deepak bhinde pgt computer science k v no. 2, ajmer · address 0.0.0.0, 127 .0.0.1 and 255 .255...

Post on 15-Jul-2020

14 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Deepak BhindeDeepak Bhinde

PGT Computer Science

K V No. 2, Ajmer

Agenda � Introduction

� Need for Networking

� Elementary Terminology of Network

Domain Name Resolution� Domain Name Resolution

� Network Topologies

� Types of Network

� Transmission Media

� Network Devices

� Network Security

Deepak Bhinde PGT Computer Science

Deepak Bhinde PGT Computer Science

Computer Networks� What is a Network ?

An interconnected collection of autonomous computer.

� Computer Networks

Computer network

Deepak Bhinde PGT Computer Science

� Computer networkconnects two or moreautonomouscomputers.

� The computers canbe geographicallylocated anywhere.

Need of Networking � Network Goals

1. Resource Sharing

� To make all programs ,data and peripherals available to any oneon the network irrespective of the physical location of theresource and the user.resource and the user.

2. Reliability

� A file can have copies on two or three different machines , so if one of them is unavailable ( hardware crash ) , the other copies could be used.

3. Cost Factor

� PC’s have better price / performance ratio then micro computer.

4. Communication Medium

Deepak Bhinde PGT Computer Science

Application of Network� Resource Sharing

� Hardware (computing resources, disks, printers)� Software (application software)

� Information Sharing� Easy accessibility from anywhere (files, databases)� Easy accessibility from anywhere (files, databases)� Search Capability (WWW)

� Communication� Email� Message broadcast

� Remote computing

� Distributed processing (GRID Computing)

Deepak Bhinde PGT Computer Science

Elementary Terminology of

Network� Nodes (Workstations )

A computer becomes a workstation (or node ) of a network as soon as it is attached to a network.

� Server � Server

A computer that facilitates the sharing of data , softwareand hardware resource ( e.g. printer , modems etc .) onthe network , is termed as a Server.

Deepak Bhinde PGT Computer Science

� Network Interface Unit (NIU) / MAC Address

� A Network Interface unit is an interpreter that helpsestablish communication between the server andworkstation .

� Each network interface that attested to a workstationhas a unique number identifying it which is known asthe node address.

� The NIU is also called Terminal Access Point (TAP).

� Different manufactures have different names for theinterface . The NIU is also called NIC – NetworkInterface Card.

Deepak Bhinde PGT Computer Science

� Network Interface Unit (NIU) / MAC Address

� The NIC manufacture assigns a unique physical address to each NIC Card. This physical address is known as Media Access Control address ( MAC address)

� The MAC address refers to the physical address assigned by NIC Manufacture.assigned by NIC Manufacture.

� A Mac address is a 6- byte address with each byte separated by a colon

� E.g. Each MAC address is unique for each network card.

10 : B5 : 03 : 63 : 2E : FC

Deepak Bhinde PGT Computer Science

Manufacture Id ( This code is assigned to manufacture by IEEE)

Card no ( assigned by the Manufacture )

� IP Address

� IP address is for the INTERFACE of a host. Multipleinterfaces mean multiple IP addresses, i.e., routers.

� 32 bit IP address in dotted-decimal notation for easeof reading, i.e., 193.140.195.66

� Address 0.0.0.0, 127.0.0.1 and 255.255.255.255 carries� Address 0.0.0.0, 127.0.0.1 and 255.255.255.255 carriesspecial meaning.

� IP address is divided into a network number and ahost number.

� Also bits in Network or Host Address cannot be all 0or 1.

Deepak Bhinde PGT Computer Science

� IP Address

Deepak Bhinde PGT Computer Science

Deepak Bhinde PGT Computer Science

� Class A : Address begins with bit 0. It has 8 bitnetwork number (range 0.0.0.0-to-127.255.255.255), 24bit host number.

� Class B : Address begins with bits 10. It has 16 bitnetwork number (range 128.0.0.0-to-191.255.255.255),network number (range 128.0.0.0-to-191.255.255.255),16 bit host number.

� Class C : Address begins with bits 110. It has 24 bitnetwork number (range 192.0.0.0-to-223.255.255.255),8 bit host number.

� Class D : Begins with 1110, multicast addresses(224.0.0.0-to-239.255.255.255)

� Class E : Begins with 11110, unused

Deepak Bhinde PGT Computer Science

� Domain Name

� The domain name is a unique name assigned to a website.

� easy to remember names for computers on the Internet (such as internic.net).

� A domain generally contain following s following parts:

� www

� Name decribing the website’s purpose

� TLD (Top Level Domain ) such as .com, .net , .org ,.edu , .ca , .in , .jp etc.

� Examples

www.amazon.com

www.wayn.com.cn

www.cbse.nic.in

Deepak Bhinde PGT Computer Science

� Domain Name Resolution

� DNR refers to the process of obtaining corresponding IP address from a domain name

� DNS Resolution is the procedure used to resolve a IP

address from a domain name.

� This is very similar to how we get the phone number of � This is very similar to how we get the phone number of

a person we want to contact.

� It is all based on hierarchy.

Deepak Bhinde PGT Computer Science

Domain Names vs. URLs

� A domain name is contained in a URL. See the examples below.

� ftp://ftp.company.com/downloads.report.doc

� http://www.networkclue.com/index.php� http://www.networkclue.com/index.php

Deepak Bhinde PGT Computer Science

Protocol

Resource or File

Hostname Domain Name

Fully Qualified Domain Name (FQDN)

Network Topology

� The network topologydefines the way in whichcomputers, printers, andother devices areconnected. A network

Introduction to Computer Networks

connected. A networktopology describes thelayout of the wire anddevices as well as thepaths used by datatransmissions.

Bus Topology

Commonly referred to as alinear bus, all the deviceson a bus topology areconnected by one singlecable.cable.

Star & Tree Topology

� The star topology is the most commonly used architecture in Ethernet LANs.

� When installed, the star topologyresembles spokes in a bicyclewheel.

� Larger networks use the extendedstar topology also called treetopology. When used with networkdevices that filter frames orpackets, like bridges, switches, androuters, this topology significantlyreduces the traffic on the wires bysending packets only to the wires ofthe destination host.

Ring Topology

� A frame travels around the ring,stopping at each node. If a node wantsto transmit data, it adds the data as wellas the destination address to the frame.

� The frame then continues around thering until it finds the destination node,ring until it finds the destination node,which takes the data out of the frame.

� Single ring – All the devices on thenetwork share a single cable

� Dual ring – The dual ring topologyallows data to be sent in bothdirections.

Mesh Topology

The mesh topologyconnects all devices(nodes) to each otherfor redundancy andfault tolerance.fault tolerance.

It is used in WANs tointerconnect LANs andfor mission criticalnetworks like thoseused by banks andfinancial institutions.

Implementing themesh topology isexpensive and difficult.

Network Security

Deepak Bhinde PGT Computer Science

� Intrusion Problem / Access Attacks

� When an authorized user attempts to gain access toprotected sensitive information , it is known as AccessAttack or Intrusion Problem .

� This type of attack against confidentially of information.

� Some common access attack are :

Snooping refers to unauthorized access of someone else ‘s� Snooping refers to unauthorized access of someone else ‘sdata ,email, computer – activity , or data communication.

� Eavesdropping is the act of secretly listening /interruptingsomeone else’s private communication / data / information.

Deepak Bhinde PGT Computer Science

� Denial of service (DoS) Attacks

� A Denial of Service (DoS) attack is an attack whichattempts to prevent the victim from being able to use allor part of their network connection.

� A denial of service attack may target a user, to preventthem from making outgoing connections on thenetwork. A denial of service may also target an entireorganization, to either prevent outgoing traffic or toorganization, to either prevent outgoing traffic or toprevent incoming traffic to certain network services,such as the organizations web page.

� Denial of service attacks are much easier to accomplishthan remotely gaining administrative access to a targetsystem. Because of this, denial of service attacks havebecome very common on the

Deepak Bhinde PGT Computer Science

� Network Security Measures

� The combination of identification ,authentication andauthorization can control access to a system.

� The combination is very useful especially in networksecurity.

� Various technologies used for Network Security

1. Active Protection1. Active Protection

2. Preventive Measures

Deepak Bhinde PGT Computer Science

� Active Protection

� Authorization

� Asking the user a legal login- id .

� Authentication

� In termed as Password – protection.

� Firewall

A system deigned to prevent unauthorized access to or � A system deigned to prevent unauthorized access to or from a private network is called firewall.

� Intrusion detection

� The art and science of sensing when a system or network is being used inappropriately or without authorization.

Deepak Bhinde PGT Computer Science

� Preventive Measures

� Implement proper security policy for your organization

� Use proper file access permission when sharing files on theinternetinternet

� Disconnect from the Internet when away

Deepak Bhinde PGT Computer Science

top related