Networking Basics
Networking Basics
College
NETWORKING
BASICS
Department of ICT
UNICAST
2
MULTICAST
3
BROADCAST
4
TOPOLOGY
A topology is a description of any kind of locality
in terms of its layout. In communication networks,
a topology is a usually schematic description of the
arrangement of a network, including its nodes and
connecting lines
The physical topology of a network describes the
layout of the cables and workstations and the
location of all network components
Common Topology:
Bus, Ring, Star and Mesh
5
BUS TOPOLOGY
In a bus topology, all computers are attached to a
single continuous cable that is terminated at
both ends, which is the simplest way to create a
physical network
Terminator
6
STAR TOPOLOGY
Unlike those in a bus topology, each
computer in a star topology is
connected to a central point by a
separate cable. The central point is a
device known as a hub
Although this setup uses more cable
than a bus, a star topology is much
more fault tolerant than a bus
topology. This means that if a failure
occurs along one of the cables
connecting to the hub, only that
portion of the network is affected, not
the entire network. It also means that
you can add new stations just by
running a single new cable
7
RING TOPOLOGY
In the ring topology, each computer
is connected directly to two other
computers in the network. Data
moves down a oneway path from
one computer to another i.e. clock
wise
Laying out cable in a ring is that
the cable design is simple. The bad
news is that, as with bus topology,
any break, such as adding or
removing a computer, disrupts the
entire network. Also, because you
have to “break” the ring in order to
add another station, it is very
difficult to reconfigure without
bringing down the whole network
8
RING TOPOLOGY
B Note: Even though all
computers are connected
through a single cable, if
there is a break all the
computer connected to the
A C ring topology will not work
Example: If Machine A
Wants to talk to Machine D
The data can travel only
Clock Wise If there is a break
D in the loop the data cannot be
transferred
9
MESH TOPOLOGY
In a mesh topology, a path exists from
each station to every other station in
the network. While not usually seen
in LANs, a variation on this type of
topology—the hybrid mesh—is used
on the Internet and other WANs in a
limited fashion.
Hybrid mesh topology networks can
have multiple connections between
some locations, but this is done only
for redundancy.
Also, it is not a true mesh because
there is not a connection between
each and every node, just a few for
backup purposes
10
COAXIAL CABLE
Coaxial cable consists of
a central copper core
surrounded by an
insulator, a braided
metal shielding, called
braiding, and an outer
cover, called the sheath
or jacket
EG : Cable TV network
and Cable Modem use
the coaxial cable 11
COAXIAL CABLE CONNECTOR
12
THICKNET (10BASE5)
Thicknet cabling, also called thick wire Ethernet, is a rigid
coaxial cable approximately 1cm thick used for the original
Ethernet networks.Thicknet is also called “yellow Ethernet”
or “yellow garden hose.”
IEEE designates Thicknet as 10Base5 Ethernet.The “10”
represents its throughput of 10 Mbps, the “Base” stands for
baseband transmission, and the “5” represents the
maximum segment length of a Thicknet cable, which is 500
m. You may find this on older networks.
13
THINNET (10BASE2)
Thinnet, also known as thin Ethernet, was the most popular
medium for Ethernet LANs in the 1980s. Thinnet is rarely
used on modern networks, although you may encounter it on
networks installed in the 1980s or on newer small office or
home office LANs
IEEE has designated Thinnet as 10Base2 Ethernet, with the
“10” representing its data transmission rate of 10 Mbps, the
“Base” representing the fact that it uses baseband
transmission, and the “2” representing its maximum segment
length of 185 (or roughly 200) m.
14
TWISTED PAIR (TP)
Twistedpair (TP) cable is
similar to telephone wiring
and consists of colorcoded
pairs of insulated copper
wires. The more twists per
inch in a pair of wires, the
more resistant the pair will
be to all forms of noise.
Higherquality, more
expensive twistedpair cable
contains more twists per
foot. The number of twists
per meter or foot is known as
the twist ratio.
15
TWISTED PAIR (TP)
Twistedpair cable is the most common
form of cabling found on LANs today.
It’s inexpensive, flexible, and easy to
install, and it can span a significant
distance before requiring a repeater
(though not as far as coax). Twisted
pair cable easily accommodates several
different topologies, although it is most
often implemented in star or star
hybrid topologies
One drawback to twistedpair is that,
because of its flexibility, it is more
prone to physical damage than coaxial
cable. All twistedpair cable falls into
one of two categories: shielded twisted
pair (STP) or unshielded twistedpair
(UTP).
16
SHIELDED TWISTEDPAIR (STP)
As the name implies, shielded twistedpair (STP) cable
consists of twisted wire pairs that are not only
individually insulated, but also surrounded by a
shielding made of a metallic substance such as foil. Some
STP use a braided metal shielding. The shielding acts as
a barrier to external electromagnetic forces, thus
preventing them from affecting the signals traveling over
the wire inside the shielding. The shielding may be
grounded to enhance its protective effect.
17
UNSHIELDED TWISTEDPAIR
(UTP)
Unshielded twistedpair (UTP) cabling consists of
one or more insulated wire pairs encased in a
plastic sheath. As its name implies, UTP does not
contain additional shielding for the twisted pairs.
As a result, UTP is both less expensive and less
resistant to noise than STP
18
UTP TYPES
Distance (100 +KM)
Three Types
Single Mode
Multi Mode
Plastic Optical
Fiber Mode
21
STRAIGHT THROUGH CABLE
Pin Number Wire color Wire Becomes Pin number Wire color
Pin 1 Orange / White Pin 1 Orange / White
Pin 2 Orange 1 1 Pin 2 Orange
Pin 3 Green / White Pin 3 Green / White
Pin 4 Blue
22 Blue/White
2 2 Pin 4 Blue
Pin 5 Pin 5 Blue/White
Pin 6
Pin 7
Green
Brown/White
3 3 Pin 6
Pin 7
Green
Brown/White
Pin 8 Brown
6 6 Pin 8 Brown
STRAIGHT THROUGH CABLE
In a UTP implementation of a straight
through cable, the wires on both cable ends
are in the same order
You can determine that the wiring is a
straightthrough cable by holding both ends
of the UTP cable side by side and seeing that
the order of the wires on both ends is
identical
Pin Number Wire color Wire Becomes Pin number Wire color
Pin 1 Orange/White Pin 1 Green/White
Pin 2 Orange 1 3 Pin 2 Green
Pin 3 Green / White Pin 3 Orange/White
Pin 4 Blue 2 6 Pin 4 Blue
Pin 5 Blue/White Pin 5 Blue/White
Pin 6
Pin 7
Green
Brown/White
3 1 Pin 6
Pin 7
Orange
Brown/White
Pin 8 Brown
6 2 Pin 8 Brown
24
STRAIGHT THROUGH / X OVER CABLE
25
CROSS OVER CABLE
In the implementation of a crossover, the
wires on each end of the cable are crossed
Transmit to Receive and Receive to
Transmit on each side, for both tip and ring
Notice that pin 1 on one side connects to pin
3 on the other side, and pin 2 connects to pin
6 on the opposite end
You can use a crossover cable for similar
devices
Connecting uplinks between switches
26
Connecting hubs to switches
Connecting a hub to another hub.
WHERE TO USE STRAIGHT THROUGH AND
CROSS OVER CABLE
Dissimilar Devices
Similar Devices
27
REGISTERED JACK (RJ)
RJ 11 RJ 45
RJ11 – Defined for
telephone connectors
RJ45 – Defined for
UTP connectors
28
LOCAL AREA NETWORK (LAN)
A computer network that spans a relatively small area. Most
LANs are confined to a single building or group of buildings
29
WIDE AREA NETWORK (WAN)
A computer network that spans a relatively large geographical
area. Typically, a WAN consists of two or more local-area
networks (LANs)
30
INTRANET
31
INTERNET
32
OPEN SYSTEM INTERNETCONNECT (OSI)
The OSI model was designed to promote
interoperability by creating a guideline for
network data transmission between
computers that have different hardware
vendors, software, operating systems, and
protocols
33
OSI
The OSI reference model illustrates the networking
process as being divided into seven layers. This
theoretical construct makes it easier to learn and
understand the concepts involved. At the top of the
model is the application that requires access to a
resource on the network, and at the bottom is the
network medium itself
As data moves down through the layers of the model,
the various protocols operating there prepare and
package it for transmission over the network. Once
the data arrives at its destination, it moves up
through the layers on the receiving system, where
the same protocols perform the same process in
34
reverse
OSI
OSI developed by International
Organization for
Standardization (ISO) in 1974
It consists of Seven Layers
Each layer has specific
processing function
35
OPEN SYSTEM INTERCONNECT
36
DATA COMMUNICATION WITH
OSI
How data travels through the layers of the OSI
model
Peer
Communication
Information flow
Network Medium
37
OSI
In Physical Layer data will be converted into Binary
(0’s & 1’&)
It transmits raw bit stream over physical cable
The Physical layer defines all the electrical and
physical specifications for devices
Physical Layer defines techniques to transfer bit
stream to cable
38
Hub and Repeater works in Physical Layer
OSI
Data Link Layer handles data frames between the
Network and Physical layers
It Receives end packages raw data from the Physical layer
into data frames for delivery to the Network layer as
packets
Error detection is happening in this layer
Data link Layer is divided in to two layers:
LLC (Logical Link Control) and MAC ( Media Access
Control)
Switch, Bridge and Network Interface card works in Data
Link Layer
39
OSI
Network Layer is responsible for providing best
path for data to reach the destination
Logical addressing is happening in this layer
Network Layer translates logical network address
and names to their physical address (e.g. computer
name = MAC address)
40
Router works in Network Layer
OSI
Transport Layer is responsible for reliable delivery of data. It
is also known as the heart of OSI layers
Provides errorchecking to guarantee errorfree data delivery,
with on losses or duplications
Provides acknowledgment of successful transmissions;
requests retransmission if some packets don’t arrive errorfree
The major function of the Transport Layer is Error Correction
Identifying Service, Multiplexing & Demultiplexing and
Segmentation are happening in this layer
Brouter and Gateway works in Transport Layer
41
BREAKING DATA IN TO
SEGMENTS
Data
42
OSI
Session Layer is responsible for establishing,
maintaining and terminating session
Responsible for name recognition (identification) so
only the designated parties can participate in the
session
Manages who can transmit data at a certain time and
for how long
Provides synchronization services by planning check
points in the data stream if session fails, only data
after the most recent checkpoint need be transmitted
Gateway works in Session Layer
43
OSI
Presentation layer is responsible for presenting the
data in a standard format and data translation
(formatting)
The Presentation layer relieves the Application layer of
concern regarding syntactical differences in a message's
data representation within the enduser systems
Following tasks are performed in Presentation Layer:
Encoding – Decoding
Encryption – Decryption
Compression – Decompression
Gateway Works in Presentation Layer
44
OSI
Application Layer provides the operating system with
direct access to network services
Application layer provides an interface so that
processes such as Excel or Word that are running on the
local machine can get access to network services (E.G.,
retrieving a file from a network server)
Handles network access, flow control and error
recovery
It serves as the interface between the user and the
network
It’s a user specific layer
Gateway works in Application layer
45
OSI
Gateway
Router
Switch
HUB
46
OSI
47
OSI
48
IP ADDRESSING
Internet Protocol Address is given to the computer as an
identifier to a computer in a TCP/IP Network
IP Address is also known as Logical Address
IP Address works in Layer 3 (Network)
Two versions of IP Addressing
IP Version 4 32 bit address (Currently we are using)
IP Version 6 128 bit address
49
IP ADDRESSING
IP Address is divided in to Network Portion and Host
Portion
Class A is written as N.H.H.H
Class B is written as N.N.H.H
Class C is written as N.N.N.H
50
IP ADDRESSING
51
IP ADDRESS
Class A 1 126
The IP address 127.0.0.1 is used as the loop
back address. This means that it is used by the host
computer to send a message back to itself. It is
commonly used for troubleshooting and network testing
54
IP ADDRESSING
Loop Back address is also known as semi broad cast address
Range of Loop back address : 127.0.0.1 to 127.255.255.254
Any IP address starts with 127 is known as loop back address
55
SUBNET MASK
Subnet Mask is to differentiate the Network ID and Host ID
Two numbers reserved for Subnet Mask i.e. 0 & 255
0 Denotes Host and 255 Denotes Network
Class Default Subnet Mask
Class A is written as 255.0.0.0 N.H.H.H
Class B is written as 255.255.0.0 N.N.H.H
Class C is written as 255.255.255.0 N.N.N.H
56
SUBNET MASK
IP Address : 10.20.50.26 Subnet Mask : 255.0.0.0
For this IP Address :
Network ID is : 10.0.0.0
First Valid IP Address : 10.0.0.1
Last Valid IP Address : 10.255.255.254
Broad Cast Address : 10.255.255.255
Number of hosts = (256x256x256) 2
57
SUBNET MASK
IP Address : 10.20.50.26 Subnet Mask : 255.255.0.0
For this IP Address :
Network ID is : 10.20.0.0
First Valid IP Address : 10.20.0.1
Last Valid IP Address : 10.20.255.254
Broad Cast Address : 10.20.255.255
Number of hosts = (256x256) – 2
58
SUBNET MASK
IP Address : 10.20.50.26 Subnet Mask : 255.255.255.0
For this IP Address :
Network ID is : 10.20.50.0
First Valid IP Address : 10.20.50.1
Last Valid IP Address : 10.20.50.254
Broad Cast Address : 10.20.50.255
Number of hosts = (256) – 2
59
SUBNET MASK
IP Address 172.26.28.36 Subnet Mask : 255.0.0.0
For this IP Address:
Network ID is : 172.0.0.0
First Valid IP Address : 172.0.0.1
Last Valid IP Address : 172.255.255.254
Broad Cast Address : 172.255.255.255
Number of hosts = (256x256x256) 2
60
SUBNET MASK
IP Address 172.26.28.36 Subnet Mask : 255.255.0.0
For this IP Address:
Network ID is : 172.26.0.0
First Valid IP Address : 172.26.0.1
Last Valid IP Address : 172.26.255.254
Broad Cast Address : 172.26.255.255
Number of hosts = (256x256) – 2
61
SUBNET MASK
IP Address 172.26.28.36 Subnet Mask 255.255.255.0
For this IP Address:
Network ID is : 172.26.28.0
First Valid IP Address : 172.26.28.1
Last Valid IP Address : 172.26.28.254
Broad Cast Address : 172.26.28.255
Number of hosts = (256) – 2
62
SUBNET MASK
IP Address 192.168.0.152 Subnet Mask 255.0.0.0
For this IP Address:
Network ID is : 192.0.0.0
First Valid IP Address : 192.0.0.1
Last Valid IP Address : 192.255.255.254
Broad Cast Address : 192.255.255.255
Number of hosts = (256x256x256) 2
63
SUBNET MASK
IP Address 192.168.0.152 Subnet Mask 255.255.0.0
For this IP Address:
Network ID is : 192.168.0.0
First Valid IP Address : 192.168.0.1
Last Valid IP Address : 192.168.255.254
Broad Cast Address : 192.168.255.255
Number of hosts = (256x256) – 2
64
SUBNET MASK
IP Address 192.168.0.152 Subnet Mask 255.255.255.0
For this IP Address:
Network ID is : 192.168.0.0
First Valid IP Address : 192.168.0.1
Last Valid IP Address : 192.168.0.254
Broad Cast Address : 192.168.0.255
Number of hosts = (256) – 2
65
BROADCAST ADDRESS
Messages that are intended for all computers on a
network are sent as broadcasts
These messages always use the IP address
255.255.255.255
Any IP Address with last Octet as 255 is known as
broadcast address for that particular network E.g.:
10.255.255.255
The IP address of 0.0.0.0 is used for the default
network
66
HOW TO ASSIGN STATIC IP ADDRESS AND
SUBNET MASK
Select Internet Protocol (TCP/IP)
and select “Properties”
High light Local Area
Connection Right
Click Select Properties
67
HOW TO ASSIGN STATIC IP ADDRESS AND
SUBNET MASK
When ever you assign a Static
IP Address it’s Mandatory to
assign static DNS
68
MAC ADDRESS
The Media Access Control address (MAC) can be
equated to the serial number of the NIC. Every IP
packet is sent out of your NIC wrapped inside an
Ethernet frame which uses MAC addresses to
direct traffic on your locally attached network
MAC addresses therefore only have significance on
the locally attached network. As the packet hops
across the Internet, its source/destination IP
address stays the same, but the MAC addresses are
reassigned by each router on the way using a
process called ARP
69
MAC ADDRESS
MAC addresses are usually written in one of the
following two formats:
00:13:21:0F:83:DF 0013210F83DF
Mac address is a 48 bit address
Mac address are 12 digit Hexadecimal {09} {A F}
Address
70
MAC ADDRESS
The First Octet of the MAC Address is known as
Group Unique 00 : 13 : 21 : 0F : 83 : DF
The Second and Third Octet of the MAC Address is
known as Organization Unique Identifier (OUI) 00 :
13 : 21 : 0F : 83 : DF
71
MAC ADDRESS
Any Mac address starts with 00 is known as
Unicast address 00 : 13 : 21 : 0F : 83 : DF
Any Mac address starts with 01 is known
as Multicast 01 : 13 : 21 : 0F : 83 : DF
Any Mac address starts with FF is known
as Broadcast FF : 13 : 21 : 0F : 83 : DF
72
MAC ADDRESS
73
REQUEST TIMED OUT
The ping command timed out because there was no reply
from the host. The source and the destination computer are
in the same network
When Ping command is initiated from one system to the
other in a network if the firewall is enabled on the
Destination System Request Timed Out error will Pop up
74
DESTINATION HOST
UNREACHABLE
The host that you are trying to ping is in a
different network. Destination and the
source belong to the different network
75
Difference between Request timed out and
Destination Host Unreachable
Hub/Switch
IP : 192.168.0.8 IP : 192.168.1.53
Mask : 255.255.255.0 Mask : 255.255.255.0
D.G : 192.168.0.1 D.G : 192.168.1.1
Hub/Switch
76
IP : 192.168.2.56 IP : 192.168.1.36
Mask : 255.255.255.0 Mask : 255.255.255.0
UNREACHABLE AND DESTINATION HOST NET
UNREACHABLE
Hub/Switch
IP : 192.168.2.168 IP : 192.168.1.192
Mask : 255.255.255.0 Mask : 255.255.255.0
Internet
WAN Side
LAN Side
Router
77
Note: Since the Router is not able to pass the WAN
Cable/DSL Modem
interface it is giving the reply from LAN interface
DESTINATION NET
UNREACHABLE
Destination Net Unreachable message is one which a
user would usually get from the Default Gateway when it
doesn't know how to get to a particular net work
78
UNKNOWN HOST
If the DNS resolution is not happening the computer will display as
“Unknown host”
Global DNS has to be assigned to fix this issue
79
COMMAND PROMPT ERROR
If the static IP Address is assigned to the computer and if we
tried to renew the IP Address it will display as “Operation failed
as no adapter is in the state permissible for this operation
80
ERROR CODE 28 (COMMAND PROMPT
Direct Firewall or PIX or Norton Internet Security
Installed (NIS)
81
PROMPT
Anti Spy Ware or Zone Alarm in the Computer
82
SOCKET ERROR
83
DIGITAL SIGNATURE
Digital signatures are especially important for electronic commerce
and are a key component of most authentication schemes. To be
effective, digital signatures must be unforgeable
84
DIGITAL SIGNATURE
A digital certificate contains the digital signature of
the certificateissuing authority so that anyone can
verify that the certificate is real
85
NIC CARD INSTALLATION
Physically install
the network
adapter, and then
restart the PC.
86
NIC CARD INSTALLATION
If the Operating System is Windows 2000 and
above the screen will display as New Hardware
Found and select “Next”
87
NIC CARD INSTALLATION
SMC 1211 TX
88
NIC CARD INSTALLATION
89
NIC CARD INSTALLATION
90
NIC CARD INSTALLATION
Click “OK”
91
NIC CARD INSTALLATION
Click “Yes” to restart the computer
Check the Device Manager for Device Status
92