Overview Computer Network Technology NSH0503/01/1104 By Diyurman Gea 1 Data Networks • Data networking solutions – Local-area networks – Wide-area networks NSH0503/01/1104 2 Networking Devices Equipment that connects directly to a network segment is referred to as a device. These devices are broken up into two classifications. The first classification is end-user devices. The second classification is network devices. NSH0503/01/1104 3 Network Topology Network topology defines the structure of the network. The physical topology, which is the actual layout of the wire or media, and the logical topology, which defines how the media is accessed by the hosts for sending data. NSH0503/01/1104 4 Network Protocols • Protocol suites are collections of protocols that enable network communication from one host through the network to another host. • A protocol is a formal description of a set of rules and conventions that govern a particular aspect of how devices on a network communicate. NSH0503/01/1104 5 LAN • • • • NSH0503/01/1104 Operate within a limited geographic area Allow many users to access high-bandwidth media Provide full-time connectivity to local services Connect physically adjacent devices 6 LAN Devices NSH0503/01/1104 7 WAN Technologies • • • • • • • NSH0503/01/1104 Analog modems Integrated Services Digital Network (ISDN) Digital Subscriber Line (DSL) Frame Relay Asynchronous Transfer Mode (ATM) E carrier series: E1, E3 Synchronous Digital Hierarchy (SDH) 8 WAN Devices NSH0503/01/1104 9 Metropolitan-Area Networks (MANs) • A MAN is a network that spans a metropolitan area such as a city or suburban area. • A MAN usually consists of two or more LANs in a common geographic area. NSH0503/01/1104 10 Virtual Private Networks (VPNs) A VPN is a private network that is constructed within a public network infrastructure such as the global Internet. NSH0503/01/1104 11 Benefits of VPNs • A VPN is a service that offers secure, reliable connectivity over a shared public network infrastructure such as the Internet. • VPNs maintain the same security and management policies as a private network. • They are the most cost-effective method of establishing a point-to-point connection between remote users and an enterprise customer's network. NSH0503/01/1104 12 VPN Types • NSH0503/01/1104 There are three main types of VPNs: • Intranet VPNs • Extranet VPNs • Access VPNs 13 Intranets and Extranets • Intranets are designed to permit access by users who have access privileges to the internal LAN of the organization. • Extranets refer to applications and services that are Intranet based, but that use extended, secure access to external users or enterprises. NSH0503/01/1104 14 OSI Reference Model • The application (upper) layers – Layer 7: Application – Layer 6: Presentation – Layer 5: Session • The data-flow (lower) layers – Layer 4: Transport – Layer 3: Network – Layer 2: Data link – Layer 1: Physical NSH0503/01/1104 15 The Purpose of OSI Model • It breaks network communication into smaller, simpler parts that are easier to develop. • It facilitates standardization of network components to allow multiple-vendor development and support. • It allows different types of network hardware and software to communicate with each other. • It prevents changes in one layer from affecting the other layers so that they can develop more quickly. • It breaks network communication into smaller parts to make learning it easier to understand. NSH0503/01/1104 16 Why a Layered Model? NSH0503/01/1104 17 Using Layers to for Communication • Source, destination, and data packets – All communications originate at a source and travel to a destination. – Information that travels on a network is referred to as a data, packet, or data packet. NSH0503/01/1104 18 Using Layers to for Communication • Media – Telephone wires (UTP) – Category 5 UTP (used for 10BASE-T Ethernet) – Coaxial cables – Optical fibers (thin glass fibers that carry light) • Protocol – All devices on a network need to speak the same language. – Set of rules that makes communication both possible and more efficient. NSH0503/01/1104 19 Layers with Functions NSH0503/01/1104 20 The Upper Layers • Application – User interface – Examples – Telnet, HTTP • Presentation – How data is presented – Special processing, such as encryption – Examples – ASCII, EMCDIC, JPEG • Session – Keeping different applications’ data separate – Examples – Operating system/application access scheduling NSH0503/01/1104 21 The Data-Flow Layers • Transport – Reliable or unreliable delivery – Error correction before transmit – Examples: TCP, UDP, SPX • Network – Provide logical addressing which routers use for path determination – Examples: IP, IPX NSH0503/01/1104 22 The Data-Flow Layers • Data link – Combines bits into bytes and bytes into frames – Access to media using MAC address – Error detection not correction – Examples: 802.3/802.2 • Physical – Moves bits between devices – Specifies voltage, wire speed, and pinout cables – Examples: EIA/TIA-232, V.35 NSH0503/01/1104 23 Peer-to-Peer Communication • For data to travel from the source to the destination, each layer of the OSI model at the source must communicate with its peer layer at the destination. • During this process, the protocols of each layer exchange information, called protocol data units (PDUs), between peer layers. • Each layer of communication on the source computer communicates with a layer-specific PDU, and with its peer layer on the destination computer. NSH0503/01/1104 24 The TCP/IP Reference Model NSH0503/01/1104 25 TCP/IP Protocol Graph NSH0503/01/1104 26 Applications • • • • • NSH0503/01/1104 FTP HTTP SMTP DNS TFTP – File Transfer Protocol – Hypertext Transfer Protocol – Simple Mail Transfer Protocol – Domain Name System – Trivial File Transfer Protocol 27 OSI Model and TCP/IP Model NSH0503/01/1104 28 Use of the OSI Model NSH0503/01/1104 29 Names for Data at Each Layer NSH0503/01/1104 30 De-Encapsulation • When the data link layer receives the frame, it does the following: – It reads the physical address and other control information provided by the directly connected peer data link layer. – It strips the control information from the frame, thereby creating a datagram. – It passes the datagram up to the next layer, following the instructions that appeared in the control portion of the frame. NSH0503/01/1104 31