNNIC addr2 

  • 3. 3 Addressing Internet address Consists of 4 bytes separated by periods Example: 136.102.233.49 -The R first bytes (R= 1,2,3) correspond to the network address; -The remaining H bytes (H = 3,2,1) are used for the host machine. -InterNIC Register: organization in charge of the allocation of the address ranges corresponding to networks. -Criteria considered: → Geographical area (country) → Organization, enterprise → Department → Host Domain Name System (DNS) -Mnemonic textual addresses are provided to facilitate the manipulation of internet addresses. -DNS servers are responsible for translating mnemonic textual Internet addresses into hard numeric Internet addresses.
  • 4. 4 Ports -An IP address identifies a host machine on the Internet. -An IP port will identify a specific application running on an Internet host machine. -A port is identified by a number, the port number. -The number of ports is not functionally limited, in contrast to serial communications where only 4 ports are allowed. -There are some port numbers which are dedicated for specific applications. 79Finger 23Telnet 110POP3 (e-mail) 25SMTP (e-mail) 70Gopher 20 and 21FTP 80HTTP Port numbersApplications
  • 5. 5 Data Transmission -In modern networks, data are transferred using packet switching. -Messages are broken into units called packets, and sent from one computer to the other. -At the destination, data are extracted from one or more packets and used to reconstruct the original message. -Each packet has a maximum size, and consists of a header and a data area. -The header contains the addresses of the source and destination computers and sequencing information necessary to reassemble the message at the destination. 1001
.101 00010000111
000000110001100 packet header data
  • 6. 6 Types of Networks There are two principle kinds of networks: Wide Area Networks (WANs) and Local Area Networks (LANs). WANs -Cover cities, countries, and continents. -Based on packet switching technology -Examples of WAN technology: Asynchronous Transfer Mode (ATM), Integrated Services Digital Network (ISDN) LANs -Cover buildings or a set of closely related buildings. -Examples of LAN technology: Ethernet, Token Ring, and Fibber Distributed Data Interconnect (FDDI). Ethernet LANs: based on a bus topology and broadcast communication Token ring LANs: based on ring topology FDDI LANs: use optical fibbers and an improved token ring mechanism based on two rings flowing in opposite directions.
  • 7. 7 Shared bus (a) Ethernet LAN Ring (b) Token Ring LAN Dual ring (c) FDDI LAN
  • 8. 8 Network connectivity type Speed Transmission time for 10 Mbytes (Telephone) dial-up modem 14.4 Kbps 90 min ISDN modem 56/128 Kbps 45/12min T1 connection 1.54 Mbps 50s Ethernet 10 Mbps 9s Token ring 4/16 Mbps Fast Ethernet 100 Mbps FDDI 100 Mbps Gigabit Ethernet 1 Gbps ATM 25Mbps/2.4Gbs
  • 9. 9 Interconnection -Networks of low capacity may be connected together via a backbone network which is a network of high capacity such as a FDDI network, a WAN network etc. -LANs and WANs can be interconnected via T1 or T3 digital leased lines -According to the protocols involved, networks interconnection is achieved using one or several of the following devices: →Bridge: a computer or device that links two similar LANs based on the same protocol. → Router: a communication computer that connects different types of networks using different protocols. → B-router or Bridge/Router: a single device that combines both the functions of bridge and router. → Gateway: a network device that connects two different systems, using direct and systematic translation between protocols.
  • 10. 10 Toronto branch Ethernet LAN Router Vancouver branch Token Ring LAN Gateway Frame Relay ATM T1 line NY headquaters Bridge/Route Token Ring LAN Router Bridge Bridge/Router Ethernet
  • 11. 11 Network Topology Diagram The specification of the network topology diagram requires the definition of the characteristics and entities underlying the network: -Geographical locations of the different components or subnets involved in the network. -Description of the LAN topology -Description of the WAN topology -Description of the network connectors such as routers, bridges, repeaters, and gateways.
  • 12. 12 2. Protocols -Define the rules that govern the communications between two computers connected to the network. -Roles: addressing and routing of messages, error detection and recovery, sequence and flow controls etc. -A protocol specification consists of the syntax, which defines the kinds and formats of the messages exchanged, and the semantic, which specifies the action taken by each entity when specific events occur. Example: HTTP protocol for communication between web browsers and servers.
  • 13. 13 S: MAIL FROM: Paul@Alpha.ARPA R: 250 OK S: RCPT TO: Jack@Beta.ARPA R: 250 OK S: DATA R: 354 Beginning of mail; ending by <CRLF>.<CRLF> S: Blah blah blah S: 
etc. S: <CRLF>.<CRLF> R: 250 OK Request For Comments (RFC): specifications of the protocols involved in Internet Communications. -Example: sample of RFC 821 describing communications between SMTP server and client.
  • 14. 14 nth layer (n-1)th layer 
 nth layer (n-1)th layer 
 Network -Protocols are designed based on a layered architecture such as the OSI reference model. -Each entity at a layer n communicates only with entities at layer n-1. -The data exchanged, known as Protocol Data Unit (PDU), goes back and forth through the layers, each layer adds or removes its own header and vice-versa. Therefore a layer n PDU may become a layer n-1 data.
  • 15. 15 3. Protocol Layers The OSI (Open Systems Interconnection) Data Model -ISO standard for computer networks design and functioning. -Involves at least 7 layers, each playing a specific role when applications are communicating over the net. -During the sending process, each layer (from top to down) will add a specific header to the raw data. -At the reception, headers are eliminated conversely until the data arrived to the receiving application.
  • 16. 16 OSI Layers Physical layer (defines the physical characteristics of the network) Data-link layer (provides safe communication of data over the physical network) Network layer (handles connection to the network by the higher layers) Transport layer (provides end-to-end errors detection and correction) Session layer (manages sessions among applications) Presentation layer (provides standard data representations for applications) Application layer (applications connected to the network)
  • 17. 17 Physical layer: ensures a safe and efficient travel of data; consists of electronic circuits for data transmission etc. Data link layer: in charge of data encapsulation under the form of packets and their interpretation at the physical layer. Network layer: in charge of packets transmission from a source A to a destination B. Transport layer: in charge of the delivery of packets from a source A to a destination B Session layer: in charge of the management of network access. Presentation layer: determines the format of the data transmitted to applications, data compressing/decompressing, encrypting etc. Application layer: contains the applications which are used by the end-user, such as Java, Word etc.
  • 18. 18 The TCP/IP Model -Consists of only 4 layers: application, transport, internet and network. Layers Application layer (applications and processes running on the network) Transport layer (provides end-to-end data delivery services) Internet layer (makes datagrams and handles data routing) Network layer (provides routines allowing access to the physical network)
  • 19. 19 Network layer -Provides the same functionality as the physical, the data link and network layers in the OSI model. -Mapping between IP addresses and network physical addresses. -Encapsulation of IP datagrams, e.g packets, in format understandable by the network. Internet layer -Lies at the heart of TCP/IP. -Based on the Internet Protocol (IP), which provides the frame for transmitting data from place A to place B. Transport layer -Based on two main protocols: TCP (Transmission Control Protocol) and UDP (User Datagram protocol) Application layer -Combines the functions of the OSI application, presentation, and session layers. -Protocols involved in this layer: HTTP, FTP, SMTP etc.
  • 20. 20 4. Networks Interconnection/Internet Concept of Network Interconnection -First implemented in the Defense Advanced Research Project Agency Network (Arpanet), in 1966 in USA. -Consists of connecting several computer networks based on different protocols -Requires the definition of a common interconnection protocol on top the local protocols. -The Internet Protocol (IP) plays this role, by defining unique addresses for a network and a host machine. FTP Telnet SNMPSMTP TCP/UDP IP Ethernet Arpanet Token ring
  • 22. 22 Internet Protocol (IP) Overview -The IP protocol provides two main functionality: →Decomposition of the initial information flow into packets of standardized size, and reassembling at the destination. →Routing of a packet through successive networks, from the source machine to the destination identified by its IP address. -Transmitted packets are not guaranteed to be delivered (datagram protocol). -The IP protocol does not request for connection (connectionless) before sending data and does not make any error detection. Functions -Decompose the initial data (to be sent) into datagrams. -Each datagram will have a header including, the IP address and the port number of the destination. -Datagrams are then sent to selected gateways, e.g IP routers, connected at the same time to the local network and to an IP service provider network.
  • 23. 23 Sender Receiver packet1 packet2 Routers -Datagrams are transferred from gateways to gateways until they arrived at their final destination.
  • 24. 24 Structure of an IP packet -The fields at the beginning of the packet, called the frame header, define the IP protocol’s functionality and limitations. -32 bits are allocated for encoding source and destination addresses (32 bits for each of these address fields). -The remainder of the header (16 bits) encodes various information such as the total packet length in bytes. -Hence an IP packet can be a maximum of 64Kb long. 0 10 12 16 20 24 Header Checksum Source address Destination address Options Data
  • 25. 25 Transmission Control Protocol (TCP) Overview -TCP provides by using IP packets a basic service that does guarantee safe delivery: →error detection →safe data transmission →assurance that data are received in the correct order -Before sending data, TCP requires that the computers communicating establish a connection (connection-oriented protocol). Client ServerTCP SYN SYN_ACK ACK DATA DATA ACK DATA FIN FIN ACK
  • 26. 26 -TCP provides support for sending and receiving arbitrary amounts of data as one big stream of byte data (IP is limited to 64Kb). -TCP does so by breaking up the data stream into separate IP packets. -Packets are numbered, and reassembled on arrival, using sequence and sequence acknowledge numbers. -TCP also improves the capability of IP by specifying port numbers. → There are 65,536 different TCP ports (sockets) through which every TCP/IP machine can talk. Structure of a TCP packet 0 2 4 8 12 20 Source port Destination port Sequence No. Sequence Ack. No. Misc. header Data
  • 27. 27 User Datagram Protocol (UDP) Overview -Datagram protocol also built on top of IP. -Has the same packet-size limit (64Kb) as IP, but allows for port number specification. -Provides also 65,536 different ports. -Hence, every machine has two sets of 65,536 ports: one for TCP and the other for UDP. -Connectionless protocol, without any error detection facility. -Provides only support for data transmission from one end to the other, without any further verification. -The main interest of UDP is that since it does not make further verification, it is very fast. -Useful for sending small size data in a repetitive way such as time information.
  • 28. 28 4.5 Internet Application Protocols On top of TCP/IP, several services have been developed in order to homogenize applications of same nature: -FTP (File Transfer Protocol) allows the transfer of collection of files between two machines connected to the Internet. -Telnet (Terminal Protocol) allows a user to connect to a remote host in terminal mode. -NNTP (Network News Transfer Protocol) allows the constitution of communication groups (newsgroups) organized around specific topics. -SMTP (Simple Mail Transfer Protocol) defines a basic service for electronic mails. -SNMP (Simple Network Management Protocol) allows the management of the network. FTP Telnet SNMPSMTP TCP/UDP IP Ethernet Arpanet Token ring