INTRODUCTORY INFORMATION TECHNOLOGY COMMUNICATING OVER NETWORKS. Faramarz Hendessi

Similar documents
Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols

This talk will cover the basics of IP addressing and subnetting. Topics covered will include:

Chapter 6: Network Communications and Protocols

TCP/IP and the OSI Model

Networking interview questions

TCP/IP Protocol Suite and IP Addressing

Unit C - Network Addressing Objectives Purpose of an IP Address and Subnet Mask Purpose of an IP Address and Subnet Mask

Module 7: Configuring and Supporting TCP/IP

TCP /IP Fundamentals Mr. Cantu

Chapter 7. Local Area Network Communications Protocols

1/18/13. Network+ Guide to Networks 5 th Edition. Objectives. Chapter 10 In-Depth TCP/IP Networking

Network+ Guide to Networks

Introduction to internetworking, OSI, TCP/IP and Addressing.

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 8 Networking Essentials

Chapter Motivation For Internetworking

Computer Communication & Networks / Data Communication & Computer Networks Week # 03

Network Protocols - Revision

Defining Networks with the OSI Model. Module 2

Networking Basics. EC512 Spring /15/2015 EC512 - Prof. Thomas Skinner 1

Introduction to TCP/IP

Network+ Guide to Networks 5 th Edition. Chapter 10 In-Depth TCP/IP Networking

06/02/ Local & Metropolitan Area Networks 0. INTRODUCTION. 1. History and Future of TCP/IP ACOE322

Copyleft 2005, Binnur Kurt. Objectives

IP Address Assignment

FINAL EXAM REVIEW PLEASE NOTE THE MATERIAL FROM LECTURE #16 at the end. Exam 1 Review Material

Lecture 8 Network Layer: Logical addressing

Networking and Health Information Exchange: ISO Open System Interconnection (OSI)

Network+ Guide to Networks 6 th Edition. Chapter 4 Introduction to TCP/IP Protocols

Binary Octet to Decimal Format Conversion

Introduction to Networking

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061. Lecture 2. Internetworking IPv4, IPv6

01/17/08 TDC /17/08 TDC363-03

CS1302 / Computer Networks

Session 2. Background. Lecture Objectives

Internet Protocol Addressing and Routing. Redes TCP/IP

6 Computer Networks 6.1. Foundations of Computer Science Cengage Learning

THE OSI MODEL. Application Presentation Session Transport Network Data-Link Physical. OSI Model. Chapter 1 Review.

IP Addressing and Subnetting

Interconnecting Networks with TCP/IP

Define TCP/IP and describe its advantages on Windows Describe how the TCP/IP protocol suite maps to a four-layer model

IP - The Internet Protocol

System Programming. Introduction to computer networks

Introduction to TCP/IP

Networking and Health Information Exchange Unit 1a ISO Open Systems Interconnection (OSI) Slide 1. Slide 2. Slide 3

OSI Data Link & Network Layer

OSI Data Link & Network Layer

The Internet Protocol (IP)

MTA_98-366_Vindicator930

Networking and IP Addressing TELECOMMUNICATIONS AND NETWORKING

DATA COMMUNICATION AND NETWORKS

COMPONENTS OF DATA COMMUNICATION

Computer Networks Question Bank

NETWORK LAYER: IP Addressing

Second Semester Examination Higher National Diploma in Information Technology First Year

Introduction to Open System Interconnection Reference Model

OSI Data Link & Network Layer

OSI Model with Protocols. Layer Name PDU Address Protocols Device

Network+ Guide to Networks 6 th Edition. Chapter 9 In-Depth TCP/IP Networking

Lecture (06) Network Access layer fundamentals (4) LAN, & WAN Internetwork Layer I

Module 9: TCP/IP Protocol Suite and IP Addressing

IP Basics Unix/IP Preparation Course June 29, 2010 Pago Pago, American Samoa

IP Addresses McGraw-Hill The McGraw-Hill Companies, Inc., 2000

INTRODUCTORY COMPUTER

Computer Networks Lecture -5- IPv4 Addresses. Dr. Abbas Abdulazeez

Network Layer/IP Protocols

6 Chapter 6. Figure 1 Required Unique Addresses

Significance of TCP/IP Model Divya Shree Assistant Professor (Resource Person), Department of computer science and engineering, UIET, MDU, Rohtak

Top-Down Network Design

IP Addressing Week 6. Module : Computer Networks Lecturer: Lucy White Office : 324

Chapter 6. The Protocol TCP/IP. Introduction to Protocols

Chapter 18 and 22. IPv4 Address. Data Communications and Networking

Networking Applications

ISO 9001:2008. Pankaj Kumar Dir, TEC, DOT

6 Computer Networks 6.1. Foundations of Computer Science Cengage Learning

BTEC Level 3 Extended Diploma Unit 9 Computer Network IP Addresses

Lecture Outline. Lecture 2. OSI model and networking. The OSI model and networking. The OSI model and networking. The OSI model and networking

TCP/IP Fundamentals. Introduction. Practice Practice : Name. Date Period

What is a Network? TCP / IP. The ISO OSI Model. Protocols. The TCP/IP Protocol Suite. The TCP/IP Protocol Suite. Computer network.

LOGICAL ADDRESSING. Faisal Karim Shaikh.

BABU MADHAV INSTITUTE OF INFORMATION TECHNOLOGY, UTU 2017

Business Data Communications and Networking

TCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12

Data and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications

Chapter 19 Network Layer: Logical Addressing 19.1

IP addresses and Subnetting

Chapter 7: IP Addressing CCENT Routing and Switching Introduction to Networks v6.0

LESSON 3 PORTS AND PROTOCOLS

Data Communication and Network. Introducing Networks

Networks: Communicating and Sharing Resources

Networking Fundamentals

Lecture (02) Network Protocols and Standards

M2-R4: INTERNET TECHNOLOGY AND WEB DESIGN

Layering in Networked computing. OSI Model TCP/IP Model Protocols at each layer

Fundamentals of Computer Networking AE6382

Special expressions, phrases, abbreviations and terms of Computer Networks

ROYAL INSTITUTE OF INFORMATION & MANAGEMENT

Chapter 2 Network Models 2.1

CCM 4300 Lecture 6 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964

CHAPTER-2 IP CONCEPTS

Transcription:

INTRODUCTORY INFORMATION TECHNOLOGY COMMUNICATING OVER NETWORKS Faramarz Hendessi

INTRODUCTORY INFORMATION TECHNOLOGY Lecture 6 Fall 2010 Isfahan University of technology Dr. Faramarz Hendessi

Overview Understand network communication. Decipher computer addressing. Network communication protocols. Network designing.

Understand Network Communication A sender, a receiver, a message, and a medium are required for network communication. In order to communicate effectively, it is essential that the systems on a network use the same language.

Understand Network Communication Computer signals Messages

Computer Signals Digital signal and analog signal are the two forms in which computer signals are transmitted. When two computers communicate on a network, they exchange digital signals. Each signal or digit is represented by a distinct state.

Computer Signals An analog signal

Computer Signals The presence of an electrical signal is considered as on, and is represented by the digit one. The absence of an electrical signal is considered as off, and is represented by a zero. A system that uses zeros and ones is called a binary system.

Computer Signals A modem is required to convert a digital signal into an analog signal, and vice versa. The process of converting digital signals into analog signals is called modulation. The process of converting analog signals back into digital signals is called demodulation.

Computer Signals Bits: The term bit is used to represent a single instance of a digital signal. These can also be represented by other medium states, such as the relative signal strengths of light pulses or radio waves. A bit becomes important when it is combined with other bits to create different characters.

Computer Signals Bytes: Eight bits make a byte. A byte can be used to represent up to 256 characters, digits, or symbols on a computer.

Messages When a computer communicates with itself or with other computers, it assembles the characters into meaningful data. The data can then be easily received and interpreted by the receiving computer.

Decipher Computer Addressing Unique address. Physical address. Hexadecimal notation. Node address. Network addresses and their implementation.

Unique Address A unique address with an exact name and storage path is required for storing and retrieving data accurately over a network. Network addressing is handled by ensuring that each address is unique.

Physical Address The physical address is the first element of a computer s network address. It is a special serial number assigned to a component installed inside the computer. The numbers are controlled by the networking industry s regulating organization, the Institute of Electrical and Electronics Engineers (IEEE).

Physical Address The equipment manufacturer requests a block of unique 48-bit binary numbers and assigns a separate number to each network interface card (NIC) that they create. The first 24 bits of the MAC address assigned to a NIC are set by the IEEE to identify the manufacturer.

Physical Address The physical address, also know as the Media Access Control (MAC) address, is a means by which the computer gains access to the networking medium. The physical (or MAC) address is also sometimes referred to as the hardware address.

Hexadecimal Notation Hexadecimal notation (hex) is a numbering system that uses 16 alphanumeric characters instead of the usual ten numeric digits. Hex is a shorthand for writing binary numbers. A single hex digit is used to represent four digits of a binary number.

Node Address A unique node address is required for every computer on a network. Adding node numbers to the MAC helps locate the randomly generated node numbers. Each node address is useful within the specific network to which it is attached.

Network Addresses and Their Implementation The network address is a combination of the node address and the MAC address. The source address and the destination address are required to transmit data effectively. The source address specifies where the transmitted information originates.

Network Addresses and Their Implementation The destination address specifies the information s destination. Both the source and destination addresses are then added to the data being transmitted to make sure that the message is routed properly.

Network Addresses and Their Implementation Directing messages to the specific computer

Network Communication Protocols Network communication decisions. Layered communication. Internet communication. Intranet/Extranet communication.

Network Communication Decisions Language: A set of language rules developed to effectively communicate over a network is called a protocol. NetBIOS (Network Basic Input/Output System) and NetBEUI (NetBIOS Extended User Interface) were two networking languages used earlier.

Network Communication Decisions Broadcasting versus routing: Broadcasting involves passing digital messages over the network medium. Routing involves deciding the recipient of the message and sending it to them directly.

Network Communication Decisions Message format - Formatting refers to combining mutually acceptable characters in such a way that messages can be exchanged.

Layered Communication The International Standards Organization (ISO) suggested the use of the Open Systems Interconnection (ISO) model to explain network communication. The OSI model s standards are open and made available to everyone to enable interconnectivity of different systems. The model simplifies complex networking activities by grouping the steps into seven layers.

Layered Communication Layers in the OSI Model

Layered Communication Layers in the OSI Model

Internet Communication Transmission Control Protocol/Internet Protocol (TCP/IP). User Datagram Protocol (UDP). Domain Name Service (DNS). File Transfer Protocol (FTP). Simple Mail Transfer Protocol (SMTP).

Transmission Control Protocol/Internet Protocol (TCP/IP) TCP/IP is the most widely used protocol, and acts as the Transport/Network layer protocol. The TCP makes sure that the data is correctly sized, properly put in packets, and sequenced back in the right order upon receipt. The TCP, also known as a connection-oriented protocol, links the Application layer to the Network layer.

Transmission Control Protocol/Internet Protocol (TCP/IP) The IP is a set of rules that is concerned with sending a message to the correct address and is, therefore, called a connectionless protocol. The IP is also responsible for the creation and maintenance of an addressing scheme, known as the IP address. IP operates at the Network layer.

Transmission Control Protocol/Internet Protocol (TCP/IP) Each IP address is a unique 4-byte (or 32-bit) number, and each byte is separated by a decimal point. IP addresses can be used as static assignments to individual computers, or can be assigned dynamically.

Every machine needs an address Address identifies one network interface on a host Every interface needs a unique address An IP address is a 32 bit number Written as four fields (octets), 8 bits each, separated by dots Called dotted decimal notation Example: 147.134.2.20

Classes of IP addresses Class A Theoretically only 127 class A s 16.7 million hosts Class B 16,384 class B s 65,000 hosts Class C 2.09 million class C s 256 hosts

Class A First octets with a decimal number between 1 and 127 Uses the first octet to represent the network address and the other three octets for host addresses Cannot use 127.x.y.z as it is reserved for loopback testing 127.0.0.1 is localhost

Class B First octets with a decimal number between 128 and 191 Uses the first two octets to represent the network address and the last two octets for the host addresses

Class C First octets with a decimal number between 192 and 223 Uses the first three octets to represent the network address and the last octet to develop host addresses

Class D Decimal values between 224 and 239 in the first octet Class D addresses are multicast addresses Allows several hosts to listen in on the same address at the same time

Class E Decimal range of 240-255 Reserved addresses and and invalid host addresses that are used for experimental purposes

Private Addresses These are nonroutable addresses Class A 10.0.0.0 through 10.255.255.255 Class B 172.16.0.0 through 172.31.255.255 Class C 192.168.0.0 through 192.168.255.255

Private addresses. Use for Network Address Translation (NAT) or Routing and Remote Access (RRAS) to connect an inside network with one routable IP address That s what we are doing in class!

Classless Inter-Domain Routing (CIDR) Developed to increase the efficiency of address allocation and to alleviate overloaded Internet routers Represents addresses in traditional notation, but highlights the network portion with a slash followed by a number 192.168.0.1/24 The number after the is the number of bits that represent the network portion of the IP address

Subnet Mask A 32-bit address that looks like an IP address but actually points out to IP which part of the IP address is the network portion Every IP address must have a subnet mask Determines whether the packet is on the same local network or on a remote network

Standard subnet masks Class A 255.0.0.0 Class B 255.255.0.0 Class C 255.255.255.0

Custom subnet masks Use to divide your network into several smaller networks for easier management Handout at a later time on how to do this

Address assignment Static Manually entered Dynamic A DHCP server is configured with a pool of addresses to lease out to hosts Discover Offer Request acknowledgment

DHCP You can reserve an IP address based on it s MAC address To ensure a machine always gets the same address To save an address in a pool for a particular machine

DHCP lease time Long leases mean less network traffic, but those addresses are not available for use during the lease time Up to the network administrator to set, depending on the devices on the network, their portability, network traffic, etc. ** The DHCP is a set of rules that allow a group of computers to effectively lease IP numbers to network members when required.

User Datagram Protocol (UDP) UDP is a connectionless protocol that operates at the Transport layer. This protocol does not have to open a connection with the receiver and it does not have to carry out any error correction. UDP does not perform any checks to ensure the receipt of data, so it never carries out automatic retransmissions.

Domain Name Service (DNS) The DNS is used for locating resources on the Internet. It operates at the Application layer. The DNS server uses the IP address to link to the Uniform Resource Locator (URL) concerned. Examples of domain names include com, net, org, edu, gov, and mil.

File Transfer Protocol (FTP) The FTP is used for transferring files over the Internet. It operates using a client at the Application layer and a server at the opposite end.

File Transfer Protocol (FTP) It is also possible to send files to an FTP site, making the process of exchanging large pieces of information fast and simple. Some FTP servers allow anonymous logins, while others require passwords and proper authentication.

Simple Mail Transfer Protocol (SMTP) SMTP is a set of rules that regulates the transfer of e-mail over the Internet. The Post Office Protocol (POP) or the Internet Message Access Protocol (IMAP) is required to read e-mail.

Simple Mail Transfer Protocol (SMTP) Graphic or document attachments are handled by an SMTP extension called Multipurpose Internet Mail Extensions (MIME). The MIME converts each attachment into a coded form, similar to text, for transfer over SMTP.

Intranet/Extranet Communication Intranet communication refers to using Internet communication techniques without using an Internet connection. When two or more Intranets are networked without being connected to the Internet, it is called an Extranet.

Network Designing Network needs. Network choices. Network layout.

Network Needs Administering a network involves: Ensuring that the systems are up and running at any given point in time, while making them easy for a user to operate. Maintaining the system s operation with the minimum amount of downtime.

Network Choices Network budget The total cost of the network must be less than the projected earnings to impose an economic limit for installing and maintaining a network. Network security The required security must be essentially added to the network to avoid any kind of security issues.

Network Choices The following aspects must be considered while choosing a network s users: The network s users should be trained and be capable of handling the system. The number of users who would be accessing the system should be defined at a given point in time.

Network Choices The following aspects must be considered while choosing a network s users (continued): It must be ensured that when the network access is at its peak, the users are able to obtain the services immediately after logging in. The maximum capacity of the network should be designed to handle a user s request.

Network Choices Network application: It is essential to know how and why the network would be used. These facts help determine the means for producing the network s output and the tools that go into producing it.

Network Choices Network growth: Any system should allow for future growth, and should include added capacity for incorporating new resources into the network. Allowances should also be provided for technological advances.

Network Layout The physical layout or the geometric pattern formed by the arrangement of interconnected computers is referred to as topology. Bus, ring, and star are the three most common types of physical topologies.

Network Layout Bus topology

Network Layout Ring topology

Network Layout Star topology

Summary Communication involves a sender, a receiver, a message, and a medium. A bit is a single digit and a byte is made up of eight bits. A system that uses only zeros and ones is called a binary system.

Summary The ISO recommends the use of the OSI model to connect dissimilar networking components. The needs of all the networked resources should be adequately considered while panning the network. Topology refers to the physical layout or arrangement of computers in a network.