Upload
zubair-ali
View
216
Download
0
Embed Size (px)
Citation preview
8/7/2019 networkspide (2)
1/47
Computer Networks
Overview What is a network?
Types of network (LAN & WAN) Advantages & Disadvantages.
Hardware
Fileserver, Workstation, NIC, Router Software Operating Systems
Peer-to-Peer Client/Server
Cabling
UTP, Coaxial, Fiber Optic
Wireless
Protocols Ethernet
Token Ring
Topologies
8/7/2019 networkspide (2)
2/47
What is a Network?
A network consists of two or more
computers that are linked in order to
share resources (such as printers and CD-ROMs), exchange files, or allow
electronic communications. Thecomputers on a network may be linked
through cables, telephone lines, radio
waves, satellites, or infrared lightbeams.
8/7/2019 networkspide (2)
3/47
TYPES OF NETWORKSThe three basic types of networks include: LAN, MAN
andWAN.LOCAL AREA NETWORK (LAN)
A network is said to be Local Area Network (LAN) if it isconfined relatively to a small area. It is generally limited to a
building or a geographical area, expanding not more than amile apart to other computers.
LAN configuration consist of:
A file server - stores all of the software that controls the network,as well as the software that can be shared by the computers
attached to the network. A workstation - computers connected to the file server (Mac or
PCs).These are less powerful than the file server
Cables - used to connect the network interface cards in eachcomputer.
8/7/2019 networkspide (2)
4/47
METROPOLITAN AREA NETWORK (MAN)
Metropolitan Area Network (MAN) covers largergeographic areas, such as cities. Often used by locallibraries and government agencies often to connect tocitizens and private industries.
WIDE AREA NETWORK (WAN) Wide Area Networks (WANs) connect larger geographic
areas, such as London, the UK, or the world. In this type
of network dedicated transoceanic cabling or satelliteuplinks may be used.
8/7/2019 networkspide (2)
5/47
ADVANTAGES OF NETWORK
Speed. Sharing and transferring files within Networks are very rapid. Thussaving time, while maintaining the integrity of the file.
Cost. Individually licensed copies of many popular software programs canbe costly. Networkable versions are available at considerable savings.Shared programs, on a network allows for easier upgrading of the
program on one single file server, instead of upgrading individualworkstations.
Security. Sensitive files and programs on a network are passwordsprotected (established for specific directories to restrict access toauthorized users) or designated as "copy inhibit," so that you do not have
to worry about illegal copying of programs. Centralized Software Management. Software can be loaded on one
computer (the file server) eliminating that need to spend time and energyinstalling updates and tracking files on independent computersthroughout the building.
8/7/2019 networkspide (2)
6/47
ADVANTAGES OF NETWORK
Resource Sharing. Resources such as, printers, faxmachines and modems can be shared.
Electronic Mail. E-mail aids in personal andprofessional communication. Electronic mail on a
LAN can enable staff to communicate within thebuilding having tot to leave their desk.
Flexible Access. Access their files from computersthroughout the firm.
Workgroup Computing. Workgroup software (suchas Microsoft BackOffice) allows many users to workon a document or project concurrently
8/7/2019 networkspide (2)
7/47
DISADVANTAGES OF NETWORK
Server faults stop applications being available
Network faults can cause loss of data.
Network fault could lead to loss of resources
User work dependent upon network System open to hackers
Decisions tend to become centralized
Could become inefficient
Could degrade in performance
Resources could be located too far from users
Network management can become difficult
8/7/2019 networkspide (2)
8/47
DISADVANTAGES OF NETWORKS
Initial installation expense can be
costly
Fileserver may fail causing entirenetwork to go down
Proper administration requires
considerable time and expertise Cables may break
8/7/2019 networkspide (2)
9/47
HARDWARE
FileserverA file server stands at the heart of most
networks. It is a very fast computer with alarge amount of RAM and storage space,
along with a fast network interface card.The network operating system software
resides on this computer, along with any
software applications and data files thatneed to be shared.
8/7/2019 networkspide (2)
10/47
HARDWARE
WorkstationsAll of the computers connected to the fileserver on a network are called workstations. Atypical workstation is a computer that isconfigured with a network interface card,networking software, and the appropriate
cables. Workstations do not necessarily needfloppy disk drives or hard drives because filescan be saved on the file server. Almost anycomputer can serve as a network workstation.
8/7/2019 networkspide (2)
11/47
HARDWARE
Network Interface Cards
The network interface card (NIC) provides
the physical connection between thenetwork and the computer workstation.Most NICs are internal, with the card
fitting into an expansion slot inside thecomputer.
8/7/2019 networkspide (2)
12/47
HARDWARE
Concentrators/HubsA concentrator is a device that provides a centralconnection point for cables from workstations,
servers, and peripherals. Hubs are multi-slotconcentrators into which can be plugged anumber of multi-port cards to provide additionalaccess as the network grows in size. Most
concentrators are active, that is they electricallyamplify the signal as it moves from one device toanother.
8/7/2019 networkspide (2)
13/47
HARDWARE
RouterIf a LAN connects to the Internet a network
will need router. The router serves as thetranslator between the information on the
LAN and the Internet. It also determines
the best route to send the data over the
Internet.
8/7/2019 networkspide (2)
14/47
SOFTWARE
Network Operating Systems
Peer-to-PeerPeer-to-peer network operating systemsallow users to share resources and fileslocated on their computers and to accessshared resources found on othercomputers. However, they do not have afile server or a centralized managementsource. In a peer-to-peer network, all
computers are considered equal; they allhave the same abilities to use the resourcesavailable on the network. Peer-to-peernetworks are designed primarily for smallto medium local area networks
8/7/2019 networkspide (2)
15/47
SOFTWARE
Client/ServerClient/server network operating systems allow
the network to centralize functions andapplications in one or more dedicated fileservers. The file servers become the heart ofthe system, providing access to resources and
providing security. Individual workstations(clients) have access to the resources availableon the file servers.
8/7/2019 networkspide (2)
16/47
NETWORKS
CablingCable is the medium through which
information usually moves from onenetwork device to another.
8/7/2019 networkspide (2)
17/47
Unshielded Twisted Pair (UTP)
Cable
Twisted pair cabling comes in two varieties: shielded
and unshielded. Unshielded twisted pair (UTP) is the
most popular and is the type we use. The quality ofUTP may vary from telephone-grade wire toextremely high-speed cable. The cable has four pairs ofwires inside the jacket. Each pair is twisted with a
different number of twists per inch to help eliminateinterference from adjacent pairs and other electricaldevices.There are 5 categories recognized.
8/7/2019 networkspide (2)
18/47
UTP Connectors
The standard connector for UTP cabling is anRJ-45 connector. This is a plastic connectorthat looks like a large telephone-styleconnector. RJ stands for Registered Jack,implying that the connector follows a standardborrowed from the telephone industry. This
standard designates which wire goes witheach pin inside the connector.
8/7/2019 networkspide (2)
19/47
Coaxial Cable
Coaxial cabling has a single copper conductorat its center. A plastic layer provides insulationbetween the center conductor and a braidedmetal shield. The metal shield helps to blockany outside interference from fluorescentlights, motors, and other computers.
8/7/2019 networkspide (2)
20/47
Coaxial Cable Connectors
The most common type of connector usedwith coaxial cables is the BNC connector.Different types of adapters are available forBNC connectors, including a T-connector,barrel connector, and terminator. Connectorson the cable are the weakest points in any
network. To help avoid problems BNCconnectors should be crimped.
8/7/2019 networkspide (2)
21/47
Fiber Optic Cable
Fiber optic cabling consists of a center glass coresurrounded by several layers of protectivematerials. It transmits light rather than
electronic signals, eliminating the problem ofelectrical interference. Fiber optic cable has theability to transmit signals over much longerdistances than coaxial and twisted pair. It also
has the capability to carry information at vastlygreater speeds.
8/7/2019 networkspide (2)
22/47
Wireless LANs
Not all networks are connected with cabling; somenetworks are wireless. Wireless LANs use highfrequency radio signals or infrared light beams tocommunicate between the workstations and the file
server. Each workstation and file server on a wirelessnetwork has some sort of transceiver/ antenna tosend and receive the data. Information is relayedbetween transceivers as if they were physically
connected. For longer distance, wirelesscommunications can also take place through cellulartelephone technology or by satellite.
8/7/2019 networkspide (2)
23/47
Wireless networks are great for allowing laptopcomputers or remote computers to connect tothe LAN. Wireless networks are also beneficialin older buildings where it may be difficult or
impossible to install cables.
This includes all computers, peripherals,interface cards and other equipment needed to
perform data processing and communicationswithin the network.
Wireless LANs
8/7/2019 networkspide (2)
24/47
PROTOCOL
A protocol is a set of rules that governs the
communications between computers on a
network. These rules are guidelines that regulate
the access method, allowed physical topologies,types of cabling, and speed of data transfer.
The most common protocols are: Ethernet
LocalTalk
Token Ring
FDDI
ATM
8/7/2019 networkspide (2)
25/47
ETHERNETThis is the most widely used protocol. This protocol uses an
access method called CSMA/CD (Carrier Sense MultipleAccess/Collision Detection). In this system each computer listensto the cable for any transmitting node before sending anythingthrough the network. If the network is clear, the computer willtransmit. Else wait and try again when the line is clear.Sometimes, two computers attempt to transmit at the same
instant (causing a collision). Each computer then backs off andwaits a random amount of time before attempting to retransmit.The delay by collisions and retransmitting is very small and doesnot normally affect the speed of transmission on the network.
Topologies are bus star or tree and transmission is via twistedpair, coaxial, or fibre optic cable at a speed of 10 Mbps.
8/7/2019 networkspide (2)
26/47
Fast Ethernet
Support 100Mbps and are more expensivenetwork concentrators/hubs and networkinterface cards is requires for Fast Ethernet.Category 5 twisted pair or fibre optic cable is
necessary.
Gigabit Ethernet
The Ethernet has a standard protocol of 1Gbps
transmission speed but used primarily forbackbones on a network.
8/7/2019 networkspide (2)
27/47
LOCALTALK
Apple Computer developed LocalTalk forMacintosh computers. The method used byLocalTalk is called CSMA/CA (Carrier SenseMultiple Access with Collision Avoidance). It is
similar to CSMA/CD except that a computersignals its intent to transmit before it actuallydoes so. LocalTalk adapters and special twistedpair cable can be used to connect a series ofcomputers through the serial port.
LocalTalk protocol allows for linear bus, star, ortree topologies using twisted pair cable.
8/7/2019 networkspide (2)
28/47
TOKEN RING
This was developed by IBM in the mid 1980s. The
method used involves token-passing. Computers areconnected so that the signal travels around thenetwork from one computer to another in a logicalring. A single electronic token moves around the ring
from one computer to the next. If a computer doesnot have information to transmit, it simply passesthe token on to the next workstation. If a computerwishes to transmit and receives an empty token, it
attaches data to the token. The token then proceedsaround the ring until it comes to the computer forwhich the data is meant. At this point, the receivingcomputer captures the data.
8/7/2019 networkspide (2)
29/47
FIBRE DISTRIBUTED DATA INTERFACE
(FDDI)Access method of token-passing via a dual ring physicaltopology. Transmission on one of the rings; however, if a
break occurs, the system keeps information moving by
automatically using portions of the second ring to create anew complete ring. Transmission speed is100 Mbps over afiber optic cable, but expensive.
8/7/2019 networkspide (2)
30/47
ASYNCHRONOUS TRANSFER MODE (ATM)
Transmits data in small packets of a fixed sizeat a speed of 155 Mbps and higher. ATM
supports a variety of media such as video, CD-quality audio, and imaging. ATM employs a
star topology with fibre optic or twisted pair
cabling.
8/7/2019 networkspide (2)
31/47
NETWORKSTOPOLOGIES
Physical Topologies
The configuration of cables, computers,
and other peripherals.
8/7/2019 networkspide (2)
32/47
NETWORK TOPOLOGY
The term topologyrefers to the way in which the nodes of anetwork are connected.
The topology of a network will effect its performance (itterms of speed) and its cost (both short and long term).
Cost/resource considerations and the environment in which
the network is to be used often determines the choice oftopology.
8/7/2019 networkspide (2)
33/47
A network topology is the way in which a network is connectedup.
The simplest network topology you can have is a single link (i.e.cable, optical fibre, radio or any other means of transmittingdata) between two computers.
It may not be a very big network, but technically it is still anetwork. The computers can exchange data and they areautonomous.
8/7/2019 networkspide (2)
34/47
COMMON TOPOLOGIES
Some common topologies include:
MESH STAR
BUS
TREE
RING
BACKBONE
8/7/2019 networkspide (2)
35/47
8/7/2019 networkspide (2)
36/47
STAR TOPOLOGY
If all the hosts are connected to a central hub (which can be a
switching device or a central server also acting as a router)then we have a star topology.
Hosts communicate by sending theirmessages to the hub. It thenforwards the messages to the
destination host. Star topologies are popular with
financial institutions who keep theirlatest records on a central server.Any changes to the records are
updated centrally.
Its easy to control and monitor access to a central server.
Cabling costs can still be high if network is spread out.
The central hub may be a bottleneck in busy networks.
8/7/2019 networkspide (2)
37/47
STAR NETWORKS
The hub switches messages through to theappropriate destination.
The hub may also provide a translation service fordevices with different protocols.
Star Networks are vulnerable, however. If the hub
fails then the network fails.
Star Networks may require a lot of cabling and canbe expensive to install.
8/7/2019 networkspide (2)
38/47
BUS NETWORKS
A bus network consists of a single medium (typically 5 pairtwisted-wire cable) to which all the host computers areconnected.
Packets are broadcasted on the medium to all nodes on thenetwork.
Network
Interface Units
Host
Computers
Terminator
Bi-directional
medium
8/7/2019 networkspide (2)
39/47
BUS TOPOLOGY
We can make a cheap network by connecting not just two but anumber of hosts to a single link. Such a network is said to havea bus topology. It is also called a multi-drop link.
Although physically simple, bus topologies need a complicatedprotocol in order to ensure that hosts get fair use of the linkand do not attempt to use the link at the same time. This canslow things down in a busy network.
8/7/2019 networkspide (2)
40/47
TREE NETWORKS
A tree network (as used in LANs) is a variant of the Bustopology.
Nodes are connected in a tree structure and messages arebroadcast across whole tree.
Communications Link
Root Node
ost Com uters
8/7/2019 networkspide (2)
41/47
TREE Networks
Tree topologies have the advantage that they areeasy to expand.
Furthermore, if a fault occurs, the effected branch
can be easily isolated so that the rest of the networkis not effected.
The disadvantage is that signals can be reflected
from the ends of branches and cause interference.For this reason, Tree Networks are usually run atlower speeds.
8/7/2019 networkspide (2)
42/47
TREE TOPOLOGY
A tree topology has a root and branches that gives it a
distinctive tree shape.
Messages pass up the tree until
they reach a branching point incommon with the destination
host. They are then passeddown the tree to thedestination.
Tree topology is easily extended.
There is a simple algorithm for routing messages.
A large number messages pass through the root, which maybecome a communications bottleneck.
8/7/2019 networkspide (2)
43/47
RING TOPOLOGY
A Ring network consists of nodes connected to each other toform a closed loop.
Nodes accept data from neighbouring nodes in the form ofpackets.
Data FlowHost
Computers
ACTIVE CABLE
8/7/2019 networkspide (2)
44/47
RING TOPOLOGY OPERATION
The NIUs (or, in some cases, the hosts themselves) act asrepeaters for the packets being forwarded.
This means that the Ring can be expanded to any size
(although more hops will be required to get the packets to theirdestinations).
One big advantage of Ring Topologies is that contention isavoided since each repeater knows if it has to forward an
existing packet or is free to accept a new one.
8/7/2019 networkspide (2)
45/47
RING TOPOLOGY
In a Ring Topology hosts are connected to their neighbours to
form a loop. Messages are passed from
one host to the next untilthey reach the destination
host.
Typically messages pass
the whole way around thering and are checked and
removed by the hosts thatsent them.
Less cabling is required because neighbouring hosts are notusually far apart.
A break in one of the links will stop the network from working(but failures can be quickly detected and fixed).
8/7/2019 networkspide (2)
46/47
BACKBONE NETWORK
A backbone network connects many smaller networks viadevices called bridges.
This type of network is easy to expand and isolates local traffic.
8/7/2019 networkspide (2)
47/47
BACKBONE NETWORK
Rather than connecting hosts directly, a network can be used
to connect other networks. Such a network is called abackbone network.
Most messages are sent betweennearby hosts which are usually
connected to the same local
networks. A message for a host on another
network is sent (via bridges) over the
backbone to the destination network.
Backbone networks are often used by institutions to connectlegacy networks.
Small networks of networks, such as those formed with abackbone network, are often called intranets.