1 / 24

Network Vocabulary & Hardware

CIS 375. Network Vocabulary & Hardware. Network Vocabulary. General Terms Analog: Referring to a system or component that uses a system of measurement, response or storage in which values are expressed as a magnitude using a continuous scale of measurement.

michelleb
Download Presentation

Network Vocabulary & Hardware

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CIS 375 Network Vocabulary & Hardware

  2. Network Vocabulary • General Terms • Analog: Referring to a system or component that uses a system of measurement, response or storage in which values are expressed as a magnitude using a continuous scale of measurement. • Backward Compatible: An upgraded component of a computing system that can be used interchangeably with its previous version. • Band: In analog communications, the range of frequencies over which a communication system operates. • Bandwidth:In analog communications, the difference between the highest and lowest frequencies available in the band. In digital communications, bandwidth is loosely used to refer to the information-carrying capacity of a network or component of a network. (*Only as fast as the slowest connection!)

  3. Network Vocabulary (continued) • Binary: 1. A numerical system using “2” as its base. 2. Data that is encoded or presented in machine-readable form (1’s & 0’s). • Bit Rate: The rate at which bits are transmitted or received during communication, expressed as the number bits in a given amount of time, usually one second. • Byte:A group of 8 bits. • Checksum:The result of a mathematical operation that uses the binary representation of a group of data as its basis, usually to check the integrity of the data. • Half Duplex: Capability for data transmission in only one direction at a time between a sending station and a receiving station. Compare with full duplex(simultaneous bidirectional)and simplex (One Direction Only). • Dual Band: equipment is capable of transmitting in either of two different standard frequency ranges.(https://www.lifewire.com/dual-band-wireless-networking-explained-818279)

  4. Network Vocabulary (continued) • Encryption: The application of a specific algorithm to data so as to alter the appearance of the data making it incomprehensible to those who are not authorized to see the information. • Ethernet: is a family of computer networking technologies commonly used in local area networks (LAN), metropolitan area networks (MAN) and wide area networks (WAN).[1] It was commercially introduced in 1980 and first standardized in 1983 as IEEE 802.3,[2] and has since been refined to support higher bit rates and longer link distances. Over time, Ethernet has largely replaced competing wired LAN technologies such as token ring, FDDI and ARCNET.https://en.wikipedia.org/wiki/Ethernet

  5. Network Vocabulary (continued) • Wi-Fi or WiFi (/ˈwaɪfaɪ/) is a technology for wireless local area networking with devices based on the IEEE 802.11 standards. Wi-Fi is a trademark of the Wi-Fi Alliance, which restricts the use of the term Wi-Fi Certified to products that successfully complete interoperability certification testing.[1]Devices that can use Wi-Fi technology include personal computers, video-game consoles, phones and tablets, digital cameras, smart TVs, digital audio players and modern printers. Wi-Fi compatible devices can connect to the Internet via a WLAN and a wireless access point. Such an access point (or hotspot) has a range of about 20 meters (66 feet) indoors and a greater range outdoors. Hotspot coverage can be as small as a single room with walls that block radio waves, or as large as many square kilometres achieved by using multiple overlapping access points.Depiction of a device sending information wirelessly to another device, both connected to the local network, in order to print a documentWi-Fi most commonly uses the 2.4 gigahertz (12 cm) UHF and 5 gigahertz (6 cm) SHFISM radio bands. Having no physical connections, it is more vulnerable to attack than wired connections, such as Ethernet.(https://en.wikipedia.org/wiki/Wi-Fi)

  6. Network Vocabulary (continued) • IP Address: An Internet Protocol address (IP address) is a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication.[1] An IP address serves two principal functions: host or network interface identification and location addressing.Version 4 of the Internet Protocol (IPv4) defines an IP address as a 32-bit number.[1] However, because of the growth of the Internet and the depletion of available IPv4 addresses, a new version of IP (IPv6), using 128 bits for the IP address, was developed in 1995,[2] and standardized as RFC 2460 in 1998.[3]IPv6 deployment has been ongoing since the mid-2000s.IP addresses are usually written and displayed in human-readable notations, such as 172.16.254.1 in IPv4, and 2001:db8:0:1234:0:567:8:1 in IPv6.The IP address space is managed globally by the Internet Assigned Numbers Authority (IANA), and by five regional Internet registries (RIR) responsible in their designated territories for assignment to end users and local Internet registries, such as Internet service providers. IPv4 addresses have been distributed by IANA to the RIRs in blocks of approximately 16.8 million addresses each. Each ISP or private network administrator assigns an IP address to each device connected to its network. Such assignments may be on a static (fixed or permanent) or dynamicbasis (DHCP), depending on its software and practices.https://en.wikipedia.org/wiki/IP_address

  7. Network Vocabulary (continued) • DHCP: The Dynamic Host Configuration Protocol (DHCP) is a standardized network protocol used on Internet Protocol (IP) networks. The DHCP is controlled by a DHCP server that dynamically distributes network configuration parameters, such as IP addresses, for interfaces and services. A router or a residential gatewaycan be enabled to act as a DHCP server. A DHCP server enables computers to request IP addresses and networking parameters automatically, reducing the need for a network administrator or a user to configure these settings manually. In the absence of a DHCP server, each computer or other device (e.g., a printer) on the network needs to be statically (i.e., manually) assigned to an IP address. (*Restarting your Modem/Router)

  8. Network Vocabulary (continued) • MAC Address: A media access control address (MAC address) of a computer is a unique identifier assigned to network interfaces for communications at the data link layer of a network segment. MAC addresses are used as a network address for most IEEE 802 network technologies, including Ethernet and Wi-Fi. Logically, MAC addresses are used in the media access control protocol sublayer of the OSI reference model.MAC addresses are most often assigned by the manufacturer of a network interface controller (NIC) and are stored in its hardware, such as the card's read-only memoryor some other firmware mechanism. If assigned by the manufacturer, a MAC address usually encodes the manufacturer's registered identification number and may be referred to as the burned-in address (BIA). It may also be known as an Ethernet hardware address (EHA), hardware address or physical address (not to be confused with a memory physical address). This can be contrasted to a programmed address, where the host device issues commands to the NIC to use an arbitrary address.https://en.wikipedia.org/wiki/MAC_address

  9. Network Vocabulary (continued) • Network gateway is an internetworking system capable of joining together two networks that use different base protocols. A network gateway can be implemented completely in software, completely in hardware, or as a combination of both. Depending on the types of protocols they support, network gateways can operate at any level of the OSI model.Because a network gateway, by definition, appears at the edge of a network, related capabilities like firewalls tend to be integrated with it.Onhome networks, a broadband router typically serves as the network gateway although ordinary computers can also be configured to perform equivalent functions.

  10. Network Vocabulary (continued) • Infrared(IR): A means of short distance wireless networking that depends on an unobstructed line of sight path. • Integrity: In networking, a desirable condition where the information received is exactly equal to the information sent. • Interface: Connection between two systems or devices. In routing terminology, a network connection. • I/O: input/output. • Multicast: Routing technique that allows IP traffic to be propagated from one source to a number of destinations or from many sources to many destinations. • Little-endian: Method of storing or transmitting data in which the least significant bit or byte is presented first. Compare with big-endian. • Packet: A discrete chunk of communication in a pre-defined format.

  11. Network Vocabulary (continued) • Peer: In networking, a device to which a computer has a network connection that is relatively symmetrical, i.e. where both devices can initiate or respond to a similar set of requests. • Ping: A network diagnostic utility on Unix systems that sends an ICMP Echo Request to a distant node which must then immediately return an ICMP Echo Reply packet back to the originating node • Port: On a network hub, bridge or router, a physically distinct and individually controllable set of transmission hardware. Each such port is connected to the devices other ports through the device’s internal electronic structures. • Protocol: In networking, a specification of the data structures and algorithms necessary to accomplish a particular network function. • Session: An on-going relationship between two computing devices involving the allocation of resources and sustained date flow. (Time-out – session stall/hangs)

  12. Network Vocabulary (continued) • The Open Systems Interconnection model (OSI model) is a conceptual model that characterizes and standardizes the communication functions of a telecommunication or computing system without regard to their underlying internal structure and technology. Its goal is the interoperability of diverse communication systems with standard protocols. The model partitions a communication system into abstraction layers . *The original version of the model defined seven layers.A layer serves the layer above it and is served by the layer below it. For example, a layer that provides error-free communications across a network provides the path needed by applications above it, while it calls the next lower layer to send and receive packets that comprise the contents of that path. Two instances at the same layer are visualized as connected by a horizontal connection in that layer.The model is a product of the Open Systems Interconnection project at the International Organization for Standardization (ISO), maintained by the identification ISO/IEC 7498-1.https://en.wikipedia.org/wiki/OSI_model

  13. OSI Model • OSI Data Model (Layers) • 1: Physical Layer • The physical layer defines the electrical and physical specifications of the data connection. It defines the relationship between a device and a physical transmission medium (for example, an electrical cable, an optical fiber cable, or a radio frequency link). This includes the layout of pins, voltages, line impedance, cable specifications, signal timing and similar characteristics for connected devices and frequency (5 GHz or 2.4 GHz etc.) for wireless devices. It is responsible for transmission and reception of unstructured raw data in a physical medium. Bit rate control is done at the physical layer. It may define transmission mode as simplex, half duplex, and full duplex. It defines the network topology as bus, mesh, or ring being some of the most common. • 2: Data Link Layer • The data link layer provides node-to-node data transfer—a link between two directly connected nodes. It detects and possibly corrects errors that may occur in the physical layer. It defines the protocol to establish and terminate a connection between two physically connected devices. It also defines the protocol for flow control between them.

  14. OSI Model • OSI Data Model Continued (Layers) • 3: Network Layer • The network layer provides the functional and procedural means of transferring variable length data sequences (called datagrams) from one node to another connected in "different networks". A network is a medium to which many nodes can be connected, on which every node has an address and which permits nodes connected to it to transfer messages to other nodes connected to it by merely providing the content of a message and the address of the destination node and letting the network find the way to deliver the message to the destination node, possibly routing it through intermediate nodes. If the message is too large to be transmitted from one node to another on the data link layer between those nodes, the network may implement message delivery by splitting the message into several fragments at one node, sending the fragments independently, and reassembling the fragments at another node. It may, but does not need to, report delivery errors. • 4: Transport Layer • The transport layer provides the functional and procedural means of transferring variable-length data sequences from a source to a destination host via one or more networks, while maintaining the quality of service functions. • An example of a transport-layer protocol in the standard Internet stack is Transmission Control Protocol (TCP), usually built on top of the Internet Protocol (IP).

  15. OSI Model • OSI Data Model Continued (Layers) • 5: Session Layer • The session layer controls the dialogues (connections) between computers. It establishes, manages and terminates the connections between the local and remote application. It provides for full-duplex, half-duplex, or simplex operation, and establishes checkpointing, adjournment, termination, and restart procedures. The OSI model made this layer responsible for graceful close of sessions, which is a property of the Transmission Control Protocol, and also for session checkpointing and recovery, which is not usually used in the Internet Protocol Suite. The session layer is commonly implemented explicitly in application environments that use remote procedure calls. • 6: Presentation Layer • The presentation layer establishes context between application-layer entities, in which the application-layer entities may use different syntax and semantics if the presentation service provides a mapping between them. If a mapping is available, presentation service data units are encapsulated into session protocol data units and passed down the protocol stack. • This layer provides independence from data representation by translating between application and network formats. The presentation layer transforms data into the form that the application accepts. This layer formats and encrypts data to be sent across a network. It is sometimes called the syntax layer.[8]

  16. OSI Model • OSI Data Model Continued (Layers) • 7: Application Layer • The application layer is the OSI layer closest to the end user, which means both the OSI application layer and the user interact directly with the software application. This layer interacts with software applications that implement a communicating component. Such application programs fall outside the scope of the OSI model. Application-layer functions typically include identifying communication partners, determining resource availability, and synchronizing communication. When identifying communication partners, the application layer determines the identity and availability of communication partners for an application with data to transmit. When determining resource availability, the application layer must decide whether sufficient network resources for the requested communication are available.

  17. Network Hardware Categories • Types of Network Hardware • *Modems – Translate analog signals to digital signals (standards – 56K, Docsis) • *Network Backbone/Connection Devices (Switches, Hubs, Routers, Repeaters, bridges/gateways, Wireless Access Points, Firewalls) • Network Adapters (NIC, Wireless Adapters) *Some hardware can be combined into one device and serve multiple functions

  18. Modems • A modem (modulator-demodulator) is a network hardware device that modulates one or more carrier wave signals to encode digital information for transmission and demodulates signals to decode the transmitted information. The goal is to produce a signal that can be transmitted easily and decoded to reproduce the original digital data. Modems can be used with any means of transmitting analog signals, from light emitting diodes to radio. A common type of modem is one that turns the digital dataof a computer into modulated electrical signal for transmission over telephone lines and demodulated by another modem at the receiver side to recover the digital data. (https://en.wikipedia.org/wiki/Modem) • Types of Modems: • Docsis - Data Over Cable Service Interface Specification (DOCSIS/ˈdɒksɪs/) - https://en.wikipedia.org/wiki/DOCSIS • Satelite - https://en.wikipedia.org/wiki/Satellite_modem • DSL – Digital Subscriber line • Phone Modem/ISDN - https://hackaday.com/2013/01/31/how-a-dial-up-modem-handshake-works/ (https://www.youtube.com/watch?v=abapFJN6glo)

  19. Network Backbone/Connection Devices • This class of devices connect computers/networks together and form the “glue” that connects everything together and facilitates the connection of the devices/media on the network • Types of Network Backbone/Connection Devices • Routers:A router is a network device with interfaces in multiple networks whose task is to copy packets from one network to another.*Routers operate at Layer 3 of the OSI Model, the Network Layer.A router will utilize one or more routing protocols to create a routing table.The router will then use the information in its routing table to make intelligent decisions about what packets to copy to which interface.This process is known as routing.*Routers are available with many interface types, such as Ethernet and DSL. Wireless routers support wireless interfaces, such as 802.11 (Wi-Fi). (Wireless Access Point)*Not all routers clearly fall into the category of network hardware. Routing softwaremakes it possible to build a fully functional router out of a normal computer.

  20. Network Backbone/Connection Devices (continued) • Types of Network Backbone/Connection Devices (continued) • Switches:A switch is a network device with multiple ports in one network whose task is to copy frames from one port to another.Switches operate at Layer 2 of the OSI Model, the Data-Link Layer.A switch stores the MAC Address of every device which is connected to it.The switch will then evaluate every frame that passes through it. The switch will examine the destination MAC Address in each frame.Basedupon the destination MAC Address, the switch will then decide which port to copy the frame to.Ifthe switch does not recognize the MAC Address, it will not know which port to copy the frame to. When that happens, the switch will broadcast the frame to all of its ports.

  21. Network Backbone/Connection Devices (continued) • Types of Network Backbone/Connection Devices (continued) • Hubs:Before switches became available, devices called hubs were used. Hubs were less intelligent netword devices that always copied all frames to all ports. By only copying frames to the destination ports, switches utilize network bandwidth much more effectively than hubs did.*What’s the difference? http://www.webopedia.com/DidYouKnow/Hardware_Software/router_switch_hub.asp

  22. Network Backbone/Connection Devices (continued) • Types of Network Backbone/Connection Devices (continued) • Bridge - Another piece of network hardware related to the switch is the Bridge. A Bridge is effectively a two-port switch. Because few users need a two-port switch, they are no longer manufactured. • Repeater - In telecommunications, a repeater is an electronic device that receives a signal and retransmits it. Repeaters are used to extend transmissions so that the signal can cover longer distances or be received on the other side of an obstruction. • Firewall - In computing, a firewall is a network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules.[1]A firewall typically establishes a barrier between a trusted, secure internal network and another outside network, such as the Internet, that is assumed not to be secure or trusted.[2]https://en.wikipedia.org/wiki/Firewall_(computing)

  23. Network Backbone/Connection Devices (continued) • Network Adapters (NIC, Wireless Adapters) • NIC:A network interface controller (NIC, also known as a network interface card, network adapter, LAN adapter or physical network interface,[1] and by similar terms) is a computer hardware component that connects a computer to a computer network.[2] • Wireless Adapters: A wireless network interface controller (WNIC) is a network interface controller which connects to a wirelessradio-based computer network, rather than a wired network, such as Token Ring or Ethernet. A WNIC, just like other NICs, works on the Layer 1 and Layer 2 of the OSI Model. This card uses an antenna to communicate via microwaveradiation. A WNIC in a desktop computer is traditionally connected using the PCI bus. Other connectivity options are USB and PC card. Integrated WNICs are also available, (typically in Mini PCI/PCI Express Mini Card form).*Often built into the motherboard

  24. Additional Resources/Review • Additional Network Vocabulary and Terms: https://www.savvius.com/networking-glossary/glossary-network-terms/ • GeeksforGeeks – Wifi Basics and Networking Info/Tutorials:http://www.geeksforgeeks.org/basics-of-wi-fi/ • Network Tools & Resources • Port tools and info • PortQryV2 - https://www.microsoft.com/en-us/download/details.aspx?id=17148 • *TCP View - https://docs.microsoft.com/en-us/sysinternals/downloads/tcpview

More Related