Overview Computer Network Technology By Diyurman Gea

advertisement
Overview Computer
Network Technology
NSH0503/01/1104
By
Diyurman Gea
1
Data Networks
• Data networking solutions
– Local-area networks
– Wide-area networks
NSH0503/01/1104
2
Networking Devices
Equipment that connects directly to a network
segment is referred to as a device.
These devices are broken up into two classifications.
The first classification is end-user devices.
The second classification is network devices.
NSH0503/01/1104
3
Network Topology
Network topology defines the structure of the network.
The physical topology, which is the actual layout of the wire or
media, and the logical topology, which defines how the media is
accessed by the hosts for sending data.
NSH0503/01/1104
4
Network Protocols
• Protocol suites are collections of protocols that
enable network communication from one host
through the network to another host.
• A protocol is a formal description of a set of rules
and conventions that govern a particular aspect
of how devices on a network communicate.
NSH0503/01/1104
5
LAN
•
•
•
•
NSH0503/01/1104
Operate within a limited geographic area
Allow many users to access high-bandwidth media
Provide full-time connectivity to local services
Connect physically adjacent devices
6
LAN Devices
NSH0503/01/1104
7
WAN Technologies
•
•
•
•
•
•
•
NSH0503/01/1104
Analog modems
Integrated Services Digital Network (ISDN)
Digital Subscriber Line (DSL)
Frame Relay
Asynchronous Transfer Mode (ATM)
E carrier series: E1, E3
Synchronous Digital Hierarchy (SDH)
8
WAN Devices
NSH0503/01/1104
9
Metropolitan-Area Networks (MANs)
• A MAN is a network that spans a metropolitan
area such as a city or suburban area.
• A MAN usually consists of two or more LANs in a
common geographic area.
NSH0503/01/1104
10
Virtual Private Networks (VPNs)
A VPN is a private network that is constructed within a
public network infrastructure such as the global
Internet.
NSH0503/01/1104
11
Benefits of VPNs
• A VPN is a service that offers secure, reliable
connectivity over a shared public network
infrastructure such as the Internet.
• VPNs maintain the same security and management
policies as a private network.
• They are the most cost-effective method of
establishing a point-to-point connection between
remote users and an enterprise customer's network.
NSH0503/01/1104
12
VPN Types
•
NSH0503/01/1104
There are three main types of VPNs:
• Intranet VPNs
• Extranet VPNs
• Access VPNs
13
Intranets and Extranets
• Intranets are designed to permit access by users who
have access privileges to the internal LAN of the
organization.
• Extranets refer to applications and services that are
Intranet based, but that use extended, secure access to
external users or enterprises.
NSH0503/01/1104
14
OSI Reference Model
• The application (upper) layers
– Layer 7: Application
– Layer 6: Presentation
– Layer 5: Session
• The data-flow (lower) layers
– Layer 4: Transport
– Layer 3: Network
– Layer 2: Data link
– Layer 1: Physical
NSH0503/01/1104
15
The Purpose of OSI Model
• It breaks network communication into smaller,
simpler parts that are easier to develop.
• It facilitates standardization of network components
to allow multiple-vendor development and support.
• It allows different types of network hardware and
software to communicate with each other.
• It prevents changes in one layer from affecting the
other layers so that they can develop more quickly.
• It breaks network communication into smaller parts
to make learning it easier to understand.
NSH0503/01/1104
16
Why a Layered Model?
NSH0503/01/1104
17
Using Layers to for Communication
• Source, destination, and data packets
– All communications originate at a source and
travel to a destination.
– Information that travels on a network is referred
to as a data, packet, or data packet.
NSH0503/01/1104
18
Using Layers to for Communication
• Media
– Telephone wires (UTP)
– Category 5 UTP (used for 10BASE-T Ethernet)
– Coaxial cables
– Optical fibers (thin glass fibers that carry light)
• Protocol
– All devices on a network need to speak the
same language.
– Set of rules that makes communication both
possible and more efficient.
NSH0503/01/1104
19
Layers with Functions
NSH0503/01/1104
20
The Upper Layers
• Application
– User interface
– Examples – Telnet, HTTP
• Presentation
– How data is presented
– Special processing, such as encryption
– Examples – ASCII, EMCDIC, JPEG
• Session
– Keeping different applications’ data separate
– Examples – Operating system/application access
scheduling
NSH0503/01/1104
21
The Data-Flow Layers
• Transport
– Reliable or unreliable delivery
– Error correction before transmit
– Examples: TCP, UDP, SPX
• Network
– Provide logical addressing which routers use for
path determination
– Examples: IP, IPX
NSH0503/01/1104
22
The Data-Flow Layers
• Data link
– Combines bits into bytes and bytes into frames
– Access to media using MAC address
– Error detection not correction
– Examples: 802.3/802.2
• Physical
– Moves bits between devices
– Specifies voltage, wire speed, and pinout cables
– Examples: EIA/TIA-232, V.35
NSH0503/01/1104
23
Peer-to-Peer Communication
• For data to travel from the source to the
destination, each layer of the OSI model at the
source must communicate with its peer layer at
the destination.
• During this process, the protocols of each layer
exchange information, called protocol data units
(PDUs), between peer layers.
• Each layer of communication on the source
computer communicates with a layer-specific
PDU, and with its peer layer on the destination
computer.
NSH0503/01/1104
24
The TCP/IP Reference Model
NSH0503/01/1104
25
TCP/IP Protocol Graph
NSH0503/01/1104
26
Applications
•
•
•
•
•
NSH0503/01/1104
FTP
HTTP
SMTP
DNS
TFTP
– File Transfer Protocol
– Hypertext Transfer Protocol
– Simple Mail Transfer Protocol
– Domain Name System
– Trivial File Transfer Protocol
27
OSI Model and TCP/IP Model
NSH0503/01/1104
28
Use of the OSI Model
NSH0503/01/1104
29
Names for Data at Each Layer
NSH0503/01/1104
30
De-Encapsulation
• When the data link layer receives the frame, it
does the following:
– It reads the physical address and other control
information provided by the directly connected
peer data link layer.
– It strips the control information from the frame,
thereby creating a datagram.
– It passes the datagram up to the next layer,
following the instructions that appeared in the
control portion of the frame.
NSH0503/01/1104
31
Download