Skip to main content

MORE ABOUT NETWORKING

Objectives of Computer Networking

Complex communication deals with the transfer of information between various computer terminals through communication links. From 1970s, the merger of the field of computer science and data communication has led to a fast-field of system opportunities. The technologies dominating the past decade revolve around information gathering processing, Storage and discretion.

Nowadays, the (data communication) communication is mostly digital due to high operating speed, reliability, miniaturization, precise data handling.

The interconnect computers do the job-instead of a single computer serving all the companies needs. This system is called “Computer networks”. Computer network means interconnected collection of autonomous computers. Inter commented computers able to exchange information. The connection can be via copper wire, fiber optics, microwaves and communication satellite.

Network Structure

Network reduces the cost, input hardware and cable installations. It consists of number of stations, set of nodes (IMP) and communications channels.


Network Stations: May be terminal, computers, telephones or other communication devices. They are also called HOST\END SYSTEMS. The hosts are connected to communication subnet or subnet. They carry messages from host and consist of switching elements and transmission lines. Transmission lines are also called CIRCUITS, CHANNELS, TRUNKS, move bits between the machines.

The switching elements are specialized computers used to connect two or more transmission lines. The purpose of the switching element is to choose outgoing line and forward the data arriving on an incoming line. All traffic to/from the host has to go via its IMP. They are also known as PACKET SWITCHING NODES, INTERMEDIATE SYSTEM OR DATA SWITCHING EXCHANGES.

Subnet is the collection of the communication lines and routers but not the host. The set of nods to which stations attached is the boundary of the communication network. The collection of routers and communication lines moves packets from source host to the destination host.

Network structure can be thought with

- Data terminal equipment (DTE).
- Data circuit terminating Equipment (DCE) concept.

Most digital data processing device have limited data transmission capacity and limited distance of data transmission. DTE is the end user machine, generally refers to (Devices) terminals and computers.

Example: Email terminal, workstation, ATM in a bank, sales terminal in a departmental store. They are not commonly connected directly to transmission medium.

DCE is used to connect the communication channel.

Example: modem. It interacts with DTE and provides an interface of DTE to communication network transmits and receive bits one at a time over the communication channel.

To specify the exact nature of interface between DTE and DCE various standards and protocols have been developed. DCEs and DTEs are connected in two ways. A high degree of cooperation is essential in DTE-DCE combination, as data and control information is to be exchanged. They can be connected in two ways

- Point to point configuration: Here only two DTE devices are in the channel


- Multidrop configuration: Here more than two devices are connected to the same communication channel.

This will provide the basic technology concepts required for understanding networking. The following are the lessons how we categorized Computer Network.

Popular posts from this blog

UPGRADING EOS in the ARISTA Switches

UPGRADING EOS in the ARISTA Switches: EOS is the Firmware for Arista Switches whereas IOS for Cisco. This blog post shows the detailed procedures to follow and to upgrade the EOS in the Arista Switches. This Post was supports for any platform or the Version you are going to upgrade in the Arista Switches. This Post was divided into three parts : Pre-Upgrade Process Upgrade Process Post-Upgrade Process PRE-UPGRADING-PROCESS: 1       1)        Check the Upgrade Path tool by clicking the below link. https://www.arista.com/en/support/mlag-portal/mlaglist and confirm it is in mlag issu compatible 2)       Check if the  STP agent is restartable by giving the command switch-1# show spanning-tree bridge detail | grep agent Stp agent restartable                      :      ...

FORTIGATE ACTIVE PASSIVE UPGRADE

FORTIGATE ACTIVE PASSIVE UPGRADE : This blog post shows the detailed procedures to follow and to upgrade the firmware in the Fortigate Firewall. This Post was supports for any platform or the Version you are going to upgrade in the Fortigate Firewall This Post was divided into three parts : Pre-Upgrade Process Upgrade Process Post-Upgrade Process PRE UPGRADE STEPS: 1   1)     Go to the below website and check the Upgrade Path https://docs.fortinet.com/upgrade-tool 2)        Next Login to the Fortigate Console and check the HA Status ( it is to be In sync and higher Priority enabled for the required primary device) 3)        Login to the Console and give the command Config global – get sys ha status Also check session pickup is in enable to avoid session interruptions in failover. 4)        Download all the Firmware’s and the md5 files in the list and ch...
Using Internet Service in policy  : Fortigate This recipe shows how to apply a predefined Internet Service entry into a policy. The Internet Service Database is a comprehensive public IP address database that combines IP address range, IP owner, service port number, and IP security credibility. The data comes from the FortiGuard service system. Information is regularly added to this database, for example, geographic location, IP reputation, popularity & DNS, and so on. All this information helps users define Internet security more effectively. You can use the contents of the database as criteria for inclusion or exclusion in a policy. From FortiOS version 5.6, Internet Service is included in the firewall policy. It can be applied to a policy only as a destination object. From version 6.0, Internet Service can be applied both as source and destination objects in a policy. You can also apply Internet Services to shaping policy. There are three types of Internet Services...