• Toll Free: 1 (877) 645-8352
  • info@macropuseducation.com
Generic selectors
Exact matches only
Search in title
Search in content
Search in posts
Search in pages
Filter by Categories
Blog

Networking

Networking

A computer network or data network is a digital telecommunications network which allows nodes to share resources. In computer networks, networked computing devices exchange data with each other using a data link. The connections between nodes are established using either cable media or wireless media.

    The chronology of significant computer-network developments includes:

  • In the late 1950s, early networks of computers included the military radar system Semi-Automatic Ground Environment (SAGE).
  • In 1959, Anatolii Ivanovich Kitov proposed to the Central Committee of the Communist Party of the Soviet Union a detailed plan for the re-organisation of the control of the Soviet armed forces and of the Soviet economy on the basis of a network of computing centres.
  • In 1960, the commercial airline reservation system semi-automatic business research environment (SABRE) went online with two connected mainframes.
  • In 1962, J.C.R. Licklider developed a working group he called the ``Intergalactic Computer Network``, a precursor to the ARPANET, at the Advanced Research Projects Agency(ARPA).
  • In 1964, researchers at Dartmouth College developed the Dartmouth Time Sharing System for distributed users of large computer systems. The same year, at Massachusetts Institute of Technology, a research group supported by General Electric and Bell Labs used a computer to route and manage telephone connections.
  • Throughout the 1960s, Leonard Kleinrock, Paul Baran, and Donald Davies independently developed network systems that used packets to transfer information between computers over a network.
  • In 1965, Thomas Marill and Lawrence G. Roberts created the first wide area network (WAN). This was an immediate precursor to the ARPANET, of which Roberts became program manager.
  • Also in 1965, Western Electric introduced the first widely used telephone switch that implemented true computer control.
  • In 1969, the University of California at Los Angeles, the Stanford Research Institute, the University of California at Santa Barbara, and the University of Utah became connected as the beginning of the ARPANET network using 50 kbit/s circuits.
  • In 1972, commercial services using X.25 were deployed, and later used as an underlying infrastructure for expanding TCP/IP networks.
  • In 1973, Robert Metcalfe wrote a formal memo at Xerox PARC describing Ethernet, a networking system that was based on the Aloha network, developed in the 1960s by Norman Abramson and colleagues at the University of Hawaii. In July 1976, Robert Metcalfe and David Boggs published their paper ``Ethernet: Distributed Packet Switching for Local Computer Networks and collaborated on several patents received in 1977 and 1978. In 1979, Robert Metcalfe pursued making Ethernet an open standard.
  • In 1976, John Murphy of Datapoint Corporation created ARCNET, a token-passing network first used to share storage devices.
  • In 1995, the transmission speed capacity for Ethernet increased from 10 Mbit/s to 100 Mbit/s. By 1998, Ethernet supported transmission speeds of a Gigabit. Subsequently, higher speeds of up to 100 Gbit/s were added (as of 2016). The ability of Ethernet to scale easily (such as quickly adapting to support new fiber optic cable speeds) is a contributing factor to its continued use.
  • Network packet

    Computer communication links that do not support packets, such as traditional point-to-point telecommunication links, simply transmit data as a bit stream. However, most information in computer networks is carried in packets. A network packet is a formatted unit of data (a list of bits or bytes, usually a few tens of bytes to a few kilobytes long) carried by a packet-switched network.
    In packet networks, the data is formatted into packets that are sent through the network to their destination. Once the packets arrive they are reassembled into their original message. With packets, the bandwidth of the transmission medium can be better shared among users than if the network were circuit switched. When one user is not sending packets, the link can be filled with packets from other users, and so the cost can be shared, with relatively little interference, provided the link isn't overused.
    Packets consist of two kinds of data: control information, and user data (payload). The control information provides data the network needs to deliver the user data, for example: source and destination network addresses, error detection codes, and sequencing information. Typically, control information is found in packet headers and trailers, with payload datain between.
    Often the route a packet needs to take through a network is not immediately available. In that case the packet is queued and waits until a link is free.

    Network topology

    The physical layout of a network is usually less important than the topology that connects network nodes. Most diagrams that describe a physical network are therefore topological, rather than geographic. The symbols on these diagrams usually denote network links and network nodes.

    Network links

    The transmission media (often referred to in the literature as the physical media) used to link devices to form a computer network include electrical cable (Ethernet, HomePNA, power line communication, G.hn), optical fiber (fiber-optic communication), and radio waves (wireless networking). In the OSI model, these are defined at layers 1 and 2 the physical layer and the data link layer.

    Bridges

    A network bridge connects and filters traffic between two network segments at the data link layer (layer 2) of the OSI model to form a single network. This breaks the network's collision domain but maintains a unified broadcast domain. Network segmentation breaks down a large, congested network into an aggregation of smaller, more efficient networks.
    Bridges come in three basic types:
    • Local bridges: Directly connect LANs
    • Remote bridges: Can be used to create a wide area network (WAN) link between LANs. Remote bridges, where the connecting link is slower than the end networks, largely have been replaced with routers.
    • Wireless bridges: Can be used to join LANs or connect remote devices to LANs.

    Switches

    A network switch is a device that forwards and filters OSI layer 2 datagrams (frames) between ports based on the destination MAC address in each frame. A switch is distinct from a hub in that it only forwards the frames to the physical ports involved in the communication rather than all ports connected. It can be thought of as a multi-port bridge It learns to associate physical ports to MAC addresses by examining the source addresses of received frames. If an unknown destination is targeted, the switch broadcasts to all ports but the source. Switches normally have numerous ports, facilitating a star topology for devices, and cascading additional switches.
    Multi-layer switches are capable of routing based on layer 3 addressing or additional logical levels. The term switch is often used loosely to include devices such as routers and bridges, as well as devices that may distribute traffic based on load or based on application content (e.g., a Web URL identifier).

    Routers

    A router is an internetworking device that forwards packets between networks by processing the routing information included in the packet or datagram (Internet protocol information from layer 3). The routing information is often processed in conjunction with the routing table (or forwarding table). A router uses its routing table to determine where to forward packets. A destination in a routing table can include a ``null`` interface, also known as the ``black hole`` interface because data can go into it, however, no further processing is done for said data, i.e. the packets are dropped.

    Modems

    Modems (MOdulator-DEModulator) are used to connect network nodes via wire not originally designed for digital network traffic, or for wireless. To do this one or more carrier signals are modulated by the digital signal to produce an analog signal that can be tailored to give the required properties for transmission. Modems are commonly used for telephone lines, using a Digital Subscriber Line technology.

    Firewalls

    A firewall is a network device for controlling network security and access rules. Firewalls are typically configured to reject access requests from unrecognized sources while allowing actions from recognized ones. The vital role firewalls play in network security grows in parallel with the constant increase in cyber attacks.

Our distinct services include :

  • Material and Documents: We provide real time working documents and materials to our students.
  • Free System Access : We have the latest and most up to date platforms deployed on high-end servers that are available remotely and in-class on a 24/7 basis.
  • Interview Preparation: We will prepare you for interviews in your specialized area by providing some real time interview questions. We also conduct mock interviews and assist you in preparing a professional resume.
  • Placement Assistance: Our placement service division provides job placement support by submitting your resumes to prospective clients and emails you any new job opportunities in the market. However, we do not provide false guarantees on securing any jobs for you. We have a history of several ex-students who have secured excellent jobs based on our WORLD class training approach, implementation of case study projects and post training support.
  • Initial Job Stabilization Support: We support our students to get stabilized in their job in the first TWO months. If our students come across any issues, we are there to help them. Students can send an email to us with their issues, our experts will reply back with possible solutions within 24 hours.
  • Free Class Room sessions recording: In addition to the e-class training, we will give you authorization to record all of your e-class room training sessions, so that you can go back and review.

Course registration

Instructor Led Hands-on eClassroom Training.

Send Enquiry

FREE Demo Registration

FREE Demo Registration

FREE Demo Registration

X