Click here to load reader

Chapter 5 Networks Communicating and Sharing Resources

  • Upload
    adonia

  • View
    41

  • Download
    0

Embed Size (px)

DESCRIPTION

Chapter 5 Networks Communicating and Sharing Resources. Chapter objectives:. Understand basic networking. Discuss the advantages and disadvantages of networks. Distinguish between Peer-to-Peer & client/server LAN. Define topology and understand how 3 LAN topologies differ. - PowerPoint PPT Presentation

Citation preview

Chapter 6: Networks

Chapter 5 Networks Communicating and Sharing Resources

Chapter objectives:Understand basic networking.Discuss the advantages and disadvantages of networks.Distinguish between Peer-to-Peer & client/server LAN.Define topology and understand how 3 LAN topologies differ. Explain the importance of protocols.Most widely used protocol & its versions.Identify the special components of wide area network (WAN) that differentiate from LAN.2Network Definition9A-3Set of technologies that connects computers to allow communication and collaboration between users.A group of two or more computer systems linked together to exchange data.Any device connect to the network referred to as a node.Any device has a unique logical address (name).Any device also has a unique physical address (MAC). A node need NIC to connect to network.

The Uses of a Network9A-4Simultaneous access to dataData files are sharedShared files stored on a serverSoftware can be sharedShared peripheral devicePrinters and faxes are common sharesReduces the cost per userDevices can be connected to the network

4Teaching TipFigure 9A.2 on page 342 visually describes the sharing process. It can be helpful to have students open a shared file that you control. Make a change then have the students open it again. Alternatively, share a document and allow your students to write in it. Then demonstrate how the shared document changes.

Spend time discussing why application servers need to be so powerful. The Uses of a Network9A-5Personal communicationEmailConferencingVoice over IPPhone communication over network wiresEasier data backupBackup copies data to removable mediaServer data backed up in one step

5Teaching tipIt is fun if you can setup a teleconference in your classroom. Students get to learn how to join or create the conference. Additionally, they learn how to participate. Finally, students have fun, especially with shared whiteboards. Sharing Data9A-6

File server contains documents used by other computers.Advantages and Disadvantages of Networking:Advantages:Reduce hardware costs.Sharing application.Sharing information resources.Centralized data management.Connecting people.Disadvantages:Loss of autonomy.Lack of privacy.Security Threats.Loss of productivity.

Common Network Types9A-8Local Area Network (LAN) LAN interconnects devices in a limited area such as a home, school, or office building using network media.Contains printers, servers and computers.Systems are close to each other.Organizations often have several LANS.LANs Types Wired LAN Wireless LAN VLAN LAN Protocol: Standard or Rules specify how two dissimilar network components can establish a communication.

8Teaching tipUse a real world example to describe an organization with interconnected LANs. Wired LANNetwork CablesUnshielded Twisted Pair (UTP) Cable Shielded Twisted Pair (STP) Cable Coaxial Cable Fiber Optic CableEthernet: the most popular cabling technology in LAN.Ethernet uses a protocol called CSMA/CD

Twisted Pair cable Coaxial cableFiber Optic cableRj-45 connector

Network Interface Card9A-10Connects node to the mediaUnique Machine Access Code (MAC)

10Insider InformationThe Xerox Corporation controls the assignment of Ethernet addresses to NIC manufacturers. Standard Max Speed Typical Range 802.11a 54 Mbps 150 feet 802.11b 11 Mbps 300 feet 802.11g 54 Mbps 300 feet 802.11n 100 Mbps 300+ feetWireless LANsWifi standards and speeds Wi-Fi: wireless LAN standard that offers Ethernet speeds through the use of radio waves instead of wires. Network layers

Types Of (LAN)StructurePeer-to-Peer Network(P2P):Tend to slow down as the number of users increase.Keeping track of all the shared folders & files can be confusing.Security not strong because the lack of hierarchy. Nodes access resources on other nodesEach node controls its own resources

Peer-to-Peer Network(P2P): All of the computers on the network are equals or peers and there is no file server but there is a file sharing in which each computer users decides which, if any, files will be accessible to other users on the network. Users also may choose to share entire directories or even disks, they can also choose to share peripherals such as printers. P2P networks are often used for home work or small business they dont require a NOS (Network Operating System) and can be set with any operating system. P2P LAN are best used for simple networks connecting no more than 10 computers.

14Client/Server network9A-15Nodes and servers share data rolesNodes are called clientsServers are used to control accessDatabase softwareAccess to data controlled by serverServer is the most important computer

Virtual Private Network (VPN)Operates a private network over the internet

Client / Server Network: Includes one or more servers as well as clients . A client can be any type of computer ---- PC, Mac, desktop, notebook or handheld device that is connected to a network and contains the software that enables it to send requests to server. It can work with any size or physical layout of LAN and doesnt tend to slow down with heavy use.

Virtual Private Network (VPN): used by many business companies to provide their employees and customers with quick, secure access to the corporate information. A VPN operates a a private network over the internet making the data accessible to authorized users in remote locations through the use of secure, encrypted connection & software.

15LAN TopologiesNetwork Topology: the physical layout of the LAN.

Bus Topology.Star Topology.Ring Topology.

* Topology isnt just arrangement of computers but provides solutions to the problem of contention which occurs when 2 computers try to access the LAN at the same time. *contention sometimes result into collisions which is the corruption of network data caused when 2 computers transmit simultaneously.

161- Bus Topology

1- Bus TopologyOne wire or cable connects all nodes.Terminator special connectors ends the circuit. AdvantagesSimple, reliable and easy to expandEasy to setupSmall amount of wireDisadvantages:Only one node can transmit at a time.Slow & Easy to crashUsed at home or small office.

If more than one node transmit at the same time each node waits a small random amount of time before it attempts to retransmit again.Length restriction because of the lose of signal strength.Practical limit to the number of nodes attached to avoid contention. To resolve contention problems bus network uses some type of contention management a technique that specifies what happens when a collision occurs. 182- Star Topology

2- Star TopologySolves the expansion problems of the bus topology. All nodes connect to a hubPackets sent to hubHub sends packet to destinationAdvantagesEasy to setup and add users.One cable can not crash networkDisadvantagesLoss of hub crash down the entire networkUses lots of cableMost common topology used at office buildings, computer labs and WAN.

* Hub: central wiring and simple broadcast device that does not manage traffic and usually results in frequent collision 203- Ring Topology

213- Ring TopologyNodes connected in a circle.Not in common used today. Special unit of data called Token travels around the ring and is used to transmit dataNodes can transmit only when it posses the token.AdvantagesTime to send data is knownNo data collisionsDisadvantagesSlowLots of cableWell suited for use within a division of a company or on one floor of a multi floor building.

9A-23Two or more LANs connectedOver a large geographic areaTypically use public or leased linesPhone linesSatelliteThe Internet is a WANWide Area Networks (WAN)23Teaching tip Blockbuster Video uses a WAN to connect its stores nationwide. Customers from Pittsburgh may rent videos in Hilton Head. Late fees will even be displayed! WAN PROTOCOLSTCP/IP are open protocols that define how the Internet works.IP defines the internet addressing scheme.TCP defines how one computer can contact another to exchange control and confirmation messages.Circuit switching A protocol (method) used in a telephone systems with direct connection between the communicating devices.Packet switching A method used when no effort is made to create a single direct connection between the communicating devices.

The internet protocols collectively called TCP/IPTCP/IP is an abbreviation for transmission control protocol(TCP)/internet protocol(IP)IP is the most fundamental of all internet protocol because it defines the internet addressing scheme which enables any internet-connected computer to be uniquely identified.IP address has for part which are separated by periods (such as 128.254.108.7)Circuit and packet switching WAN protocols are based on either circuit-or packet switching network technology, but most use packet switchingpacket switching is more efficient and less expensive than circuit switchingWith Circuit switching the method used in the public switched telephone system there is a direct connection between the communicating devicesWith packet switching the method used for computer communication no effect is made to create signal direct connection between the two communicating devices

24Network Hardware9A-25Switches

Hubs

Replacement for hubsOnly intended node receives transmissionFast and secure

Center of a star networkAll nodes receive transmitted packetsSlow and insecure

Network Hardware9A-26GatewayRouterBridge

Connects two dissimilar networksConnects coax to twisted pairMost gateways contained in other devices

Connects two or more LANs Packets sent to remote LAN crossNetwork is segmented by IP addressConnect internal networks to the InternetNeed configured before installation

Connects two or more LANs togetherPackets sent to remote LAN cross ,other packets do not crossSegments the network on MAC addresses