Introduction Phil Smithwiki.computing.hct.ac.uk/_media/computing/hnd/l4_u...an organization does not...

45

Transcript of Introduction Phil Smithwiki.computing.hct.ac.uk/_media/computing/hnd/l4_u...an organization does not...

Page 1: Introduction Phil Smithwiki.computing.hct.ac.uk/_media/computing/hnd/l4_u...an organization does not have the right tools in place to handle this demand, managing the network can become
Page 2: Introduction Phil Smithwiki.computing.hct.ac.uk/_media/computing/hnd/l4_u...an organization does not have the right tools in place to handle this demand, managing the network can become

Introduction

Phil Smith

Page 3: Introduction Phil Smithwiki.computing.hct.ac.uk/_media/computing/hnd/l4_u...an organization does not have the right tools in place to handle this demand, managing the network can become

Learning outcomesOn successful completion of this unit you will be able

to:

LO1. Examine networking principles and their

protocols.

Page 4: Introduction Phil Smithwiki.computing.hct.ac.uk/_media/computing/hnd/l4_u...an organization does not have the right tools in place to handle this demand, managing the network can become

Role of networks1. working practice

2. commercial opportunity

3. information sharing

4. Collaboration

Page 5: Introduction Phil Smithwiki.computing.hct.ac.uk/_media/computing/hnd/l4_u...an organization does not have the right tools in place to handle this demand, managing the network can become

Role of networks Task

Investigate the purpose, resource implications,

communications, working practice, commercial

opportunity, information sharing and collaboration of

networks.

Page 6: Introduction Phil Smithwiki.computing.hct.ac.uk/_media/computing/hnd/l4_u...an organization does not have the right tools in place to handle this demand, managing the network can become

System types1. Network operating systems are used to manage

multiple computers on a single system. Every

computer has an operating system for the

individual device, but a network system is used as

a central system for an entire grouping of

computers. The types of network systems vary

according to the specific demands of the system.

Page 7: Introduction Phil Smithwiki.computing.hct.ac.uk/_media/computing/hnd/l4_u...an organization does not have the right tools in place to handle this demand, managing the network can become

Network System typesTask

You will be given two numbers.

Research the system types from the list below against the numbers you have been given.

Then report to the class what you have found.

1. Peer-based

2. client-server

3. cloud

4. cluster

5. centralised

6. virtualised

Page 8: Introduction Phil Smithwiki.computing.hct.ac.uk/_media/computing/hnd/l4_u...an organization does not have the right tools in place to handle this demand, managing the network can become

System types1. Peer-based,

1. These networks are far less common as they involve

storing the files on individual computers rather

than a centralized network. This means each

computer must share hard-drive contents with all

other computers on the network. Collectively, the

computers make the network possible. This model is

more common when used by a single individual

while connecting multiple devices.

Page 9: Introduction Phil Smithwiki.computing.hct.ac.uk/_media/computing/hnd/l4_u...an organization does not have the right tools in place to handle this demand, managing the network can become

System types1. client-server

1. These are the most common types of network

operating systems and they are frequently used in

business, government, schools and other

organizations that require a central server. The

server houses all of the files for the network, and

each computer is tied into the server.

Page 10: Introduction Phil Smithwiki.computing.hct.ac.uk/_media/computing/hnd/l4_u...an organization does not have the right tools in place to handle this demand, managing the network can become

System types Cloud based storage and browser based software has

changed the way many businesses operate. Cloud based

systems are more effective and efficient in most cases.

The only downside to the cloud systems is the need for

connectivity. A stable connection to the cloud is

mandatory for file access.

Rather than storing everything on a centralized, physical

server, the business hosts all files on a cloud based

account.

They can manage permissions for file access, and each

employee has a login to

access files on the cloud account.

E.g. Onedrive

Page 11: Introduction Phil Smithwiki.computing.hct.ac.uk/_media/computing/hnd/l4_u...an organization does not have the right tools in place to handle this demand, managing the network can become

System types1. Cluster

A cluster network is two or more computing devices working together for a common computing purpose. These networks take advantage of the parallel processing power of the computing devices. In addition to the increased processing power, shared computing resources in a cluster network also can provide scalability, high availability, and failover capabilities should one computing device have a problem.

There are three basic types of computing clusters: load-balancing clusters, high availability clusters, and high-performance clusters.

Page 12: Introduction Phil Smithwiki.computing.hct.ac.uk/_media/computing/hnd/l4_u...an organization does not have the right tools in place to handle this demand, managing the network can become

System types1. A high availability cluster

Page 13: Introduction Phil Smithwiki.computing.hct.ac.uk/_media/computing/hnd/l4_u...an organization does not have the right tools in place to handle this demand, managing the network can become

System types1. Centralised

1. A type of network where all users connect to a

central server, which is the acting agent for all

communications. This server would store both the

communications and the user account information.

Most public instant messaging platforms use a

centralized network. Also called centralized server-

structure

Page 14: Introduction Phil Smithwiki.computing.hct.ac.uk/_media/computing/hnd/l4_u...an organization does not have the right tools in place to handle this demand, managing the network can become

System types1. Virtualised

1. Application Virtualization

2. Desktop Virtualization

3. Hardware Virtualization

4. Network Virtualization

5. Storage Virtualization

Page 15: Introduction Phil Smithwiki.computing.hct.ac.uk/_media/computing/hnd/l4_u...an organization does not have the right tools in place to handle this demand, managing the network can become

System types1. Network Virtualization

1. Network virtualization is a method that combines all

physical networking equipment into a single resource. It is

the process of dividing bandwidth into multiple,

independent channels, each of which can be assigned to

servers and devices in real time.

Page 16: Introduction Phil Smithwiki.computing.hct.ac.uk/_media/computing/hnd/l4_u...an organization does not have the right tools in place to handle this demand, managing the network can become

TopologyNetwork topology refers to the physical or logical

layout of a network. It defines the way different

nodes are placed and interconnected with each

other. Alternately, network topology may describe

how the data is transferred between these nodes.

There are two types of network topologies:

physical and logical.

Physical topology emphasizes the physical layout

of the connected devices and nodes, while the

logical topology focuses on the pattern of data

transfer between network nodes.

Page 17: Introduction Phil Smithwiki.computing.hct.ac.uk/_media/computing/hnd/l4_u...an organization does not have the right tools in place to handle this demand, managing the network can become

Topology Logical

Ethernet

The IEEE 802.3 standard is popularly called as Ethernet (more on this later)

The Ethernet topology was developed at the University of Hawaii to connect computers on the various Islands. It was radio based design.Ethernet is one of the most popular Computer Network or LAN technologies in use today covering more than 85% of the computer networks.

Page 18: Introduction Phil Smithwiki.computing.hct.ac.uk/_media/computing/hnd/l4_u...an organization does not have the right tools in place to handle this demand, managing the network can become

Topology Logical

A token ring network is a local area network (LAN) topology where nodes/stations are arranged in a ring topology. Data passes sequentially between nodes on the network until it returns to the source station. To prevent congestion and collision, a token ring topology uses a token to ensure that only one node/station on the line is used at a time, thereby easily denoting media users of its activity.

A token ring LAN is physically wired as a star topology but configured as a ring topology.

The token ring LAN system was standardized by the Institute of Electrical and Electronics Engineers as IEEE 802.5.

Page 19: Introduction Phil Smithwiki.computing.hct.ac.uk/_media/computing/hnd/l4_u...an organization does not have the right tools in place to handle this demand, managing the network can become

Topology physical

e.g. star, bus, mesh, tree, ring.

Page 20: Introduction Phil Smithwiki.computing.hct.ac.uk/_media/computing/hnd/l4_u...an organization does not have the right tools in place to handle this demand, managing the network can become

Topology physical

Bus Topology: All the devices/nodes are connected

sequentially to the same backbone or transmission

line. This is a simple, low-cost topology, but its single

point of failure presents a risk.

Page 21: Introduction Phil Smithwiki.computing.hct.ac.uk/_media/computing/hnd/l4_u...an organization does not have the right tools in place to handle this demand, managing the network can become

Topology physical

Mesh Topology: The topology in each node is directly

connected to some or all the other nodes present in

the network. This redundancy makes the network

highly fault tolerant but the escalated costs may limit

this topology to highly critical networks.

Page 22: Introduction Phil Smithwiki.computing.hct.ac.uk/_media/computing/hnd/l4_u...an organization does not have the right tools in place to handle this demand, managing the network can become

Topology physical

Tree Topology: A root node is connected to two or

more sub-level nodes, which themselves are

connected hierarchically to sub-level nodes.

Physically, the tree topology is similar to bus and star

topologies; the network backbone may have a bus

topology, while the low-level nodes connect using star

topology.

Page 23: Introduction Phil Smithwiki.computing.hct.ac.uk/_media/computing/hnd/l4_u...an organization does not have the right tools in place to handle this demand, managing the network can become

Topology physical

Ring Topology: All network devices are connected

sequentially to a backbone as in bus topology except

that the backbone ends at the starting node, forming

a ring. Ring topology shares many of bus topology's

disadvantages so its use is limited to networks that

demand high throughput.

Page 24: Introduction Phil Smithwiki.computing.hct.ac.uk/_media/computing/hnd/l4_u...an organization does not have the right tools in place to handle this demand, managing the network can become

Topology physical

Star Topology: All the nodes in the network are

connected to a central device like a hub or switch via

cables. Failure of individual nodes or cables does not

necessarily create downtime in the network but the

failure of a central device can. This topology is the

most preferred and popular model.

Page 25: Introduction Phil Smithwiki.computing.hct.ac.uk/_media/computing/hnd/l4_u...an organization does not have the right tools in place to handle this demand, managing the network can become

Topology – quick task What kind of topology is your home network?

Use draw.io to draw a network diagram of your home

network.

Then decide what type of topology it is?

Page 26: Introduction Phil Smithwiki.computing.hct.ac.uk/_media/computing/hnd/l4_u...an organization does not have the right tools in place to handle this demand, managing the network can become

Networking standards Conceptual models

OSI model

TCP/IP model

standards: e.g. IEEE 802.x.

Important standards organisations -

• American national standard institute (ANSI)

•Institute of electrical and electronics engineers (IEEE)

•International standard organization (ISO)

Page 27: Introduction Phil Smithwiki.computing.hct.ac.uk/_media/computing/hnd/l4_u...an organization does not have the right tools in place to handle this demand, managing the network can become

Networking standards Conceptual models

standards: e.g. IEEE 802.x.

Page 28: Introduction Phil Smithwiki.computing.hct.ac.uk/_media/computing/hnd/l4_u...an organization does not have the right tools in place to handle this demand, managing the network can become

Networking standards Conceptual models

standards: what standard is used on your lab PC

See if you can discover the 802.xx standard on your

pc.

1. Choose network & internet settings

2. Choose change connection settings then look at the

information being displayed. (Do not change anything).

https://standards.ieee.org/standard/802_11-2012.html

Page 29: Introduction Phil Smithwiki.computing.hct.ac.uk/_media/computing/hnd/l4_u...an organization does not have the right tools in place to handle this demand, managing the network can become

Networking standards Conceptual OSI model

developers

Network engineer

Page 30: Introduction Phil Smithwiki.computing.hct.ac.uk/_media/computing/hnd/l4_u...an organization does not have the right tools in place to handle this demand, managing the network can become

Networking standards Conceptual models

e.g. OSI model and TCP/IP model

Page 31: Introduction Phil Smithwiki.computing.hct.ac.uk/_media/computing/hnd/l4_u...an organization does not have the right tools in place to handle this demand, managing the network can become

Networking standards Conceptual models

Page 32: Introduction Phil Smithwiki.computing.hct.ac.uk/_media/computing/hnd/l4_u...an organization does not have the right tools in place to handle this demand, managing the network can become

Networking standards Conceptual models

Page 33: Introduction Phil Smithwiki.computing.hct.ac.uk/_media/computing/hnd/l4_u...an organization does not have the right tools in place to handle this demand, managing the network can become

Protocols1. Purpose of protocols

1. Network Protocols are a set of rules governing

exchange of information in an easy, reliable and

secure way. The most popular model used to

establish open communication between two systems

is the Open Systems Interface (OSI) model

proposed by ISO.

Page 34: Introduction Phil Smithwiki.computing.hct.ac.uk/_media/computing/hnd/l4_u...an organization does not have the right tools in place to handle this demand, managing the network can become

Protocols1. The OSI protocols are called a protocol stack or

network stack as they all communication using

standardized protocols (rules and formats).

Page 35: Introduction Phil Smithwiki.computing.hct.ac.uk/_media/computing/hnd/l4_u...an organization does not have the right tools in place to handle this demand, managing the network can become

Protocols1. routed protocols e.g.

1. IPv4

1. IPv4 is a type of Internet networking protocol that

functions as an address for devices connected to a

network. Once connected to a network, an IPv4 address is

assigned by the host (usually an Internet service provider,

or ISP) to the client (the user's device, be it computer, cell

phone or gaming system) as a way of identifying where

queried traffic should be routed to.

2. A global unicast address is simply what we call a public IP

address in IPv4—that is, an IP address that is routed

across the whole Internet. You can make out a global

unicast address easily: The first three bits are set to 001.

Page 36: Introduction Phil Smithwiki.computing.hct.ac.uk/_media/computing/hnd/l4_u...an organization does not have the right tools in place to handle this demand, managing the network can become

Protocols1. routed protocols e.g.

1. IPv4 addresses are commonly found in the format of

xxx.xxx.xxx.xxx or some variation thereof, with each

x replaced by a number from one to nine.

Page 37: Introduction Phil Smithwiki.computing.hct.ac.uk/_media/computing/hnd/l4_u...an organization does not have the right tools in place to handle this demand, managing the network can become

Protocols1. IPV4, IPv6, IPv6 addressing

1. There are three general types of IPv6 addresses: unicast, multicast, and anycast.

2. Multicast addresses are also known in IPv4. These addresses identify multiple network interfaces / hosts. A typical use of multicast addresses in a Windows environment is the deployment of OS images to multiple hosts, simultaneously.

3. You know unicast addresses from IPv4. A unicast address is the most common form of an IP address and is assigned to one network interface.

4. This is a new address type in IPv6. Like a multicast address, an anycast address identifies multiple interfaces; however, while multicast packets are accepted by multiple machines, anycast packets are delivered only to one interface (host). This address type allows for services that are provided by multiple servers where only one server has to respond. In routing, anycast addresses are used to route packets to the closest routers.

Page 38: Introduction Phil Smithwiki.computing.hct.ac.uk/_media/computing/hnd/l4_u...an organization does not have the right tools in place to handle this demand, managing the network can become

Protocols IPv6 has different address types. One of the

important and widely used IPv6 Address type is IPv6 Link Local Address. Every IPv6 enable interfaces must have a Link-Local Address either with manual configuration or auto-address configuration. IPv6 Link Local Address is the address used between Point-to-Point interfaces and provide IPv6 Neighbor Discovery.

Point-to-point interfaces do not need a Global IPv6 Address to communicate each other. Instead, they use IPv6 Link Local Addresses for point-to-point communication. Routers do not forward these Link-Local Addresses because they are used only on a single link.

Page 39: Introduction Phil Smithwiki.computing.hct.ac.uk/_media/computing/hnd/l4_u...an organization does not have the right tools in place to handle this demand, managing the network can become

Protocols1. A routing protocol specifies how routers communicate

with each other, distributing information that enables

them to select routes between any two nodes on a

computer network. Routers perform the "traffic

directing" functions on the Internet. Each router has a

prior knowledge only of networks attached to it directly.

A routing protocol shares this information first among

immediate neighbors, and then throughout the network.

This way, routers gain knowledge of the topology of the

network. The ability of routing protocols to dynamically

adjust to changing conditions such as disabled data

lines and computers and route data around

obstructions is what gives the Internet its survivability

and reliability.

Page 40: Introduction Phil Smithwiki.computing.hct.ac.uk/_media/computing/hnd/l4_u...an organization does not have the right tools in place to handle this demand, managing the network can become

Protocols1. EUI-64 (Extended Unique Identifier) is a method

we can use to automatically configure IPv6 host

addresses. An IPv6 device will use the MAC

address of its interface to generate a unique 64-bit

interface ID.

Page 41: Introduction Phil Smithwiki.computing.hct.ac.uk/_media/computing/hnd/l4_u...an organization does not have the right tools in place to handle this demand, managing the network can become

Protocols

Page 42: Introduction Phil Smithwiki.computing.hct.ac.uk/_media/computing/hnd/l4_u...an organization does not have the right tools in place to handle this demand, managing the network can become

ProtocolsTask

Using your number allocated to you earlier research the meaning of 3 terms below.

1. FTP

2. HTTP

3. SMTP

4. POP3

5. SSL

6. Then deliver 1 point from each 1 to the class.

Page 43: Introduction Phil Smithwiki.computing.hct.ac.uk/_media/computing/hnd/l4_u...an organization does not have the right tools in place to handle this demand, managing the network can become

Protocols Final Task

Research Internet Protocol Address Management

(IPAM)

Make a few short notes then deliver 1 to the class.

Page 44: Introduction Phil Smithwiki.computing.hct.ac.uk/_media/computing/hnd/l4_u...an organization does not have the right tools in place to handle this demand, managing the network can become

All You Need To Know About IPAM We currently live in an IP dependent world; the explosion of

IP enabled devices such as smartphones, laptops, tablets and other random devices in the workplace has made today’s enterprise networks more dynamic and complex. If an organization does not have the right tools in place to handle this demand, managing the network can become a nightmare. Immediate access to accurate network information is important to an organization’s success and the only way to ensure the network is reliable, secure and well maintained is through Internet Protocol Address Management (IPAM).

https://www.getfilecloud.com/blog/2013/12/internet-protocol-address-management-ipam-explained/

Page 45: Introduction Phil Smithwiki.computing.hct.ac.uk/_media/computing/hnd/l4_u...an organization does not have the right tools in place to handle this demand, managing the network can become

What have we learnt in this

session?

1. System types

2. Networking standards

3. Topology

4. Protocols