presentation_networkingtechnologies-fundamentals n concepts for bsit-ct2_2014

113
NETWORKING TECHNOLOGIES : FUNDAMENTALS AND CONCEPTS

Upload: eingilbert-cartalla-benolirao

Post on 21-Jul-2016

15 views

Category:

Documents


1 download

DESCRIPTION

Networking Fundamentals

TRANSCRIPT

Page 1: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

NETWORKING TECHNOLOGIES :FUNDAMENTALS AND CONCEPTS

Page 2: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

• When people use computers to communicate, they use a computer network. This is about computer networks and how they are used to transmit information between computers and ultimately between people. It provides a broad overview and foundation for understanding networks and working in the computer and networking.

Page 3: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014
Page 4: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

• People use computers and networks for a wide variety of reasons.

• Three common reasons that people use networks to send information

• from a source, such as a personal computer (PC), to a destination, such as a printer, are:

Communicate and collaborate (i.e., e-mail)

Share information (i.e., document sharing)

Share resources (i.e., printers and servers)

Page 5: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

1. Increased Employee Productivity

Ideas are shared more quickly. Everyone moves faster. The organization is more

competitive.

2. Reduced Communication Costs Network-based communication such as e-mail and

“instant messenger” services are a cost-effective alternatives to phoning and faxing, with the potential to deliver significant savings in long distance charges.

Page 6: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

3. Reduced Office Equipment Costs Allows equipment – mainly printers and servers, to be shared with multiple users.

4. Access to Resources Anytime/Anywhere Key files, data, and services can be accessed from

any place on the network. With remote access in place, one can travel or work remotely and still be connected.

Page 7: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

make a phone call,watch a television showlisten to the radiolook up something on the Internetplay a video game with someone in

another country

All of these activities depend on robust, reliable networks. Converged network

Page 8: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014
Page 9: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

• Modems - Change digital data into analog for transmission over the line. There are three types: Traditional, DSL and Cable

• Modulator-Demodulator.

Page 10: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

V.90-based 56Kbps connections

Page 11: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

typical hybrid fiber-coax cable TV network

Page 12: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

• A NIC (pronounced "nick") is the hardware component inserted into the PC or workstation that provides connectivity to a network. The NIC provides the interface between the physical networking cable and the software implementing the networking protocols. The NIC is responsible for transmitting and receiving information to and from a network.

Page 13: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

Speeds available: 10 Mbps, 10/100 Mbps, 10/100/1000 Mbps

Auto sense: This is where a port that can operate at different speeds has the ability to detect the speed of another port to which it is connected; both ports will automatically configure to use the best common speed.

Duplex mode: Half Duplex - The term half duplex is used to describe data transmission that can occur in two directions over the same communications link, in only one direction at a time.

Full Duplex: The ability of a device or line to transmit data simultaneously in both directions over the same communications link, potentially doubling the throughput of traffic.

Page 14: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

All PCs require network interface cards (NIC) to make them ready for network use. Some are supplied with NICs already in them. When choosing a NIC for a PC you should consider:

• The speed of your hub, switch, or print server— Ethernet (10Mbps) or Fast Ethernet (100Mbps). • The type of connection you need—RJ-45 for twisted pair or BNC for coaxial cable. • The type of NIC connector available inside your Computer—ISA or PCI.

Page 15: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

Each individual NIC throughout the world carries a unique code, called a Media Access Control (MAC) address. Not two NIC are alike. This address is used to control data communication for the host on the network. A MAC address consists of 12 hexadecimal bits. The first 6 hexadecimal represents the NIC manufacturer and the last 6 hex numbers represents the unique number of a NIC.

When a NIC is attached to a computer, the host computer will use the NIC’s MAC address as its physical address in the network. These physical address from the NIC will be used by the computer to identify themselves in the network.

Page 16: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

• Media Access Control (MAC) Addresses• MACs are the 48-bit, hexadecimal

hardware addresses that identify Ethernet interfaces. It is presented like so:

• 01:23:45:67:89:00

Page 17: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

Installing the NIC.

Page 18: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

• Networking Cables and Connectors• RJ-11: Telephone

Page 19: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

STP (Shielded Twisted Pair) cable

Page 20: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

• RJ-45: CAT-5, 5e and 6

Page 21: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

strip cable jacket

Page 22: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

arrange wire pairs

Page 23: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

AT&T 258A_EIA 568B

Page 24: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

RJ-45 Connector inserted

Page 25: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

UTP Cable and RJ-45 connector

Page 26: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

• BNC: Coaxial

Page 27: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014
Page 28: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

• Basic Network Devices• Hubs - Simple, Layer 1 devices that

create a single broadcast domain. There are four types: Passive, Active, Intelligent and Switching

Page 29: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

• Modems - Change digital data into analog for transmission over the line. There are three types: Traditional, DSL and Cable

• Modulator-Demodulator.

Page 30: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

LAN Modems

A LAN Modem is router with a built-in Ethernet hub and two 56K analog modem, allowing several workstations to share a single connection to an ISP or remote office LAN, while transferring files locally among all attached workstations.

Page 31: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

• Network Interface Cards (NIC) - Cards with which a PC connects to an Ethernet or wireless network.

Page 32: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

• Switch - Layer 2 devices that connects and selects between network segments. Unlike hubs, switches provide packet filtering and forwarding.

Page 33: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

Manageable Hubs and Switches

Manageable Hubs and Switches are network devices that connects computers together and form a local area network. Aside from basic connectivity, these manageable devices have many useful features that are not present in any ordinary hubs and switches. These features are:

• VLAN (Virtual LAN) - A logical association that allows users to communicate as if they were physically connected to a single LAN, independent of the actual physical configuration of the network.

• Port Security – A feature that disables or enables a particular port on the switch or hub.

• Stackability – A feature that allows switches to be connected physically by a matrix cable and be treated as a single device.

• Link Aggregation – allows 2 – 4 of the switch’s ports to be combined together and treated as a single pipe.

Page 34: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

switch_hub

Page 35: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

• Router - A layer 3 device that separates network segments into different broadcast domains. Routers are high-level devices that provide an enormous amount of administration and monitoring features and allow for highly complex networks.

Page 36: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

Using a router to share a broadband (cable or DSL) modem connection

Page 37: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

A Router Helps Protect Your Home Network from Outside Access

Page 38: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

Typical home network

Page 39: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

typical wireless network

Page 40: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

WRT54G2 v1

Page 41: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

wireless adapter

Page 42: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

• Star - These networks are centrally administrated and nodes can be easily connected or disconnected using network media. This is most commonly seen in 10BASE-t, 100BASE-TX or 1000BASE-T networks.

Page 43: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

Star

Page 44: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

• Bus - Nodes “tap” into a central line. These networks are almost completely obsolete, as faults with individual nodes bring the entire network down.

Page 45: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

Bus

Page 46: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

• Mesh - Expensive to implement, mesh networks are easy to maintain and extremely reliable. They also work over great distances.

Page 47: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

MESH

Page 48: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

• Ring - Uses expensive, proprietary technology that passes a “token” packet around the ring in order to cut down on network collisions.

Page 49: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

Ring

Page 50: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

• Point to Point - These are simple, ad-hoc networks where one point goes to one other point. They are simple to set up and maintain, but would be expensive if they were the sole topology in a network.

Page 51: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

Point to Point

Page 52: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

• Point to Multipoint - This network type describes most WAN and VPN setups, like frame-relay. They’re used to connect physically distant devices.

Page 53: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

Point to Multipoint

Page 54: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

• Hybrid - Most networks are actually hybrids, being composed of one or all of these various topologies.

Page 55: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

Project Network Topology and Physical Layout Design:

NETWORK TOPOLOGY DESIGN (using packet tracer simulation ) - employ segmenting the whole campus network into several number of nodes using routers to boost network performance and increases the bandwidth available to each user for network and internet connection.

Page 56: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

• Peer to peer• A peer-to-peer network topology means

that each network device is a client and there is no central system. These are mainly used in home or small business networks. Shared resources require computers to be configured independently for access.

Page 57: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

• Client/server• A number of client machines are all

administered, authenticated and given access to shared resources through a central server or servers. This type of topology is much easier to maintain as users can be defined in one central location.

Page 58: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

client-server LAN

Page 59: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

• VPN• A VPN is a private, secure connection

through the public Internet. It allows a “point-to-point” connection between a remote user and a LAN. The connection uses encryption and authentication.

Page 60: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

• VLAN• VLANs (Virtual Local Area Networks) are

groups of network nodes that form a single, logical broadcast domain. VLANs use a switch operating at Layer 2, but sometimes need a Layer 3 device to allow VLANs to communicate with each other.

Page 61: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

• Network Protocols• Transmission Control Protocol (TCP)

- TCP is a transport layer, host-to-host, connection-oriented protocol. It enables two hosts to establish a connection and exchange network data.

Page 62: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

• User Datagram Protocol (UDP)• UDP is a transport layer,

connectionless, unreliable, low overhead protocol. UDP doesn’t offer the assurances of TCP.

Page 63: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

• File Transfer Protocol (FTP)• The FTP is an Application layer

protocol that allows a user to upload or download files between hosts

Page 64: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

• Secure File Transfer Protocol (SFTP)• SFTP is similar to FTP but comes

with SSH to provide encryption over insecure networks such as the Internet.

Page 65: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

• Trivial File Transfer Protocol (TFTP)• TFTP is also similar to FTP but works with

UDP, using less bandwidth than FTP. 

Page 66: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

• Email Protocols • Simple Mail Transport Protocol

(SMTP) is used to send e-mail. Post Office Protocol 3 (POP3) and Internet Message Access Protocol 4 (IMAP4) are used to receive emails.

Page 67: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

• Secure Shell (SSH) • SSH is a suite of protocols that uses the

RSA public-key encryption technology authentication

• Internet Control Message Protocol (ICMP)• ICMP is a network layer protocol providing

management and control

Page 68: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

• Address Resolution Protocol (ARP)• ARP is a Network layer protocol that

resolves network (IP) addresses into hardware (MAC) addresses. ARP uses the address resolution cache table built into every NIC.

Page 69: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

• Internet Group Multicast Protocol (IGMP)

• IGMP is a Network layer protocol that is used by an Internet computer to report its multicast group membership to adjacent routers.

Page 70: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

• Telnet• Telnet is a terminal emulation protocol

and program that uses TCP for transport, and most often used for server and network device remote administration.

Page 71: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

• Transport Layer Security (TLS)• TLS replaces SSL and/or HTTPS in

providing a secure mode of transport for data from server to client.

• Session Initiation Protocol (SIP)• SIP is a VoIP call control protocol that uses

a URL to address a specific endpoint.

Page 72: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

• Dynamic Host Configuration Protocol (DHCP)

• DHCP is used by devices to request IP addresses and local network configuration parameters.

Page 73: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014
Page 74: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014
Page 75: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014
Page 76: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

wifi alliance

Page 77: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

1. TCP/IP - Transmission Control Protocol/Internet Protocol. TCP is normally used in conjunction with IP in a TCP/IP-based network. The two protocols working together provide for connectivity between applications of networked computers. Originally a UNIX standard, TCP/IP is now supported on almost all platforms, and is the protocol of the Internet.

IP represents the scheme by which two devices (both with IP addresses) communicate. TCP manages the flow of IP packets, ensuring that the packets remain error-free and reach their destination correctly.

Page 78: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

Hosts and networks IP addressing is based on the concept of hosts and networks. A host is essentially anything on the network that is capable of receiving and transmitting IP packets on the network, such as a workstation or a router. It is not to be confused with a server: servers and client workstations are all IP hosts. 

Page 79: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

• IPv4• IPv4 addresses employs a 32-bit

addressing scheme that is presented in a format called dotted decimal notation, like so:

• 192.168.10.235

Page 80: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014
Page 81: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014
Page 82: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

• IPv6• IPv6 employs a 128-bit addressing

scheme divided into eight 16-bit hexadecimal numbers separated by colons, like so:

• 2342:0000:1F1F:0100:0010:0100:11B0:AFFF

Page 83: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

• IP Address Classes

Page 84: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

• Subnetting• Subnetting is the process of subdividing an

assigned IP address into smaller networks or subnets.

• Classless Inter-Domain Routing (CIDR)• CIDR is a routing scheme used to mitigate the

address shortage in IPv4 by drawing together a number of networks into one large routing table entry. A routing protocol must be classless to support CIDR.

Page 85: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

• Network Address Translation (NAT)

• NAT allows administrators to translate one public IP address into public network access for many private IP addresses.

Page 86: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

An IP address is 32 bits wide, and as discussed, it is composed of two parts: the network number, and the host number [1, 2, 3]. By convention, it is expressed as four decimal numbers separated by periods, such as "200.1.2.3" representing the decimal value of each of the four bytes. Valid addresses thus range from 0.0.0.0 to 255.255.255.255, a total of about 4.3 billion addresses. An IP address is a numbering system based on Octal numbering notation.

Page 87: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

xxxxxxxx.xxxxxxxx.xxxxxxxx.xxxxxxxx

1

2

4

8

16

32

64

128

11001011. 01010111.10000000.00000010203 87 128 2

Page 88: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

Subnet MaskExample:•Network: 192.168.12.0•4 workgroups (Logistics, Administration, Engineering, and Human Resources) that needed to be separated logically.• required to build 4 sub networks from 192.168.12.0

HR Admin

Eng’g

192.168.12.x(00000000)network Hosts

Logistics

Page 89: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

Subnet Mask

HR Admin

Logistics Eng’g

192.168.12.x(00000000)

NetworkHosts

Borrow 2 bits:

• 00 – Logistics = 00

• 01 – Engineering = 64

• 10 – Human Resource = 128

• 11 – Admin = 192

Logistics use 192.168.12.1- 62 Subnet mask 255.255.255.192

Engineering use 192.168.12.65 – 126 Subnet mask 255.255.255.192

Human Resource use 192.168.12.126 – 190 Subnet mask 255.255.255.192

Admin use 192.168.12.193 – 254 Subnet mask 255.255.255.192

Page 90: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

NETWORK PHYSICAL LAYOUT DESIGN (using Microsoft Office Visio 2003)

Page 91: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

• Wired Equivalent Privacy (WEP)• WEP provides either 64- or 128-bit

encryption for data packets over radio• frequencies providing a similar level of

security as wired Ethernet networks. WEP does not offer end-to-end security because it uses the lower level layers in the OSI model.

Page 92: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

• Remote Authentication Dial-In User Service (RADIUS)

• RADIUS is used as an authentication and accounting server, storing username and password combinations for use with a variety of different services. RADIUS is typically used in conjunction with 802.11i to authenticated pre-shared

• wireless keys

Page 93: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

• Wi-Fi Protected Access (WPA)• WPA offers improved data encryption and

user authentication over WEP using the wireless device’s hardware-specific MAC address as a means of ensuring that only authorized users access the network. The current version WPA2 uses

• Advanced Encryption Standard (AES).

Page 94: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

• Frame relay - Frame Relay is a packet switching technology used as a replacement to leased lines because frame relay connections are more cost effective. A frame relay connection is able to virtually connect to a number of different remote sites through point-to-point and point-to-multipoint connections.

Page 95: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

• Key Frame Relay Terms• ˚ Virtual Circuits (VC): the frame relay

connections.• ˚ Committed Information Rate (CIR): the

maximum amount of data bandwidth contracted by the provider.

• ˚ Burst: an amount of extra bandwidth provided based on need and network demand.

• ˚ Data Link Connection Identifier (DLCI): Identifies each individual VC.

Page 96: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

• T1/E1/J1• The T-series connections are digital carrier

transmission systems. ISPs and large companies employ either T1 or T3 transmission lines for access to the Internet.

Page 97: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

• Common T-series lines and their speeds include:

• ˚ T1 operates at1.544 Mbps using 24 voice channels• ˚ T3 operates at 44.746 Mbps using 672 voice channels• ˚ E1 operates at 2.048 MBps using 30 voice channels• ˚ E3 operates at 34.368 MBps using 480 voice channels• ˚ J1 operates at 1.544 Mbps using 24 voice channels• ˚ J3 operates at 32.064 Mbps using 480 voice channels

Page 98: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

• ˚ T1 operates at1.544 Mbps using 24 voice channels• ˚ T3 operates at 44.746 Mbps using 672 voice channels• ˚ E1 operates at 2.048 MBps using 30 voice channels• ˚ E3 operates at 34.368 MBps using 480 voice channels• ˚ J1 operates at 1.544 Mbps using 24 voice channels• ˚ J3 operates at 32.064 Mbps using 480 voice channels

• E designates European; J designates Japanese. Note the difference in speeds.

Page 99: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

• DSL• Digital Subscriber Line or DSL is a high-

speed Internet access technology carrying both digital voice and digital data and is used by businesses and consumers.

Page 100: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014
Page 101: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

• Broadband Cable• This also provides high-speed Internet

access technology carrying digital data and uses coaxial cable. cable modems convert analog signals into digital data. Cable companies offer a range of bandwidths from 256 Mbps to 1024 Mbps upload speed to 512 Mbps to 3 Mbps download speed.

Page 102: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

• OC-x/SONET• The base rate for OCx using fiber optic

media is called OC-1 and operates at 51.84 Mbps. The Synchronous Optical Network (SONET ) also uses various OCx speeds on optical fiber.

Page 103: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

• Wireless• There are a couple of different wireless

technologies which are currently used for Wide Area Networks. These include microwave point-to-point connections, satellite and WiMAX (802.16). WiMAX uses some of the same concepts as the 802.11 technologies, but over a larger area.

Page 104: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

• ATM• Asynchronous Transfer Mode (ATM)

provides a high speed solution for large scale WANs. ATM splits traffic into 53 byte cells which are transferred across the ATM network extremely quickly. ATM also offers a large number of QoS options for traffic which allow traffic priority to be very refined.

Page 105: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

• MPLS• Multi Protocol Label Switching (MPLS) is a

packet switching technique which enables packets to be tagged or labeled to differentiate different types of traffic. These types can be anything from different streams requiring high QoS requirements like VoIP or they can be used to form a VPN to safely transport traffic between multiple companies’ branches.

Page 106: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

• Firewall - Firewalls sit in the DMZ, between an intranet and the Internet and provide packet filtering to keep unauthorized access from the protected network.

Page 107: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

WAN Connection Types    WAN Services

A WAN is a data communications network that operates beyond a LAN's geographic scope. One way that a WAN is different from a LAN is that you must subscribe to an outside WAN service provider, such as PLDT and Globe Telecoms to use WAN carrier network services. A WAN uses data links, such as Analog Telephone and Frame Relay, that are provided by carrier services to access bandwidth over wide-area geographies. A WAN connects the locations of an organization to each other, to locations of other organizations, to external services (such as databases), and to remote users. WANs generally carry a variety of traffic types, such as voice, data, and video.

Page 108: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

• Cross Connects - The location where different cable sections come together

• Patch Panels - A collection of terminated circuits which can be patched together.

Page 109: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

WIRING DISTRIBUTION AND NETWORK CABLING TOOLS

Page 110: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

• Command Line Interface Tools• Be familiar with the following command line

tools:• ˚ Traceroute (or tracert)• ˚ ipconfig• ˚ ifconfig (for Linux)• ˚ ping• ˚ ARP ping• ˚ ARP

Page 111: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

• ˚ nslookup• ˚ hostname• ˚ dig (for Linux)• ˚ mtr (for Linux)• ˚ route• ˚ nbtstat• ˚ netstat

Page 112: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014

It has become appallingly obvious that our technology has exceeded our humanity. Albert Einstein (1879-1955)  

Technology is a way of organizing the universe so that man doesn't have to experience it. Max Frisch  

Technology is a gift of God. After the gift of life it is perhaps the greatest of God's gifts. It is the mother of civilizations, of arts and of sciences. Freeman Dyson   - Infinite in All Directions

Page 113: Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014