Network and The Internet001
Network and The Internet001
Network and The Internet001
CHAPT
ER 2.
Internet
Objectives:
Identify each of the major protocols used in network
communication (for example, FTP and Telnet), and what use
you can make of each.
Understand the various connection methods and speeds
used on networks.
Compare and contrast a hub and switch.
Identify what a router is and what it’s used for.
Understand how data is transmitted over a network.
Explain how the Internet works and the use of IP addresses
and URLs.
Recount a brief history of the Internet.
Use network utilities such as these: ping, IPConfig, and
tracert.
2 Describe the OSI model of network communication and the
INTRODUCTION
To be able to manage network
security, you will need knowledge
about how computer networks
operate. Those readers who
already have a strong working
knowledge of network operations
may choose to skim this chapter
or perhaps give it a quick read as a
review.
3
NETWORK BASIC
Getting two or more computers to communicate
and transmit data is a process that is simple in
concept but complex in application. Consider all
the factors involved.
5
The Physical Connection:
Local Networks
◇ The cable connection used with
traditional NICs (meaning not wireless) is
an RJ-45 connection.
◇ In contrast to the computer’s RJ-45 jacks,
standard telephone lines use RJ-11 jacks.
The biggest difference between jacks
involves the number of wires in the
connector, also called the terminator.
Table 2.1 Cable Types and Uses
Category Specifications Uses
1 Low-speed analog (less than 1MHz) Telephone, doorbell
7
Unshielded twisted-pair (UTP) cable
• The type of cable used in connecting computers is also
often referred to as unshielded twisted-pair (UTP) cable.
• The wires in the cable are in pairs, twisted together
without additional shielding
CAT4 (category 4)
Protocols
- A protocol is, essentially, an agreed-
upon method of communication. In
fact, this definition is exactly how the
word protocol is used in standard,
noncomputer usage, too.
10
Protocol Purpose Port
FTP (File Transfer 20 and 21
Protocol)
For transferring files between
computers.
TFTP (Trivial File 69
Transfer Protocol)
A quicker but less reliable form of
FTP.
11
HTTP (Hypertext Displays web pages. 80
Transfer Protocol)
“
example would be 107.22.98.198.) Each of the three-digit numbers must
be between 0 and 255; thus, an address of 107.22.98.466 would not be a
valid one.
The IP addresses come in two groups: public and private. The public IP
addresses are for computers connected to the Internet. No two public IP
addresses can be the same.
The address of a computer tells you a lot about that computer. The first
byte (or the first decimal number) in an address tells you to what class of
network that machine belongs.
15
TABLE 2.4 Network Classes
Class IP Range for the First Byte Use
10.0.0.10 to 10.255.255.255
172.16.0.0 to 172.31.255.255
192.168.0.0 to 192.168.255.255
You also cannot just put in any number you want. The
first value of a subnet mask must be 255; the remaining
18 three values can be 255, 254, 252, 248, 240, or 224.
CIDR
CIDR, or classless interdomain routing.
Rather than define a subnet mask, you
have the IP address followed by a slash
and a number. That number can be any
number between 0 and 32, which
results in IP addresses like these:
19
192.168.1.10/31 (much like a Class C IP
IPv6
IPv6 utilizes a 128-bit address (instead of 32)
, so there is no chance of running out of IP
addresses in the foreseeable future.
For example:
The network portion is indicated by a slash
followed by the
number of bits in the address that are assigned
There is a loopback address for IPv6, and it can be
written as ::/128. Other differences between IPv4 and
IPv6 are described here:
Link/machine-local.
Site/network-local.
M flag
Uniform Resource
Locators
- Your computer, or your ISP, must translate the name you
typed in (called a uniform resource locator [URL]) into an IP
address.
• Ethernet header
• TCP header
IP header.
History of the Internet
The Internet traces its roots to the Cold War. One positive
thing that can be said about the Cold War is that it was a time
of significant investment in science and technology.
The following year, 1973, would mark the birth of the TCP/
IP protocol, which allowed the various computers to
communicate in a uniform fashion, regardless of their
hardware or operating system.
“
IPConfig
Basic Network Utilities
IPConfig help
“
Basic Network Utilities
“
IPConfig/all
Ping
Another commonly used command is ping. ping
is used to send a test packet, or echo packet, to
a machine to find out if the machine is reachable
and how long the packet takes to reach the
machine.
31
Tracert
“
Netstat
“
NSLookup
This command is an abbreviation for Name
Server lookup. It is used to connect with your
network’s DNS server.
34
Other Network
Devices
A firewall is essentially a barrier
between your network and the rest
of the Internet.
The second very common type of
defensive device is a proxy server. A
proxy server will almost always be
another computer.
35
The OSI
Model
OSI model, or Open Systems
Interconnection model. This model is a
description of how networks
communicate. It describes the various
protocols and activities, and it tells how
the protocols and activities relate to
each other.
36
TABLE 2.5 The OSI Model
Layer Layer Description Protocol
Number s
38
Media Access Control (MAC)
Addresses
MAC addresses are unique addresses
for a NIC. (MAC is also a sub layer of
the data link layer of the OSI model.)
Every NIC in the world has a unique
address that is represented by a 6-byte
hexadecimal number, and an Address
Resolution Protocol (ARP) is used to
convert IP addresses to MAC
39 addresses.
THANK
YOU!!
40
Maps
our office
41
89,526,124
Whoa! That’s a big number, aren’t you proud?
42
89,526,124$
That’s a lot of money
185,244 users
And a lot of users
100%
Total success!
43
Our process is easy
44
Our sales funnel
20%
40%
60%
80%
100%
45
Let’s review some
concepts
Yellow Blue Red
Is the color of gold, butter and ripe Is the colour of the clear sky and the Is the color of blood, and because
lemons. In the spectrum of visible deep sea. It is located between of this it has historically been
light, yellow is found between green violet and green on the optical associated with sacrifice, danger
and orange. spectrum. and courage.
Yellow Red
Blue
Is the color of gold, butter and ripe Is the color
colourofofblood,
the clear
andsky
because
and the
lemons. In the spectrum of visible of
deep
thissea.
it has
It is
historically
located between
been
light, yellow is found between green associated
violet and green
with sacrifice,
on the optical
danger
and orange. and
spectrum.
courage.
46
You can copy&paste graphs from Google Sheets
47
Place your screenshot here
Android project
Show and explain your web, app or
software projects using these gadget
templates.
48
Place your screenshot
here
iPhone project
Show and explain your web, app or
software projects using these gadget
templates.
49
Place your screenshot here
Tablet project
Show and explain your web, app or
software projects using these gadget
templates.
50
Place your screenshot here
Desktop project
Show and explain your
web, app or software
projects using these
gadget templates.
51
Thanks!
Any questions?
You can find me at:
◇ @username
◇ user@mail.me
52
Credits
Special thanks to all the people who made and released
these awesome resources for free:
◇ Presentation template by SlidesCarnival
◇ Photographs by Unsplash
53
Presentation design
This presentation uses the following typographies and colors:
◇ Titles: Nixie One
◇ Body copy: Muli
You can download the fonts on this page:
https://www.fontsquirrel.com/fonts/nixie-one
https://www.fontsquirrel.com/fonts/muli
You don’t need to keep this slide in your presentation. It’s only here to serve you as a design guide if you
need to create new slides or download the fonts to edit the presentation in PowerPoint®
54
SlidesCarnival icons are editable shapes.
Examples:
55
Diagrams and infographics
56
� Now you can use any emoji as an icon!
And of course it resizes without losing quality and you can change the
color.
�
How? Follow Google instructions https://twitter.com/googledocs/
✋👆👉👍👤👦👧👨👩👪💃🏃
status/730087240156643328
💑❤😂😉😋😒😭👶😸🐟🍒🍔
💣📌📖🔨🎃🎈🎨🏈🏰🌏🔌🔑
and many more...
57