Professional Documents
Culture Documents
Simulation
E-mail: nigaccna21@gmail.com
Lecture Outline
2
Chapter 1:Element of Modern
Network
What is Networking
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 5
Chapter 1:Element of Modern
Network
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 8
Providing Resources in a Network
Networks of Many Sizes
In the case of computer network
technology, there are several types of
networks that vary from simple to
complex level.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 9
Providing Resources in a Network
Networks of Many Sizes
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 10
Providing Resources in a Network
Computer Network Architecture
Computer Network Architecture is defined as the
physical and logical design of the software,
hardware, protocols, and media of the
transmission of data. Simply we can say that how
computers are organized and how tasks are
allocated to the computer.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 11
Providing Resources in a Network
Computer Network Architecture
Network architecture refers to a network’s structural and
logical layout. It describes how the network devices are
connected and the rules that govern data transfer between
them.
The two types of network architectures are used:
• Peer-To-Peer network
• Client/Server network
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 12
Providing Resources in a Network
Peer-to-Peer
•Peer-To-Peer network is a network in which all the
computers are linked together with equal privilege and
responsibilities for processing the data.
•Peer-To-Peer network is useful for small environments,
usually up to 10 computers.
•Peer-To-Peer network has no dedicated server.
•Special permissions are assigned to each computer for
sharing the resources, but this can lead to a problem if the
computer with the resource is down.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 13
Providing Resources in a Network
Peer-to-Peer
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 14
Providing Resources in a Network
Peer-to-Peer
Advantages Of Peer-To-Peer Network:
•It is less costly as it does not contain any dedicated server.
•If one computer stops working but, other computers will not
stop working.
•It is easy to set up and maintain as each computer manages
itself.
Disadvantages Of Peer-To-Peer Network:
•In the case of Peer-To-Peer network, it does not contain
the centralized system . Therefore, it cannot back up the
data as the data is different in different locations.
•It has a security issue as the device is managed itself.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 15
• Client/Server network is a network model designed for the
end users called clients, to access the resources such as
songs, video, etc. from a central computer known as Server.
• The central controller is known as a server while all other
computers in the network are called clients.
• A server performs all the major operations such as
security and network management.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 16
• A server is responsible for managing all the resources such
as files, directories, printer, etc.
• All the clients communicate with each other through a
server. For example, if client1 wants to send some data to
client 2, then it first sends the request to the server for
the permission. The server sends the response to the
client 1 to initiate its communication with the client 2.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 17
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 18
Advantages Of Client/Server network:
• A Client/Server network contains the centralized
system. Therefore we can back up the data easily.
• A Client/Server network has a dedicated server that
improves the overall performance of the whole system.
• Security is better in Client/Server network as a single
server administers the shared resources.
• It also increases the speed of the sharing resources.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 19
Disadvantages Of Client/Server network:
• Client/Server network is expensive as it requires the
server with large memory.
• A server has a Network Operating System(NOS) to
provide the resources to the clients, but the cost of
NOS is very high.
• It requires a dedicated network administrator to
manage all the resources.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 20
LANs, WANs, and Internets
Components of a Network
There are three categories of network components:
Devices Equipment that connects to a network,
Media
the communication channels used to
Services interconnect nodes on a computer network.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 21
Components of a Network
Network Representations
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 22
Components of a Network
Topology Diagrams
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 23
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 24
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 25
Computer Network Architecture
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 26
A Global Network Architecture
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 27
We begin with an architecture that
could represent an enterprise
network of national or global
extent, or a portion of the Internet
with some of its associated
networks.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 28
At the center of the figure is an IP backbone,
or core, network, which could represent a
portion of the Internet or an enterprise IP
network. Typically, the backbone consists of
high-performance routers, called core
routers, interconnected with high-volume
optical links.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 29
an IP backbone are routers that provide
connectivity to external networks and users.
These routers are sometimes referred to as
edge routers or aggregation routers.
An edge router is a specialized router located
at a network boundary that enables an internal
network to connect to external networks. They
are primarily used at two demarcation points:
the wide area network (WAN) and the internet.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 30
The upper part of Figure depicts a portion of what
might be a large enterprise network. The figure
shows two sections of the network connected via a
private high-speed WAN, with switches
interconnected with optical links. MPLS using IP is
a common switching protocol used for such WANs;
wide-area Ethernet is another option.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 31
The lower portion of Figure also shows an individual
residential user connected to an Internet service
provider (ISP) through some sort of subscriber
connection. Common examples of such a connection are a
DSL, which provides a high-speed link over telephone
lines and requires a special DSL modem, and a cable TV
facility, which requires a cable modem, or some type of
wireless connection.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 32
DSL (Digital Subscriber Line) is a modem technology that uses
existing telephone lines to transport high-bandwidth data,
such as multimedia and video, to service subscribers.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 33
A Global Network Architecture
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 34
A Global Network Architecture
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 35
enterprises often design their network facilities in a
three-tier hierarchy: access, distribution, and core.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 36
The distribution network connects access networks with
each other and with the core network. An edge router in
the distribution network connects to an edge router in an
access network to provide connectivity.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 37
The core network, also referred to as a backbone network,
connects geographically isolated distribution networks as well
as providing access to other networks that are not part of
the enterprise network. Typically, the core network will use
very high-performance routers, high-capacity transmission
lines, and multiple interconnected routers for increased
redundancy and capacity. The core network may also connect
to high-performance, high-capacity servers, such as large
database servers and private cloud facilities.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 38
A computer network can be categorized by their size. A
computer network is mainly of six types:
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 39
LANs and WANs
Local Area Networks (LAN)
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 40
LANs and WANs
Personal Area Networks (PAN)
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 41
LANs and WANs
Personal Area Networks (PAN)
There are two types of Personal Area Network:
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 42
LANs and WANs
Wide Area Networks (WAN)
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 43
LANs and WANs
Types of Networks
The two most common types of network infrastructures are:
A wireless LAN is a wireless computer
Local Area Network (LAN) network that links two or more devices
using wireless communication to form a
Wide Area Network (WAN). local area network within a limited area
such as a home, school, computer
laboratory, campus, or office building.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 44
Internetwork
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 45
LANs, WANs, and Internets
The Internet
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 46
The Internet
Intranet and Extranet
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 47
Extranet: An extranet is a communication network based
on the internet protocol such as Transmission Control
protocol and internet protocol. The access to the
extranet is restricted to only those users who have login
credentials.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 49
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 50
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 51
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 52
As networks evolve, we are discovering that there are four
basic characteristics that the underlying architectures
need to address in order to meet user expectations:
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 53
Security
Network allows the security by ensuring that the user has
the right to access the certain files and applications.
Scalability
Scalability means that we can add the new components on
the network. Network must be scalable so that we can
extend the network by adding new devices. But, it decreases the
speed of the connection and data of the transmission speed also decreases, this
increases the chances of error occurring. This problem can be
overcome by using the routing or switching devices.
Reliability
Computer network can use the alternative source for the
data communication in case of any hardware failure.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 54
Reliable Network
Providing (QoS)
Examples of priority decisions for an organization might
include:
Time-sensitive communication - increase priority for services
like telephony or video distribution.
Non time-sensitive communication - decrease priority for web
page retrieval or email.
High importance to organization - increase priority for
production control or business transaction data.
Undesirable communication - decrease priority or block
unwanted activity, like peer-to-peer file sharing or live
entertainment
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 55
Cloud Computing
Front End
Back End
Each of the ends is connected through a network, usually Internet.
The following diagram shows the graphical view of cloud
computing architecture:
Cloud Computing Architecture
consists of interfaces and applications that are required to access the cloud
computing platforms, Example - Web Browser.
Back End: It refers to the cloud itself. It consists of all the resources
Sharing Among
Organizations
Community cloud provides an
infrastructure to share cloud resources
and capabilities among several
organizations.
Security
The community cloud is comparatively
more secure than the public cloud but
less secured than the private cloud.
Service Models
98
"Things," in the IoT sense, can refer to a wide variety
of devices such as heart monitoring implants, biochip
transponders on farm animals, electric clams in coastal
waters, automobiles with built-in sensors, DNA
analysis devices for environmental/food/pathogen
monitoring or field operation devices that assist fire-
fighters in search and rescue operations.
These devices collect useful data with the help of
various existing technologies and then autonomously
flow the data between other devices.
99
History of IoT
The concept of the Internet of Things first became
popular in 1999, through the Auto-ID Center at MIT and
related market-analysis publications. R
Radio-frequency identification (RFID) was seen as a
prerequisite for the IoT at that point. If all objects and
people in daily life were equipped with identifiers,
computers could manage and inventory them. Besides
using RFID, the tagging of things may be achieved through
such technologies as near field communication, barcodes,
QR codes, bluetooth, and digital watermarking.
100
How IoT Works?
Internet of Things is not the result of a single novel
technology; instead, several complementary technical
developments provide capabilities that taken together help
to bridge the gap between the virtual and physical world.
These capabilities include:
Communication and cooperation
Addressability
Identification
Sensing
Actuation
Embedded information processing
Localization
User interfaces
101
How IoT Works?
102
The Structure of IoT
The IoT can be viewed as a gigantic network
consisting of networks of devices and computers
connected through a series of intermediate technologies
where numerous technologies like RFIDs, wireless
connections may act as enablers of this connectivity.
"The Sky's not the limit. It's only the beginning with IoT."
106
Applications of IoT
• Rules of Communication
• Network Protocols and Standards
• Moving Data in the Network
• Summary
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 122
The Rules
What is Communication?
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 123
The Rules
Establishing the Rules
Establishing the Rules
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 124
The Rules
Message Encoding
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 125
The Rules
Message Formatting and Encapsulation
Example: Personal letter contains the following elements:
An identifier of the recipient
A salutation or greeting
The message content
A closing phrase
An identifier of the sender
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 126
The Rules
Message Delivery Options
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 127
Protocols
Network Protocols
How the message is formatted or structured
The process by which networking devices share information
about pathways with other networks
How and when error and system messages are passed
between devices
The setup and termination of data transfer sessions
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 128
Protocol Suites
TCP/IP Protocol Suite and Communication
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 129
Reference Models
Comparing the OSI and TCP/IP Models
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 130
Data Encapsulation
Communicating the Messages
Segmenting message benefits
Different conversations can be interleaved
Increased reliability of network communications
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 131
Data Encapsulation
Protocol Data Units (PDUs)
Data
Segment
Packet
Frame
Bits
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 132
Data Encapsulation
Encapsulation
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 133
Data Encapsulation
De-encapsulation
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 134
Moving Data in the Network
Accessing Local Resources
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 135
Accessing Local Resources
Network Addresses & Data Link addresses
Network Address
Source IP address
Destination IP address
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 136
Accessing Local Resources
Communicating with Device / Same Network
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 137
Accessing Local Resources
MAC and IP Addresses
R1
192.168.1.1
11-11-11-11-11-11
ARP
Request
PC1 S1 R1
192.168.1.110
AA-AA-AA-AA-AA-AA
PC2
192.168.1.111
BB-BB-BB-BB-BB-BB
FTP Server
192.168.1.9
CC-CC-CC-CC-CC-CC
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 138
Accessing Remote Resources
Default Gateway
PC 1 R2
R1 172.16.1.99
192.168.1.110 192.168.1.1
AA-AA-AA-AA-AA-AA 22-22-22-22-22-22
11-11-11-11-11-11
Web Server
172.16.1.99
AB-CD-EF-12-34-56
PC 2 FTP Server
192.168.1.111 192.168.1.9
BB-BB-BB-BB-BB-BB CC-CC-CC-CC-CC-CC
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 139
Accessing Remote Resources
Communicating Device / Remote Network
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 140
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 141