Beruflich Dokumente
Kultur Dokumente
Module Outline
What is Networking?
Types Of Network and Networking Devices
Ports
Protocols
Addressing and Types of Addressing
IP Address Classes
Internet & Intranet
Domain and DNS
Linux
Virtualization
What is Networking?
Networking is connecting devices together so that they can communicate with each
other, in order to share data, files, and computing resources.
Networking happens all around us, In our PCs, ATMs, cell phones, and much more.
Star:
Mesh:
Primary Types of a Network
Hub (Layer 1)
Switch (Layer 2)
Router (Layer 3)
ARCNET, Token Ring and other technologies have been used in the past, but
Ethernet over twisted pair cabling, and Wi-Fi are the two most common
technologies currently in use.
A Wide area network (WAN) is a computer network that covers a broad area (i.e.,
any network whose communications links cross metropolitan, regional, or national
boundaries). This is in contrast with personal area networks (PANs), local area
networks (LANs), campus area networks (CANs), or metropolitan area
networks(MANs) which are usually limited to a room, building, campus or specific
metropolitan area (e.g., a city) respectively.
WLAN Wireless Local Area Network
A wireless local area network(WLAN) links two or more devices using some
wireless distribution method (typically spread-spectrum or OFDM radio), and usually
providing a connection through an access point to the wider internet. This gives users
the mobility to move around within a local coverage area and still be connected to the
network.
Wireless LANs have become popular in the home due to ease of installation, and the
increasing popularity of laptop computers. Public businesses such as coffee shops
and malls have begun to offer wireless access to their customers; sometimes for free.
Large wireless network projects are being put up in many major cities: New York
City, for instance, has begun a pilot program to cover all five boroughs of the city with
wireless Internet access.
Common Ports & Port Numbers
TCP:- The Transmission Control Protocol (TCP) is one of the core protocols of the
Internet Protocol Suite. TCP is one of the two original components of the suite,
complementing the Internet Protocol (IP) and therefore the entire suite is
commonly referred to as TCP/IP. TCP provides the service of exchanging data
reliably directly between two network hosts, whereas IP handles addressing and
routing message across one or more networks. In particular, TCP provides reliable,
ordered delivery of a stream of bytes from a program on one computer to another
program on another computer. TCP is the protocol that major Internet applications
rely on, such as the World Wide Web, e-mail, and file transfer. Other applications,
which do not require reliable data stream service, may use the User Datagram
Protocol (UDP) which provides a datagram service, which emphasizes
reduced latency over reliability.
Internet Protocol
The Internet Protocol (IP) is the principal communications protocol used for relaying
datagrams (packets) across an internetwork using the Internet Protocol Suite.
Responsible for routing packets across network boundaries, it is the primary protocol
that establishes the Internet.
IP is the primary protocol in the Internet Layer of the Internet Protocol Suite and has
the task of delivering datagrams from the source host to the destination host solely
based on their addresses. For this purpose, IP defines addressing methods and
structures for datagram encapsulation.
Unified Datagram Protocol (UDP)
The User Datagram Protocol (UDP) is one of the core members of the Internet
Protocol Suite, the set of network protocols used for the Internet. With UDP, computer
applications can send messages, in this case referred to as datagrams, to other hosts
on an Internet Protocol (IP) network without requiring prior communications to set
up special transmission channels or data paths. The protocol was designed by David P.
Reed in 1980 and formally defined in RFC 768
UDP uses a simple transmission model without implicit hand-shaking dialogues for
providing reliability, ordering, or data integrity. Thus, UDP provides an unreliable
service and datagrams may arrive out of order, appear duplicated, or go missing
without notice. UDP assumes that error checking and correction is either not
necessary or performed in the application, avoiding the overhead of such processing
at the network interface level.
History of Networking
History of Networking
PID:- In the very Beginning, When computers were used for business and educational
purposes only, a question arose, which was that if a standalone computer can process
information at such speeds, what if they started working in combination and
collaborations with other peers. However for networking some identification number
was needed which could uniquely identify every computer on the network. For this
purpose, PID (which is nothing but a Product Identification number which is provided
by the Manufacturer and is hardcoded on the Network Interface Card) was used.
But the problem came when more than one manufacturer started manufacturing
Network Interface Cards and their Product Identification number started conflicting
with each other due to which PID could not be used to uniquely identify a system on a
network.
History of Networking
So, to sort out this problem, IEEE had announced that any company who wishes to
manufacture networking devices must take permission from IEEE and they would
assign them a Company ID which had to be used along with their product IDs. This is
what we know today as a Mac Address.
Mac Address: A Media Access Control (MAC) is a 48 bit hexadecimal number which is
a unique identifier assigned to most network adapters or network interface cards
(NICs) by the manufacturer for identification. It is combination of CID(Company ID) and
PID(Product ID). It may also be known as a hardware address, adapter address,
or physical address.
E.g. 00:1E:40:58:B6:59
History of Networking
Now, As networks grew rapidly, it became very difficult to remember or to use these
long and complicated MAC addresses for networking. A solution was produced in the
form of Addressing.
If this were to change suddenly you would not be able to open linux.org unless you
knew the new IP address.
NetBIOS Name have been replaced by the Domain Names as they can not satisfy the
global demand, as there are limited number of words possible that can be assigned to
IP address under NetBIOS.
For example:
Google
Yahoo
amazon
History of Networking
DNS:- The Domain Name System (DNS) is a distributed hierarchical naming system
for computers, services, or any resource connected to the Internet or a private
network. It associates various information with domain names assigned to each of
the participants. Most importantly, it translates domain names meaningful
to humans into the numerical (binary) identifiers associated with networking
equipment for the purpose of locating and addressing these devices worldwide. An
often-used analogy to explain the Domain Name System is that it serves as the
"phone book" for the Internet by translating human-friendly
computer hostnames into IP addresses. For example, www.example.com translates to
the addresses 192.0.32.10 (IPv4) and2620:0:2d0:200::10 (IPv6).
How DNS protocol works ?
DHCP
DHCP:- Dynamic Host Configuration Protocol (DHCP) is a network protocol that enables a
server to automatically assign an IP address to a computer from a defined range of
numbers (i.e. a scope) configured for a given network.
DHCP server can be configured on Windows Operating System or any UNIX based
Operating System like Linux.
These days, ADSL routers that are configured in homes and offices that have DHCP server
installed in them by default. A Home user does not need to worry about configuring DHCP
server.
Address Resolution Protocol
ARP protocol was introduced in 1982 and ARP is a layer 3 protocol i.e network layer.
Address resolution protocol, is used to resolve IP (Internet protocol) address into
MAC(Media Access Control) Address.
Due to the introduction of DHCP server in networks, DHCP server assigns different IP
address every time when it is switched on, So to make the communication more reliable
one can not directly send any data to IP address instead data is send to combination of IP
address and Mac address on the network for which Implementation of ARP protocol is
necessary.
Internet Control Message Protocol
The Internet Control Message Protocol (ICMP) is one of the core protocols of the Internet
Protocol Suite. It is chiefly used by the operating systems of networked computers to send
error messagesindicating, for instance, that a requested service is not available or that a
host or router could not be reached.
ICMP relies on IP to perform its tasks, and it is an integral part of IP. It differs in purpose
from transport protocols such as TCP and UDP in that it is typically not used to send and
receive data between end systems. It is usually not used directly by user network
applications, with some notable exceptions being the ping tool and traceroute.
ICMP for Internet Protocol version 4 (IPv4) is also known as ICMPv4. IPv6 has a similar
protocol, ICMPv6.
File Transfer Protocol
File Transfer Protocol (FTP) is a standard network protocol used to copy a file from one
host to another over a TCP/IP-based network, such as the Internet. FTP is built on a client-
server architecture and utilizes separate control and data connections between the client
and server. FTP is used with user-based password authentication or with anonymous user
access.
Applications were originally interactive command-line tools with a standardized command
syntax, but graphical user interfaces have been developed for all desktop operating
systems in use today.
How FTP protocol works ?
TELNET
TELNET is a network protocol used on the Internet or local area networks to provide a
bidirectional interactive text-oriented communications facility via a virtual terminal
connection. User data is interspersed in-band with TELNET control information in an 8-
bit byte oriented data connection over the Transmission Control Protocol (TCP).
Telnet was developed in 1969 beginning with RFC 15, extended in RFC 854, and
standardized as Internet Engineering Task Force (IETF) Internet Standard STD 8, one of the
first Internet standards.
Simple Mail Transfer Protocol (SMTP) is an Internet standard for electronic mail (e-mail)
transmission across Internet Protocol (IP) networks. SMTP was first defined by RFC
821 (STD 10) (1982), and last updated by RFC 5321 (2008) which includes
the extended SMTP (ESMTP) additions, and is the protocol in widespread use today.
SMTP is specified for outgoing mail transport and uses TCP port 25. The protocol for
new submissions is effectively the same as SMTP, but it uses port 587 instead.
Hyper Text Transfer Protocol
Indicates the action of transferring emails from the inbox of mail server to the inbox of
the client
Features:
Supports offline mail processing and persistent message IDs
Offers access to new mail from various client platforms anywhere across the
network
Linux
Virtual memory: Giving an application program the impression that it has contiguous
working memory, isolating it from the underlying physical memory implementation
Assignments:
Some Content in the Presentation has been adapted or used from Wikipedia, under the
Creative Commons Attribution-ShareAlike 3.0 Unported License.