Вы находитесь на странице: 1из 19

Networking

Presented By : Manish Srivastava CS Final Year 0806510032


1

What is Networking..?
In the world of computers, networking is the practice of linking two or more computing devices together for the purpose of sharing data. Networks are built with a mix of computer hardware and computer software.

Internetworking..?
Internetworking is a term used by Cisco and other providers of network products and services as a comprehensive term for all the concepts, technologies, and generic devices that allow people and their computers to communicate across different kinds of networks.
2

OSI Model

Devices

HUB

SWITCH

SERVER
ROUTER REPEATER
4

TCP/IP

TCP/IP (Transmission Control Protocol/Internet Protocol) is the basic communication language or protocol of the Internet. It can also be used as a communications protocol in a private network (either an intranet or an extranet). When you are set up with direct access to the Internet, your computer is provided with a copy of the TCP/IP program just as every other computer that you may send messages to or get information from also has a copy of TCP/IP.
5

TCP vs UDP
Reliability: TCP is connection-oriented protocol. When a file or message send it will get delivered unless connections fails. UDP is connectionless protocol. When you a send a data or message, you don't know if it'll get there, it could get lost on the way. Ordered: If you send two messages along a connection, one after the other, you know the first message will get there first. If you send two messages out, you don't know what order they'll arrive in i.e. no ordered. Streaming: Data is read as a "stream," with nothing distinguishing where one packet ends and another begins. There may be multiple packets per read call. 6

Classes Of IP

Subnetting :
Subnetting is essentially the modification of a single IP network to create two or more logically visible sub-sections. It entails changing the subnet mask of the local network number to produce an even number of smaller network numbers, each with a corresponding range of IP addresses.

Function Of Router:
A router is a networking element that controls Internet and LAN traffic, shares the available bandwidth between multiple connected computers, filters packets, acts as a hardware firewall based on its configuration, network gateway, NAT server and wireless Access Point . A wireless router is essentially a bunch of network cards connected internally by an intelligent switch that directs the incoming/outgoing traffic between them.

Modes Of Router :
A.User Mode B.Privilege Mode C.Configuration Mode

Router can be operated on following three modes..

Routing:
In internetworking, the process of moving a packet of data from source to destination. Routing is usually performed by a dedicated device called a router. Routing is a key feature of the Internet because it enables messages to pass from one computer to another and eventually reach the target machine. Each intermediary computer performs routing by passing along the message to the next computer. Part of this process involves analyzing a routing table to determine the best path.
10

Switching:
A network switch or switching hub is a computer networking device that connects network segments. The term commonly refers to a multi-port network bridge that processes and routes data at the data link layer (layer 2) of the OSI model. Switches that additionally process data at the network layer (Layer 3) and above are often referred to as Layer 3 switches or multilayer switches.

11

VLAN (Virtual LAN)


Short for virtual LAN, a network of computers that behave as if they are connected to the same wire even though they may actually be physically located on different segments of a LAN. VLANs are configured through software rather than hardware, which makes them extremely flexible. One of the biggest advantages of VLANs is that when a computer is physically moved to another location, it can stay on the same VLAN without any hardware reconfiguration.
12

Security :
Security exactly means how can we secure our internal network using router, so that unauthenticated access can be avoided. By this we can apply security on a particular internetworks, sites , ports.

Access List :
Standard Access List Extended Access List Named Access List

An access list is essentially a list of conditions that categorize packets. They can be really helpful when you need to exercise control over a network traffic. There are three types of access list :

13

NAT (Network Address


Network Address Translation (NAT) is the process where a network device, usually a firewall, assigns a public address to a computer (or group of computers) inside a private network. The main use of NAT is to limit the number of public IP addresses an organization or company must use, for both economy and security purposes. Routers inside the private network can route traffic between private addresses with no trouble. However, to access resources outside the network, like the Internet, these computers have to have a public address in order for responses to their requests to return to them. This is where NAT comes into play.

Translation)

14

Remote Login
Remote access is the ability to get access to a computer or a network from a remote distance. In corporations, people at branch offices, telecommuters, and people who are travelling may need access to the corporation's network.

Telnet
Telnet is a user command and an underlying TCP/IP protocol for accessing remote computers. Through Telnet, an administrator or another user can access someone else's computer remotely.

Remote Desktop
Remote desktop is a program or an operating system feature that allows the user to connect to a computer in another location, see that computer's desktop and interact with it as if it were local.

15

VPN (Virtual Private Network)


VPN gives extremely secure connections between private networks linked through the Internet. It allows remote computers to act as though they were on the same secure, local network. Advantages Allows you to be at home and access your company's computers in the same way as if you were sitting at work. Almost impossible for someone to tap or interfere with data in the VPN tunnel. If you have VPN client software on a laptop, you can connect to your company from anywhere in the world. Disadvantages Setup is more complicated than less secure methods. VPN works across different manufacturers' equipment, but connecting to a non-NETGEAR product will add to difficulty, since there may not documentation specific to your situation.
16

Proxy Server
In computer networks, a proxy server is a server (a computer system or an application) that acts as an intermediary for requests from clients seeking resources from other servers. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource, available from a different server. The proxy server evaluates the request according to its filtering rules.

17

Query ?
18

Thank you &


Have a nice day.

19

Вам также может понравиться