0% found this document useful (0 votes)
16 views10 pages

609466608 Networking Reviewer

A computer network is a series of connection points that allows for data transmission, communication, and resource sharing among devices. Networks offer advantages such as accessibility and cost reduction, but also face disadvantages like security risks and technical issues. Understanding networking fundamentals, including types, topologies, and data transmission methods, is essential for effective system and network management.

Uploaded by

roberto bula
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views10 pages

609466608 Networking Reviewer

A computer network is a series of connection points that allows for data transmission, communication, and resource sharing among devices. Networks offer advantages such as accessibility and cost reduction, but also face disadvantages like security risks and technical issues. Understanding networking fundamentals, including types, topologies, and data transmission methods, is essential for effective system and network management.

Uploaded by

roberto bula
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 10

Networking

NETWORKING

Question: WHAT IS A COMPUTER NETWORK?


COMPUTER NETWORK
 A series of connection points that enables us
to transmit, receive and share data in the
form of different file formats.
 It helps us to communicate with each other
and share necessary documents virtually.

ADVANTAGES OF A NETWORK
 Ease of accessibility
 Flexibility
 Convenient resource sharing
 Connectivity
 Security
 Great storage capacity
 Reduced cost

DISADVANTAGES OF A NETWORK
 Memory thirsty
 Spread of computer virus
 Technical issue / implementing issue
 Protecting private data
 Customer control
 Some application programs issue

Question: WHY DO ORGANIZATION NEEDS


SYSTEM AND NETWORK MANAGEMENT?
ADMINISTRATORS ROLES AND FUNCTION IN
AN ORGANIZATION?
Networking
FUNDAMENTALS OF NETWORKING APPLICATIONS OF COMMUNICATION AND
COMPUTER NETWORK / NETWORK
APPLICATIONS
DATA COMMUNICATION AND COMPUTER
 Resource sharing such as printers and storage
NETWORK
devices
DATA COMMUNICATIONS  Exchange of information by means of e-Mails
and FTP
 refers to the transmission of this digital data  Information sharing by using Web or Internet
between two or more computers  Interaction with other users using dynamic web
COMPUTER NETWORK / DATA NETWORK pages
 IP phones
 is a telecommunications network that allows  Video conferences
computers to exchange data.  Parallel computing
 Instant messaging
physical connection between networked
computing devices.
CLASSIFICATION OF COMPUTER NETWORKS

Question: WHY TO LEARN DATA COMMUNICATION 1. GEOGRAPHICAL SPAN


AND COMPUTER NETWORK?  It may be spanned across your table
 It may be spanned across a whole building
 NETWORK BASIC UNDERSTANDING  It may be spanned across a whole city
 A system of interconnected computers and  It may be spanned across multiple cities or
computerized peripherals such as printers is provinces.
called COMPUTER NETWORK. This  It may be one network covering whole world.
interconnection among computers facilitates
information sharing among them. Computers 2. INTER-CONNECTIVITY
may connect to each other by either wired or  NETWORK MESH  Every single device
wireless media. can be connected to every other device on
 NETWORK ENGINEERING network.
 Involves software, firmware, chip level  BUS LIKE STRUCTURE  All devices can
engineering, hardware, and electric pulses. be connected to a single medium but
 To ease network engineering, the whole geographically disconnected.
networking concept is divided into multiple  LINEAR STRUCTURE  Each device is
layers. Each layer is involved in some connected to its left and right peers only.
particular task and is independent of all other  STAR LIKE STRUCTURE  All devices
layers. Layers share data between them and connected together with a single device.
they depend on each other only to take input  HYBRID STRUCTURE  All devices
and send output. connected arbitrarily using all previous ways
 INTERNET to connect each other.
 A network of networks is called an
INTERNETWORK, or simply the internet. It is 3. ADMINISTRATION
the largest network in existence on this  A network could be:
planet.  PRIVATE  belongs a single
 Internet uses TCP/IP protocol suite and uses autonomous system and cannot be
IP as its addressing protocol. Present day, accessed outside its physical or
Internet is widely implemented using IPv4. logical domain.
Because of shortage of address spaces, it is  PUBLIC  accessed by all.
gradually migrating from IPv4 to IPv6.
 Internet enables its users to share and
access enormous amount of information
worldwide.

4. NETWORK ARCHITECTURE
Networking
 CLIENT-SERVER  There can be one or  Internet enables its users to share and access
more systems acting as Server. Other being enormous amount of information worldwide.
Client, requests the Server to serve requests.  Uses/Benefits:
Server takes and processes request on behalf o Web sites
of Clients. o E-mail
 PEER-TO-PEER  Two systems can be o Instant Messaging
connected Point-to-Point, or in back-to-back o Audio and Video Streaming
fashion. They both reside at the same level o Blogging and Social Media
and called PEERS. o Marketing and Networking
 HYBRID  involves network architecture of
o Resource Sharing
both the above types.

NETWORK LAN TECHNOLOGIES


COMPUTER NETWORK TYPES
1. ETHERNET
1. PERSONAL AREA NETWORK (PAN)
 Widely deployed LAN technology.
 Smallest network which is very personal to a
 Invented by Metcalfe and Boggs in 1970.
user.
Standardized in IEEE 802.3 in 1980.
 Connectivity range up to 10 meters
 Ethernet shares media. Network which uses
 Examples: wireless computer keyboard and
shared media has high probability of data
mouse, Bluetooth enabled headphones,
collision.
wireless printers and TV remotes.
 Uses 48-bits MAC address;
2. LOCAL AREA NETWORK (LAN)
 10BASE-T; 10MBPS speed
 A computer network spanned inside a building
 Uses coaxial cable or Cat-5 twisted pair cable
and operated under single administrative
with RJ-45 connector
system.
 Segment length up to 100 meters
 Provides a useful way of sharing the
2. FAST-ETHERNET
resources between end users. The resources
 Extends Ethernet
such as printers, file servers, scanners, and
 100BASE-T; 100MBPS; Cat-5
internet are easily sharable among computers.
 Segment length up to 100 meters UP TO
 LAN covers an organization’ offices, schools,
2000 meters.
colleges or universities. Number of systems
3. GIGA-ETHERNET
connected in LAN may vary from as least as
 introduced in 1995
two to as much as 16 million.
 UTP using Cat-5, Cat-5e and Cat-6 cables
3. METROPOLITAN AREA NETWORK (MAN)
 Speed up to 1000 mbits/seconds
 Expands throughout a city such as cable TV
4. VIRTUAL LAN
network.
 Is a solution to divide a single Broadcast
 Service enables its users to expand their LAN.
domain into multiple Broadcast domains.
 Example: MAN can help an organization to
 Host in one VLAN cannot speak to a host in
connect all of its offices in a city.
another. By default, all hosts are placed into
4. WIDE AREA NETWORK (WAN)
the same VLAN.
 Covers a wide area which may span across
provinces and even a whole country.
 These networks provide connectivity to MANs
and LANs. NETWORKING TERMS AND CONCEPTS
 Example: Asynchronous Transfer Mode  IP address
(ATM), Frame Relay, and Synchronous  Nodes
Optical Network (SONET)  Routers
5. INTERNET WORK  Switches
 A network of networks is called an o Circuit Switching
INTERNETWORK, or simply the internet. It is o Packet Switching
the largest network in existence on this
o Message Switching
planet.
 Ports
 The internet hugely connects all WANs and it
 Network cable types
can have connection to LANs and Home
networks.
Networking
COMPUTER NETWORK TOPOLOGIES  Added Cost; Expensive
 High Maintenance

NETWORK TOPOLOGY 4. RING TOPOLOGY


 Each device is connected to two other
 is the arrangement with which computer systems devices on either side.
or network devices are connected to each other.
 Topologies may define both physical and logical Advantage:
aspect of the network.  Reduces Packet Collision
 Both logical and physical topologies could be same  Easy to Manage and Maintain
or different in a same network.  High Speed-Transfers

Disadvantage:
NETWORK TOPOLOGY TYPES  If one workstation is down, Network failed.
1. POINT-TO-POINT  Difficult to troubleshoot
 Simplest topology with dedicated links  Communication Problem
between two-end points.
5. MESH TOPOLOGY
Advantage:  Host is connected to one or multiple host
 Easy to maintain TWO TYPES:
 Least Delay in communication
 Low cost option  FULL MESH  All nodes are connected;
Expensive Implementation.
Disadvantage:  PARTIALLY MESH  All nodes aren’t
necessary to be connected; Practical.
 Single link Breakdown
 Cannot be Expanded Advantage:
 If anyone fails, all will stop working
 Failure on single device won’t break the
network
 Provides Multiple Paths
2. BUS TOPOLOGY (LINE TOPOLOGY)
 Robust feature
 All devices share single communication line
or cable. Disadvantage:
Advantage:  Costly
 Power Requirements is High
 Easiest topology in connecting peripherals /
 Complex process
removing devices
 Cost Effective
 Easy to expand

Disadvantage:

 Not great for large network 6. TREE TOPOLOGY


 Difficulty in Network Problems  Also known as HIERARCHICAL TOPOLOGY,
 Slow Network Down this is the most common form of network
 Packet loss is high topology in use presently.
 Divides the network into multiple
levels/layers of network.
3. STAR TOPOLOGY
 All host are connected to a central device Layers:
(HUB)  Core Layer
Advantage:  Distribution Layer
 Access Layer
 Reliable
 Fault detection Advantages:
 No Disruptions  Easy Addition of nodes
Disadvantage:  Straight-forward troubleshooting
 Independent nodes
 If Hub is down, all goes down
Networking
Disadvantages:  DOTTED DECIMAL NOTATION

 Expensive implementation
 Network health depends on root nodes
 Maintenance and Configuration

7. HYBRID TOPOLOGY
 Design contains more than one topology.
 HEXADECIMAL NOTATION
Advantage:

 Combined benefits
 Flexible
 Reliable and Easy Integration

Disadvantage:

 Network Expensive DOTTED DECIMAL NOTATION


 Complex design
 Difficult to Install  Binary to Decimal Conversion

NETWORK DATA TRANSMISSION

 The transfer of data from one digital device to


another.

CLASSIFICATION OF NETWORK DATA


 The 32 bit IP address is divided into five sub-classe
TRANSMISSION

1. UNICAST
 One to one transmission
 Advantage: Personalization
2. MULTICAST
 One to many transmissions
 Advantage: Enhanced Efficiency
3. BROADCAST
 One to all transmission
 Advantage: Massive Audience

CLASSFUL IP ADDRESSING
NETWORK ID AND HOST ID

INTRODUCTION TO CLASSFUL IP ADDRESSING

IP ADDRESSING

 Internet Protocol
 The unique number that gets assigned to the
connected device.
 An address having information about how to reach a
specific host.

HOW IP ADDRESS WRITTEN?


Networking
OSI MODEL
 THE TRANSFER LAYER
 responsible for end-to-end
OPEN SYSTEM INTERCONNECTION (OSI) communication between the two
devices.
 Developed by HUBERT ZIMMERMAN  This includes taking data from the
(France) session layer and breaking it up into
 A conceptual model created by the chunks called SEGMENTS before
International Organization for sending it to the network layer.
Standardization (ISO) which enables  also responsible for flow control and error
diverse communication systems to control.
communicate using standard protocols. o FLOW CONTROL  determines
 Provides a standard for different computer
an optimal speed of
systems to be able to communicate with each
transmission to ensure that a
other.
sender with a fast connection
doesn’t overwhelm a receiver with
a slow connection.
WHY DOES THE OSI MODEL MATTER? o ERROR CONTROL  ensuring
 It is a guide that the data received is
 It is useful for troubleshooting network complete, and requesting a
problems retransmission if it isn’t.
 clear framework  THE NETWORK LAYER
 responsible for facilitating data transfer
between two different networks.
7 LAYERS OF OSI MODEL  The network layer breaks up segments
from the transport layer into smaller
 THE APPLICATION LAYER units, called PACKETS, on the sender’s
 This is the only layer that directly device, and reassembling these packets
interacts with data from the user. on the receiving device.
 Client software applications are not part of  also finds the best physical path for the
the application layer. data to reach its destination; this is
 Responsible for the protocols and data known as ROUTING.
manipulation that the software relies on to  THE PHYSICAL LAYER
present meaningful data to the user.  includes the physical equipment
 Application layer protocols include HTTP involved in the data transfer, such as
as well as SMTP (Simple Mail Transfer the cables and switches.
Protocol is one of the protocols that  data gets converted into a BIT STREAM,
enables email communications) which is a string of 1s and 0s.
 THE PRESENTATION LAYER  The physical layer of both devices must
 Primarily responsible for preparing data also agree on a signal convention so that
so that it can be used by the application the 1s can be distinguished from the 0s on
layer. both devices.
 responsible for
o translation
o encryption HOW DATA FLOWS THROUGH THE OSI
o compression. MODEL?
 THE SESSION LAYER
 responsible for opening and closing In order for human-readable information to be
communication between the two transferred over a network from one device to
devices. another, the data must travel down the seven
 also synchronizes data transfer with layers of the OSI Model on the sending device
checkpoints.
Networking
and then travel up the seven layers on the o UTP - Unshielded Twisted Pair
receiving end. o STP - Shielded Twisted Pair

Network Devices SIMILARITIES AND DIFFERENCES


Network Cables  Both can transmit data at 10Mbps,
100Mbps, 1Gbps and 10Gbps
TYPES OF NETWORK DEVICES  STP cable is more expensive
 Both uses RJ45 jack
1. HUB  STP provides more noise resistant
 It connects multiple devices  Both maximum length is 100m or 328ft
 Also acts as repeater
 Simplest in the networking devices
2. SWITCH
 More intelligent than Hubs.
 Improves network efficiency
 Multiport bridge
3. ROUTER
 Intelligent device
 Can divide internal networks
 Interconnect 2 or more heterogeneous
networks
4. BRIDGE UTP UNSHIELDED TWISTED PAIR
 Connects 2 or more host/network
segments
 More intelligent than Repeater
 Phased Out Now
5. GATEWAY
 Connects 2 or more autonomous network
 Computer with multiple NICs
 Similar to Router
6. MODEM
 from Modulator-Demodulators
 MODULATOR  converts digital to
analog
 DEMODULATOR  converts analog
into digital signals
7. ACCESS POINT
 Devices that sends and receives data
wirelessly over radio frequencies (band)
 2.4 GHz
 5 GHz
Things to consider:
 Location
 Attenuation
 Channel Interference

NETWORK CABLES
 TWISTED PAIR CABLES
Networking
Networking
NETWORK INSTALLATION AND 10. LEARN THE BASICS OF NETWORK
CONFIGURATION INSTALLATION
HOW TO MANAGE NETWORK EFFECTIVELY? Benefits:
 Avoid expensive installation/setup
fees
NETWORK INSTALLATION  Strategies
 Saves time
1. DECIDE ON A NETWORK TYPE  Business Fit
Three (3) Basic Network Types:
 Wired Networks
 Wi-Fi Networks
HOW TO MANAGE NETWORK EFFECTIVELY?
 Hybrid Networks
2. PLAN YOUR INSTALLATION 1. Create an inventory of most important
Things to Consider: system
 Start Deciding  Called Critical Infrastructure list
 How many Data Points?  Manually check your Network
 Understand and Get It Right 2. Develop a change control process
3. CALCULATE CABLE AMOUNTS  Document all process
Things to Consider:  Log all the changes implemented
 Choose Location 3. Awareness for the compliance standard
 Measure  Check First
 Add some Extra  System for Compliance and for
4. GET THE RIGHT MATERIAL troubleshooting
Which Network? 4. Have a map with status icon
 Wired  Add an icon for all devices in infrastructure
 Wi-Fi list
 Hybrid  Display this map
5. GATHER THE TOOLS 5. Look at dependencies
Tools Needed:  Set dependencies monitoring
 Punch Down Tools 6. Setup alerting
 Crimping Tools  Schedule monitoring alerts
 Network Test Tool  Alerts to specific server and apps teams
6. POSITION THE WALL PLATES 7. Decide on standards and security
What to do?  Alert is backed up with additional
 Mark it information
 Placed in Convenient and Accessible o SMNP (Simple Network
Location Management Protocol)
 Avoid in Switches o WMI (Windows Management
7. CUT HOLES/RUN THE CABLES Instrumentation)
What to do? 8. Getting supplemental data
 Turn off the Power  Look at Logs
 Run Cables one at a time  Capture the network traffic
 Wear PPE  Log Application Information
8. TEST THE CABLES 9. Network perimeter
What to do?  Watch what’s coming in and out
 Connect it  IDS (Intrusion Detection System)
 Network Test Too EACH 10. Tracking users and devices
9. SET UP THE ROUTER/MODEM  Have a process
Things to consider:  Know who are connected
 Proper Router/Modem
 Proper Electrical outlet
Networking

NETWORK TROUBLESHOOTING NETWORK TROUBLESHOOTING TOOLS


1. COMMAD-LINE TOOLS
 PING  Transmits a datagram to
Network Troubleshooting Tools
another host.
Network Troubleshooting applications  TRACERT / TRACEROUTE 
Hardware Tools Determines the route data takes to get
particular destination.
 IPCONFIG  Verifies network settings
NETWORK TROUBLESHOOTING STEPS and connections.
1. IDENTIFY THE PROBLEM  NSLOOKUP  Locating IP Addresses
 Gather Information associated with a domain name.
 Duplicate the Problem
 Question Users
NETWORK TROUBLESHOOTING
 Identify the symptoms
APPLICATIONS
 Determined changes
 Define individual problems clearly 1. PACKET SNIFFER  Analyzes traffic on
the network. Identify network vulnerabilities.
2. DEVELOP A THEORY 2. PORT SCANNER  Look for open ports
 Produce a theory about the cause (Open or Closed), Port in used and Port
 Simple Problem Cause vulnerability.
 Complicated Issues 3. WIFI ANALYZER  Detects devices and
points of interference in a WIFI signal.
3. TEST THE THEORY
 Using the tools at your disposal
HARDWARE TOOLS
 Try and Try
1. WIRE CRIMPERS  Tools that attaches
4. PLAN OF ACTION media connectors to the ends of the
 Plan to address the problem cables.
 Simple Plan 2. CABLE TESTER  Tools that verifies if a
 Complex Plan signal is transmitted. Diagnosing
connectivity issues.
5. IMPLEMENT THE SOLUTION 3. PUNCH DOWN TOOL  Tool used to
 DIY Solutions connect wires directly to a patch panel.
 Network Administrators approval 4. SPECTRUM ANALYZER  Instrument that
displays the variations of a signal strength
6. VERIFY THE SYSTEM FUNCTIONALITY against frequencies.
 Test the Network
 Make sure the issue has been resolve
 Verification Process

7. DOCUMENT THE ISSUE


 Document each stage:
 Symptoms
 Theory you developed
 Strategy for Testing

You might also like