seminar networking

Upload: deepak-rathore

Post on 10-Apr-2018

218 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/8/2019 Seminar Networking

    1/45

    Seminar On

    NetworkingPresented by

    Intramantra Global Solution PVT LTD, Indore

    http://intramantra.com

  • 8/8/2019 Seminar Networking

    2/45

    Basics of Networking

    Networking began its infancy in the mid -1960s.by the US Department of Defence (DoD).

    The original intention of networking was beingdeveloped to withstand a nuclear war.

    Telephone networks were to vulnerable and wouldterminate all conversations should a nuclear war occur.

  • 8/8/2019 Seminar Networking

    3/45

    You wake up at 3 a.m. to go to the bathroom and

    stop and check your e-mail on the way back to bed.

    Basics of Networking

  • 8/8/2019 Seminar Networking

    4/45

    WE ARE DEALING WITH MACHINES INSTEAD OF PEOPLE IN TODAYS WORLD. OUR PRIVACY IS

    AFFECTED AND ALMOST ALL OF OUR PERSONAL

    INFORMATION CAN BE FOUND IN

    THE VIRTUAL WORLD .

    Basics of Networking

  • 8/8/2019 Seminar Networking

    5/45

    ARPA ( Advanced R esearch P rojects Agency)was created in response with the launching of the

    Sputnik in 1957. ARPA decided that a DoD network should be packet-switched networked consisting of a subnet andhost computers.

    Experimental network research was awarded toUCL A, UCSB , S RI and Univ. of Utha in 1969. Theseareas were because they all had a large number of ARPA contracts.

    Basics of Networking

  • 8/8/2019 Seminar Networking

    6/45

    These 4 universities also had different and completelyincompatible host computers.

    ARPA NET protocols were not suitable for running over multiple networks , so TC P/IP model and protocolswere invented in 1974.

    ARPA awarded several other contracts and specificallyUniv.. of California at Berkeley to integrate theprotocols with the Berkeley UN IX.

    Basics of Networking

  • 8/8/2019 Seminar Networking

    7/45

    Berkeley developed a convenient program interfaceto the network and wrote many applications , utility,and management programs to make networking easier.

    In it early infancy , the OS I protocols were crushed andthe TC P/IP protocols were already in widespread use.

    The OS I Model had seven layers because at the time ,IBM had a propriety seven -layer protocol calledSN A (Systems Network Architecture).

    Basics of Networking

  • 8/8/2019 Seminar Networking

    8/45

    At the time , IBM dominated the computer companiesand every was scared to death that IBM would use

    its clout to force everyone to use SN A.

    The OS I was to be produced like an IBM-referencemodel.

    The OS I model became the world standard and wasnot controlled by one company , but by a neutralorganization , ISO ( International Standards Association).

    Basics of Networking

  • 8/8/2019 Seminar Networking

    9/45

    TYPE S OF N ETW ORKS

    L AN LOC AL AR E A NETWO RK IS A SM ALL

    GEOG RAPHI C AL AR E A SUC H AS OU R SC HOOLBO AR D.

    M AN MET R OP OLIT AN AR E A NETWO RK IS A NETWO RK OVE R A L AR GE R GEOG RAPHI C AL AR E A

    SUC H AS T HE PR OV INC IAL GOVE R NMENT.W AN W IDE AR E A NETWO RK IS A NETWO RK USEDOVE R AN E XTR EMELY L AR GE GEOG RAPHI C AL AR E A SUC H AS T HE FEDE RA L GOVE R NMENT.

    Basics of Networking

  • 8/8/2019 Seminar Networking

    10/45

  • 8/8/2019 Seminar Networking

    11/45

    BUS TO P OLOGY ALLOWS INFO R M ATION TO BE

    DIR ECTED F R OM ONE COM P UTE R TO T HE OT HER .LOTS OF B IN AR Y COLL IS ION T HOUG H .

    Basics of Networking

  • 8/8/2019 Seminar Networking

    12/45

    ST AR TO P OLOGY IS T HE MOST COMMON TY P EUSED. ALL COM P UTE R S AR E ATT ACHED TO A HUB.LESS COLL IS IONS AND MOST EFF IC IENT.

    Basics of Networking

  • 8/8/2019 Seminar Networking

    13/45

    RI NG TO P OLOGY - USES A TO KEN TO PA SSINFO R M ATION F R OM 1 COM P UTE R TO T HE OT HER . A TO KEN IS ATT ACHED TO T HE MESS AGE BY T HESENDE R TO IDENT IFY W HICH COM P UTE R S HOULDR ECE IVE T HE MESS AGE. AS T HE MESS AGE MOVES AR OUND T HE RI NG , E ACH COM P UTE R EXAMINES

    THE TO KEN. IF T HE COM P UTE R IDENT IFIES T HE TO KEN AS ITS OWN , THEN IT W ILL PR OCESS T HEINFO R M ATION.

    Basics of Networking

  • 8/8/2019 Seminar Networking

    14/45

    A DIS ADV ANT AGE OF A TO KEN RI NG IS IF ONECOM P UTE R IS B R OKEN O R DOWN , THE MESS AGEC ANNOT BE PA SSED TO T HE OT HER COM P UTE R S.

    Basics of Networking

  • 8/8/2019 Seminar Networking

    15/45

    The seven layers of the OS I Model are:

    Layer 1 PH S IC LLayer 2 ATA LIN Layer 3 N E TWORKLayer 4 TRA N SPORTLayer 5 SESS IO NLayer 6 PR ESEN TATIO NLayer 7 APPL ICATIO N

    Basics of Networking

  • 8/8/2019 Seminar Networking

    16/45

    Each one of you was assigned a number whenyou entered the lab. Get together with your team

    member(s).

    Begin to research the layer that your number isassociated with.

    Research as much information as you can in15 minutes and make notes of your finding.

    Basics of Networking

  • 8/8/2019 Seminar Networking

    17/45

    Once complete, we will create a bigger groupwith all the layer present.

    You will present your finding to your group aboutthe layer. You will only have 2 minutes to present.

    Basics of Networking

  • 8/8/2019 Seminar Networking

    18/45

    THE PH YS IC AL L AYER

    The physical layer is concerned with transmitting

    raw bits over a communication channel thoughhubs, wires (cat5U TP ), modems, network cardsbasically anything that is physical to the network.

    When looking at network cables , there are2 types that affect nodes. They are:

    In networking , computers are also known asHosts or Nodes.

    Basics of Networking

  • 8/8/2019 Seminar Networking

    19/45

  • 8/8/2019 Seminar Networking

    20/45

    Wiring:1-3 White /Orange2-6 Orange3-1 White /Green6-2 Green4-4 Blue5-5 White /Blue7-7 White /Brown8-8 Brown

    Typical Crossover Cable

    Basics of Networking

  • 8/8/2019 Seminar Networking

    21/45

    TW ISTED S HIELDED PAIR USED IN PH ONE L INES , NETWO RK S

    UNS HIELDED TW ISTED PAIR

    CO AXIAL C ABLE USED IN C ABLEV IS ION G R E AT FO R VIDEO

    F IBR E O P TIC C ABLES - USES L IGHT TO C ARR Y S IGN AL BUTHAR D TO WO RK WITH AND LOOSES S IGN AL OVE R LONGE R DIST ANCES

    COMMUNICA TION CHANN EL S

    Basics of Networking

  • 8/8/2019 Seminar Networking

    22/45

    Crimping Tool Hub

    Basics of Networking

  • 8/8/2019 Seminar Networking

    23/45

    THE DATA-LINK LA YER

    The data link layer takes raw transmission and

    transform it into a line that appears free of transmission errors in the network layer.

    The Data- Link Layer also is where you would findthe MAC Address. (Media Access Control). To find the

    MAC Address of your computer, or any computer:Start/ P rograms/ MS P rompt and type: ipconfig/all

    Basics of Networking

    "C:\ WINDO WS>" prompt , type "tracertwww.howstuffworks.com"

  • 8/8/2019 Seminar Networking

    24/45

    THE DATA-LINK LA YER

    You will also find smart devices such as switches inthe Data- Link Layer.

    The digital information that needs to be sent such asand e-mail, attachments, etc needs to be broken intosmaller bits known as packets.

    These packets require some information similar tosending a letter in the mail.

    Basics of Networking

  • 8/8/2019 Seminar Networking

    25/45

    Hea der Trailer (Footer)Conta ins : Conta ins :Mac Address (if a va ila ble) Ma c Address (from your computer)IP Address (where it's going) IP Address (where it ca me from)

    PACKETS

    Bits of information

    THE RE A RE A NUMBE R OF PACKETS THAT WILLFOLLOW EACH OTHE R TO THE FI NAL DESTI NATION.

    Basics of Networking

  • 8/8/2019 Seminar Networking

    26/45

    THE NETW ORK LA YER

    The network layer is concerned with controlling

    the operation of the subnet. A R OUTE R is used todetermining how packets are routed from sourceto destination.

    If one path is busy, then the router will select another path for the packets to travel. So really, the packetscan all have different paths and find their way to thefinal destination.

    Basics of Networking

  • 8/8/2019 Seminar Networking

    27/45

    THE NETW ORK LA YER

    The router has millions of I P addressing built into

    the software, and knows where to send the packets.

    IP stands for Internet P rotocol and is basically anaddress that the packets will be sent to.

    An example would be 216.27.61.137

    Basics of Networking

  • 8/8/2019 Seminar Networking

    28/45

    THE NETW ORK LA YERIf you look at the I P Address, the number are brokeninto different categories.

    216. 27.61.137

    Classification Hosts

    216. 27.61.137

    Octets

    Basics of Networking

  • 8/8/2019 Seminar Networking

    29/45

    Classifications can be broken into 3 classes. They are:

    Class A - Only the first octet is used for addressing andthe balance used for hosts.

    Class B - The first two octet are used for addressingand the balance used for hosts.

    Class C - The first three octet are used for addressingand the balance used for hosts.

    Basics of Networking

  • 8/8/2019 Seminar Networking

    30/45

    Every machine on the Internet has a unique

    identifying number , called an IP Address.

    A typical IP address looks like this:

    216.27.61.137

    But computers communicate in binary form.

    Basics of Networking

  • 8/8/2019 Seminar Networking

    31/45

    The same IP address in binary:

    11011000.00011011.00111101.10001001

    216.27.61.137

    Basics of Networking

  • 8/8/2019 Seminar Networking

    32/45

    If you add all the positions together , you get 32 ,

    which is why IP addresses are considered

    32-bit numbers

    Combine the four octets and you get 2 32 or a possible

    4 ,2 94 ,967 ,2 96 unique values.

    11011000.00011011.00111101.10001001

    Basics of Networking

  • 8/8/2019 Seminar Networking

    33/45

    Class A - This class is for very large networks ,

    such as a major international company might have.

    IP addresses with a first octet from 1 to 1 2 6 are

    part of this class.

    Basics of Networking

  • 8/8/2019 Seminar Networking

    34/45

    Class B - This class is used for medium-sized networks.

    A good example is a large college campus.

    IP addresses with a first octet from 1 2 8 to 191

    are part of this class. Class B addresses also include

    the second octet as part of the Net identifier.

    Basics of Networking

  • 8/8/2019 Seminar Networking

    35/45

    Class C - Class C addresses are commonly used for

    small to mid-size businesses. IP addresses

    with a first octet from 19 2 to 22 3 are part of this

    class. Class C addresses also include the second

    and third octets as part of the Net identifier.

    Basics of Networking

  • 8/8/2019 Seminar Networking

    36/45

    Loopback - The IP address 127.0.0.1 is used

    as the loopback address. This means that it isused by the host computer to send a message

    back to itself.

    Basics of Networking

    LOO P BACK

  • 8/8/2019 Seminar Networking

    37/45

  • 8/8/2019 Seminar Networking

    38/45

    THE S ESSION LA YER

    The session layer allows different machines to

    establish sessions between themselves.

    Once communications are established, encryptionthen begins both parties.

    Basics of Networking

  • 8/8/2019 Seminar Networking

    39/45

    THE P RES ENTATION LA YER

    The P resentation Layers job is managing data

    structures and converting from the representationused inside the computer to the network standardrepresentation an visa versa.

    In English terms, the P resentation layer basicallytakes the packets and re-assembles them so you canopen the e-mail or the attachment.

    If any packets got lost along the way, or weredamaged, then the P resentation layer will send asign to the sender that it requires the specific packet.

    Basics of Networking

  • 8/8/2019 Seminar Networking

    40/45

    THE APPL ICATION LA YER

    The Application layer contains a variety of protocols

    that are commonly required. Another Application layer function is file transfer.

    Different file systems have different file naming

    conventions , different ways of representing text lines , and so on.

    Transferring a file between two different systemsrequires handling and other incompatibilities.

    Basics of Networking

  • 8/8/2019 Seminar Networking

    41/45

  • 8/8/2019 Seminar Networking

    42/45

    SOA P - Si p le Obj ec t AccessP r o toco lSOA P de fines a s tanda r d ay to encode o bj ec tsw it i n ne two r packe ts s ing X L.

    PTh e ynam ic os t on figu r a tion P r o toco l

    (P

    ) suppo rt s au toma ti c add r ess ass ignmen tand imp r oved con figu r a tion managemen t o f I Pne two r ks .

    TH E APP LI AT ION L A YER

    Basics of Networking

  • 8/8/2019 Seminar Networking

    43/45

    IP v6 - Internet P rotocol version 6

    IPv6 promises to relieve the current I P addressshortage, and this new version of the protocolmay also increase performance and improveadministration capabilities.

    PPP o E

    The P oint to P oint P rotocol over Ethernet(PPP o E) standard helps access providersmanage their broadband service delivery, andit can a lso improve the ea se of use for DS L andcable modem customers.

    THE APPL ICATION LA YER

    Basics of Networking

  • 8/8/2019 Seminar Networking

    44/45

    As you can see, the OSI Model is a sophisticatedand complicated model, but I hope you gainedsome information on the way this theoretical modelwork.

    The package that I have given you also has anIP Addressing assignment that I use with my Grade12 Computer Engineering Students.

    Basics of Networking

  • 8/8/2019 Seminar Networking

    45/45