seminar networking
TRANSCRIPT
-
8/8/2019 Seminar Networking
1/45
Seminar On
NetworkingPresented by
Intramantra Global Solution PVT LTD, Indore
http://intramantra.com
-
8/8/2019 Seminar Networking
2/45
Basics of Networking
Networking began its infancy in the mid -1960s.by the US Department of Defence (DoD).
The original intention of networking was beingdeveloped to withstand a nuclear war.
Telephone networks were to vulnerable and wouldterminate all conversations should a nuclear war occur.
-
8/8/2019 Seminar Networking
3/45
You wake up at 3 a.m. to go to the bathroom and
stop and check your e-mail on the way back to bed.
Basics of Networking
-
8/8/2019 Seminar Networking
4/45
WE ARE DEALING WITH MACHINES INSTEAD OF PEOPLE IN TODAYS WORLD. OUR PRIVACY IS
AFFECTED AND ALMOST ALL OF OUR PERSONAL
INFORMATION CAN BE FOUND IN
THE VIRTUAL WORLD .
Basics of Networking
-
8/8/2019 Seminar Networking
5/45
ARPA ( Advanced R esearch P rojects Agency)was created in response with the launching of the
Sputnik in 1957. ARPA decided that a DoD network should be packet-switched networked consisting of a subnet andhost computers.
Experimental network research was awarded toUCL A, UCSB , S RI and Univ. of Utha in 1969. Theseareas were because they all had a large number of ARPA contracts.
Basics of Networking
-
8/8/2019 Seminar Networking
6/45
These 4 universities also had different and completelyincompatible host computers.
ARPA NET protocols were not suitable for running over multiple networks , so TC P/IP model and protocolswere invented in 1974.
ARPA awarded several other contracts and specificallyUniv.. of California at Berkeley to integrate theprotocols with the Berkeley UN IX.
Basics of Networking
-
8/8/2019 Seminar Networking
7/45
Berkeley developed a convenient program interfaceto the network and wrote many applications , utility,and management programs to make networking easier.
In it early infancy , the OS I protocols were crushed andthe TC P/IP protocols were already in widespread use.
The OS I Model had seven layers because at the time ,IBM had a propriety seven -layer protocol calledSN A (Systems Network Architecture).
Basics of Networking
-
8/8/2019 Seminar Networking
8/45
At the time , IBM dominated the computer companiesand every was scared to death that IBM would use
its clout to force everyone to use SN A.
The OS I was to be produced like an IBM-referencemodel.
The OS I model became the world standard and wasnot controlled by one company , but by a neutralorganization , ISO ( International Standards Association).
Basics of Networking
-
8/8/2019 Seminar Networking
9/45
TYPE S OF N ETW ORKS
L AN LOC AL AR E A NETWO RK IS A SM ALL
GEOG RAPHI C AL AR E A SUC H AS OU R SC HOOLBO AR D.
M AN MET R OP OLIT AN AR E A NETWO RK IS A NETWO RK OVE R A L AR GE R GEOG RAPHI C AL AR E A
SUC H AS T HE PR OV INC IAL GOVE R NMENT.W AN W IDE AR E A NETWO RK IS A NETWO RK USEDOVE R AN E XTR EMELY L AR GE GEOG RAPHI C AL AR E A SUC H AS T HE FEDE RA L GOVE R NMENT.
Basics of Networking
-
8/8/2019 Seminar Networking
10/45
-
8/8/2019 Seminar Networking
11/45
BUS TO P OLOGY ALLOWS INFO R M ATION TO BE
DIR ECTED F R OM ONE COM P UTE R TO T HE OT HER .LOTS OF B IN AR Y COLL IS ION T HOUG H .
Basics of Networking
-
8/8/2019 Seminar Networking
12/45
ST AR TO P OLOGY IS T HE MOST COMMON TY P EUSED. ALL COM P UTE R S AR E ATT ACHED TO A HUB.LESS COLL IS IONS AND MOST EFF IC IENT.
Basics of Networking
-
8/8/2019 Seminar Networking
13/45
RI NG TO P OLOGY - USES A TO KEN TO PA SSINFO R M ATION F R OM 1 COM P UTE R TO T HE OT HER . A TO KEN IS ATT ACHED TO T HE MESS AGE BY T HESENDE R TO IDENT IFY W HICH COM P UTE R S HOULDR ECE IVE T HE MESS AGE. AS T HE MESS AGE MOVES AR OUND T HE RI NG , E ACH COM P UTE R EXAMINES
THE TO KEN. IF T HE COM P UTE R IDENT IFIES T HE TO KEN AS ITS OWN , THEN IT W ILL PR OCESS T HEINFO R M ATION.
Basics of Networking
-
8/8/2019 Seminar Networking
14/45
A DIS ADV ANT AGE OF A TO KEN RI NG IS IF ONECOM P UTE R IS B R OKEN O R DOWN , THE MESS AGEC ANNOT BE PA SSED TO T HE OT HER COM P UTE R S.
Basics of Networking
-
8/8/2019 Seminar Networking
15/45
The seven layers of the OS I Model are:
Layer 1 PH S IC LLayer 2 ATA LIN Layer 3 N E TWORKLayer 4 TRA N SPORTLayer 5 SESS IO NLayer 6 PR ESEN TATIO NLayer 7 APPL ICATIO N
Basics of Networking
-
8/8/2019 Seminar Networking
16/45
Each one of you was assigned a number whenyou entered the lab. Get together with your team
member(s).
Begin to research the layer that your number isassociated with.
Research as much information as you can in15 minutes and make notes of your finding.
Basics of Networking
-
8/8/2019 Seminar Networking
17/45
Once complete, we will create a bigger groupwith all the layer present.
You will present your finding to your group aboutthe layer. You will only have 2 minutes to present.
Basics of Networking
-
8/8/2019 Seminar Networking
18/45
THE PH YS IC AL L AYER
The physical layer is concerned with transmitting
raw bits over a communication channel thoughhubs, wires (cat5U TP ), modems, network cardsbasically anything that is physical to the network.
When looking at network cables , there are2 types that affect nodes. They are:
In networking , computers are also known asHosts or Nodes.
Basics of Networking
-
8/8/2019 Seminar Networking
19/45
-
8/8/2019 Seminar Networking
20/45
Wiring:1-3 White /Orange2-6 Orange3-1 White /Green6-2 Green4-4 Blue5-5 White /Blue7-7 White /Brown8-8 Brown
Typical Crossover Cable
Basics of Networking
-
8/8/2019 Seminar Networking
21/45
TW ISTED S HIELDED PAIR USED IN PH ONE L INES , NETWO RK S
UNS HIELDED TW ISTED PAIR
CO AXIAL C ABLE USED IN C ABLEV IS ION G R E AT FO R VIDEO
F IBR E O P TIC C ABLES - USES L IGHT TO C ARR Y S IGN AL BUTHAR D TO WO RK WITH AND LOOSES S IGN AL OVE R LONGE R DIST ANCES
COMMUNICA TION CHANN EL S
Basics of Networking
-
8/8/2019 Seminar Networking
22/45
Crimping Tool Hub
Basics of Networking
-
8/8/2019 Seminar Networking
23/45
THE DATA-LINK LA YER
The data link layer takes raw transmission and
transform it into a line that appears free of transmission errors in the network layer.
The Data- Link Layer also is where you would findthe MAC Address. (Media Access Control). To find the
MAC Address of your computer, or any computer:Start/ P rograms/ MS P rompt and type: ipconfig/all
Basics of Networking
"C:\ WINDO WS>" prompt , type "tracertwww.howstuffworks.com"
-
8/8/2019 Seminar Networking
24/45
THE DATA-LINK LA YER
You will also find smart devices such as switches inthe Data- Link Layer.
The digital information that needs to be sent such asand e-mail, attachments, etc needs to be broken intosmaller bits known as packets.
These packets require some information similar tosending a letter in the mail.
Basics of Networking
-
8/8/2019 Seminar Networking
25/45
Hea der Trailer (Footer)Conta ins : Conta ins :Mac Address (if a va ila ble) Ma c Address (from your computer)IP Address (where it's going) IP Address (where it ca me from)
PACKETS
Bits of information
THE RE A RE A NUMBE R OF PACKETS THAT WILLFOLLOW EACH OTHE R TO THE FI NAL DESTI NATION.
Basics of Networking
-
8/8/2019 Seminar Networking
26/45
THE NETW ORK LA YER
The network layer is concerned with controlling
the operation of the subnet. A R OUTE R is used todetermining how packets are routed from sourceto destination.
If one path is busy, then the router will select another path for the packets to travel. So really, the packetscan all have different paths and find their way to thefinal destination.
Basics of Networking
-
8/8/2019 Seminar Networking
27/45
THE NETW ORK LA YER
The router has millions of I P addressing built into
the software, and knows where to send the packets.
IP stands for Internet P rotocol and is basically anaddress that the packets will be sent to.
An example would be 216.27.61.137
Basics of Networking
-
8/8/2019 Seminar Networking
28/45
THE NETW ORK LA YERIf you look at the I P Address, the number are brokeninto different categories.
216. 27.61.137
Classification Hosts
216. 27.61.137
Octets
Basics of Networking
-
8/8/2019 Seminar Networking
29/45
Classifications can be broken into 3 classes. They are:
Class A - Only the first octet is used for addressing andthe balance used for hosts.
Class B - The first two octet are used for addressingand the balance used for hosts.
Class C - The first three octet are used for addressingand the balance used for hosts.
Basics of Networking
-
8/8/2019 Seminar Networking
30/45
Every machine on the Internet has a unique
identifying number , called an IP Address.
A typical IP address looks like this:
216.27.61.137
But computers communicate in binary form.
Basics of Networking
-
8/8/2019 Seminar Networking
31/45
The same IP address in binary:
11011000.00011011.00111101.10001001
216.27.61.137
Basics of Networking
-
8/8/2019 Seminar Networking
32/45
If you add all the positions together , you get 32 ,
which is why IP addresses are considered
32-bit numbers
Combine the four octets and you get 2 32 or a possible
4 ,2 94 ,967 ,2 96 unique values.
11011000.00011011.00111101.10001001
Basics of Networking
-
8/8/2019 Seminar Networking
33/45
Class A - This class is for very large networks ,
such as a major international company might have.
IP addresses with a first octet from 1 to 1 2 6 are
part of this class.
Basics of Networking
-
8/8/2019 Seminar Networking
34/45
Class B - This class is used for medium-sized networks.
A good example is a large college campus.
IP addresses with a first octet from 1 2 8 to 191
are part of this class. Class B addresses also include
the second octet as part of the Net identifier.
Basics of Networking
-
8/8/2019 Seminar Networking
35/45
Class C - Class C addresses are commonly used for
small to mid-size businesses. IP addresses
with a first octet from 19 2 to 22 3 are part of this
class. Class C addresses also include the second
and third octets as part of the Net identifier.
Basics of Networking
-
8/8/2019 Seminar Networking
36/45
Loopback - The IP address 127.0.0.1 is used
as the loopback address. This means that it isused by the host computer to send a message
back to itself.
Basics of Networking
LOO P BACK
-
8/8/2019 Seminar Networking
37/45
-
8/8/2019 Seminar Networking
38/45
THE S ESSION LA YER
The session layer allows different machines to
establish sessions between themselves.
Once communications are established, encryptionthen begins both parties.
Basics of Networking
-
8/8/2019 Seminar Networking
39/45
THE P RES ENTATION LA YER
The P resentation Layers job is managing data
structures and converting from the representationused inside the computer to the network standardrepresentation an visa versa.
In English terms, the P resentation layer basicallytakes the packets and re-assembles them so you canopen the e-mail or the attachment.
If any packets got lost along the way, or weredamaged, then the P resentation layer will send asign to the sender that it requires the specific packet.
Basics of Networking
-
8/8/2019 Seminar Networking
40/45
THE APPL ICATION LA YER
The Application layer contains a variety of protocols
that are commonly required. Another Application layer function is file transfer.
Different file systems have different file naming
conventions , different ways of representing text lines , and so on.
Transferring a file between two different systemsrequires handling and other incompatibilities.
Basics of Networking
-
8/8/2019 Seminar Networking
41/45
-
8/8/2019 Seminar Networking
42/45
SOA P - Si p le Obj ec t AccessP r o toco lSOA P de fines a s tanda r d ay to encode o bj ec tsw it i n ne two r packe ts s ing X L.
PTh e ynam ic os t on figu r a tion P r o toco l
(P
) suppo rt s au toma ti c add r ess ass ignmen tand imp r oved con figu r a tion managemen t o f I Pne two r ks .
TH E APP LI AT ION L A YER
Basics of Networking
-
8/8/2019 Seminar Networking
43/45
IP v6 - Internet P rotocol version 6
IPv6 promises to relieve the current I P addressshortage, and this new version of the protocolmay also increase performance and improveadministration capabilities.
PPP o E
The P oint to P oint P rotocol over Ethernet(PPP o E) standard helps access providersmanage their broadband service delivery, andit can a lso improve the ea se of use for DS L andcable modem customers.
THE APPL ICATION LA YER
Basics of Networking
-
8/8/2019 Seminar Networking
44/45
As you can see, the OSI Model is a sophisticatedand complicated model, but I hope you gainedsome information on the way this theoretical modelwork.
The package that I have given you also has anIP Addressing assignment that I use with my Grade12 Computer Engineering Students.
Basics of Networking
-
8/8/2019 Seminar Networking
45/45