Networks seminar report
-
Upload
harshaachyutuni -
Category
Documents
-
view
219 -
download
0
Transcript of Networks seminar report
-
8/9/2019 Networks seminar report
1/22
Basics of Computer Networks
1 Introduction
A computer network or data network is a telecommunications network that allows
computers to exchange data. In computer networks, networked computing devices pass data to
each other along data connections. Data is transferred in the form of packets. The connections
(network links) between nodes are established using either cable media or wireless media. The
best known computer network is the Internet.
!etwork computer devices that originate, route and terminate the data are called network
nodes. !odes can include hosts such as personal computers, phones, servers as well as
networking hardware. Two such devices are said to be networked together when one device is
able to exchange information with the other device, whether or not the" have a direct connection
to each other.
Arguabl", the greatest advancement in technolog" and communication over the past #$
"ears has been the development and advancement of the computer network. %rom emailing a
friend to on line bill pa"ing to downloading data off the Internet to e commerce, networking has
made our world much smaller and changed the wa" we communicate forever.
Thus a network can be defined as,
net·work: &net wurk' – noun , a s"stem containing an" combination of computers,
computer terminals, printers, audio or visual displa" devices, or telephones interconnected b"
telecommunication e uipment or cables used to transmit or receive information.
P a g e | 1
-
8/9/2019 Networks seminar report
2/22
Basics of Computer Networks
2 TYPES OF NETWORKS
*A! and +A! were the original categories of area networks, while the others have
graduall" emerged over man" "ears of technolog" evolution.
!ote that these network t"pes are a separate concept from network topologies such as
bus, ring and star.
LAN - Local Area Network
A LAN connects network devices over a relatively short distance. A networked
o ce !uilding" school" or home usually contains a single LAN" though sometimes
one !uilding will contain a few small LANs #perhaps one per room$" and occasionally
a LAN will span a group of near!y !uildings. %n &CP'%P networking" a LAN is often !ut
not always implemented as a single %P su!net.
In addition to operating in a limited space, *A!s are also t"picall" owned, controlled,
and managed b" a single person or organi ation. The" also tend to use certain connectivit"
technologies, primaril" -thernet and Token ing.
(AN - (ide Area NetworkAs the term implies, a +A! spans a large ph"sical distance. The Internet is the largest
+A!, spanning the -arth.
A +A! is a geographicall" dispersed collection of *A!s. A network device called a
router connects *A!s to a +A!. In I/ networking, the router maintains both a *A! address and
a +A! address.
A +A! differs from a *A! in several important wa"s. 0ost +A!s (like the Internet)
are not owned b" an" one organi ation but rather exist under collective or distributed ownership
and management. +A!s tend to use technolog" like AT0, %rame ela" and 1.#2 for
connectivit" over the longer distances.
etropo!itan "rea Network
P a g e | 2
-
8/9/2019 Networks seminar report
3/22
Basics of Computer Networks
A network spanning a ph"sical area larger than a *A! but smaller than a +A!, such as a
cit". A 0A! is t"picall" owned and operated b" a single entit" such as a government bod" or
large corporation.
#irtua! pri$ate network ( #PN )
A $irtua! pri$ate network (#PN ) extends a private network across a public network,
such as the Internet. It enables a computer or +i %i enabled device to send and receive data
across shared or public networks as if it were directl" connected to the private network, while
benefiting from the functionalit", securit" and management policies of the private network. A
3/! is created b" establishing a virtual point to point connection through the use of dedicated
connections, virtual tunnelling protocols, or traffic encr"ptions.
A 3/! connection across the Internet is similar to a wide area network (+A!) link
between websites. %rom a user perspective, the extended network resources are accessed in the
same wa" as resources available within the private network.
3/!s allow emplo"ees to securel" access their compan"4s intranet while traveling
outside the office. 5imilarl", 3/!s securel" connect geographicall" separated offices of an
organi ation, creating one cohesive network. 3/! technolog" is also used b" individual Internet
users to secure their wireless transactions and to connect to prox" servers for the purpose of
protecting personal identit" and location.
Intranet
An intranet is a computer network that uses Internet /rotocol technolog" to share
information, operational s"stems, or computing services within an organi ation. This term is
used in contrast to extranet , a network between organi ations, and instead refers to a network
within an organi ation. 5ometimes, the term refers onl" to the organi ation4s internal website,
but ma" be a more extensive part of the organi ation4s information technolog" infrastructure,
and ma" be composed of multiple local area networks. The ob6ective is to organi e each
individual4s desktop with minimal cost, time and effort to be more productive, cost efficient,
timel", and competitive.
An intranet ma" host multiple private websites and constitute an important component
and focal point of internal communication and collaboration. An" of the well known Internet
P a g e | 3
-
8/9/2019 Networks seminar report
4/22
Basics of Computer Networks
protocols ma" be found in an intranet, such as 7TT/ (web services), 50T/ (e mail), and %T/
(file transfer protocol). Internet technologies are often deplo"ed to provide modern interfaces to
legac" information s"stems hosting corporate data.
An intranet can be understood as a private analog of the Internet, or as a private
extension of the Internet confined to an organi ation. The first intranet websites and home pages
were published in 8998, and began to appear in non educational organi ations in 899:.
Intranets are sometimes contrasted to extranets. +hile intranets are generall" restricted to
emplo"ees of the organi ation, extranets ma" also be accessed b" customers, suppliers, or other
approved parties. -xtranets extend a private network onto the Internet with special provisions
for authentication, authori ation and accounting (AAA protocol).
In man" organi ations, intranets are protected from unauthori ed external access b"
means of a network gatewa" and firewall. %or smaller companies, intranets ma" be created
simpl" b" using private I/ address ranges. In these cases, the intranet can onl" be directl"
accessed from a computer in the local network; however, companies ma" provide access to off
site emplo"ees b" using a virtual private network, or b" other access methods, re uiring user
authentication and encr"ption.
E%tranet
An e%tranet is a computer network that allows controlled access from outside of an
organi ation4s intranet. -xtranets are used for specific use cases including business to business
( in that it provides access to needed
services for channel partners, without granting access to an organi ation4s entire network.
P a g e | 4
-
8/9/2019 Networks seminar report
5/22
Basics of Computer Networks
& 'ENEFITS OF " NETWORK
The benefits of networking (either wired or wireless) in homes are
Fi!e ()arin* !etwork file sharing between computers gives "ou more flexibit" than using
flopp" drives or >ip drives. !ot onl" can "ou share photos, music files, and documents, "ou can
also use a home network to save copies of all of "our important data on a different computer.
Backups are one of the most critical "et overlooked tasks in home networking.
Printer + perip)era! ()arin* ?nce a home network is in place, it4s eas" to then set up all of
the computers to share a single printer. !o longer will "ou need to bounce from one s"stem or
another 6ust to print out an email message. ?ther computer peripherals can be shared similarl"
such as network scanners, +eb cams, and =D burners.
Internet connection sharing - )sing a home network" multiple family
mem!ers can access the %nternet simultaneously without having to pay an
%*P for multiple accounts. +ou will notice the %nternet connection slows downwhen several people share it" !ut !road!and %nternet can handle the e,tra
load with little trou!le. *haring dial-up %nternet connections works" too.
Painfully slow sometimes" you will still appreciate having shared dial-up on
those occasions you really need it.
Multi-player games - any popular home computer games support LAN
mode where friends and family can play together" if they have their
computers networked.
Internet telephone service - *o-called oice over %P # o%P$ services allow
you to make and receive phone calls through your home network across the
%nternet" saving you money.
Home entertainment - Newer home entertainment products such as digital video
recorders #/ 0s$ and video game consoles now support either wired or wireless
P a g e | 5
-
8/9/2019 Networks seminar report
6/22
Basics of Computer Networks
home networking. 1aving these products integrated into your network ena!les
online %nternet gaming" video sharing and other advanced features.
, P-YSI."/ E0I"
Twi(ted pair ca !e
Twi(ted pair cabling is a t"pe of wiring in which two conductors of a single circuit aretwisted together for the purposes of canceling out electromagnetic interference (-0I) from
external sources; for instance, electromagnetic radiation from unshielded twisted pair (@T/)
cables, and crosstalk between neighboring pairs. It was invented b" Alexander raham
-
8/9/2019 Networks seminar report
7/22
Basics of Computer Networks
dimensions of the cable are controlled to give a precise, constant conductor spacing, which is
needed for it to function efficientl" as a radio fre uenc" transmission line.
Fi* ,32: .oa%ia! .a !e
Fi er optic ca !e
An optica! 4i er ca !e is a cable containing one or more optical fibers that are used tocarr" light. The optical fiber elements are t"picall" individuall" coated with plastic la"ers and
contained in a protective tube suitable for the environment where the cable will be deplo"ed.
Different t"pes of cable are used for different applications, for example long distance
telecommunication, or providing a high speed data connection between different parts of a
building.
Fi* ,3&: Fi er optic ca !e
P a g e | 7
-
8/9/2019 Networks seminar report
8/22
Basics of Computer Networks
5 WIRE/ESS E0I"
icrowa$e (6(tem
-
8/9/2019 Networks seminar report
9/22
Basics of Computer Networks
@ses antennae resembling telephone towers to pick up radio signals within a specific
area (cell).
In4rared tec)no!o*6
Transmits data as infrared light waves from one device to another, providing
wireless links between /=s and peripherals
Fi* 531: In4rared Tran(mi((ion
P a g e | 9
-
8/9/2019 Networks seminar report
10/22
Basics of Computer Networks
7 .ate*ori8ation o4 Network(
!etworks are usuall" classified into three properties.
H.8 .Topolog"
H.#. /rotocol
H.E. Architecture
7313 Topo!o*6
Network topo!o*6 is the arrangement of the various elements of a computer network.
-ssentiall", it is the topological structure of a network and ma" be depicted ph"sicall" or logicall". Physical topology is the placement of the various components of a network, including
device location and cable installation, while logical topology illustrates how data flows within a
network, regardless of its ph"sical design. Distances between nodes, ph"sical interconnections,
transmission rates, or signal t"pes ma" differ between two networks, "et their topologies ma" be
identical.
An example is a local area network (*A!) An" given node in the *A! has one or more
ph"sical links to other devices in the network; graphicall" mapping these links results in a
geometric shape that can be used to describe the ph"sical topolog" of the network. =onversel",
mapping the data flow between the components determines the logical topolog" of the network.
732 Protoco!
ules of !etwork /rotocol include guidelines that regulate the following characteristics of a
network access method, allowed ph"sical topologies, t"pes of cabling, and speed of datatransfer.
P a g e | 1
-
8/9/2019 Networks seminar report
11/22
Basics of Computer Networks
&ypes of Network Protocols
The most common network protocols are
2. 3thernet
4. Local &alk
5. &oken 0ing
6. 7//%
8. A&
The followings are some commonl" used network s"mbols to draw different kinds of network protocols.
Fi* 731: /a6out o4 Network(
Et)ernet
The -thernet protocol is b" far the most widel" used one. -thernet uses an access
method called =50A =D (=arrier 5ense 0ultiple Access =ollision Detection). This is a s"stem
where each computer listens to the cable before sending an"thing through the network. If the
network is clear, the computer will transmit. If some other nodes have alread" transmitted on the
cable, the computer will wait and tr" again when the line is clear. 5ometimes, two computers
attempt to transmit at the same instant. A collision occurs when this happens. -ach computer
then backs off and waits a random amount of time before attempting to retransmit. +ith this
P a g e | 11
-
8/9/2019 Networks seminar report
12/22
Basics of Computer Networks
access method, it is normal to have collisions. 7owever, the dela" caused b" collisions and
retransmitting is ver" small and does not normall" effect the speed of transmission on the
network.
The -thernet protocol allows for linear bus, star, or tree topologies. Data can be
transmitted over wireless access points, twisted pair, coaxial, or fiber optic cable at a speed of 8$
0bps up to 8$$$ 0bps.
Fa(t Et)ernet
To allow for an increased speed of transmission, the -thernet protocol has developed a
new standard that supports 8$$ 0bps. This is commonl" called %ast -thernet. %ast -thernet
re uires the application of different, more expensive network concentrators hubs and network
interface cards. In addition, categor" 2 twisted pair or fiber optic cable is necessar". %ast
-thernet is becoming common in schools that have been recentl" wired.
/oca! Ta!k
*ocal Talk is a network protocol that was developed b" Apple =omputer, Inc. for
0acintosh computers. The method used b" *ocal Talk is called =50A =A (=arrier 5ense
0ultiple Access with =ollision Avoidance). It is similar to =50A =D except that a computer
signals its intent to transmit before it actuall" does so. *ocal Talk adapters and special twisted
pair cable can be used to connect a series of computers through the serial port. The 0acintosh
operating s"stem allows the establishment of a peer to peer network without the need for
additional software. +ith the addition of the server version of Apple5hare software, a
client server network can be established.
The *ocal Talk protocol allows for linear bus, star, or tree topologies using twisted pair
cable. A primar" disadvantage of *ocal Talk is low speed. Its speed of transmission is onl" #E$
Jbps.
Token Rin*
P a g e | 12
-
8/9/2019 Networks seminar report
13/22
Basics of Computer Networks
The Token ing protocol was developed b" I
-
8/9/2019 Networks seminar report
14/22
Basics of Computer Networks
The most latest development in the -thernet standard is a protocol that has a
transmission speed of 8 bps. igabit -thernet is primaril" used for backbones on a network at
this time. In the future, it will probabl" also be used for workstation and server connections. It
can be used with both fiber optic cabling and copper. The 8$$$
-
8/9/2019 Networks seminar report
15/22
Basics of Computer Networks
Fi* 732: OSI ode!
NETWORKIN9 -"R0W"RE "N0 SOFTW"RE
31 Et)ernet )u
An Et)ernet )u , acti$e )u , network )u , repeater )u , mu!tiport repeater or )u
is a device for connecting multiple -thernet devices together and making them act as a single
network segment. It has multiple input output (I ?) ports, in which a signal introduced at the
input of an" port appears at the output of ever" port except the original incoming. A hub works
at the ph"sical la"er (la"er 8) of the ?5I model. epeater hubs also participate in collision
detection, forwarding a 6am signal to all ports if it detects a collision. In addition to standard
B/B= (K L:2K) ports, some hubs ma" also come with a
(A@I) connector to allow connection to legac" 8$
-
8/9/2019 Networks seminar report
16/22
Basics of Computer Networks
Fi* 31: Et)ernet -u
32 Repeater(
A common problem in the networking world is that of weakening electrical signals.
-lectrical signals traveling through wires (such as copper wires used in most networks), weaken
due to the wire4s electrical resistance. This effect limits the lengths of the cable that can be
used. A repeater will overcome this limit, when there is a need to connect two computers at a
larger distance.
A repeater is connected to two cable segments. An" electrical signal reaching the
repeater from one segment, will be amplified and retransmitted to the other segment.
Fi* 32: Repeater
3& Router(
P a g e | 16
-
8/9/2019 Networks seminar report
17/22
Basics of Computer Networks
A router is a networking device, commonl" speciali ed hardware, that forwards data
packets between computer networks. This creates an overla" internetwork, as a router is
connected to two or more data lines from different networks. +hen a data packet comes in one
of the lines, the router reads the address information in the packet to determine its ultimate
destination. Then, using information in its routing table or routing polic", it directs the packet tothe next network on its 6ourne". outers perform the Ktraffic directingK functions on the Internet.
A data packet is t"picall" forwarded from one router to another through the networks that
constitute the internetwork until it reaches its destination node.
The most familiar t"pe of routers are home and small office routers that simpl" pass data,
such as web pages, email, I0, and videos between the home computers and the Internet. An
example of a router would be the owner4s cable or D5* router, which connects to the Internet
through an I5/. 0ore sophisticated routers, such as enterprise routers, connect large business or
I5/ networks up to the powerful core routers that forward data at high speed along the optical
fiber lines of the Internet backbone. Though routers are t"picall" dedicated hardware devices,
use of software based routers has grown increasingl" common.
Fi* 3&: #i(ua!i8ation o4 Router
3, odem(
5hort for mo dulator- dem odulator. A modem is a device or program that enables a
computer to transmit data over, for example, telephone or cable lines. =omputer information is
P a g e | 17
-
8/9/2019 Networks seminar report
18/22
Basics of Computer Networks
stored digitall", whereas information transmitted over telephone lines is transmitted in the form
of analog waves. A modem converts between these two forms.
%ortunatel", there is one standard interface for connecting external modems to computers
called RS-232. =onse uentl", an" external modem can be attached to an" computer that has an
5 #E# port, which almost all personal computers have. There are also modems that come as an
expansion board that "ou can insert into a vacant expansion slot. These are sometimes called
onboard or internal modems .
Fi* 3,: #i(ua!i8ation o4 odem
+hile the modem interfaces are standardi ed, a number of different protocols for
formatting data to be transmitted over telephone lines exist. 5ome, like ==ITT 3.E:, are official
standards, while others have been developed b" private companies. 0ost modems have built in
support for the more common protocols at slow data transmission speeds at least, most
modems can communicate with each other. At high transmission speeds, however, the protocols
are less standardi ed.
35 Firewa!!
7aving a good understanding of the capabilities offered b" the different t"pes of
firewalls will help "ou in placing the appropriate t"pe of firewall to best meet "our securit"
needs.
@nderstanding /acket %iltering %irewalls
/acket filtering firewalls validate packets based on protocol, source and or destination I/
addresses, source and or destination port numbers, time range, Differentiate 5ervices =ode /oint
(D5=/), t"pe of service (To5), and various other parameters within the I/ header. /acket
P a g e | 18
-
8/9/2019 Networks seminar report
19/22
Basics of Computer Networks
filtering is generall" accomplished using Access =ontrol *ists (A=*) on routers or switches and
are normall" ver" fast, especiall" when performed in an Application 5pecific Integrated =ircuit
(A5I=). As traffic enters or exits an interface, A=*s are used to match selected criteria and
either permit or den" individual packets.
Fi* 35: #i(ua!i8ation o4 Firewa!!
Advantages
The primar" advantage of packet filtering firewalls is that the" are located in 6ust about ever"
device on the network. outers, switches, wireless access points, 3irtual /rivate !etwork (3/!)
concentrators, and so on ma" all have the capabilit" of being a packet filtering firewall.
outers from the ver" smallest home office to the largest service provider devices inherentl"
have the capabilit" to control the flow of packets through the use of A=*s.
5witches ma" use outed Access =ontrol *ists ( A=*s), which provide the capabilit" to
control traffic flow on a KroutedK (*a"er E) interface; /ort Access =ontrol *ists (/A=*), which
are assigned to a KswitchedK (*a"er #) interface; and 3*A! Access =ontrol *ists (3A=*s),
which have the capabilit" to control KswitchedK and or KroutedK packets on a 3*A!.
?ther networking devices ma" also have the power to enforce traffic flow through the use of
A=*s. =onsult the appropriate device documentation for details.
P a g e | 19
-
8/9/2019 Networks seminar report
20/22
Basics of Computer Networks
/acket filtering firewalls are most likel" a part of "our existing network. These devices ma" not
be the most feature rich, but when "ou need to uickl" implement a securit" polic" to mitigate
an attack, protect against infected devices, and so on, this ma" be the uickest solution to
deplo".
Caveats
The challenge with packet filtering firewalls is that A=*s are static, and packet filtering has no
visibilit" into the data portion of the I/ packet.
-
8/9/2019 Networks seminar report
21/22
Basics of Computer Networks
In computing, the Po(t O44ice Protoco! (POP ) is an application la"er Internet standard
protocol used b" local e mail clients to retrieve e mail from a remote server over a T=/ I/
connection. /?/ has been developed through several versions, with version E ( POP& ) being the
current standard.
3irtuall" all modern e mail clients and servers support /?/E, and it along with I0A/
(Internet 0essage Access /rotocol) are the two most prevalent Internet standard protocols for e
mail retrieval, with man" webmail service providers such as mail, ?utlook.com and MahooN
0ail also providing support for either I0A/ or /?/E to allow mail to be downloaded.
;?2311 @ protoco!:
IEEE ;?2311 is a set of media access control (0A=) and ph"sical la"er (/7M)specifications for implementing wireless local area network (+*A!) computer communication
in the #.:, E.H, 2 and H$ 7 fre uenc" bands. The" are created and maintained b" the I---
*A! 0A! 5tandards =ommittee (I--- B$#). The base version of the standard was released in
899 and has had subse uent amendments. The standard and amendments provide the basis for
wireless network products using the +i %i brand. +hile each amendment is officiall" revoked
when it is incorporated in the latest version of the standard, the corporate world tends to market
to the revisions because the" concisel" denote capabilities of their products.
Re4erence(
en.wikipedia.org
www.webopedia.com
www.networkworld.com
P a g e | 21
-
8/9/2019 Networks seminar report
22/22
Basics of Computer Networks