LESSON OBJECTIVE - PowerPoint PPT Presentation

1 / 43
About This Presentation
Title:

LESSON OBJECTIVE

Description:

To avoid duplication of equipment and resources like printers. ... TCP/IP Layer model. International Organization for Standardization (ISO) OSI model ... – PowerPoint PPT presentation

Number of Views:59
Avg rating:3.0/5.0
Slides: 44
Provided by: christina63
Category:

less

Transcript and Presenter's Notes

Title: LESSON OBJECTIVE


1
LESSON OBJECTIVE
  • The history of networking.
  • Networking devices.
  • Network topology.
  • Lans and Wans.
  • VPNs
  • Bandwidth

2
SNEAKERNET TECHNOLOGY
3
Why were networks created
  • To avoid duplication of equipment and resources
    like printers.
  • Reduce files being duplicated all over the place.
  • Communicate efficiently.
  • To increase productivity by staff not having to
    wait to print something or share a file.
  • Save money

4
DIAL-UP POINT TO POINT CONNECTIONSIN 1980S
Companies used own standards
5
BULLETIN BOARDS
6
NETWORK DEVICES
7
REPEATER
8
HUB AND BRIDGES
9
SWITCH
10
ROUTER
11
NETWORK TOPOLOGY
12
LAN (Local Area Network)
  • Ethernet
  • Token ring/FDDI
  • (Fiber Distributed Data Interface)

13
WAN (Wide Area Network)
14
Some common WAN technologies are
  • Modems
  • Integrated Services Digital Network (ISDN)
  • Digital Subscriber Line (DSL)
  • Frame Relay
  • US (T) and Europe (E) Carrier Series T1, E1,
    T3, E3
  • Synchronous Optical Network (SONET)

15
Common wan line terms
  • Term Bandwidth
  • Modem 56kbps
  • DLS 12kbps to 6.1Mbps
  • ISDN 128kbps
  • Frame Relay 56kbps to 44.736
  • T1 1.544 Mpbs
  • T3 44.7 Mbps

16
MAN (Metropolitan-area networks)
17
(SAN) Storage-area networks
  • A SAN is a dedicated, high-performance
    network used to move data between servers and
    storage resources.

18
VPN (Virtual Private Networks)
19
  • ACCESS VPN provide remote access for mobile and
    small office, home office (SOHO) users to an
    Intranet or Extranet over a shared
    infrastructure. Access VPNs use analog, dialup,
    ISDN, DSL, mobile IP, and cable technologies to
    securely connect mobile users, telecommuters, and
    branch offices.
  • INTRANET VPN use dedicated connections to link
    regional and remote offices to an internal
    network over a shared infrastructure. Intranet
    VPNs differ from Extranet VPNs in that they allow
    access only to the employees of the enterprise.
  • EXTRANET VPN use dedicated connections to link
    business partners to an internal network over a
    shared infrastructure. Extranet VPNs differ from
    Intranet VPNs in that they allow access to users
    outside the enterprise.

20
Bandwidth
21
(No Transcript)
22
MEASUREMENT OF BANDWIDTH
  • Bits per second
  • Kbps
  • Mbps
  • Gbps
  • Tbps

23
THROUGHPUT
  • A true measure of network performance is how many
    bits per second can be carried at any one time.

24
MEASUREMENT FORMULA
25
END OF FIRST PART OF CHAPTER 2
  • Now its your turn, please action the following
  • Do the quiz on the module.
  • Read the module.

26
  • OSI Layer model
  • TCP/IP Layer model

27
International Organization for Standardization
(ISO)
OSI model Open System Interconnection
28
Layer 7 - Application
  • Closest to the user.
  • Email, Telnet, HTTP

29
Layer 6 - Presentation
  • Ensures information sent out from the application
    layer can be read by another application.
  • Encryption and decryption processing.
  • Uses standard formats such as
  • TIFF, JPEG, GIF, MIDI, MPEG
  • DOC, XLS, MDB
  • Services Application layer.

30
Layer 5 Session
  • Services Presentation layer.
  • Establishes, manages, and terminates sessions
    between two hosts.
  • Provides efficient data transfer for the
    presentation and application layer.
  • Uses protocols
  • Network File systems (NFS), X-Windows system and
    Appletalk.

31
Layer 4 - Transport
  • Services Session layer.
  • Segments data from sending host and reassembles
    it into a data stream at receiving host.
  • Ensures reliable transmission.
  • Establishes maintains and terminates virtual
    circuits.
  • Error correction and recovery.

32
Layer 3 - Network
  • Services Transport layer.
  • Selects the correct path on a Wan.
  • Uses logical (IP) addressing systems.
  • A router is considered a layer 3 networking
    device.
  • Creates a packet or datagram with a header which
    contains information about source and destination
    logical (IP) address.

33
Layer 2 Data Link layer
  • Services Network layer.
  • Provides reliable transit of data across a
    physical link. Uses FCS (Frame check sequence)
    error detection.
  • Concerned with physical (MAC) addressing system.
  • Uses Frames, and flow control, inserts physical
    (mac) addresses.
  • A NIC, Bridge and a switch are considered layer 2
    networking devices.

34
Layer 1 - Physical
  • Services the Data Link layer.
  • Defines the electrical functions of
    transmissions.
  • Encodes the frames into bits for transmission.
  • Concerned with cabling media, and networking
    devices Repeaters, Hubs.

35
TCP/IP model
  • The U.S. Department of Defense (DoD) created the
    TCP/IP reference model, because it wanted to
    design a network that could survive any
    conditions, including a nuclear war.

36
File Transfer Protocol (FTP) Hypertext Transfer
Protocol (HTTP) Simple Mail Transfer Protocol
(SMTP) Domain Name System (DNS) Trivial File
Transfer Protocol (TFTP)
37
TCP/IP MODEL
Transport Control Protocol (TCP) User Datagram
Protocol (UDP)
38
TCP/IP MODEL
  • Internet Protocol (IP)

39
TCP/IP MODEL
The network access layer refers to any particular
technology used on a specific network.
40
(No Transcript)
41
PEER TO PEER COMMUNICATIONS
PDU Protocol Data Units
42
ENCAPSULATION
EMAIL
Segments for reliable transmission
Data packets/ datagrams with logical IP addresses
Frames with physical mac addresses
Converts data to bit and bytes for transmission
43
LAYER DETAILS
Name Brief Desc. Network Device PDU Type Protocols used
7
6
5
4
3
2
1
Write a Comment
User Comments (0)
About PowerShow.com