Lecture1-Introduction 2024-3
Lecture1-Introduction 2024-3
COMP2013
Dr Linh Pham
School of Computing, Data & Mathematical Sciences
2024-3
References
Subject Learning Guide
Textbook chapter 1-2, 7
Dean, T (2016). Network+ Guide to Networks
Course Technology
Subject Website:
UWS’ e-learning (vUWS) https://vuws.westernsydney.edu.au/
Contains:
•Subject Outline
•Learning Guide
•Lecture Notes
•Practical Notes
•Self Tests
•Assignment
•Notice Board
•Related URLs (VMWare etc.)
•Other teaching materials
COMP2013 LAN Workshop. © University of
Western Sydney 6
Subject Textbook
https://cengage.com.au/product/division/u
niversity/title/guide-to-networking-
essentials/isbn/9780357118283
https://raghavenv12.files.wordpress.com/2
014/10/mastering-windows-server-2012-
r2-by-sybex.pdf
http://45pi.com/ebook/Network+%20Guid
e%20to%20Networks-
%206th%20Edition.pdf
Represented by bits
n A bit can only be a zero (0) or a one (1)
n 2number of bits is number of values that can be
represented
w e.g. 21 = 2 values (0 or 1), 22= 4 values (00,
01,10,11)
nHow many values does 4 bits represent?
w A byte is 8 bits
nHow many values does 1 byte represent?
Represented by bits
n Has 8 digits (0, 1, 2, 3, 4, 5, 6, 7)
n One octal digit represents 3 binary bits
n e.g.
• Octal value for binary number 011 = 3
• Octal value for binary number 010 = 2
• Octal value for binary number 111 = 7
F
What is the Hex value for binary number 1111? ________
B5
What is the Hex value for binary number 1011 0101? ________
Network Services
A Network is two or more n File Sharing, Print
computers connected Sharing, E-mail,…
together to share
resources
Network Media
n Network Interface Cards
(NIC), Transmission
Media (wired and
wireless)
Network Protocols
n Rules of standards that
allow computers to
connect and exchange
information
COMP2013 LAN Workshop. © University of
Western Sydney 26
Types of Networks
Peer-to-Peer networks
n Has no dedicated servers
and all computers are
equal
n All computers can provide
and request services
n Resources are kept locally
and are locally managed
n Sometimes called a
workgroup
Roughly hierarchical
at center: “tier-1” ISPs (e.g., Verizon, Sprint, AT&T, Cable
and Wireless), national/international coverage
n treat each other as equals
Tier-1
providers
Tier 1 ISP
interconnect
(peer)
privately
Tier 1 ISP Tier 1 ISP
Tier-2 ISPs
Tier-2 ISP pays also peer
Tier-2 ISP Tier-2 ISP
tier-1 ISP for privately with
connectivity to Tier 1 ISP each other.
rest of Internet
q tier-2 ISP is
customer of
tier-1 provider Tier 1 ISP Tier 1 ISP Tier-2 ISP
Tier 1 ISP
frequency
time
TDM
frequency
time
COMP2013 LAN Workshop. © University of
Western Sydney 37
Network Software
Application
supporting network applications:
FTP, SMTP, HTTP
Presentation
allow applications to interpret meaning of data,
e.g., encryption, compression, machine-specific
conventions: MIME, SSL
Session
synchronization, checkpoints, recovery of data
exchange: NetBIOS, SAP
COMP2013 LAN Workshop. © University of
Western Sydney 41
Functionality at Each Layer (cont.)
Transport
process-process data transfer:
TCP, UDP
Network
routing of datagrams from source to destination:
IP, routing protocols
Data Link
data transfer between neighboring network elements:
PPP, Ethernet
Physical
bits “on the wire”: SONET/SDH, 802.11a/b/g/n
COMP2013 LAN Workshop. © University of
Western Sydney 42
What is a NIC?
A network interface card (NIC)
is a device that plugs into a
motherboard and provides ports
for the network media
connections.
Works at the physical layer
It is the component that
interfaces with the local-area
network (LAN).
The following things are
important to consider when
selecting a NIC:
n The type of network
n The type of media
n The type of system bus
COMP2013 LAN Workshop. © University of
Western Sydney 43
Repeaters and Hubs
Repeater Works at the physical
layer
A repeater receives the signal,
regenerates it, and passes it on
Repeaters are used mainly at
the edges of networks to extend
the wire so more workstations
can be added which would
normally result in signal loss
Hubs and MAUs (Multistation
Access Units)
n Works at the physical layer
n Used to connect network
devices
n All devices receive all data
sent
COMP2013 LAN Workshop. © University of
Western Sydney 44
Bridges and Switches
Bridges (two ports) and switches
operate at the data link layer of
the OSI model.
The function of the bridge is to
make intelligent decisions about
whether or not to pass signals on
to the next segment of a network.
When a bridge/switch sees a
frame on the network, it looks at
the destination MAC address and
compares it to the forwarding
table to determine whether to
filter, flood, or copy the frame
onto another segment.
Lecture 2 Media
Practical 1 Networking Fundamentals