Professional Documents
Culture Documents
Networks by Scale
Network Fundamentals
* Bus *Mesh
*Ring * Hybrid
* Star *Tree
Network Fundamentals
Bus Topology
Topology in which all of the nodes of the network are
connected to a common transmission medium which has
exactly two endpoints (this is the "bus", which is also
commonly referred to as the backbone, or trunk)
All data that is transmitted between nodes in the network is
transmitted over this common transmission medium and is
able to be received by all nodes in the network virtually
simultaneously
The two endpoints of the common transmission medium are
normally terminated with a device called a terminator
Network Fundamentals
Star Topology
Topology in which each of the nodes of the network is
connected to a central node with a point-to-point link in a
"hub or Switch
All data that is transmitted between nodes in the network is
transmitted to this central node
Network Fundamentals
Ring Topology
Topology in which each of the nodes of the network is
connected to two other nodes in the network and with the
first and last nodes being connected to each other, forming a
ring
All data that is transmitted between nodes in the network
travels from one node to the next node in a circular manner
and the data generally flows in a single direction only.
Network Fundamentals
Mesh Topology
Topology in which each of the nodes of the network is
connected to each of the other nodes in the network with a
point-to-point link this makes it possible for data to be
simultaneously transmitted from any single node to all of the
other nodes.
The physical fully connected mesh topology is generally too
costly and complex for practical networks, although the
topology is used when there are only a small number of
nodes to be interconnected
Network Fundamentals
Tree Topology
Topology in which a central "root" node (the top level of the
hierarchy) is connected to one or more other nodes that are
one level lower in the hierarchy (i.e., the second level) with a
point-to-point link between each of the second level nodes
and the top level central "root" node, while each of the second
level nodes that are connected to the top level central "root"
node will also have one or more other nodes that are one
level lower in the hierarchy
Network Fundamentals
Hybrid Topology
The hybrid topology is a type of network topology that is
composed of one or more interconnections of two or more
networks that are based upon different physical topologies
These days, the physical installation of a NIC is relatively easy.
Step 1 Shut down or power off the PC.
Step 2 Disconnect the power cord from the PC.
Step 3 Connect an antistatic strap to your wrist to protect
the computer and NIC from your bodys static
electricity.
Step 4 Insert the NIC into the expansion slot(PCI Slot)
Step 5 Reassemble the PC and turn it on.
Step 6 Install the Driver if Required
Configure NIC Card in Windows XP Professional
My Network Place (Click Properties)
Local Area Network (Click Properties)
TCP/IP(Click Properties)
Types of Cables
Twisted Pair Cable
Co-axial Cable
Fiber Optical Cable
SC
Box-shaped connectors that snap into a receptacle. SC (Subscriber Connector
or Standard Connector) connectors are often used in a duplex
configuration where two fibers are terminated into two SC connectors that
are molded together. SC is used with single-mode fiber.
FC
Similar to SMA connectors, FC (Face Contact) connectors use a heavy
duty ferrule in the center for more mechanical stability than SMA or ST
connectors. These connectors are more popular in industrial settings
where greater strength is required.
Crimping of UTP Cables are divided into three types
Straight Cables
Crossover Cables
Rolled over Cables
Straight Cables
It is used between dissimilar devices e.g.: Hub to PC, PC to
Switch, Switch to Router..etc
Side 1 Side 2
Orange White Orange White
Orange Orange
Green White Green White
Blue Blue
Blue White Blue White
Green Green
Brown White Brown White
Brown Brown
Crossover Cables
It is used between similar devices e.g. Hub to Hub, Switch to
Switch, PC to PCetc
Side 1 Side 2
Orange White Green White
Orange Green
Green White Orange White
Blue Blue
Blue White Blue white
Green Orange
Brown White Brown white
Brown Brown
Rolled Over Cables
It is used for connecting Router Console port to PC Com Port
Side 1 Side 2
Orange White Brown
Orange Brown White
Green White Green
Blue Blue White
Blue White Blue
Green Green White
Brown White Orange
Brown Orange white
In addition to the hosts, LANs may use other devices to
control physical access to the shared medium, extend the
maximum reach of the LAN, switch traffic, and so on.
NIC Card
Repeaters
Hub
Switch
Bridges
Routers
Gateways
Network Interface Cards
For a PC to use a network, it must have some interface to the
network cabling. PCs use network interface cards (NICs) to
provide that interface. NICs are expansion cards that give a
PC an interface to a network
MAC Address
A MAC address, also called a physical address, is a unique,
hardware-level address assigned to every networking device
by its manufacturer. MAC addresses are six bytes long. The
first three bytes uniquely identify the manufacturer and are
referred to as the Organizationally Unique
Identifier (OUI). The remaining three bytes identify the
device itself and are known as the Universal LAN MAC
address.
NIC/LAN Card
Repeaters
A repeater is a device that regenerates a signal to improve
transmission distance. By using repeaters, you can exceed the
normal limitations on segment lengths imposed by the
various networking technologies.
Reassembly
All such received PDUs will be reassembled back to form the
original data at the receiving end; and the process is termed
reassembly. This is again performed at the transport layer of
the OSI
OSI MODEL
Fragmentation
Each physical network imposes some maximum transmission
size, called the Maximum Transfer Unit (MTU), on the packets
that may be sent over it. When the size of the packet exceeds
the limits of the network on the outgoing interface, the
packet must be broken into smaller packets, each of which
carries a portion of the original data. This process is called
Fragmentation.
When the fragment packets arrive at their destination, the
destination host must join the fragments together again
before processing the original packet in the normal way.
OSI MODEL
Datagram
A datagram is an independent, self-contained message sent
over the network whose arrival, arrival time, and content are
not guaranteed.
OSI MODEL
Windowing
Windowing is a flow control scheme in which the source
computer will monitor and make adjustments to the amount
of information sent based on successful, reliable receipt of
data segments by the destination computer. The size of the
data transmission, called the "window size",
Window size 1
In the most basic form of reliable data transfer, the source
computer sends data segments one segment at a time. The
source waits for acknowledgment from the destination
indicating expectation of the next data segment (an
expectation acknowledgement) and then sends the next data
segment. In this example, where the window size is 1, we are
ensured that all data segments will arrive and will arrive in
order
OSI MODEL
Window size 3
If the window size is changed to 3, the source computer can
transmit up to 3 data segments at a time before expecting a
single acknowledgement in return. It must wait for an
acknowledgment before sending another set of 3 data
segments
TCP/IP is an industry standard set of protocols developed by
the U.S. Department of Defense Advanced Research Projects
Agency (DARPA) in 1969. It maps TCP/IP protocols to a four-
layer conceptual model known as the DARPA model. It is
often compared to the still born OSI Protocol Layers The four
layers of the DARPA model are:
Application layer
Refers to standard network services like http, ftp, telnet as well
as communication methods used by various application
programs
Transport layer
Manages the transfer of data by using connection oriented
(TCP) and connectionless (UDP) transport protocols Manages
the connections between networked applications
Internet layer
Manages addressing of packets and delivery of packets
between networks
xxxxxxxx.xxxxxxxx.xxxxxxxx.xxxxxxxx
Where X can be 0 or 1
Network ID
Host ID
Network ID
Host ID
Network ID
Class A 255.0.0.0
Class B 255.255.0.0
Class C 255.255.255.0
Network Access Control (NAC) is a computer networking
solution that uses a set of protocols to define and implement
a policy that describes how to secure access to a network
nodes by devices when they initially attempt to access the
network.
NAC might integrate the automatic remediation process into
the network systems, allowing the network infrastructure
such as routers, switches and firewalls to work together.
All operating systems use some form of security model.
Security can be grouped into two models.
Share-level security
User-level security
Share-level Security Model
The share level security model is usually implemented on peer to
peer networks. There is no central security entity or security
manager
The user of each computer can decide which resources
associated with his or her machine such as hard disk, printer,
applicationsetc can be made available to another network
users.
The resources are shared and can be protected using password.
Filtering by IP address
The most basic firewall filter based on IP address the firewall
examines the source and destination IP address of the packet
and accepts or rejects it on this basics
Filtering by Port Number
If you have a server that offers services on different ports
such as HTTP, FTP, TELNET, and SMTP you can set up a
firewall that filters on the basics of port numbers. That is
especially helpful if you want external users to be limited to
only certain ports.
Encryption is the process of scrambling information. The
scrambling is not random, however. A key is used to code
and decode the information .The information is useless
without the key to decrypt it. Encryption plays important role
in the network security.
Backup Utility
Computer viruses are data destructive programs written
with the intent of copying and spreading the destruction to
the other computer and program
Types of Viruses
Boot Viruses
These Virus attack Boot record, MBR, FAT, Partition Table.
Program Viruses
These Virus attack Program files (.exe, .com, sys, drv, bin)
Multi Viruses
These Viruses attack Programs that run Macros
Multi-partite Viruses
These are the viruses that attack both the boot sector and
program files
Antivirus
Virus Protection