Uploaded by aadyapre

Networking note

Unit 2 : Networking
Lesson 01 - Role of Networks
Module Learning Outcomes
▪LO1. Examine networking principles and their protocols.
▪LO2. Explain networking devices and operations.
▪LO3. Design efficient networked systems.
▪LO4. Implement and diagnose networked systems.
What is a Network?
▪ Many types of network provide different kinds of services.
▪ In the course of a day,
▪ A person might make a phone call,
▪ Watch a television show,
▪ Listen to the radio,
▪ Look up something on the Internet or
▪ Even play a video game with someone in another country.
▪ All of these activities depend on robust, reliable networks;
What is a Network?
A Computer Network is a collection of autonomous computing devices that are interconnected in various ways in order
to exchange information by common conventions, called protocols, over a shared communication medium.
Note: A single computer system with its peripherals such as printers, scanners etc. is not considered as a network.
In computer networking,



The generic term node or host refers to any device on a network (usually refers to a computer)
Data transfer rate
▪ The speed with which data is moved from one place on a network to another
Data transfer rate is a key issue in computer networks
Advantages of computer networks






Share Information and Resources
Access databases
Ecommerce
Easy administration
Communication
Provides data security
Benefits of a Network




Information sharing
Hardware sharing
Software sharing
Collaborative environment
Risks of Network Computing
▪ The security of a computer network is challenged everyday by:
 Equipment malfunctions
 System failures
Note: equipment malfunctions and system failures may be caused by natural disasters such as floods, storms or
fires and electrical disturbances.
 Computer hackers
 Virus attacks
Factors to be considered when installing a network
1. Performance
2. Reliability
3. Security
Performance
▪It can be measured in following ways:
➢Transit time: It is the time taken to travel a message from one device to another.
➢Response time: It is defined as the time elapsed between a request and response.
▪Other ways to measure performance are:
➢Efficiency of software
➢Number of users
➢Capability of connected hardware
Reliability
▪It decides the frequency at which network failure take place. More the failures are, less is the network's reliability.
Security
•
It refers to the protection of data from the unauthorized user or access.
•
While travelling through network, data passes many layers of network, and data can be traced if attempted.
•
Hence security is also a very important characteristic for Networks.
Lesson [02] System Types
Module Learning Outcomes
▪LO1. Examine networking principles and their protocols.
▪LO2. Explain networking devices and operations.
▪LO3. Design efficient networked systems.
▪LO4. Implement and diagnose networked systems.
Network Models
▪ Computer networks can logically classified into two models.
1. Peer to Peer model
2. Client server model
Peer to Peer network

In a peer to peer network, a number of workstations are connected together for sharing devices, information
or data. All the workstations are considered equal.

A peer to peer network has no dedicated servers. Any one computer can act as client or server at any instance.

This network is ideal for small networks where there is no need for dedicated servers, like home networks and
small business networks.
Client server network



In a server-based network, the server is the central location where users share and access network resources .
This dedicated computer controls the level of access that users have to shared resources. Shared data is in one
location, making it easy to back up critical business information. Each computer that connects to the network is
called a client computer.
Server operating systems are designed to handle the load when multiple client computers access server-based
resources.
Network types
•
Networks are classified in different types based on purpose and/or size.
 LAN
 MAN
 WAN
 PAN (Personal Area Network)
 SAN (Storage Area Network)
 CAN (Controller Area Network)
 VPN (Virtual Private Network)
Local Area Networks (LANs)
•
•
•
•
•
A Local Area Network spans across a small geographic area
LANs are usually confined to one building or a group of buildings
Usually privately owned
Provides high data rates
The most common type of Local Area Network is called Ethernet
Wide Area Networks (WANs)
•
•
•
A network which covers a very large geographical area such as a country, continent or even the world
Provides long distance communication of data or information
Operating at low speeds (compared to LANs)
Metropolitan Area Network (MAN)
•
•
A network which covers medium geographical area such as a town or a city.
Provides high speed connectivity for Internet through DSL/ ADSL lines and other services such as cable TV.
Virtual Private Network (VPN)

A Virtual Private Network (VPN) is a network that uses a public telecommunication infrastructure, such as the
Internet, to provide remote offices or individual users with secure access to their organization’s network.

Became popular as more employees worked in remote locations. • Employees can access the network
(Intranet) from remote locations.

The Internet is used as the backbone for VPNs.

Reduces cost tremendously from reduction of equipment and maintenance costs.
Storage Area Networks (SANs)

A Storage Area Network (SAN) is a high-speed special purpose network (or sub network) that interconnects
different kinds of data storage devices with associated data servers.
Controller Area Network (CAN)

Controller Area Network is a serial bus network of microcontrollers that connects devices, sensors and
actuators in a system or sub-system for real-time control applications.

It is a dedicated development of the automotive electronics industry
Other types of Networks

Intranet – An intranet is a private LAN designed to use by everyone within an organization.

Protected from unauthorized external access by means of a network gateway and firewall

May be created simply by using private IP address ranges such as 192.168.0.0/16

Extranet – a network that connects people within your company with people who are outside your company.
All within a secure, password protected network that can be accessed from anywhere.
What is Cloud Computing?

Cloud computing is the delivery of on-demand computing services -- from applications to storage and
processing power -- typically over the internet and on a pay-as-you-go basis.

Elastic resources—Scale up or down quickly and easily to meet demand

Metered service - So you only pay for what you use

Self-service —AlltheIT resourcesyouneed with self-serviceaccess
Types of Cloud Services

Most cloud computing services fall into three broad categories:
1. Software as a service (SaaS)
2. Platform as a service (PaaS)
3. Infrastructure as a service (IaaS)
•
These are sometimes called the cloud computing stack, because they build on top of one another.
•
Knowing what they are and how they’re different makes it easier to accomplish business goals.
Software as a service (SaaS)
•
Cloud-based applications or software as a service run on distant computers “in the cloud” that are owned and
operated by others and that connect to users’ computers via the internet and, usually, a web browser.
Platform as a service (PaaS)
•
Platform as a service provides a cloud-based environment with everything required to support the complete
lifecycle of building and delivering web-based (cloud) applications without the cost and complexity of buying
and managing the underlying hardware, software, provisioning, and hosting
Infrastructure as a service (IaaS)
•
Infrastructure as a service provides companies with computing resources including servers, networking,
storage, and data center space on a pay-per-use basis.
Lesson [03] Networking Standards
Module Learning Outcomes
▪LO1. Examine networking principles and their protocols.
▪ LO2. Explain networking devices and operations.
▪LO3. Design efficient networked systems.
▪LO4. Implement and diagnose networked systems.
Networking Standards- Introduction
•
•
•
A Standard is an agreed upon definition of a protocol.
Standards are industry wide protocol definitions that are not tied to a particular manufacturer.
Many organizations are involved in setting standards for networking
Networking Standards
•
The five most important organizations are:
 American National Standards Institute (ANSI)
 Institute of Electrical & Electronics Engineers (IEEE)
 International Organization for standardization (ISO)
 Internet Engineering Task Force (IETF)
 WorldWideWeb Consortium (W3C)
IEEE



The Institute of Electrical and Electronic Engineers (IEEE) is a global association and organization of
professionals working toward the development, implementation and maintenance of technologycentered products and services.
IEEE is a nonprofit organization founded in 1963.
It works solely toward innovating, educating and standardizing the electrical and electronic
development industry.
IEEE 802 Standards
• In 1985,the computer society of the IEEE started a project called , Project 802,to set standards to enable
intercommunication among equipment from a variety of manufactures .
• Instead , it is away of specifying functions of the physical layer and the data link layer of major LAN protocols.
Conceptual Models – Introduction
•
TCP/IP and OSI are hierarchical models to define how network devices and their applications follow
protocols that have a set of rules to communicate with each other, similar to Human Laws such as
country’s Constitution
•
Open System Interconnection (OSI) model is a conceptual model that covers all aspects of network
communications.
This model characterizes and standardizes the internal functions of a communications system by
partitioning it into abstraction layers.
This is a model that allows any two different systems to communicate regardless of their underlying
architecture (hardware or software).
OSI Model
•
•
TCP/IP Model
•
•
•
TCP (Transmission Control Protocol) /IP (Internet Protocol) was developed by the Department of Defense (DoD)
project agency.
Unlike OSI Model, it consists of four layers each having its own protocols. Internet Protocols are the set of rules
defined for communication over the network.
The TCP/IP model is mostly used for interconnecting computers over the internet.
TCP/IP Model Layers
•
Application Layer: This layer permits users to access the services of global or private internet. Some protocols
described in this layer are TELNET,SMTP ,FTP. The working of this layer is a combination of application,
presentation and session layer of the OSI model.
•
Transport Layer: It enables a fault-free end-to-end delivery of the data between the source and destination
hosts in the form of datagrams. The protocols defined by this layer are TCP and UDP.
•
Internet Layer: The purpose of this layer is to transmit an independent packet into any network which travels
to the destination. It includes the IP , ICMP and ARP as the standard packet format for the layer.
•
Network Interface Layer: This layer acts as an interface between hosts and transmission links and used for
transmitting datagrams.
Lesson [04] Networking Topologies
Module Learning Outcomes
▪LO1. Examine networking principles and their protocols.
▪LO2. Explain networking devices and operations.
▪LO3. Design efficient networked systems.
▪LO4. Implement and diagnose networked systems.
What is a Topology?
•
•
•
•
A network topology describes the physical connections and logical communication pathways between objects
in a network.
The term is used to describe a variety of networking concepts.
Topologies are used to describe connections between computers (or hosts) in a network, between routers in a
network, or even between wide area network connections.
There are two types of topologies.
✓Physical
✓Logical
Physical Topology
• A Physical Topology describes the way in which the devices are connected.
Bus Topology
•
In Bus topology, all devices share single communication line or cable.
•
Bus topology either uses CSMA/CD technology or recognizes one host as Bus Master to solve the issue while
multiple hosts sending data at the same time.
•
A failure of a device does not affect the other devices. But a failure of the shared communication line can make
all other devices stop functioning.
•
Both ends of the shared channel have a line terminator.
•
The data is sent in only one direction and as soon as it reaches the extreme end, the terminator removes the
data from the line.
Ring Topology
•
In ring topology, each host machine connects to exactly two other machines, creating a circular network
structure.
•
When one host tries to communicate or send message to a host which is not adjacent to it, the data travels
through all intermediate hosts.
•
To connect one more host in the existing structure, the administrator may need only one more extra cable.
•
Failure of any host results in failure of the whole ring. Thus, every connection in the ring is a point of failure.
There are methods which employ one more backup ring.
Star Topology
•
One of the most common network setups where each of the devices and computers on a network connect to a
central hub.
•
If the central hub fails, the entire network becomes unusable.
•
Star topology is not expensive as to connect one more host, only one cable is required and configuration is
simple.
Tree Topology
•
Also known as Hierarchical Topology, this is the most common form of network topology in use presently.
•
This topology imitates an extended Star topology and inherits properties of bus topology.
•
This topology divides the network in to multiple levels/layers of network
Mesh Topology
•
In this type of topology, a host is connected to one or multiple hosts.
•
This topology has hosts in point-to-point connection with every other host or may also have hosts which are in
point-to-point connection to few hosts only.
•
Mesh technology comes in two types:
 Full Mesh - All hosts have a point-to-point connection to every other host
 Partial Mesh - Not all hosts have a point-to-point connection to every other host
Logical Topology
•
The Logical Topology describes how the devices communicate or the shape of the communication
path.
Ethernet
•
Ethernet is a widely-deployed LAN technology.
•
This technology was invented by Bob Metcalfe and D.R. Boggs in the year 1970. It was standardized in IEEE
802.3 in 1980.
•
Ethernet shares media. A Network which uses shared media has high probability of data collision.
•
Ethernet uses Carrier Sense Multi Access/Collision Detection (CSMA/CD) technology to detect collisions.
•
When a collision occurs in Ethernet, all its hosts roll back, wait for some random amount of time, and then
re-transmit the data.
Ethernet
• An Ethernet connector is a network interface card equipped with 48-bits MAC address.
•
Traditional Ethernet uses 10BASE-T specifications.
•
10BASE-T Ethernet provides transmission speed up to 10MBPS and uses coaxial cable or Cat-5 twisted pair
cable with RJ-45 connector.
•
Ethernet follows star topology with segment length up to 100 meters.
Fast Ethernet
• To encompass the need of fast emerging software and hardware technologies, Ethernet extends itself as Fast
Ethernet.
• It can run on UTP, Optical Fibre, and wirelessly too.
• It can provide speeds up to 100 MBPS. This standard is named as 100BASE-T in IEEE 803.2 using Cat-5 twisted
pair cable.
Gigabit Ethernet
• After being introduced in 1995, Fast-Ethernet could enjoy its high-speed status only for 3 years till Gigabit
Ethernet was introduced.
• Giga-Ethernet provides speeds up to 1000 Mbps.
• IEEE802.3ab standardized Gigabit Ethernet over UTP using Cat-5, Cat-5e and Cat-6 cables.
VLAN
• AVLAN (virtual LAN) is a sub network which can group together collections of devices on separate physical local
area networks (LANs).
• VLANs make it easy for network administrators to partition a single switched network to match the functional
and security requirements of their systems without having to run new cables or make major changes in their
current network infrastructure.
VLAN
•
•
•
In this diagram, different VLANs are depicted in different colour codes.
Hosts in one VLAN, even if connected on the same Switch cannot see or speak to other hosts in different
VLANs.
To route packets between two different VLANs a Layer-3 device such as a Router is required.
Lesson [5] Network Protocols
Module Learning Outcomes
▪LO1. Examine networking principles and their protocols.
▪LO2. Explain networking devices and operations.
▪LO3. Design efficient networked systems.
▪LO4. Implement and diagnose networked systems.
What is a Network Protocol?
•
•
•
Network protocols are sets of established rules that determine how to format, transmit and receive data
between two or more devices.
Standardized network protocols provide a common language for network devices.
To successfully send and receive information, devices on both sides of a communication exchange and follow
an agreed protocol
Layer Protocols
A number of applications have been standardized to operate on top of TCP/IP Model.
File Transfer Protocol (FTP)
• The File Transfer Protocol (FTP) is used to send files from one sys
text and binary files are accommodated.
• FTP uses a client - server architecture.
• Files can be transferred between two computers using a FTP software
• FTP software may have a GUI or support a series of commands
Hypertext Transfer Protocol (HTTP)
• The Hypertext Transfer Protocol (HTTP) is an application layer protocol that is used by the World Wide Web
and this protocol defines how messages are formatted and transmitted.
• Computers on the WWW use HTTP to talk with each other
• HTTP is a connectionless text based protocol
• HTTPS is used for secure browsing
Simple Mail Transfer Protocol (SMTP)
• The Simple Mail Transfer Protocol (SMTP) provides a basic electronic mail transport facility for transferring
messages among separate hosts.
• SMTP is an application level protocol.
• SMTP is a connection oriented protocol.
• SMTP is a text based protocol.
• It handles exchange of messages between e-mail servers over a TCP/IP network
Transmission Control Protocol (TCP)
• TCP provides communication between an application program and the Internet Protocol ▪Responsible for
verifying the correct delivery of data from client to server
• Break data up into packets that the network can handle efficiently
• TCP is a connection-oriented and reliable protocol
• TCP adds support to detect errors or lost data and to trigger retransmission until the data is correctly and
completely received.
User Datagram Protocol (UDP)
• It is an unreliable and connectionless protocol
• UDP doesn’t have the error checking and ordering functionality of TCP
• UDP is commonly used in time-sensitive communications such as voice and video conferencing or DNS lookups
where occasionally dropping packets is better than waiting.
Lesson [6] Network Protocols – Part 2
Module Learning Outcomes
▪LO1. Examine networking principles and their protocols.
▪LO2. Explain networking devices and operations.
▪LO3. Design efficient networked systems.
▪LO4. Implement and diagnose networked systems.
Layer Protocols
A number of applications have been standardized to operate on top of TCP/IP Model.
Internet Protocol (IP)
•
•
•
Stands for Internet Protocol and it is responsible for logical addressing, path determination and delivering
packets from the source host to the destination host by looking at the IP addresses in the packet headers.
The identifier used in the IP layer of the TCP/IP model to identify each device connected to the Internet is called
the Internet address or IP address
IP has 2 versions: IPv4 and IPv6
IPv4 Introduction
• An IP address is a 32-bit address that uniquely and universally defines the connection of a host or a router to
the Internet. IP addresses are unique
• The 32-bit IP address is broken up into 4 octets, which are arranged into a dotted-decimal notation scheme.
• An octet is a set of 8 bits.
• The address space of IPv4 is 232 or 4,294,967,296.
IP Address Classes
• IP addresses are divided into 5 classes, each of which is designated with the alphabetic letters A to E.
• Classes A, B, and C provide unicast addresses.
• Class D addresses are used for multicasting.
• Class E addresses are reserved for testing & some mysterious future use.
IP Address Classes
IP Address Classes
Are you the Host or the Network
•
•
The 32 bits of the IP address are divided into Network & Host portions, with the octets assigned as a part of one
or the other.
Each Network is assigned a network address & every device or interface (such as a router port) on the network
is assigned a host address.
Class A Addresses
•
•
•
•
Class A IP addresses use the 1st 8 bits (1st Octet) to designate the Network ID.
The 1st bit which is always a 0, is used to indicate the address as a Class A address & the remaining 7 bits are
used to designate the Network.
The other 3 octets contain the Host ID
A has a total of: 27-2= 126 networks(0.0.0.0 and 127.x.y.z are special address) 224 – 2 = 16,777,214 hosts
(2n) = Number of networks
(2n –2) = Number of available hosts
Class B Addresses
• Class B addresses use the 1st 16 bits (two octets) for the Network ID.
• The last 2 octets are used for the Host ID.
• The 1st 2 bits, which are always 10, designate the address as a Class B address & 14 bits are used to designate
the Network. This leaves 16 bits (two octets) to designate the Hosts.
• Class B has a total of: 214 = 16384 network address 216 – 2 = 65534 host address
Class C Addresses
• Class C addresses use the 1st 24 bits (three octets) for the Network ID & only the last octet for Host ID.
• The 1st 3 bits of all class C addresses are set to 110, leaving 21 bits for the Network ID. This leaves 8 bits to
designate the Hosts.
• Class C has a total of:
 221 = 2097152 network address
 28 – 2 = 254 host address
Public and Private IP
• A public IP address is an IP address that your home or business router receives from your ISP.
• A private IP address is an IP address that's reserved for internal use
Subnet Mask
•
•
•
•
•
•
A subnet mask is a number that defines a range of IP addresses that can be used in a network.
A subnet mask hides, or "masks," the network part of a system's IP address and leaves only the host part as the
machine identifier.
The subnet masking process was developed to identify & extract the Network part of the address.
A subnet mask, which contains a binary bit pattern of ones & zeros, is applied to an address to determine
whether the address is on the local Network. This is known as the ANDing process
If it is not, the process of routing it to an outside network begins.
255.255.255.0
Masking concept
•
aIn order to get the network address we AND the destination address with the subnet mask ▪ The only way you
can get a result of a 1 is to combine 1 & 1. Everything else will end up as a 0
Default Subnet Mask
•
The default subnet masks are three subnet masks that correspond to the standard Class A, B, and C address
assignments.
Trial Separation
• If a destination IP address is 206.175.162.21, we know that it is a Class C address & that its binary equivalent is:
11001110.10101111.10100010.00010101
• We also know that the default standard Class C subnet mask is: 255.255.255.0 and that its binary equivalent is:
11111111.11111111.11111111.00000000
•
When these two binary numbers (the IP address & the subnet mask) are combined using Boolean Algebra, the
Network ID of the destination network is the result:
•
•
The result is the IP address of the network. 11001110.10101111.10100010.00000000 206.175.162.0
If this address is the same as the local network, the message is for a node on the local network.
Address Resolution Protocol (ARP)
•
An internet layer protocol that is used to convert an IP address into a physical address(MAC address).
•
A host wishing to obtain a physical address broadcasts an ARP request onto the network.
•
The host on the network that has the IP addresses in the request replies with its physical address.
•
There is also Reverse ARP (RARP) which can be used by a host to discover its IP address. In this case, the host
broadcasts its physical address and a RARP server replies with the host’s IP address.
Address Resolution Protocol (ARP)
Lesson [07] Networking Devices
Module Learning Outcomes
▪LO1. Examine networking principles and their protocols.
▪LO2. Explain networking devices and operations.
▪LO3. Design efficient networked systems.
▪LO4. Implement and diagnose networked systems.
Network Interface Card (NIC)
•
•
Hubs
•
•
•
NIC is a computer hardware component that connects a computer to a computer network.
This works in Physical layer.
A hub interconnects two or more workstations into a local area network.
When a workstation transmits to a hub, the hub immediately resends the data frame to all connecting links.
Three basic types of hubs :
 Passive
 Active
 Intelligent
Switch
• Switch is a computer networking device that connects devices together on a computer network by using packet
switching to receive, process, and forward data to the destination device.
• Managed and Unmanaged Switches
Bridge
• A device that connects two local-area networks (LANs), or two segments of the same LAN that use the same
protocol, such as Ethernet or Token-Ring
• Information only cross the bridge if they are addressed for a host on the other side (selective forwarding).
• No hosts on Segment B will receive information from host to host communication on Segment A as they will be
blocked by the bridge.
Router
•
•
•
•
A router is a device that forwards data packets along networks.
A router is used to connect at least two networks, commonly two LANs or WANs or a LAN and its ISP's network.
Routers are located at gateways, the places where two or more networks connect.
Routers are the critical devices that keep data flowing between networks and keep the networks connected to
the Internet.
Repeater
• A network device used to regenerate or replicate a signal. Repeaters are used in transmission systems to
regenerate analog or digital signals distorted by transmission loss. Digital repeaters can reconstruct a signal to
near its original quality.
• Works in physical layer.
Access Point
• An access point can be considered to represent a two-port bridge
Modem
• It converts or "modulates" an analog signal from a telephone or cable wire to digital data (1s and 0s) that a
computer can recognize.
• Similarly, it converts digital data from a computer or other device into an analog signal that can be sent over
standard telephone lines. ▪Modem stand for "Modulator-Demodulator."
Content Filter
• Content-control software is software designed to restrict or control the content a reader is authorized to
access.
Firewall
• System or group of systems that enforces an access control policy between two networks
• Monitors and controls traffic into and out of secure networks
• Normally located at the gateway to a network
Load Balancer
• Load balancing improves the distribution of workloads across multiple computing resources, such as
computers, a computer cluster, network links, central processing units, or disk drives.
•
Load Balancing algorithms
 Round robin
 Weighted round robin
 Least connections
 Least response time
Packet Shaper
• The Packet Shaper is a device that sits in between the campus network and the outside network.
• All incoming and outgoing traffic passes through it.
VPN Concentrator
• A VPN concentrator is a type of networking device that provides secure creation of VPN connections and
delivery of messages between VPN nodes.
Lesson [08] Transmission Media & Networking Software
Module Learning Outcomes
▪LO1. Examine networking principles and their protocols.
▪LO2. Explain networking devices and operations.
▪LO3. Design efficient networked systems.
▪LO4. Implement and diagnose networked systems.
What is Transmission Media ?
• Transmission media is the data signal carrier with in computer networks.
Basic Types of Physical Media
•
Twisted Pair – 10 Base T
Unshielded Twisted Pair (UTP) cable
Shielded Twisted Pair (STP) cable
•
Coaxial cable
 Thin Coaxial Cable – 10 Base 2
 Thick Coaxial Cable – 10 Base 5
•
Optical Fiber
Twisted Pair Cable
• Inexpensive
• Susceptible to electrical interference (noise)
• Used in telephone systems
• Physical characteristics
 Requires two conductors
 Twisted around each other to reduce electrical interference
 Plastic sheath
• Two Types ▪
 Unshielded Twisted Pair (UTP)
 Shielded Twisted Pair (STP)
UTP vs STP
Coaxial Cable
• At one time, coaxial cable was the most widely used network cabling
• Coaxial was relatively inexpensive, and it was light, flexible, and easy to work with
• It was so popular that it became a safe, easily supported installation
Fiber Optic Cable
• Fiber optic cabling consists of a center glass core surrounded by several layers of protective materials
• Transmit light rather than electronic signals which eliminating the problem of electrical interference.
• Ability to transmit signals over much longer distance.
• Data transmission at vastly greater speeds
Wireless Media
• Microwave system
 transmits data via high-frequency radio signals through the atmosphere
• Satellite system
 receive transmitted signals, amplify them, and then transmit the signals to the appropriate
locations
• Cellular technology
 uses antennae resembling telephone towers to pick up radio signals within a specific area
(cell)
• Infrared technology
 Transmits data as infrared light waves from one device to another, providing wireless links
between PCs and peripherals.
Networking Software
• Network software encompasses a broad range of software used for design, implementation, and operation
and monitoring of computer networks.
• Enables users to have access to network resources in a seamless manner
• Allows administrations to add or remove users from the network
• Helps administrators and security system to protect the network from data breaches, unauthorized access
and attacks on a network
• Enables network virtualizations
Client Software
• Software that resides in a user's desktop or laptop computer or mobile device that accesses a service made
available by a server
• E.g Outlook-Email Client Software
Server Software
• Server software is a type of software that is designed to be used, operated and managed on a computing
server.
• It provides and facilitates the harnessing of underlying server computing power for use with an array of
high-end computing services and functions.
 E.g. Server Operating System
Lesson [09] Server Types
Module Learning Outcomes
▪LO1. Examine networking principles and their protocols.
▪LO2. Explain networking devices and operations.
▪LO3. Design efficient networked systems.
▪LO4. Implement and diagnose networked systems.
Servers
• A server is a computer designed to process requests and deliver data to other (client) computers over a
local network or internet.
• Computer networks support one or more servers that handle specialized tasks.
• Server OS is the software that handle those task.
Common Types of Servers
• Web Servers
• Email Server
• FTP Server
• Identity Server
• Proxy Server
• Game Server
• Application Server
Web Servers
• A web server is a computer system that processes requests via HTTP, the basic network protocol used to
distribute information on the World Wide Web.
• Software: Apache HTTP server, Nginx, Internet information server, Apache tomcat
Email Server
• An e-mail server is a computer within your network that works as your virtual post office.
• A mail server usually consists of a storage area where e-mail is stored for local users
Types of mail Server
• Mail servers can be broken down into two main categories: outgoing mail servers and incoming mail
servers.
• Outgoing mail servers are known as SMTP, or Simple Mail Transfer Protocol, servers.
• Incoming mail servers come in two main varieties. IMAP and POP3, or Internet Message Access Protocol,
Post Office Protocol, version 3,
• Servers always store copies of messages on servers.
File Server
• File server is a computer attached to a network that provides a location for shared disk access.
• Shared storage of computer files (such as text, image, sound, video) that can be accessed by the
workstations that are able to reach the computer that shares the access through a computer network.
Database Server
• A database server is a computer program that provides database services to other computer programs or
to computers, as defined by the client–server model.
•
Software : MySQL, Oracle Database,IBMDB2, MariaDB
Virtualization Server
• Server virtualization is the process of using software on a physical server to create multiple partitions or
"virtual instances" each capable of running independently.
Server Selection
• Match the server to your primary needs
• Consider about the affordability
• Choose best of the breed
• Buy the right OS
• Build in expansion and redundancy
• Support and maintenance
Workstations
• A workstation is a computer designed for professional use by a single user
• It usually has more capacity than a personal computer, but is not as high-powered as a mainframe
computer that is designed to support very complex calculations and multiple users
Lesson [10] Understanding User Requirements
Module Learning Outcomes
▪LO1. Examine networking principles and their protocols.
▪LO2. Explain networking devices and operations.
▪LO3. Design efficient networked systems.
▪LO4. Implement and diagnose networked systems.
Building a good network
• STEP 1 – Verify business goals and technical requirements
• STEP 2 – Determine the features and functions required to meet the identified needs
• STEP 3 – Perform a network readiness assessment
• STEP 4 – Design a solution and site acceptance test plan
• STEP 5 – Create a project plan
Fundamental Design Goals
• Availability
• Security
• Scalability
• Manageability
Network Design Methodologies
• Large network design projects are normally divided into three distinct steps:
 Step 1. Identify the network requirements.
 Business goals
 Technical requirements

 Step 2. Characterize the existing network. Step 3. Design the network topology and solutions
Quality of Service (QoS)
• Capability of a network to provide better service to selected network traffic over various technologies.
• QoS helps manage packet loss, delay and jitter on your network infrastructure.
QoS Characteristics
• Reliability – Lack of reliability means losing a packet or ack
• Delay – Different applications can tolerate delay in different degrees
• Jitter – The variation in packets belonging to same flow
• Bandwidth – Different applications need different bandwidths
Lesson [11] Networking services and application
Module Learning Outcomes
▪LO1. Examine networking principles and their protocols.
▪LO2. Explain networking devices and operations.
▪LO3. Design efficient networked systems.
▪LO4. Implement and diagnose networked systems.
Static vs. Dynamic IP Addressing
• Two methods of assigning and IP address to a device.
• When a device is assigned a static IP address, the address does not change.
• Most devices use dynamic IP addresses, which are assigned by the network when they connect and change
over time.
Dynamic Host Configuration Protocol (DHCP)
• A protocol for assigning dynamic IP addresses to devices on a network.
• With dynamic IP addressing, a device can have a different IP address every time it connects to the network.
• In some systems, the device’s IP address can even change while it is still connected.
• DHCP also supports a mix of static and dynamic IP addresses.
DHCP Functions
Domain Name System (DNS)
• A Domain Name System (DNS) server performs the task of mapping a domain name to an IP address.
Network Address Translation (NAT)
•
•
A method of remapping one IP address space into another by modifying network address information in IP
header of packets while they are in transit across a traffic routing device.
The technique was originally used as a shortcut to avoid the need to readdress every host when a network was
moved.
Network Address Translation (NAT)
Lesson [12] Device Configuration
Module Learning Outcomes
▪LO1. Examine networking principles and their protocols.
▪LO2. Explain networking devices and operations.
▪LO3. Design efficient networked systems.
▪LO4. Implement and diagnose networked systems.
Practical
• Windows Server 2012 R2 installation on Oracle VirtualBox.
• IP address configuration on client PC.
Lesson [13] Verification, Monitoring and Maintenance
Module Learning Outcomes
▪LO1. Examine networking principles and their protocols.
▪LO2. Explain networking devices and operations.
▪LO3. Design efficient networked systems.
▪LO4. Implement and diagnose networked systems.
Network Verification - Ping Command
•
•
•
Helps to verify the network connectivity.
Used to test the reachability of a host on an Internet Protocol (IP) network.
Ping operates by sending Internet Control Message Protocol (ICMP) echo request packets to the target host
and waiting for an ICMP echo reply.
>ping www.google.com
Network Verification – Traceroute Command
•
Used to show several details about the path that a packet takes from the computer or device you're on to
whatever destination you specify.
> tracert www.google.com
Telnet & SSH Commands
•
•
•
TCP/IP protocol for accessing remote computers.
Through Telnet, an administrator or another user can access someone else's computer remotely.
A program for logging into a remote machine and for executing commands on a remote machine.
Network Monitoring
•
Network monitoring is the use of a system that constantly monitors a computer network for slow or failing
components and that notifies the network administrator in case of outages or other trouble.
•
Network monitoring is part of network management.
•
Eg: Solar Winds Network Performance Monitor, PRTG Network Monitor
Network Monitoring Software
Network Maintenance
• Regular maintenance of the networked systems helps them to run more smoothly as well as reduce the risk of
break downs.
• By having a well-designed maintenance schedule assists you in organizing your maintenance tasks
Network Maintenance Tasks
• Server Management
• Router Management
• Upgrading Hardware and Software
• Network Monitoring
• Network Security
• Scheduling Backups