0% found this document useful (0 votes)
27 views9 pages

1 Introduction

Uploaded by

snprmjr
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
27 views9 pages

1 Introduction

Uploaded by

snprmjr
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 9

NETWORKING

Unit Code M/618/7393


INTRODUCTION
• Computer networking has connected the world by groups of small networks through internet
links to support global communications. It supports access to digital information anytime,
anywhere using many applications like email, audio and video transmission, including the
World Wide Web, and this has opened the floodgates to the availability of information.

• Computer networks are the driving force behind the evolution of computer systems and
allow users to access data, hardware and services regardless of their location

• Being knowledgeable about the underlying principles of networking is of vital importance to


all IT professionals.
AIM
• The aim of this unit is to provide students with wider background knowledge of computer
networking essentials, how they operate, protocols, standards, security considerations and the
prototypes associated with a range of networking technologies. Students will explore a range of
hardware, with related software, and will configure and install these to gain knowledge of networking
systems.

• A range of networking technologies will be explored to deliver a fundamental knowledge of Local


Area Networking (LAN), Wide Area Networking (WAN) and their evolution to form largescale
networks and the protocol methodologies related to IP data networks will be explored.

• Students will gain knowledge and skills to successfully install, operate and troubleshoot a small
network; and the operation of IP data networks, router, switching technologies, IP routing
technologies, IP services and basic troubleshooting.
CONTENTS
LO1 Examine networking principles and their protocols
• Role of networks:
Purpose, benefits, resource implications, communications, working practice, commercial opportunity,
information sharing, collaboration.
• System types:
Peer-based, client-server, cloud, cluster, centralised, virtualized.
• Networking standards:
Conceptual models e.g. OSI model, TCP/IP model; standards: e.g. IEEE 802.x.
• Topology:
Logical e.g. Ethernet, Token Ring; physical e.g. star, ring, bus, mesh, tree, ring.
• Protocols:
Purpose of protocols; routed protocols e.g. IPv4, IPv6, IPv6 addressing, Global unicast, Multicast,
Link local, Unique local, EUI 64, Auto configuration, FTP, HTTP, SMTP, POP3, SSL; management
of protocols for addressing.
LO2 Explain networking devices and operations

• Networking devices:
Servers; hub, routers; switches; multilayer switch, firewall, HIDS, repeaters; bridges; wireless
devices; access point (wireless/wired), content filter, Load balancer, Modem, Packet shaper, VPN
concentrator.
• Networking software:
Client software, server software, client operating system, server operating system, Firewall.
• Server type:
Web, file, database, combination, virtualisation, terminal services server.
• Server selection:
Cost, purpose, operating system requirement.
• Workstation:
Hardware e.g. network card, cabling; permissions; system bus; local-system architecture e.g.
memory, processor, I/O devices.
LO3 Design efficient networked systems
• Bandwidth:
Expected average load; anticipated peak load; local internet availability; cost constraints, throughput.
• Users:
Quality expectations, concept of system growth.
• Networking services and applications:
DHCP; static vs dynamic IP addressing, reservations, scopes, leases, options (DNS servers, Suffixes),
IP helper, DHCP relay, DNS records, Dynamic DNS.
• Communications:
Suited to devices, suited to users, supportive of lifestyle desires, supportive of commercial
requirements, security requirements, quality of service needs.
• Scalable:
Able to support device growth, able to support addition of communication devices, able to cope with
bandwidth use and trend changes, protocol utilization, addressing.
• Selection of components:
Supporting infrastructure needs; supporting connectivity requirements.
LO4 Implement and diagnose networked systems
• Devices:
Installation of communication devices, allocation of addresses, local client configuration,
server configuration, server installation, security considerations.
• Verification of configuration and connectivity:
Installation of internet work communication medium, ping, extended ping, traceroute,
telnet, SSH.
• System monitoring:
Utilization, bandwidth needs, monitoring user productivity and security of the system.
• Maintenance schedule:
Backups, upgrades, security, auditing.
• Diagnose and resolve layer 1 problems:
Framing, CRC, Runts, Giants, Dropped packets, late collisions, Input/Output errors.
• Policy review:
Bandwidth, resource availability.
RECOMMENDED RESOURCES
Textbooks
• BURGESS, M. (2003) Principles of Network and System Administration. 2nd Ed.
• John Wiley and Sons Ltd.
• HALLBERG, B. (2005) Networking: A Beginner’s Guide. 4th Ed.
• Osborne/McGraw-Hill US.
• LIMONCELLI, T. and HOGAN, C. (2001) The Practice of System and Network
• Administration. Addison-Wesley.
• LOWE, D. (2005) Networking All-in-One Desk Reference for Dummies. 2nd Ed.
• Hungry Minds Inc.
• OLIFER, N. and OLIFER, V. (2005) Computer Networks: Principles, Technologies and
• Protocols for Network Design. John Wiley and Sons Ltd.
• STALLINGS, W. (2003) Data and Computer Communications. 7th Ed.(Prentice Hall)
• SUBRAMANIAN, M. (2000) Network Management: An Introduction to Principles and
• Practice. Addison-Wesley.
• TANENBAUM, A. (2002) Computer Networks. Prentice Hall PTR.
Journals
• The Institute of Engineering and Technology
THANK YOU

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy