You are on page 1of 94

NETWORKING

Lecture Slide by Ruman Thapa

01/19/2024
ISMT COLLEGE_NETWORKING-1
OBJECTIVE OF COURSE

01/19/2024
ISMT COLLEGE_NETWORKING-1
LO1 Examine networking principles and their protocols
Introduction to networks:
Impact of networks on daily lives, the basic requirements of a reliable network, employment opportunities in
the networking field, network common network attacks, network trends, e.g. bring your own device (BYOD).
Role of networks:
Purpose, benefits, resource implications, communications, e.g. transmission mediums, working practice,
commercial opportunity, information sharing, collaboration.
System types:
Peer-based, client-server, cloud, cluster, centralized, virtualized.
Networking standards:
Conceptual models, e.g. OSI model, TCP/IP model; standards, e.g. IEEE 802.x.
Topology:
Network representation logical, e.g. ethernet, Token Ring; physical, e.g. star, ring, bus, mesh, tree.
Protocols:
Purpose of protocols; adherence, routed protocols, e.g. IPv4 (addressing, subnetting, VLSM), IPv6
(addressing); global unicast, multicast, link local, unique local, EUI 64, auto configuration, ICMP, FTP, HTTP, SMTP, POP3,
SSL; management of protocols for addressing.
Wireless networks:
Explore the use and evolution and industry developments in mobile/cellular networks, including key
technologies; standards for communications (3G, 4G, 5G); process of accessing and connecting to NB-IoT, GPRS and
Wi-Fi networks.
01/19/2024
Distinguish between NB-IoT and Wi-Fi AT command sets.
ISMT COLLEGE_NETWORKING-1
LO2 Explain networking devices and operations
Networking devices:
Explain the operation of server, hub, routers, switches, multilayer switch (including their operating
systems, e.g. CISCO IOS, etc.), firewall, Host-based Intrusion System (HIDS), repeaters, bridges, wireless devices,
access point (wireless/wired), content filter, load balancer, modem, packet shaper, VPN concentrator.
Explore the basic concepts, features and key technologies of IoT gateways, including IoT gateway solutions,
industrial IoT gateway positioning, edge computing, network topologies, RF mesh, Smart Home networks,
acceleration, Wi-Fi coverage and intelligent services and serial data transmission (binary data).

Networking software:
Client software, server software, client operating system, server operating system, firewall.

Server type:
Web, file, database, combination, virtualisation, terminal services server.

Server selection:
Cost, purpose, operating system requirement.

Workstation:
Hardware, e.g. network card, cabling.
System bus and local-system architecture, e.g. memory, processor, I/O devices. Permissions.
01/19/2024
ISMT COLLEGE_NETWORKING-1
LO3 Design efficient networked systems
Bandwidth:
Expected average load, anticipated peak load, local internet availability, cost constraints, throughput.
Users:
Quality expectations, concept of system growth.
Consider what the network will be used for (purpose) according to the scenario.
Networking services and applications:
DHCP, including static vs dynamic IP addressing, reservations, scopes, leases, options (DNS servers, Suffixes), IP helper, DHCP relay, DNS
records, Dynamic DNS, static and dynamic routing between multiple subnets.
Calculate IP subnet address ranges in dotted decimal and binary.
Calculate subnet masks
Communications:
Ensuring communications are suited to devices, suited to users, supportive of lifestyle desires, supportive of commercial requirements,
security requirements, quality of service needs.
Scalability:
Ability to support device growth, able to support addition of communication devices, able to cope with bandwidth use and trend
changes, protocol utilisation, addressing, multiple subnets, dynamic, static routing protocols.
Selection of components:
Supporting infrastructure needs; supporting connectivity requirements.
Security:
The concept of ‘secure by design’ and its application to infrastructure.
Security considerations when designing a network for an identified scenario, e.g. shared data, network access, remote workers, public
01/19/2024 facing systems, internal policy.
ISMT COLLEGE_NETWORKING-1
LO4 Implement and diagnose networked systems
Devices:
Installation of communication devices, allocation of addresses, local client configuration, server configuration, server installation, security considerations.

Verification of configuration and connectivity:


Installation of internet work communication medium, ping, extended ping, traceroute, telnet, SSH.
Evidence the system meets design requirements, including security controls as required by the scenario, have been implemented.

System monitoring:
Utilisation, bandwidth needs, monitoring user productivity and security of the system. Factors affecting network performance.
Identify typical failure modes in protocols and approaches to error control.
Review network monitoring data to optimise performance and undertake root cause analysis of events and make recommendations to reduce false positives and
false negatives.

Network automation:
Process of setting up software to automatically manage, configure, test, deploy, and operate network devices (physical or virtual).

Maintenance schedule:
Backups, upgrades, security, auditing.

Diagnose and resolve layer 1 problems:


Explore the E2E integrated development and testing process.
Framing, CRC, runts, giants, dropped packets, late collisions, input/output errors.

Policy review:
Bandwidth, resource availability.

Service level agreements (SLAs):


01/19/2024 Conditions of service availability, time window for each level of service (prime time and non-prime time), responsibilities of each party, escalation procedures, and
ISMT COLLEGE_NETWORKING-1
cost/service trade- offs.
REFERENCE BOOK
Burgess, M. (2003) Principles of Network and System Administration. 2nd Ed. John Wiley and Sons Ltd.
Donahue, G. A. (2011) Network Warrior 2nd Ed. O'Reilly Media.
Goransson, P. Black, C. et al (2016) Software Defined Networks: A Comprehensive Approach 2nd Ed. Morgan
Kaufmann.
Hallberg, B. (2005) Networking: A Beginner’s Guide. 4th Ed. Osborne/McGraw-Hill US.
Limoncelli, T. and Hogan, C. (2001) The Practice of System and Network Administration. Addison-Wesley.
Lowe, D. (2005) Networking All-in-One Desk Reference for Dummies. 2nd Ed. Hungry Minds Inc.
Olifer, N. and Olifer, V. (2005) Computer Networks: Principles, Technologies and Protocols for Network Design.
John Wiley and Sons Ltd.
Stallings, W. (2003) Data and Computer Communications. 7th Ed. (Prentice Hall).
Tanenbaum, A. (2002) Computer Networks. Prentice Hall PTR.

01/19/2024
ISMT COLLEGE_NETWORKING-1
What is Computer Network?
Computer Network is a system in which multiple computers are connected to each
other to share information and resources.

Network
Wireless
Devices

Computers

Wired
Network Definition
A Computer Network is a interconnected collection of autonomous computers
Two computers are said to be interconnected if they can share and exchange
information/resources.
A network can be defined as two or more computers connected together in such a
way that they can share resources.

01/19/2024
ISMT COLLEGE_NETWORKING-1
Network Definition
A resource may be:
A file
A folder
A printer
A disk drive
Or just about anything else that exists on a computer.

01/19/2024
ISMT COLLEGE_NETWORKING-1
Network Definition
The computers can be interconnected by any media (copper, optical fiber, microwave
or satellites )
One saying is that computer network emerged because of multiuser environment of
mainframe computers
Other saying is that computer network evolved because of digital telecommunication.

01/19/2024
ISMT COLLEGE_NETWORKING-1
Network Definition
The first step when building a network, even a worldwide network such as the
Internet, is to connect two hosts together. This is illustrated in the figure below.

01/19/2024
ISMT COLLEGE_NETWORKING-1
Network Definition
A network is simply a collection of computers or other hardware devices that are
connected together,
using special hardware and software,
to allow them to exchange information and cooperate

01/19/2024
ISMT COLLEGE_NETWORKING-1
Networking Definition
Networking is the term that describes the processes involved in designing,
implementing, upgrading, managing and otherwise working with networks and
network technologies.
Networking is the practice of linking two or more computing devices together for
the purpose of sharing data.
Networks are built with a mix of computer hardware and computer software.
A network, is a collection of computers and other hardware components
interconnected by communication channels that allow sharing of resources and
information.

01/19/2024
ISMT COLLEGE_NETWORKING-1
Network Definition
A computer network can be described as a system of interconnected devices that can
communicate using some common standards (called protocols). These devices
communicate to exchange resources (e.g. files and printers) and services.
Here is an example network consisting of two computers connected together:

In the example above, the two computers are directly connected using a cable. This
small network can be used to exchange data between just these two computers.

01/19/2024
ISMT COLLEGE_NETWORKING-1
Network Definition
What if we want to expand our network? Then we can use a network device, either
a switch or a hub, to connect more than two computers together:

Now all of the devices on the network can communicate with each other.
We’ll talk more about hubs and switches in latter chapter. For now, just remember
that these devices serve as a central point to which all of the computers connect to.

01/19/2024
ISMT COLLEGE_NETWORKING-1
Advantages of Computer Network
File Sharing Flexible Access

Entertainment Better Communication


Advantages of Computer Network
Internet Access Inexpensive System

Instant and Multiple Access Resource Sharing


Applications of Computer Network
Email Services Teleconferencing

Business & Finance File & Directory Services

& Many More….


Advantages of Networking
Connectivity and Communication
Data Sharing
Hardware Sharing
Instant and multiple access
Internet Access Sharing
Cost effective
Performance Enhancement and Balancing
Entertainment
Remote Access

01/19/2024
ISMT COLLEGE_NETWORKING-1
Disadvantages of Networking
Network Hardware, Software and Setup Costs
Hardware and Software Management and Administration Costs
Undesirable Sharing
Illegal or Undesirable Behavior
Data Security Concerns

01/19/2024
ISMT COLLEGE_NETWORKING-1
Components of a Network

01/19/2024
ISMT COLLEGE_NETWORKING-1
Other Components

NIC

Cables

01/19/2024
ISMT COLLEGE_NETWORKING-1
WHAT IS DATA COMMUNICATION?
Electronic transmission of information that has been encoded digitally with some
standard from one network (systems) to other network (systems) via certain
medium, knows as Data Communication.
Data communications are the exchange of data between two devices via some form
of transmission medium such as a wire cable.
Elements of Data Communication
Message
Sender
Receiver
Transmission media
Protocol

01/19/2024
ISMT COLLEGE_NETWORKING-1
01/19/2024
ISMT COLLEGE_NETWORKING-1
Data transmission process between sender and receiver refers to data communication,
and deployed physical environment (hardware / software / protocols / channel ) is
network.

01/19/2024
ISMT COLLEGE_NETWORKING-1
1) Message. The message is the information (data) to be communicated. Popular
forms of information include text, numbers, pictures, audio, and video.
2) Sender. The sender is the device that sends the data message. It can be a
computer, workstation, telephone handset, video camera, and so on.
3) Receiver. The receiver is the device that receives the message. It can be a
computer, workstation, telephone handset, television, and so on.
4) Transmission medium. The transmission medium is the physical path by which a
message travels from sender to receiver. Some examples of transmission media
include twisted-pair wire, coaxial cable, fiber-optic cable, and radio waves
5) Protocol. A protocol is a set of rules that govern data communications. It
represents an agreement between the communicating devices. Without a protocol,
two devices may be connected but not communicating, just as a person speaking
French cannot be understood by a person who speaks only Japanese.

01/19/2024
ISMT COLLEGE_NETWORKING-1
TERMINOLOGY IN NETWORKING
1) Servers and Clients
In networking there are always two computers in the connection(The server and The
client)
The server listens and waits for clients to connect to it and the client connects to the
server.
For example, the server is the computer that holds the web site and the client is your
web browser.

01/19/2024
ISMT COLLEGE_NETWORKING-1
TERMINOLOGY IN NETWORKING
CONT..
So when you type in http://www.google.com, your web browser connects to the
server at http://www.google.com and they start communicating.
A client-server protocol is one in which an always-on host (the server) listens for
connections from other hosts (clients). When a connection is established, data may
be transferred between the client and the server.

01/19/2024
ISMT COLLEGE_NETWORKING-1
01/19/2024
ISMT COLLEGE_NETWORKING-1
TERMINOLOGY IN NETWORKING
2) Protocols
In data communication and networking, a protocol defines the rules that both the
sender and receiver and all intermediate devices need to follow to be able to
communicate effectively.
When communication is simple, we may need only one simple protocol; when the
communication is complex, we may need to divide the task between different
layers, in which case we need a protocol at each layer, or protocol layering.
A protocol is the language that computers use to talk to each other.
If two computers want to talk to each other they need to know the same language.
If they don't know the same language they can't talk to each other.

01/19/2024
ISMT COLLEGE_NETWORKING-1
What is Protocol?
Human Protocol(Language) Network Protocol
“what’s the time?” ✔ Set of rules
“I have a question” ✔ machines rather than humans
Introduction Talk ✔ all communication activity in Internet
governed by protocols.

Protocol is define format,


order of message sent and
received among network
entities, and actions taken
on message transmission
and reception
TERMINOLOGY IN NETWORKING
For example if someone who speaks Chinese and doesn't know a word of English it
won't be all that easy to communicate with an English speaking person. It will be
nearly impossible.
The protocol used in Web Browsers and Web Servers is the HTTP protocol.

01/19/2024
ISMT COLLEGE_NETWORKING-1
TERMINOLOGY IN NETWORKING
CONT..
A protocol is an established set of rules that dictate the method of communication
between 2 hosts.
Examples include HTTP, FTP, TCP
Network protocols include mechanisms for devices to identify and make connections
with each other, as well as formatting rules that specify how data is packaged into
messages sent and received.

01/19/2024
ISMT COLLEGE_NETWORKING-1
TERMINOLOGY IN NETWORKING
Some protocols also support message ​acknowledgment and data compression
designed for reliable and/or high-performance network communication.

01/19/2024
ISMT COLLEGE_NETWORKING-1
PURPOSE OF COMPUTER
NETWORKING
1. File and Data Sharing
At one time, file-sharing consisted mostly of saving documents to floppy disks
that could be physically transferred to other computers by hand.
With networking, however, files can be shared instantaneously across the
network, whether with one user or with hundreds.

01/19/2024
ISMT COLLEGE_NETWORKING-1
PURPOSE CONT…
Employees across departments can collaborate on documents, exchange background
material, revise spreadsheets and make simultaneous additions and updates to a
single central customer database without generating conflicting versions.

01/19/2024
ISMT COLLEGE_NETWORKING-1
01/19/2024
ISMT COLLEGE_NETWORKING-1
PURPOSE CONT…
2) Resource Sharing
Computer networking also allows the sharing of network resources, such as printers,
dedicated servers, backup systems, input devices and Internet connections.
By sharing resources, unique equipment like scanners, color printers or high-speed
copiers can be made available to all network users simultaneously without being
relocated, eliminating the need for expensive redundancies.

01/19/2024
ISMT COLLEGE_NETWORKING-1
PURPOSE CONT…

01/19/2024
ISMT COLLEGE_NETWORKING-1
PURPOSE CONT…
3) Data Protection and Redundancy
Preventing critical data loss saves businesses worldwide countless millions of dollars
every year.
Networking computers together allows users to distribute copies of important
information across multiple locations, ensuring essential information isn't lost with
the failure of any one computer in the network.

01/19/2024
ISMT COLLEGE_NETWORKING-1
PURPOSE CONT…
By utilizing central backup systems both on- and off-site, unique documents and data
can be gathered automatically from every computer in the network and securely
backed up in case of physical computer damage or accidental deletion.

01/19/2024
ISMT COLLEGE_NETWORKING-1
PURPOSE CONT…
4) Ease of Administration
Information technology (IT) officers and computer network administrators love
network systems because they allow the IT professional to maintain uniform versions
of software, protocols and security measures across hundreds or thousands of
individual computers from one IT management station.

01/19/2024
ISMT COLLEGE_NETWORKING-1
PURPOSE CONT…
Instead of individually upgrading each computer in a company one at a time, a
network administrator can initiate an upgrade from a server and automatically
duplicate the upgrade throughout the network simultaneously, allowing everyone in
the company to maintain uniform software, resources and procedures.

01/19/2024
ISMT COLLEGE_NETWORKING-1
PURPOSE CONT…
5) Internal Communications
Computer networking also allows organizations to maintain complex internal
communications systems.
Network email can be instantaneously delivered to all users, voice mail systems can
be hosted via network and made available system wide and collaborative scheduling
software and program management tools allow employees to coordinate meetings
and work activities that maximize effectiveness, while also notifying managers and
co-workers of plans and progress.

01/19/2024
ISMT COLLEGE_NETWORKING-1
Types of Computer Network
Computer networks can be categories by their size as well as their purpose.
The size of a network can be expressed by the geographic area.
Some of the different networks based on size are:
1. Local Area Network - LAN
2. Metropolitan Area Network - MAN
3. Wide Area Network - WAN
Local Area Network
A local area network (LAN) is a computer network that interconnects computers
within a limited area such as a residence, school, laboratory, university campus or
office building.
Metropolitan Area Network
A metropolitan area network (MAN) is a computer network that interconnects with
computer in a metropolitan area like city.
MAN is a larger than LAN but smaller than the area covered by a WAN.
It is also used to interconnection of several local area network.

Navagam
Morbi

Rajkot

Shapar
Wide Area Network
A wide area network (WAN) is a computer network that exists over a large-scale
geographical area.
A WAN connects different networks, including local area networks (LAN) and
metropolitan area networks (MAN).
It may be located with in a state or a country or it may be interconnected around the
world.

Asia

America

Africa
Types of Computer Networks - Summary
Types of Computer Networks - Summary
Basis Of Comparison LAN MAN WAN
Full Name Local Area Network Metropolitan Area Wide Area Network
Network
Meaning A network that connects It covers relatively large It spans large locality &
a group of computers in region such as cities, connects countries
a small geographical towns together. e.g. Internet
area
Ownership of Network Private Private or Public Private or Public (VPN)
Design and Maintenance Easy Difficult Difficult

Propagation Delay Short Moderate Long

Speed High Moderate Low


Equipment Used NIC, Switch, Hub Modem, Router Microwave, Radio
Transmitter & Receiver
Range(Approximately) 1 to 10 km 10 to 100 km Beyond 100 km
Used for College, School, Small towns, City State, Country, Continent
Hospital
Networking Model
Network can be classified into two types:

1. Peer to peer networks


2. Client server networks

01/19/2024
ISMT COLLEGE_NETWORKING-1
Peer to Peer Network
Computers are connected together so that users can share
resources and information.

There is no central server for authenticating users, each of them


works as both client and server.
e.g. Bit Torrent
Client – Server Network
Client: Request servers for a task.
Generally called desktop PCs or workstations.
Server: Receive requests from the clients. Process and response them.
e.g. Web Server, Email Server
Peer to Peer Networks

What does the word “peer” mean?

Merriam-Webster: one that is of equal standing with another : EQUAL;

especially : one belonging to the same societal group especially


based on age, grade, or status

Peer-to-peer: From one equal partner to another?

01/19/2024
ISMT COLLEGE_NETWORKING-1
01/19/2024
ISMT COLLEGE_NETWORKING-1
01/19/2024
ISMT COLLEGE_NETWORKING-1
Features of Peer to Peer Networks
Here, each computer is responsible for making its own resources
available to other computers on the network.
Each computer is responsible for setting up and maintaining its own
security for these resources.
Also each computer is responsible for accessing the required network
resources from peer to peer relationship.
Useful for small networks containing less than 10 computers on a single
LAN.
Each computer maintains its own accounts & their security settings

01/19/2024
ISMT COLLEGE_NETWORKING-1
Features of Peer to Peer Networks
Every computer can function both as a client as well as a server.
P2P do not have central control system i.e. there are no centralized servers
in peer networks .
Here, user simply share disk space & resources, such as printer & faxes.
There is no central login process.

01/19/2024
ISMT COLLEGE_NETWORKING-1
Peer to Peer Networks contd…
If the system is logged into one peer on the network, he/she can use any
resources on the network that are controlled by a specified password.
Access to individual resources can be controlled if the user who shared
the resources requires a password to access it.
Since, there is no central security , the user will have to know individual
for each secured shared resource he wishes to access.

01/19/2024
ISMT COLLEGE_NETWORKING-1
When do we use p2p network?
1. If the security is not important.
2. If the number of users are less than ten.
3. If all the users are situated in the same area.
4. If the possibility of future expansion is less.

01/19/2024
ISMT COLLEGE_NETWORKING-1
Advantages of Peer to Peer Networks
1. It is easy to install and so is the configuration of computers on this network,
2. Simple & eliminates the need of expensive server
3. No additional software is necessary in order to set up the peer to peer network
4. All the resources and contents are shared by all the peers, unlike server-client
architecture where Server shares all the contents and resources.
5. P2P is more reliable as central dependency is eliminated. Failure of one peer
doesn’t affect the functioning of other peers.
6. There is no need for full-time System Administrator. Every user is the
administrator of his machine. User can control their shared resources.
4.The over-all cost of building and maintaining this type of network is
comparatively very less.

01/19/2024
ISMT COLLEGE_NETWORKING-1
Drawbacks – Peer to Peer Networks
1.In this network, the whole system is decentralized thus it is difficult to administer.
That is one person cannot determine the whole accessibility setting of whole
network.
2.Security in this system is very less viruses, malwares can easily transmitted over
this P-2-P architecture.
3.Data recovery or backup is very difficult. Each computer should have its own
back-up system.
4.Lot of movies, music and other copyrighted files are transferred using this type of
file transfer. P2P is the technology used in torrents.

01/19/2024
ISMT COLLEGE_NETWORKING-1
Client Server Networks
In the client/ server architecture, certain computers acts as server and other acts as
clients.
A server is simply a computer that manages the network resource, provides service
to other computers when they request
Server computer functions as the "brain" of the organization, and a group
of client computers which are commonly called workstations
A client computer requests a service from a server
One can construct client server network by using one or more powerful networked
computers and rest as clients

01/19/2024
ISMT COLLEGE_NETWORKING-1
Client Server Networks
Here, all the available network resources such as files, directories,
applications & shared devices are centrally managed & hosted & then are
accessed by client.
Security of the clients are provided by the server.
Communication between the client & the server
The client places the request on the server machine when it wants to
access the centralized resources.
The server responds to the request and sends the reply.

01/19/2024
ISMT COLLEGE_NETWORKING-1
Components of Client/Server
1) Clients or Workstations.
2) Servers.
3) Network Devices :- They connect the clients and servers,
and at the same time ensure proper collision free routing of
information.
4) Other components like scanner , printer, etc can also be
connected to network architecture.

01/19/2024
ISMT COLLEGE_NETWORKING-1
Client/Server Architecture

01/19/2024
ISMT COLLEGE_NETWORKING-1
Advantages - Client/Server
Centralization : Unlike P2P, in this architecture there is a centralized control.
Servers help in administering the whole set-up. Access rights and resource
allocation is done by Servers.
Proper Management : All the files are stored at the same place. In this way,
management of files becomes easy. Also it becomes easier to find files.
Back-up and Recovery possible : As all the data is stored on server its easy to make a
back-up of it. Also, in case of some break-down if data is lost, it can be recovered
easily and efficiently.
Upgradation and Scalability: Changes can be made easily by just upgrading the
server. Also new resources and systems can be added by making necessary changes
in server.
Accessibility : From various platforms in the network, server can be accessed remotely.

01/19/2024
ISMT COLLEGE_NETWORKING-1
Advantages - Client/Server
Storage capacities As new information is uploaded in database , each workstation
need not have its own storage capacities increased (as may be the case in peer-to-
peer systems). All the changes are made only in central computer on which server
database exists.
Security : Rules defining security and access rights can be defined at the time of
set-up of server.

01/19/2024
ISMT COLLEGE_NETWORKING-1
Disadvantages – Client/server
1) Congestion in Network : Too many requests from the clients may lead to
congestion, which rarely takes place in P2P network. Overload can lead to
breaking-down of servers. In peer-to-peer, the total bandwidth of the network
increases as the number of peers increase.
2) Client-Server architecture is not as robust as a P2P and if the server fails, the
whole network goes down. Also, if you are downloading a file from server and it
gets abandoned due to some error, download stops altogether. However, if there
would have been peers, they would have provided the broken parts of file.
3) Cost : It is very expensive to install and manage this type of computing.
4) You need professional IT people to maintain the servers and other technical
details of network.

01/19/2024
ISMT COLLEGE_NETWORKING-1
Transmission media

01/19/2024
ISMT COLLEGE_NETWORKING-1
Transmission Media
A transmission media can be defined as any medium that can carry
information from a source to a destination.

Transmission
Media

Guided Media Unguided Media


(Wired) (Wireless)

Twisted-Pair Coaxial Fiber Optic Radio Infrared


Microwave
Cable Cable Cable Wave Wave
Guided Media
Guided media are those that provide a wired - channel from one device to another.
Three Guided media commonly used for data transmission are:

Twisted Pair Coaxial Cable Fiber Optic


Cable Cable
Twisted Pair Cable
Separately insulated
Twisted together
It is widely used in different kinds of data and voice infrastructure.
The use of two wires twisted together helps to reduce crosstalk and electromagnetic
induction.
Two types of twisted pair cable:

UTP STP
(Unshielded Twisted (Shielded Twisted Pair)
Pair)
Twisted Pair Cable – Cont…
UTP(Unshielded Twisted Pair)
Ordinary telephone wires
Less expensive
Weak immunity against noise & interferences
Most used in two categories: Cat-3 & Cat-5
Used in laboratory
STP(Shielded Twisted Pair)
An extra metallic shield on each pair
Relatively more expensive
Better performance than UTP
Used in exterior network(outside of building).
Coaxial Cable

Outer conductor is braided shield


Inner conductor is solid metal
Separated by insulating material, and whole cover by plastic cover
Used in television, long distance telephone transmission
High bandwidth and excellent noise immunity
Fiber Optic Cable
Glass or plastic core
Laser or light emitting diode
Small size & weight
Used in high bandwidth network
High data rate & lower attenuation
Unguided Media
Unguided media transmit electromagnetic waves without using a physical conductor.
This type of communication is often referred to as wireless communication.
1. Radio wave
2. Microwave
3. Infrared Wave
Radio wave

Highly regulated
Omni directional antennas
Radio waves are used for multicast communications, such as radio and television, and paging systems
Penetrate through walls
Microwave
Use directional antennas - point to point line of sight communications
Microwave communication
Used for unicast communication such as cellular telephones, satellite networks
Higher frequency ranges cannot efficiently penetrate walls
Infrared wave
Infrared signals can be used for short-range communication in a closed area using
line-of-sight propagation
Used on televisions, VCRs, and stereos all use infrared communication.
Relatively directional
Cheap, easy to build but they do not pass through solid objects
So, who owns the Internet?
Well, nobody does. No single person or company owns the Internet or even
controls it entirely. As a wide-area network, it is made up of many smaller
networks. These smaller networks are often owned and managed by a person or
organization. The Internet, then, is really defined by how connections can be
made between these networks.

15-
Internet Connections
Internet backbone A set of high-speed networks that carry Internet traffic
These networks are provided by companies such as AT&T, GTE, and IBM
Internet service provider (ISP) A company that provides other companies or
individuals with access to the Internet

15-
Broadband and Baseband(Complete
yourself)

Source:
https://www.omnisecu.com/basic-networking/diff
erence-between-baseband-and-broadband.php

01/19/2024
ISMT COLLEGE_NETWORKING-1
Bandwidth,
Throughput, Delay,
Latency & Jitter

01/19/2024
ISMT COLLEGE_NETWORKING-1
Bandwidth
The simplest way to understand bandwidth is to think of them as pipes. The fatter the
pipe, the more the bandwidth
Maximum rate (in bps) at which the sender can send data along the link

01/19/2024
ISMT COLLEGE_NETWORKING-1
Throughput
Throughput is the actual rate that information is transferred.
It is defined as the quantity of data being sent/received by unit of time.
Throughput and bandwidth are two different but closely related concepts.
To summarize, throughput is an actual measure of how much data is successfully
transferred from source to destination, and bandwidth is a theoretical measure of how
much data could be transferred from source to destination.

01/19/2024
ISMT COLLEGE_NETWORKING-1
Network Latency
The time it takes for a ping to reach and individual Internet node and return to its
point of origin. This ping is reported as round trip time (RTT) in milliseconds (ms).
Latency is the time it takes a data packet to travel from point-to-point on the network.

01/19/2024
ISMT COLLEGE_NETWORKING-1
High Latency VS Low Latency
Low network latency = Good web performance
High network latency = Poor web performance

The lower is the latency, the faster the data will move from one location to another.
It directly effects web performance, application performance, and data transfer
capabilities.

01/19/2024
ISMT COLLEGE_NETWORKING-1
Propagation Delay
Time it takes the signal to travel from source to destination

01/19/2024
ISMT COLLEGE_NETWORKING-1
Jitter
The jitter is an inconsistent arrival of packets between two endpoints.
Jitter is the term used to refer to the fluctuation in delay as packets transfer across a
network.
Jitter is thus the changing rate of delay across a network and is measured in
milliseconds.
Jitter of more than 20 ms will cause delays in packet arrival which, like high latency,
will result in delays in your audio or video.
For instance, if you have two computers communicating with each other in an office,
there will be an exchange of data packets. On healthy networks, these packets will
travel at a consistent interval.

01/19/2024
ISMT COLLEGE_NETWORKING-1
On a network experiencing jitter, the level
of delay throughout transit would fluctuate
and could lead to 50ms delay on packet
transfers.
The end result is congestion of the
network as devices fight for the same
bandwidth space.
The more traffic gets congested, the greater
the likelihood that packet loss will occur.

01/19/2024
ISMT COLLEGE_NETWORKING-1
Packet Loss
Packet loss refers to any packets of data that are lost or dropped in transit during
travel across a computer network.
Packet loss could be due to a failure or an inefficiency of a component that carries
data across a network, such as a faulty router, a loose cable connection or a bad wifi
signal.
Lost packets don’t go into a “packet lost and found,” though – they’re just discarded.

01/19/2024
ISMT COLLEGE_NETWORKING-1
01/19/2024
ISMT COLLEGE_NETWORKING-1

You might also like