The document provides information about presentations that cover chapter objectives from a Network+ Guide to Networks textbook. It states that the presentations include the objectives listed at the beginning of each chapter and figures from the chapters. Instructors can customize the presentations for their class needs and additional images can be found on the instructor companion site.
This document provides an overview of chapter 1 from the Network+ Guide to Networks, 6th Edition. It introduces networking concepts such as peer-to-peer and client/server networks. Peer-to-peer networks allow direct communication between equal nodes, while client/server networks use a centralized server to manage shared resources. The document also discusses common network types like LANs, MANs, and WANs and elements of client/server networks including clients, servers, network cards, and protocols. Finally, it outlines several common uses for networks such as file and print sharing, remote access services, and email communication.
This document summarizes key points from Chapter 1 of the Network+ Guide to Networks 6th Edition. It defines a network and the advantages of networking over stand-alone computing. It distinguishes between peer-to-peer and client/server networks and describes their characteristics. It also defines LANs, MANs and WANs and discusses common network services like file sharing, printing, and communications services.
A communications, data exchange, and resource-sharing system created by linking two or more computers and establishing standards, or protocols, so that they can work together
This document provides an overview and introduction to key concepts in computer networking. It discusses the growth of computer networking and its ubiquitous use today. It then covers five key aspects of networking including network applications, data communications, packet switching technologies, TCP/IP internetworking, and additional concepts. It also discusses why networking seems complex due to various standards, models and terminology. The document aims to provide background needed to understand networking complexity at a high level.
Introduction to Networks & Networking Conceptszaisahil
油
The document provides an overview of computer networks and networking concepts. It defines what a computer network is, discusses the key components of networks including hardware, software, media and design. It also covers different types of networks like LANs, WANs and MANs. The document discusses peer-to-peer and client-server network models and the roles of clients, servers and network services. It provides examples of specialized servers like file servers, mail servers and web servers. Finally, it discusses factors to consider when selecting the right type of network.
This document provides information about a computer networks course including details about the lecturer, course content, objectives, and prerequisites. The course covers 12 weeks of material on topics ranging from the history of computer networks and the TCP/IP protocol stack to IP routing, data link layer services, and wireless networking principles. Assessment includes two term exams, a final exam, and a lab component. The goal is for students to gain an understanding of major computer network components, how the Internet works, and networking protocols at each layer of the TCP/IP model.
The document discusses the OSI reference model, which defines 7 layers for network communications: Physical, Data Link, Network, Transport, Session, Presentation, and Application. It describes the functions of each layer, such as the Physical layer handling signals and the Data Link layer organizing bits into frames. The OSI model enables different networks and devices to communicate by standardizing how layers interact, with each layer adding information and passing data to the next layer.
This document provides an overview of networking concepts and components. It defines networking as connecting devices to share information and resources. Key points include:
- Networks can be local or wide area and use various media like cables or wireless.
- Protocols and software enable communication between networked devices using clients, servers, and services.
- Peer-to-peer networks have flexible sharing but limited security, while server-based networks centralize resources but require dedicated hardware.
- Network servers play important roles like file/print sharing, email, web, and running applications.
This document provides an overview of an Internetworking course, including details about the instructor, course objectives, synopsis, and teaching plan. The course covers topics such as addressing, binding, routing, Internet protocols, and the TCP/IP protocol suite. It focuses on networking fundamentals like layers, encapsulation, naming, and functions of common protocols. The teaching plan outlines chapters on introduction/overview, underlying network technologies, and TCP/IP architecture.
This document provides an overview of computer networks and the TCP/IP protocol suite. It describes network criteria like performance and reliability. It discusses physical network structures like point-to-point, multipoint, mesh, star, bus and ring topologies. It also defines categories of networks such as local area networks (LANs), wide area networks (WANs) and metropolitan area networks (MANs). A key point is that the TCP/IP protocol suite, which controls the Internet, is organized into five layers: application, transport, internet, network interface and physical. The layers are described along with how a message travels through them.
This document outlines the course DCN 330 which covers data communication and network interconnectivity, including distinguishing network devices, analyzing network designs, quality of service, cloud computing, and gaining hands-on experience through lectures, labs, and a course project using tools like Cisco Packet Tracer and lab equipment. Students will be evaluated through exams, quizzes, lab assignments, and a course project presentation and report.
Introduction to computer networking chapter 2binakasehun2026
油
This document provides an overview of computer networks, including their components, applications, types, and topologies. Key points:
- A computer network connects devices like computers and printers to share resources and exchange information. Nodes can be any device that can send or receive data.
- Networks provide advantages like resource sharing, information exchange via email/FTP, information sharing via web/internet, interaction via dynamic web pages, video conferences, and parallel computing.
- Networks are classified by geographical span (LAN, MAN, WAN), administration (private, public), and architecture (client-server, peer-to-peer). Common topologies include bus, star, ring, mesh, and hybrid combinations.
This document provides an overview of computer networks. It discusses the agenda and definitions of networks, advantages of networking, common network topologies including bus, star, ring and mesh. It also describes fundamental network classifications like LAN, MAN and WAN. The document outlines applications of networks and defines key components like links, nodes, switches, routers and hubs. It concludes with a discussion of cloud computing and modes of data transfer in networks.
The document provides an overview of network reference models and standards, specifically explaining the OSI reference model and IEEE 802 networking model. The OSI model is a seven-layer framework for networking that separates functions into the physical, data link, network, transport, session, presentation, and application layers. The IEEE 802 standards define networking interfaces and cabling to ensure compatibility between devices.
The document discusses the Open Systems Interconnection (OSI) reference model, which introduced standards for network communication. The OSI model organizes network functions into seven layers, with each layer building on the services provided by the previous layer. Layers 1-4 deal with flow of data through the network, while layers 5-7 deal with services for applications. The model helps ensure compatibility between different network technologies.
UNIT 4 computer networking powerpoint presentation .pdfshubhangisonawane6
油
This document provides an overview of computer networking concepts. It defines a computer network as multiple computers connected together to share information and resources. The document discusses different types of networks including LAN, MAN, WAN and internetworks. It describes key network features like performance, reliability, security and expandability. The document also covers network topologies, advantages and disadvantages of networks, and provides examples of mesh, star, tree and bus topologies.
UNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptxLeahRachael
油
This document provides an overview of network architecture and protocols. It discusses Ethernet, including its history, components, addressing, frames, and media access control. It also covers token ring, AppleTalk, ARCNET, the layered network protocol model (with HTTP as an example), and network operating system architectures like peer-to-peer and client-server. Segmentation strategies like firewalls and software-defined networking are introduced to improve performance and security.
This document provides an overview of networking fundamentals including network history, topologies, protocols, and devices. It discusses the evolution of networks from standalone computers connecting via modems to today's large networks. It describes common network topologies like bus, star, and ring. The document outlines the OSI and TCP/IP models and explains the functions of common networking devices like hubs, bridges, routers, and gateways. It also covers wired media like coaxial cable and fiber optic cable as well as wireless networking standards.
The document provides an overview of TCP/IP, including its origins, standards groups, models, protocols, and analysis. Key points covered include TCP/IP's design goals of withstanding disruption and enabling interoperability, the transition from IPv4 to IPv6 to address limited addresses, and how protocol analyzers work to capture and decode network packets for troubleshooting.
The document discusses the OSI Reference Model, which divides networking functions into 7 layers - physical, data link, network, transport, session, presentation, and application layer. Each layer has distinct responsibilities and provides services to the layer above it. The model was developed by ISO to standardize network communication and ensure compatibility between different systems.
This document provides information about a distributed systems course being taught at the University of Edinburgh in Fall 2014. It introduces the instructors and TAs, lists the lecture times and readings, and describes the exam and assignment structure. It also provides examples of distributed systems like web browsing, multiplayer games, stock markets, Hadoop, and networking to illustrate the concept of multiple computers working together over a network to accomplish a common task.
This document presents a LAN design project report for an organization with 70 users. It proposes a network with wired and wireless connectivity using Ethernet cables, switches, a router and access points. A central data server would be installed with antivirus software and connected to the network along with a DHCP server for dynamic IP address allocation. The network diagram and configurations are presented, along with the hardware, software and design guidelines required to implement the LAN.
This document provides an overview of telecommunications, networking technologies, the internet, and wireless technologies. It discusses the components of telecommunications networks including clients, servers, network interfaces, cabling, switches, and routers. It also describes different types of networks like local area networks (LANs) and wide area networks (WANs). Additionally, it explains key concepts like packet switching, TCP/IP protocols, internet addressing, domain name systems (DNS), and the architecture of the internet. Wireless technologies and standards for internet access are also covered.
This document provides an overview of a computer network course, including its outcomes, chapters, and key concepts. The first chapter covers fundamentals of computer networks, including definitions of networks and computer networks, and the need for and applications of computer networks. It also discusses advantages of computer networks and classifications based on geographical area and transmission technology. Network computing models like peer-to-peer, client-server, and distributed systems are defined along with their characteristics. The roles and functions of network operating systems are outlined.
This document provides an overview of an Internetworking course, including details about the instructor, course objectives, synopsis, and teaching plan. The course covers topics such as addressing, binding, routing, Internet protocols, and the TCP/IP protocol suite. It focuses on networking fundamentals like layers, encapsulation, naming, and functions of common protocols. The teaching plan outlines chapters on introduction/overview, underlying network technologies, and TCP/IP architecture.
This document provides an overview of computer networks and the TCP/IP protocol suite. It describes network criteria like performance and reliability. It discusses physical network structures like point-to-point, multipoint, mesh, star, bus and ring topologies. It also defines categories of networks such as local area networks (LANs), wide area networks (WANs) and metropolitan area networks (MANs). A key point is that the TCP/IP protocol suite, which controls the Internet, is organized into five layers: application, transport, internet, network interface and physical. The layers are described along with how a message travels through them.
This document outlines the course DCN 330 which covers data communication and network interconnectivity, including distinguishing network devices, analyzing network designs, quality of service, cloud computing, and gaining hands-on experience through lectures, labs, and a course project using tools like Cisco Packet Tracer and lab equipment. Students will be evaluated through exams, quizzes, lab assignments, and a course project presentation and report.
Introduction to computer networking chapter 2binakasehun2026
油
This document provides an overview of computer networks, including their components, applications, types, and topologies. Key points:
- A computer network connects devices like computers and printers to share resources and exchange information. Nodes can be any device that can send or receive data.
- Networks provide advantages like resource sharing, information exchange via email/FTP, information sharing via web/internet, interaction via dynamic web pages, video conferences, and parallel computing.
- Networks are classified by geographical span (LAN, MAN, WAN), administration (private, public), and architecture (client-server, peer-to-peer). Common topologies include bus, star, ring, mesh, and hybrid combinations.
This document provides an overview of computer networks. It discusses the agenda and definitions of networks, advantages of networking, common network topologies including bus, star, ring and mesh. It also describes fundamental network classifications like LAN, MAN and WAN. The document outlines applications of networks and defines key components like links, nodes, switches, routers and hubs. It concludes with a discussion of cloud computing and modes of data transfer in networks.
The document provides an overview of network reference models and standards, specifically explaining the OSI reference model and IEEE 802 networking model. The OSI model is a seven-layer framework for networking that separates functions into the physical, data link, network, transport, session, presentation, and application layers. The IEEE 802 standards define networking interfaces and cabling to ensure compatibility between devices.
The document discusses the Open Systems Interconnection (OSI) reference model, which introduced standards for network communication. The OSI model organizes network functions into seven layers, with each layer building on the services provided by the previous layer. Layers 1-4 deal with flow of data through the network, while layers 5-7 deal with services for applications. The model helps ensure compatibility between different network technologies.
UNIT 4 computer networking powerpoint presentation .pdfshubhangisonawane6
油
This document provides an overview of computer networking concepts. It defines a computer network as multiple computers connected together to share information and resources. The document discusses different types of networks including LAN, MAN, WAN and internetworks. It describes key network features like performance, reliability, security and expandability. The document also covers network topologies, advantages and disadvantages of networks, and provides examples of mesh, star, tree and bus topologies.
UNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptxLeahRachael
油
This document provides an overview of network architecture and protocols. It discusses Ethernet, including its history, components, addressing, frames, and media access control. It also covers token ring, AppleTalk, ARCNET, the layered network protocol model (with HTTP as an example), and network operating system architectures like peer-to-peer and client-server. Segmentation strategies like firewalls and software-defined networking are introduced to improve performance and security.
This document provides an overview of networking fundamentals including network history, topologies, protocols, and devices. It discusses the evolution of networks from standalone computers connecting via modems to today's large networks. It describes common network topologies like bus, star, and ring. The document outlines the OSI and TCP/IP models and explains the functions of common networking devices like hubs, bridges, routers, and gateways. It also covers wired media like coaxial cable and fiber optic cable as well as wireless networking standards.
The document provides an overview of TCP/IP, including its origins, standards groups, models, protocols, and analysis. Key points covered include TCP/IP's design goals of withstanding disruption and enabling interoperability, the transition from IPv4 to IPv6 to address limited addresses, and how protocol analyzers work to capture and decode network packets for troubleshooting.
The document discusses the OSI Reference Model, which divides networking functions into 7 layers - physical, data link, network, transport, session, presentation, and application layer. Each layer has distinct responsibilities and provides services to the layer above it. The model was developed by ISO to standardize network communication and ensure compatibility between different systems.
This document provides information about a distributed systems course being taught at the University of Edinburgh in Fall 2014. It introduces the instructors and TAs, lists the lecture times and readings, and describes the exam and assignment structure. It also provides examples of distributed systems like web browsing, multiplayer games, stock markets, Hadoop, and networking to illustrate the concept of multiple computers working together over a network to accomplish a common task.
This document presents a LAN design project report for an organization with 70 users. It proposes a network with wired and wireless connectivity using Ethernet cables, switches, a router and access points. A central data server would be installed with antivirus software and connected to the network along with a DHCP server for dynamic IP address allocation. The network diagram and configurations are presented, along with the hardware, software and design guidelines required to implement the LAN.
This document provides an overview of telecommunications, networking technologies, the internet, and wireless technologies. It discusses the components of telecommunications networks including clients, servers, network interfaces, cabling, switches, and routers. It also describes different types of networks like local area networks (LANs) and wide area networks (WANs). Additionally, it explains key concepts like packet switching, TCP/IP protocols, internet addressing, domain name systems (DNS), and the architecture of the internet. Wireless technologies and standards for internet access are also covered.
This document provides an overview of a computer network course, including its outcomes, chapters, and key concepts. The first chapter covers fundamentals of computer networks, including definitions of networks and computer networks, and the need for and applications of computer networks. It also discusses advantages of computer networks and classifications based on geographical area and transmission technology. Network computing models like peer-to-peer, client-server, and distributed systems are defined along with their characteristics. The roles and functions of network operating systems are outlined.
Welcome to the March 2025 issue of WIPAC Monthly the magazine brought to you by the LinkedIn Group WIPAC Monthly.
In this month's edition, on top of the month's news from the water industry we cover subjects from the intelligent use of wastewater networks, the use of machine learning in water quality as well as how, we as an industry, need to develop the skills base in developing areas such as Machine Learning and Artificial Intelligence.
Enjoy the latest edition
This PPT covers the index and engineering properties of soil. It includes details on index properties, along with their methods of determination. Various important terms related to soil behavior are explained in detail. The presentation also outlines the experimental procedures for determining soil properties such as water content, specific gravity, plastic limit, and liquid limit, along with the necessary calculations and graph plotting. Additionally, it provides insights to understand the importance of these properties in geotechnical engineering applications.
This presentation provides an in-depth analysis of structural quality control in the KRP 401600 section of the Copper Processing Plant-3 (MOF-3) in Uzbekistan. As a Structural QA/QC Inspector, I have identified critical welding defects, alignment issues, bolting problems, and joint fit-up concerns.
Key topics covered:
Common Structural Defects Welding porosity, misalignment, bolting errors, and more.
Root Cause Analysis Understanding why these defects occur.
Corrective & Preventive Actions Effective solutions to improve quality.
Team Responsibilities Roles of supervisors, welders, fitters, and QC inspectors.
Inspection & Quality Control Enhancements Advanced techniques for defect detection.
Applicable Standards: GOST, KMK, SNK Ensuring compliance with international quality benchmarks.
This presentation is a must-watch for:
QA/QC Inspectors, Structural Engineers, Welding Inspectors, and Project Managers in the construction & oil & gas industries.
Professionals looking to improve quality control processes in large-scale industrial projects.
Download & share your thoughts! Let's discuss best practices for enhancing structural integrity in industrial projects.
Categories:
Engineering
Construction
Quality Control
Welding Inspection
Project Management
Tags:
#QAQC #StructuralInspection #WeldingDefects #BoltingIssues #ConstructionQuality #Engineering #GOSTStandards #WeldingInspection #QualityControl #ProjectManagement #MOF3 #CopperProcessing #StructuralEngineering #NDT #OilAndGas
Engineering at Lovely Professional University (LPU).pdfSona
油
LPUs engineering programs provide students with the skills and knowledge to excel in the rapidly evolving tech industry, ensuring a bright and successful future. With world-class infrastructure, top-tier placements, and global exposure, LPU stands as a premier destination for aspiring engineers.
Air pollution is contamination of the indoor or outdoor environment by any ch...dhanashree78
油
Air pollution is contamination of the indoor or outdoor environment by any chemical, physical or biological agent that modifies the natural characteristics of the atmosphere.
Household combustion devices, motor vehicles, industrial facilities and forest fires are common sources of air pollution. Pollutants of major public health concern include particulate matter, carbon monoxide, ozone, nitrogen dioxide and sulfur dioxide. Outdoor and indoor air pollution cause respiratory and other diseases and are important sources of morbidity and mortality.
WHO data show that almost all of the global population (99%) breathe air that exceeds WHO guideline limits and contains high levels of pollutants, with low- and middle-income countries suffering from the highest exposures.
Air quality is closely linked to the earths climate and ecosystems globally. Many of the drivers of air pollution (i.e. combustion of fossil fuels) are also sources of greenhouse gas emissions. Policies to reduce air pollution, therefore, offer a win-win strategy for both climate and health, lowering the burden of disease attributable to air pollution, as well as contributing to the near- and long-term mitigation of climate change.
The Golden Gate Bridge a structural marvel inspired by mother nature.pptxAkankshaRawat75
油
The Golden Gate Bridge is a 6 lane suspension bridge spans the Golden Gate Strait, connecting the city of San Francisco to Marin County, California.
It provides a vital transportation link between the Pacific Ocean and the San Francisco Bay.
Indian Soil Classification System in Geotechnical EngineeringRajani Vyawahare
油
This PowerPoint presentation provides a comprehensive overview of the Indian Soil Classification System, widely used in geotechnical engineering for identifying and categorizing soils based on their properties. It covers essential aspects such as particle size distribution, sieve analysis, and Atterberg consistency limits, which play a crucial role in determining soil behavior for construction and foundation design. The presentation explains the classification of soil based on particle size, including gravel, sand, silt, and clay, and details the sieve analysis experiment used to determine grain size distribution. Additionally, it explores the Atterberg consistency limits, such as the liquid limit, plastic limit, and shrinkage limit, along with a plasticity chart to assess soil plasticity and its impact on engineering applications. Furthermore, it discusses the Indian Standard Soil Classification (IS 1498:1970) and its significance in construction, along with a comparison to the Unified Soil Classification System (USCS). With detailed explanations, graphs, charts, and practical applications, this presentation serves as a valuable resource for students, civil engineers, and researchers in the field of geotechnical engineering.
Indian Soil Classification System in Geotechnical EngineeringRajani Vyawahare
油
Comptia Security + Chapter 1 601
1. About the Presentations
The presentations cover the objectives found in the
opening of each chapter.
All chapter objectives are listed in the beginning of
each presentation.
You may customize the presentations to fit your
class needs.
Some figures from the chapters are included. A
complete set of images from the book can be found
on the Instructor Companion Site.
息 2016 Cengage Learning速. May not be scanned, copied or duplicated, or posted to
a publicly accessible website, in whole or in part.
2. Network+ Guide to Networks
7th Edition
Chapter 1
An Introduction to Networking
息 2016 Cengage Learning速. May not be scanned, copied or duplicated, or posted to a
publicly accessible website, in whole or in part.
3. 息 Cengage Learning 2016
Objectives
Identify types of applications and protocols used on
a network
Distinguish between the client-server and peer-to-
peer models used to control access to a network
Describe various networking hardware devices and
the most common physical topologies
3
Network+ Guide to Networks, 7th Edition
4. 息 Cengage Learning 2016
4
Objectives
Describe the seven layers of the OSI model
Explore best practices for safety when working with
networks and computers
Describe the seven-step troubleshooting model for
solving a networking problem
Network+ Guide to Networks, 7th Edition
5. 息 Cengage Learning 2016
How Networks Are Used
Network services - the resources a network makes
available to its users
Includes applications and the data provided by these
applications
Types of applications found on most networks:
Client-Server
File and Print Services
Communications Services
Network+ Guide to Networks, 7th Edition 5
6. 息 Cengage Learning 2016
Client-Server Applications
Client computer requests data or a service from a
second computer, called the server
List of several popular client-server applications:
Web service
Email services
FTP service
Telnet service
Remote Desktop
Remote applications
Network+ Guide to Networks, 7th Edition 6
9. 息 Cengage Learning 2016
File and Print Services
File services - a servers ability to share data files
and disk storage space
File server - a computer that provides file services
Print services - ability to share printers across a
network
With one printer, less time is spent on maintenance
and management
Network+ Guide to Networks, 7th Edition 9
10. 息 Cengage Learning 2016
Communication Services
Convergence - using the same network to deliver
multiple types of communications services
Unified communication (UC) - refers to the
centralized management of multiple network-based
communications
Three types of communication services:
Conversational voice - VoIP (Voice over IP)
Streaming live audio and video
Streaming stored audio and video
Network+ Guide to Networks, 7th Edition 10
11. 息 Cengage Learning 2016
Communication Services
Voice and video transmissions are delay-sensitive
You dont want to hear or see breaks in transmission
Voice and video transmission are considered loss-
tolerant
Network administrators must pay attention to the
quality of service (QoS) a network provides for voice
and video
Bandwidth - the amount of traffic, or data
transmission activity, on the network
Network+ Guide to Networks, 7th Edition 11
12. 息 Cengage Learning 2016
Controlling Network Access
Topology - how parts of a whole work together
Physical topology - mostly applies to hardware and
describes how computers, other devices, and cables
fir together to form the physical network
Logical topology - has to do with software and
describes how access to the network is controlled
How users and programs initially gain access to the
network
Network operating system - controls access to the
entire network
Required by client-server models
Network+ Guide to Networks, 7th Edition 12
13. 息 Cengage Learning 2016
Network+ Guide to Networks, 7th Edition 13
Peer-to-Peer Model
Peer-to-peer (P2P) network model - the OS of each
computer on the network is responsible for
controlling access to its resources
No centralized control
Computers, called nodes or hosts, form a logical
group of computers and users
May share resources
May prevent access to resources
Each computer user has a Windows local account
Works only on that one computer
14. 息 Cengage Learning 2016
Network+ Guide to Networks, 7th Edition 14
Peer-to-Peer Model
15. 息 Cengage Learning 2016
Network+ Guide to Networks, 7th Edition 15
Peer-to-Peer Model
Advantages
Simple configuration
Less expensive
Compared to other network models
Disadvantages
Not scalable
Not necessarily secure
Not practical for large installations
16. 息 Cengage Learning 2016
Network+ Guide to Networks, 7th Edition 16
Client-Server Network Model
Resources are managed by the network operating
system (NOS) via a centralized directory database
Windows domain - a logical group of computers that
a Windows Server can control
Active Directory (AD) - the centralized directory
database that contains user account information and
security for the entire group of computers
Global account (a.k.a. global username or network
ID) - a domain-level account assigned by the
network administrator and is kept in AD
17. 息 Cengage Learning 2016
Network+ Guide to Networks, 7th Edition 17
Client-Server Network Model
A user can sign on to the network from any
computer on the network and gain access to the
resources that AD allows
This process is managed by Active Directory Domain
Services (AD DS)
Clients dont share their resources directly with each
other
Access is controlled by entries in the centralized
domain database
18. 息 Cengage Learning 2016
Network+ Guide to Networks, 7th Edition 18
Client-Server Network Model
19. 息 Cengage Learning 2016
Network+ Guide to Networks, 7th Edition 19
Client-Server Network Model
The NOS is responsible for:
Manages client data, resources
Ensures authorized user access
Controls user file access
Restricts user network access
Dictates computer communication rules
Supplies application to clients
Server examples
Windows Server 2012 R2, Ubuntu Server, or Red Hat
Linux
20. 息 Cengage Learning 2016
Network+ Guide to Networks, 7th Edition 20
Client-Server Network Model
Servers that have a NOS installed require:
More memory, processing, storage capacity
Equipped with special hardware
Provides network management functions
Advantages relative to peer-to-peer networks
User credential assigned from one place
Multiple shared resource access centrally controlled
Central problem monitoring, diagnostics, correction
capabilities
More scalable
21. 息 Cengage Learning 2016
Networking Hardware and Physical
Topologies
Network+ Guide to Networks, 7th Edition 21
22. 息 Cengage Learning 2016
LANs and Their Hardware
Local area network (LAN) - usually contained in a
small space
Such as an office or building
Switch - receives incoming data from one of its ports
and redirects it to another port or multiple ports
Will send the data to its intended destination
Star topology - all devices connect to one central
device (usually a switch)
Network interface card (NIC) - a network port used
to attach a device to a network
Network+ Guide to Networks, 7th Edition 22
23. 息 Cengage Learning 2016
LANs and Their Hardware
A LAN can have several switches
Backbone - a central conduit that connects the
segments (pieces) of a network
Might use higher transmission speeds and different
cabling than network cables connected to computers
Three switches daisy-chained together in a single
line is said to use a bus topology
However, each switch is connected to computers via
a star topology, making it a star-bus topology
A topology that combines topologies is known as a
hybrid topology
Network+ Guide to Networks, 7th Edition 23
24. 息 Cengage Learning 2016
LANs and Their Hardware
Network+ Guide to Networks, 7th Edition 24
25. 息 Cengage Learning 2016
LANs and Their Hardware
Router - a device that manages traffic between two
or more networks
Can help find the best path for traffic to get from one
network to another
Routers can be used in small home networks to
connect the home LAN to the Internet
Industrial-grade routers can have several network
ports, one for each network it connects to
Difference between router and switch:
Router is like a gateway between networks
Network+ Guide to Networks, 7th Edition 25
26. 息 Cengage Learning 2016
LANs and Their Hardware
Network+ Guide to Networks, 7th Edition 26
27. 息 Cengage Learning 2016
MANs and WANs
Metropolitan area network (MAN) - a group of
connected LANs in the same geographical area
Also known as a campus area network (CAN)
WAN (wide area network) - a group of LANs that
spread over a wide geographical area
Internet is the largest and most varied WAN
MANs and WANs often use different transmission
methods and media than LANs
PAN (personal area network) - smallest network
A network of personal devices
Network+ Guide to Networks, 7th Edition 27
28. 息 Cengage Learning 2016
MANs and WANs
Network+ Guide to Networks, 7th Edition 28
29. 息 Cengage Learning 2016
The Seven-Layer OSI Model
OSI (Open Systems Interconnection) reference
model - a seven-layer model developed to
categorize the layers of communication
Developed by ISO in the 1980s
The layers are numbered in order, starting with
Layer 1, the Physical layer at the bottom
Physical, Data Link, Network, Transport, Session,
Presentation, Application
Network+ Guide to Networks, 7th Edition 29
30. 息 Cengage Learning 2016
The Seven-Layer OSI Model
Network+ Guide to Networks, 7th Edition 30
31. 息 Cengage Learning 2016
Layer 7: Application Layer
Application layer - describes the interface between
two applications, on separate computers
Application layer protocols are used by programs
that fall into two categories:
Provide services to a user, such as a browser and
Web server
Utility programs that provide services to the system,
such as SNMP that monitor and gather information
about network traffic
Payload - data that is passed between applications
or utility programs and the OS
Network+ Guide to Networks, 7th Edition 31
32. 息 Cengage Learning 2016
Layer 6: Presentation Layer
Presentation layer - responsible for reformatting,
compressing, and/or encrypting data in a way that
the receiving application can read
Example:
An email message can be encrypted at the
Presentation layer by the email client or by the OS
Network+ Guide to Networks, 7th Edition 32
33. 息 Cengage Learning 2016
Layer 5: Session Layer
Session layer - describes how data between
applications is synched and recovered if messages
dont arrive intact at the receiving application
The Application, Presentation, and Session layers
are intertwined
Often difficult to distinguish between them
Most tasks are performed by the OS when an
application makes an API call to the OS
Application programming interface (API) call is the
method an application uses when it makes a request
of the OS
Network+ Guide to Networks, 7th Edition 33
34. 息 Cengage Learning 2016
Layer 4: Transport Layer
Transport layer - responsible for transporting
Application layer payloads from one application to
another
Two main Transport layer protocols are:
TCP (Transmission Control Protocol) - makes a
connection with the end host, checks whether data
was received; called a connection-oriented protocol
UDP (User Datagram Protocol) - does not guarantee
delivery by first connecting and checking whether
data is received; called a connectionless protocol
Network+ Guide to Networks, 7th Edition 34
35. 息 Cengage Learning 2016
Layer 4: Transport Layer
Protocols add their own control information in an
area at the beginning of the payload (called a
header)
Encapsulation - process of adding a header to the
data inherited from the layer above
The Transport layer header addresses the receiving
application by a number called a port number
If message is too large, TCP divides it into smaller
messages called segments
In UDP, the message is called a datagram
Network+ Guide to Networks, 7th Edition 35
36. 息 Cengage Learning 2016
Layer 3: Network Layer
Network layer - responsible for moving messages
from one node to another until reaches destination
IP adds its own Network layer header to the
segment or datagram
The entire Network layer message is called a packet
IP address - assigned to each node on a network
Network layer uses it to uniquely identify each host
IP relies on several routing protocols to find the best
route for a packet to take to reach destination
ICMP and ARP are examples
Network+ Guide to Networks, 7th Edition 36
37. 息 Cengage Learning 2016
Layer 2: Data Link Layer
Layers 2 and 1 are responsible for interfacing with
physical hardware on the local network
Protocols at these layers are programmed into
firmware of a computers NIC and other hardware
Type of networking hardware or technology used on
a network determine the Link Layer protocol used
Ethernet and Wi-Fi are examples
The Link layer puts control information in a Link
layer header and at the end of the packet in a trailer
Entire Link layer is called a frame
Network+ Guide to Networks, 7th Edition 37
38. 息 Cengage Learning 2016
Layer 2: Data Link Layer
MAC (Media Access Control) address - hardware
address of the source and destination NICs
Also called a physical address, hardware address, or
Data Link layer address
Embedded on every network adapter and are
considered short-range addresses that can only find
nodes on the local network
Network+ Guide to Networks, 7th Edition 38
39. 息 Cengage Learning 2016
Layer 1: Physical Layer
Physical layer - simplest layer and is responsible for
sending bits via a wired or wireless transmission
Can be transmitted as:
Wavelengths in the air
Voltage on a copper wire
Light (via fiber-optic cabling)
Network+ Guide to Networks, 7th Edition 39
40. 息 Cengage Learning 2016
Protocol Data Unit or PDU
Protocol data unit (PDU) - the technical name for a
group of bits as it moves from one layer to the next
and from one LAN to the next
Technicians loosely call this group of bits a message
or a transmission
Network+ Guide to Networks, 7th Edition 40
41. 息 Cengage Learning 2016
Summary of How the Layers Work
Together
Network+ Guide to Networks, 7th Edition 41
42. 息 Cengage Learning 2016
Summary of How the Layers Work
Together
Network+ Guide to Networks, 7th Edition 42
43. 息 Cengage Learning 2016
Staying Safe When Working with
Networks and Computers
Network and computer technicians need to know
how to protect themselves
As wells as protect sensitive electronic components
This section takes a look at some best practices for
safety
Network+ Guide to Networks, 7th Edition 43
44. 息 Cengage Learning 2016
Emergency Procedures
Know the best escape route or emergency exit
Fire Suppression Systems - have a fire suppression
system in the data center that includes:
Emergency alert system
Portable fire extinguishers
Emergency power-off switch
Suppression agent
Fail Open or Fail Close - does the security system
allow access during a failure (fail open) or deny
access during the failure (fail close)
Network+ Guide to Networks, 7th Edition 44
45. 息 Cengage Learning 2016
Emergency Procedures
Material Safety Data Sheet (MSDS) - explains how
to properly handle substances such as chemical
solvents and how to dispose of them
Includes information such as physical data, toxicity,
health effects, first aid, storage, shipping, disposal,
and spill procedures
Network+ Guide to Networks, 7th Edition 45
46. 息 Cengage Learning 2016
HVAC Systems
Heating, ventilation, and air conditioning (HVAC)
system - controls the environment in a data center
Including the temperature, humidity, airflow, and air
filtering
HVAC system must provide acceptable temperature
and humidity ranges for devices that might overheat
or fail due to high humidity
HVAC systems and network cabling often occupy
the space above the ceiling or below the floor in a
data center
Called the plenum
Network+ Guide to Networks, 7th Edition 46
47. 息 Cengage Learning 2016
Protecting Against Static Electricity
Computer components are grounded inside a
computer case
Sensitive electronic components can be damaged
by electrostatic discharge (ESD)
Static electricity can cause two types of damage:
Catastrophic failure - destroyed beyond use
Upset failure - shorten the life of a component
Network+ Guide to Networks, 7th Edition 47
48. 息 Cengage Learning 2016
Protecting Against Static Electricity
Before touching a component, ground yourself by:
Wearing an ESD strap around your wrist that clips
onto the chassis or computer case
Touching the case before touching any component
inside the case
Storing a component inside an antistatic bag
In addition to protecting against ESD, always shut
down and unplug a computer before working inside
it
Network+ Guide to Networks, 7th Edition 48
49. 息 Cengage Learning 2016
Installation Safety
Lifting Heavy Objects - follow these guidelines:
Decide which side of object to face so load is most
balanced
Stand close to the object with your feet apart
Keep your back straight, bend knees and grip load
Lift with your legs, arms, and shoulders (not your
back or stomach)
Keep the load close to your body and avoid twisting
your body while youre holding it
To put the object down, keep your back as straight as
possible and lower object by bending your knees
Network+ Guide to Networks, 7th Edition 49
50. 息 Cengage Learning 2016
Installation Safety
Rack Installations - switches, routers, servers, and
patch panels can be installed in racks
Follow device manufacturers guidelines for
requirements for the rack and the direction for
installation
Network+ Guide to Networks, 7th Edition 50
51. 息 Cengage Learning 2016
Installation Safety
General directions for safely installing rack-
mountable devices:
Engage brakes on rack wheels, if applicable
Wear an ESD strap
Place the device in the rack for good airflow
Device must be well grounded
Pay attention to tools as you work so they dont
accidentally fall into a rack of expensive equipment
Install fan trays so that air flows in the same direction
as the fans inside the device
Network+ Guide to Networks, 7th Edition 51
53. 息 Cengage Learning 2016
Electrical and Tool Safety in Data
Centers
Electrical and tool safety is generally regulated by
OSHA (Occupational Safety and Health
Administration)
OSHA guidelines when using power tools:
Wear personal protective equipment (PPE)
Keep all tools in good condition and properly store
tools not in use
Use the right tool for the job and operate the tool
according to the manufacturers instructions
Watch out for trip hazards, so you and others dont
stumble on a tool or cord
Network+ Guide to Networks, 7th Edition 53
54. 息 Cengage Learning 2016
Troubleshooting Network Problems
Troubleshooting steps used by most expert
networking troubleshooters:
Identify problem
Gather information
Identify symptoms
Question users
Determine if anything has changed
Establish theory of probable cause
Question the obvious
Network+ Guide to Networks, 7th Edition 54
55. 息 Cengage Learning 2016
Troubleshooting Network Problems
Troubleshooting steps (contd)
Test theory to determine cause
If theory confirmed, determine next steps
If theory not confirmed, establish new theory or
escalate
Establish action plan
Implement solution or escalate the problem
Verify full functionality
Implement preventative measures if applicable
Document findings, actions, outcomes
Network+ Guide to Networks, 7th Edition 55
56. 息 Cengage Learning 2016
Network+ Guide to Networks, 7th Edition 56
Summary
Networks provide a wide range of services, including
client-server applications, file and print services, and
communications services
File and print services enable multiple users to
share data, storage areas, and printers
Traditional peer-to-peer networks are usually simple
and inexpensive to set up
The client-server model for access control relies on
a centrally administered server using a NOS that
manages shared resources for multiple clients
More complex and expensive to install
57. 息 Cengage Learning 2016
Network+ Guide to Networks, 7th Edition 57
Summary
A LAN is a network of computers and other devices
that can directly address all other nodes
In a star topology, all computers and network
devices connect to one central device
A backbone is a central conduit that connects parts
of a network and might use the bus topology
A router manages traffic between two or more LANS
LANS can be interconnected to form WANS, which
traverse longer distances in two or more
geographical areas
58. 息 Cengage Learning 2016
Network+ Guide to Networks, 7th Edition 58
Summary
The seven layers of the OSI model are Application,
Presentation, Session, Transport, Network, Data
Link, and Physical
At Layers 7,6, and 5, data and its control information
is known as the payload
A message at the Transport layer is called a
segment in TCP and a datagram in UDP
An IP transmission is called a packet
A message at the Data Link layer is called a frame
Some switches operate at the Data Link layer and
routers operate at the Network layer
59. 息 Cengage Learning 2016
Network+ Guide to Networks, 7th Edition 59
Summary
A fire suppression system can include an
emergency alert system, portable fire extinguishers,
an emergency power-off switch, and suppression
agents
HVAC systems are responsible for controlling
humidity and temperature in a data center
When working with sensitive components, protect
against ESD by using an ESD strap
Troubleshooting problems and their solutions are
documented in a call tracking system