Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014
-
Upload
eingilbert-cartalla-benolirao -
Category
Documents
-
view
15 -
download
1
description
Transcript of Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014
![Page 1: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/1.jpg)
NETWORKING TECHNOLOGIES :FUNDAMENTALS AND CONCEPTS
![Page 2: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/2.jpg)
• When people use computers to communicate, they use a computer network. This is about computer networks and how they are used to transmit information between computers and ultimately between people. It provides a broad overview and foundation for understanding networks and working in the computer and networking.
![Page 3: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/3.jpg)
![Page 4: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/4.jpg)
• People use computers and networks for a wide variety of reasons.
• Three common reasons that people use networks to send information
• from a source, such as a personal computer (PC), to a destination, such as a printer, are:
Communicate and collaborate (i.e., e-mail)
Share information (i.e., document sharing)
Share resources (i.e., printers and servers)
![Page 5: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/5.jpg)
1. Increased Employee Productivity
Ideas are shared more quickly. Everyone moves faster. The organization is more
competitive.
2. Reduced Communication Costs Network-based communication such as e-mail and
“instant messenger” services are a cost-effective alternatives to phoning and faxing, with the potential to deliver significant savings in long distance charges.
![Page 6: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/6.jpg)
3. Reduced Office Equipment Costs Allows equipment – mainly printers and servers, to be shared with multiple users.
4. Access to Resources Anytime/Anywhere Key files, data, and services can be accessed from
any place on the network. With remote access in place, one can travel or work remotely and still be connected.
![Page 7: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/7.jpg)
make a phone call,watch a television showlisten to the radiolook up something on the Internetplay a video game with someone in
another country
All of these activities depend on robust, reliable networks. Converged network
![Page 8: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/8.jpg)
![Page 9: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/9.jpg)
• Modems - Change digital data into analog for transmission over the line. There are three types: Traditional, DSL and Cable
• Modulator-Demodulator.
![Page 10: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/10.jpg)
V.90-based 56Kbps connections
![Page 11: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/11.jpg)
typical hybrid fiber-coax cable TV network
![Page 12: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/12.jpg)
• A NIC (pronounced "nick") is the hardware component inserted into the PC or workstation that provides connectivity to a network. The NIC provides the interface between the physical networking cable and the software implementing the networking protocols. The NIC is responsible for transmitting and receiving information to and from a network.
![Page 13: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/13.jpg)
Speeds available: 10 Mbps, 10/100 Mbps, 10/100/1000 Mbps
Auto sense: This is where a port that can operate at different speeds has the ability to detect the speed of another port to which it is connected; both ports will automatically configure to use the best common speed.
Duplex mode: Half Duplex - The term half duplex is used to describe data transmission that can occur in two directions over the same communications link, in only one direction at a time.
Full Duplex: The ability of a device or line to transmit data simultaneously in both directions over the same communications link, potentially doubling the throughput of traffic.
![Page 14: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/14.jpg)
All PCs require network interface cards (NIC) to make them ready for network use. Some are supplied with NICs already in them. When choosing a NIC for a PC you should consider:
• The speed of your hub, switch, or print server— Ethernet (10Mbps) or Fast Ethernet (100Mbps). • The type of connection you need—RJ-45 for twisted pair or BNC for coaxial cable. • The type of NIC connector available inside your Computer—ISA or PCI.
![Page 15: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/15.jpg)
Each individual NIC throughout the world carries a unique code, called a Media Access Control (MAC) address. Not two NIC are alike. This address is used to control data communication for the host on the network. A MAC address consists of 12 hexadecimal bits. The first 6 hexadecimal represents the NIC manufacturer and the last 6 hex numbers represents the unique number of a NIC.
When a NIC is attached to a computer, the host computer will use the NIC’s MAC address as its physical address in the network. These physical address from the NIC will be used by the computer to identify themselves in the network.
![Page 16: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/16.jpg)
• Media Access Control (MAC) Addresses• MACs are the 48-bit, hexadecimal
hardware addresses that identify Ethernet interfaces. It is presented like so:
• 01:23:45:67:89:00
![Page 17: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/17.jpg)
Installing the NIC.
![Page 18: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/18.jpg)
• Networking Cables and Connectors• RJ-11: Telephone
![Page 19: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/19.jpg)
STP (Shielded Twisted Pair) cable
![Page 20: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/20.jpg)
• RJ-45: CAT-5, 5e and 6
![Page 21: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/21.jpg)
strip cable jacket
![Page 22: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/22.jpg)
arrange wire pairs
![Page 23: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/23.jpg)
AT&T 258A_EIA 568B
![Page 24: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/24.jpg)
RJ-45 Connector inserted
![Page 25: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/25.jpg)
UTP Cable and RJ-45 connector
![Page 26: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/26.jpg)
• BNC: Coaxial
![Page 27: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/27.jpg)
![Page 28: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/28.jpg)
• Basic Network Devices• Hubs - Simple, Layer 1 devices that
create a single broadcast domain. There are four types: Passive, Active, Intelligent and Switching
![Page 29: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/29.jpg)
• Modems - Change digital data into analog for transmission over the line. There are three types: Traditional, DSL and Cable
• Modulator-Demodulator.
![Page 30: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/30.jpg)
LAN Modems
A LAN Modem is router with a built-in Ethernet hub and two 56K analog modem, allowing several workstations to share a single connection to an ISP or remote office LAN, while transferring files locally among all attached workstations.
![Page 31: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/31.jpg)
• Network Interface Cards (NIC) - Cards with which a PC connects to an Ethernet or wireless network.
![Page 32: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/32.jpg)
• Switch - Layer 2 devices that connects and selects between network segments. Unlike hubs, switches provide packet filtering and forwarding.
![Page 33: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/33.jpg)
Manageable Hubs and Switches
Manageable Hubs and Switches are network devices that connects computers together and form a local area network. Aside from basic connectivity, these manageable devices have many useful features that are not present in any ordinary hubs and switches. These features are:
• VLAN (Virtual LAN) - A logical association that allows users to communicate as if they were physically connected to a single LAN, independent of the actual physical configuration of the network.
• Port Security – A feature that disables or enables a particular port on the switch or hub.
• Stackability – A feature that allows switches to be connected physically by a matrix cable and be treated as a single device.
• Link Aggregation – allows 2 – 4 of the switch’s ports to be combined together and treated as a single pipe.
![Page 34: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/34.jpg)
switch_hub
![Page 35: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/35.jpg)
• Router - A layer 3 device that separates network segments into different broadcast domains. Routers are high-level devices that provide an enormous amount of administration and monitoring features and allow for highly complex networks.
![Page 36: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/36.jpg)
Using a router to share a broadband (cable or DSL) modem connection
![Page 37: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/37.jpg)
A Router Helps Protect Your Home Network from Outside Access
![Page 38: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/38.jpg)
Typical home network
![Page 39: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/39.jpg)
typical wireless network
![Page 40: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/40.jpg)
WRT54G2 v1
![Page 41: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/41.jpg)
wireless adapter
![Page 42: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/42.jpg)
• Star - These networks are centrally administrated and nodes can be easily connected or disconnected using network media. This is most commonly seen in 10BASE-t, 100BASE-TX or 1000BASE-T networks.
![Page 43: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/43.jpg)
Star
![Page 44: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/44.jpg)
• Bus - Nodes “tap” into a central line. These networks are almost completely obsolete, as faults with individual nodes bring the entire network down.
![Page 45: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/45.jpg)
Bus
![Page 46: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/46.jpg)
• Mesh - Expensive to implement, mesh networks are easy to maintain and extremely reliable. They also work over great distances.
![Page 47: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/47.jpg)
MESH
![Page 48: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/48.jpg)
• Ring - Uses expensive, proprietary technology that passes a “token” packet around the ring in order to cut down on network collisions.
![Page 49: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/49.jpg)
Ring
![Page 50: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/50.jpg)
• Point to Point - These are simple, ad-hoc networks where one point goes to one other point. They are simple to set up and maintain, but would be expensive if they were the sole topology in a network.
![Page 51: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/51.jpg)
Point to Point
![Page 52: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/52.jpg)
• Point to Multipoint - This network type describes most WAN and VPN setups, like frame-relay. They’re used to connect physically distant devices.
![Page 53: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/53.jpg)
Point to Multipoint
![Page 54: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/54.jpg)
• Hybrid - Most networks are actually hybrids, being composed of one or all of these various topologies.
![Page 55: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/55.jpg)
Project Network Topology and Physical Layout Design:
NETWORK TOPOLOGY DESIGN (using packet tracer simulation ) - employ segmenting the whole campus network into several number of nodes using routers to boost network performance and increases the bandwidth available to each user for network and internet connection.
![Page 56: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/56.jpg)
• Peer to peer• A peer-to-peer network topology means
that each network device is a client and there is no central system. These are mainly used in home or small business networks. Shared resources require computers to be configured independently for access.
![Page 57: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/57.jpg)
• Client/server• A number of client machines are all
administered, authenticated and given access to shared resources through a central server or servers. This type of topology is much easier to maintain as users can be defined in one central location.
![Page 58: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/58.jpg)
client-server LAN
![Page 59: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/59.jpg)
• VPN• A VPN is a private, secure connection
through the public Internet. It allows a “point-to-point” connection between a remote user and a LAN. The connection uses encryption and authentication.
![Page 60: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/60.jpg)
• VLAN• VLANs (Virtual Local Area Networks) are
groups of network nodes that form a single, logical broadcast domain. VLANs use a switch operating at Layer 2, but sometimes need a Layer 3 device to allow VLANs to communicate with each other.
![Page 61: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/61.jpg)
• Network Protocols• Transmission Control Protocol (TCP)
- TCP is a transport layer, host-to-host, connection-oriented protocol. It enables two hosts to establish a connection and exchange network data.
![Page 62: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/62.jpg)
• User Datagram Protocol (UDP)• UDP is a transport layer,
connectionless, unreliable, low overhead protocol. UDP doesn’t offer the assurances of TCP.
![Page 63: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/63.jpg)
• File Transfer Protocol (FTP)• The FTP is an Application layer
protocol that allows a user to upload or download files between hosts
![Page 64: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/64.jpg)
• Secure File Transfer Protocol (SFTP)• SFTP is similar to FTP but comes
with SSH to provide encryption over insecure networks such as the Internet.
![Page 65: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/65.jpg)
• Trivial File Transfer Protocol (TFTP)• TFTP is also similar to FTP but works with
UDP, using less bandwidth than FTP.
![Page 66: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/66.jpg)
• Email Protocols • Simple Mail Transport Protocol
(SMTP) is used to send e-mail. Post Office Protocol 3 (POP3) and Internet Message Access Protocol 4 (IMAP4) are used to receive emails.
![Page 67: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/67.jpg)
• Secure Shell (SSH) • SSH is a suite of protocols that uses the
RSA public-key encryption technology authentication
• Internet Control Message Protocol (ICMP)• ICMP is a network layer protocol providing
management and control
![Page 68: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/68.jpg)
• Address Resolution Protocol (ARP)• ARP is a Network layer protocol that
resolves network (IP) addresses into hardware (MAC) addresses. ARP uses the address resolution cache table built into every NIC.
![Page 69: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/69.jpg)
• Internet Group Multicast Protocol (IGMP)
• IGMP is a Network layer protocol that is used by an Internet computer to report its multicast group membership to adjacent routers.
![Page 70: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/70.jpg)
• Telnet• Telnet is a terminal emulation protocol
and program that uses TCP for transport, and most often used for server and network device remote administration.
![Page 71: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/71.jpg)
• Transport Layer Security (TLS)• TLS replaces SSL and/or HTTPS in
providing a secure mode of transport for data from server to client.
• Session Initiation Protocol (SIP)• SIP is a VoIP call control protocol that uses
a URL to address a specific endpoint.
![Page 72: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/72.jpg)
• Dynamic Host Configuration Protocol (DHCP)
• DHCP is used by devices to request IP addresses and local network configuration parameters.
![Page 73: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/73.jpg)
![Page 74: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/74.jpg)
![Page 75: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/75.jpg)
![Page 76: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/76.jpg)
wifi alliance
![Page 77: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/77.jpg)
1. TCP/IP - Transmission Control Protocol/Internet Protocol. TCP is normally used in conjunction with IP in a TCP/IP-based network. The two protocols working together provide for connectivity between applications of networked computers. Originally a UNIX standard, TCP/IP is now supported on almost all platforms, and is the protocol of the Internet.
IP represents the scheme by which two devices (both with IP addresses) communicate. TCP manages the flow of IP packets, ensuring that the packets remain error-free and reach their destination correctly.
![Page 78: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/78.jpg)
Hosts and networks IP addressing is based on the concept of hosts and networks. A host is essentially anything on the network that is capable of receiving and transmitting IP packets on the network, such as a workstation or a router. It is not to be confused with a server: servers and client workstations are all IP hosts.
![Page 79: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/79.jpg)
• IPv4• IPv4 addresses employs a 32-bit
addressing scheme that is presented in a format called dotted decimal notation, like so:
• 192.168.10.235
![Page 80: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/80.jpg)
![Page 81: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/81.jpg)
![Page 82: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/82.jpg)
• IPv6• IPv6 employs a 128-bit addressing
scheme divided into eight 16-bit hexadecimal numbers separated by colons, like so:
• 2342:0000:1F1F:0100:0010:0100:11B0:AFFF
![Page 83: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/83.jpg)
• IP Address Classes
![Page 84: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/84.jpg)
• Subnetting• Subnetting is the process of subdividing an
assigned IP address into smaller networks or subnets.
• Classless Inter-Domain Routing (CIDR)• CIDR is a routing scheme used to mitigate the
address shortage in IPv4 by drawing together a number of networks into one large routing table entry. A routing protocol must be classless to support CIDR.
![Page 85: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/85.jpg)
• Network Address Translation (NAT)
• NAT allows administrators to translate one public IP address into public network access for many private IP addresses.
![Page 86: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/86.jpg)
An IP address is 32 bits wide, and as discussed, it is composed of two parts: the network number, and the host number [1, 2, 3]. By convention, it is expressed as four decimal numbers separated by periods, such as "200.1.2.3" representing the decimal value of each of the four bytes. Valid addresses thus range from 0.0.0.0 to 255.255.255.255, a total of about 4.3 billion addresses. An IP address is a numbering system based on Octal numbering notation.
![Page 87: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/87.jpg)
xxxxxxxx.xxxxxxxx.xxxxxxxx.xxxxxxxx
1
2
4
8
16
32
64
128
11001011. 01010111.10000000.00000010203 87 128 2
![Page 88: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/88.jpg)
Subnet MaskExample:•Network: 192.168.12.0•4 workgroups (Logistics, Administration, Engineering, and Human Resources) that needed to be separated logically.• required to build 4 sub networks from 192.168.12.0
HR Admin
Eng’g
192.168.12.x(00000000)network Hosts
Logistics
![Page 89: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/89.jpg)
Subnet Mask
HR Admin
Logistics Eng’g
192.168.12.x(00000000)
NetworkHosts
Borrow 2 bits:
• 00 – Logistics = 00
• 01 – Engineering = 64
• 10 – Human Resource = 128
• 11 – Admin = 192
Logistics use 192.168.12.1- 62 Subnet mask 255.255.255.192
Engineering use 192.168.12.65 – 126 Subnet mask 255.255.255.192
Human Resource use 192.168.12.126 – 190 Subnet mask 255.255.255.192
Admin use 192.168.12.193 – 254 Subnet mask 255.255.255.192
![Page 90: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/90.jpg)
NETWORK PHYSICAL LAYOUT DESIGN (using Microsoft Office Visio 2003)
![Page 91: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/91.jpg)
• Wired Equivalent Privacy (WEP)• WEP provides either 64- or 128-bit
encryption for data packets over radio• frequencies providing a similar level of
security as wired Ethernet networks. WEP does not offer end-to-end security because it uses the lower level layers in the OSI model.
![Page 92: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/92.jpg)
• Remote Authentication Dial-In User Service (RADIUS)
• RADIUS is used as an authentication and accounting server, storing username and password combinations for use with a variety of different services. RADIUS is typically used in conjunction with 802.11i to authenticated pre-shared
• wireless keys
![Page 93: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/93.jpg)
• Wi-Fi Protected Access (WPA)• WPA offers improved data encryption and
user authentication over WEP using the wireless device’s hardware-specific MAC address as a means of ensuring that only authorized users access the network. The current version WPA2 uses
• Advanced Encryption Standard (AES).
![Page 94: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/94.jpg)
• Frame relay - Frame Relay is a packet switching technology used as a replacement to leased lines because frame relay connections are more cost effective. A frame relay connection is able to virtually connect to a number of different remote sites through point-to-point and point-to-multipoint connections.
![Page 95: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/95.jpg)
• Key Frame Relay Terms• ˚ Virtual Circuits (VC): the frame relay
connections.• ˚ Committed Information Rate (CIR): the
maximum amount of data bandwidth contracted by the provider.
• ˚ Burst: an amount of extra bandwidth provided based on need and network demand.
• ˚ Data Link Connection Identifier (DLCI): Identifies each individual VC.
![Page 96: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/96.jpg)
• T1/E1/J1• The T-series connections are digital carrier
transmission systems. ISPs and large companies employ either T1 or T3 transmission lines for access to the Internet.
![Page 97: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/97.jpg)
• Common T-series lines and their speeds include:
• ˚ T1 operates at1.544 Mbps using 24 voice channels• ˚ T3 operates at 44.746 Mbps using 672 voice channels• ˚ E1 operates at 2.048 MBps using 30 voice channels• ˚ E3 operates at 34.368 MBps using 480 voice channels• ˚ J1 operates at 1.544 Mbps using 24 voice channels• ˚ J3 operates at 32.064 Mbps using 480 voice channels
![Page 98: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/98.jpg)
• ˚ T1 operates at1.544 Mbps using 24 voice channels• ˚ T3 operates at 44.746 Mbps using 672 voice channels• ˚ E1 operates at 2.048 MBps using 30 voice channels• ˚ E3 operates at 34.368 MBps using 480 voice channels• ˚ J1 operates at 1.544 Mbps using 24 voice channels• ˚ J3 operates at 32.064 Mbps using 480 voice channels
• E designates European; J designates Japanese. Note the difference in speeds.
![Page 99: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/99.jpg)
• DSL• Digital Subscriber Line or DSL is a high-
speed Internet access technology carrying both digital voice and digital data and is used by businesses and consumers.
![Page 100: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/100.jpg)
![Page 101: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/101.jpg)
• Broadband Cable• This also provides high-speed Internet
access technology carrying digital data and uses coaxial cable. cable modems convert analog signals into digital data. Cable companies offer a range of bandwidths from 256 Mbps to 1024 Mbps upload speed to 512 Mbps to 3 Mbps download speed.
![Page 102: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/102.jpg)
• OC-x/SONET• The base rate for OCx using fiber optic
media is called OC-1 and operates at 51.84 Mbps. The Synchronous Optical Network (SONET ) also uses various OCx speeds on optical fiber.
![Page 103: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/103.jpg)
• Wireless• There are a couple of different wireless
technologies which are currently used for Wide Area Networks. These include microwave point-to-point connections, satellite and WiMAX (802.16). WiMAX uses some of the same concepts as the 802.11 technologies, but over a larger area.
![Page 104: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/104.jpg)
• ATM• Asynchronous Transfer Mode (ATM)
provides a high speed solution for large scale WANs. ATM splits traffic into 53 byte cells which are transferred across the ATM network extremely quickly. ATM also offers a large number of QoS options for traffic which allow traffic priority to be very refined.
![Page 105: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/105.jpg)
• MPLS• Multi Protocol Label Switching (MPLS) is a
packet switching technique which enables packets to be tagged or labeled to differentiate different types of traffic. These types can be anything from different streams requiring high QoS requirements like VoIP or they can be used to form a VPN to safely transport traffic between multiple companies’ branches.
![Page 106: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/106.jpg)
• Firewall - Firewalls sit in the DMZ, between an intranet and the Internet and provide packet filtering to keep unauthorized access from the protected network.
![Page 107: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/107.jpg)
WAN Connection Types WAN Services
A WAN is a data communications network that operates beyond a LAN's geographic scope. One way that a WAN is different from a LAN is that you must subscribe to an outside WAN service provider, such as PLDT and Globe Telecoms to use WAN carrier network services. A WAN uses data links, such as Analog Telephone and Frame Relay, that are provided by carrier services to access bandwidth over wide-area geographies. A WAN connects the locations of an organization to each other, to locations of other organizations, to external services (such as databases), and to remote users. WANs generally carry a variety of traffic types, such as voice, data, and video.
![Page 108: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/108.jpg)
• Cross Connects - The location where different cable sections come together
• Patch Panels - A collection of terminated circuits which can be patched together.
![Page 109: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/109.jpg)
WIRING DISTRIBUTION AND NETWORK CABLING TOOLS
![Page 110: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/110.jpg)
• Command Line Interface Tools• Be familiar with the following command line
tools:• ˚ Traceroute (or tracert)• ˚ ipconfig• ˚ ifconfig (for Linux)• ˚ ping• ˚ ARP ping• ˚ ARP
![Page 111: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/111.jpg)
• ˚ nslookup• ˚ hostname• ˚ dig (for Linux)• ˚ mtr (for Linux)• ˚ route• ˚ nbtstat• ˚ netstat
![Page 112: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/112.jpg)
It has become appallingly obvious that our technology has exceeded our humanity. Albert Einstein (1879-1955)
Technology is a way of organizing the universe so that man doesn't have to experience it. Max Frisch
Technology is a gift of God. After the gift of life it is perhaps the greatest of God's gifts. It is the mother of civilizations, of arts and of sciences. Freeman Dyson - Infinite in All Directions
![Page 113: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014](https://reader036.fdocuments.in/reader036/viewer/2022062502/577cc7451a28aba711a07f7f/html5/thumbnails/113.jpg)