Chapter 1.ppt
-
Upload
manoj-kumar-shukla -
Category
Documents
-
view
224 -
download
0
Transcript of Chapter 1.ppt
Confidential
Chapter 1
Introducing Computer Network
Confidential
What is a Network?
A network is a connection between terminals, computers, servers,
and components which allows for the easy flow of data and use of
resources between one another.
Different networks that we come across in our day to day life are
telephone network, cable T.V network, transport network of a city
etc.
Confidential
Introducing Computer Networking
Stand-alone environment Elementary Form of Computer Networking
`
Confidential
Introducing Computer Networking
The sneaker net
A simple computer network
Confidential
What is a Computer Network?
Computer networking means sharing of data and resources
between two or more computers with a communication between
them through a medium. The communication medium can be
through radio waves, wires (Ethernet cable), leased lines, router,
infrared, optical fibers etc.
Confidential
Networking Application Areas
Sharing information (or data).
Sharing resources (hardware and software).
Centralizing administration and support
Confidential
Sharing Information
The ability to share information quickly and inexpensively has proven
to be one of the most popular uses of networking technology.
The computer can help you centralize the information and maintain
control over it
By making information available for sharing, networks can reduce the
need for paper communication, increase efficiency, and make nearly
any type of data available simultaneously to every user who needs it.
Managers can use these utilities to communicate quickly and
effectively with large numbers of people and to organize and
schedule meetings with people drawn from an entire company or
business enterprise far more easily than was previously possible.
Confidential
Sharing Hardware Resources
Confidential
Sharing Software Resources
Networks can be used to share and standardize applications, such
as word processors, spreadsheets, inventory databases, and so on,
to ensure that everyone on the network is using the same
applications and the same versions of those applications. This
allows documents to be shared easily and creates training
efficiencies: it is easier for people to master one word processing
application thoroughly than to try to learn four or five different word
processing applications.
Confidential
Centralizing Administration and Support
Electronic-mail (e-mail): Preserving Information Protecting Information A network provides a more Administrator can centrally install and configure
the software and also restrict access to the software. It is easier than doing it on every one of the computers in an organization.
Confidential
Understanding Networking Architecture
Explaining Client, Server and Peers
Explaining Server (domain) / Client Networks
Explaining Peer Networks
Explaining Hybrid Networks
Confidential
Identifying Components of Network
Client computers
Server computers:
Network interface cards (NICs):
Cable:
Switches:
Wireless networks:
Network software:
Confidential
Identifying Types of Network
LAN (Local area network)
PAN (Personal area network)
MAN (Metropolitan area network)
WAN (Wide area network)
Confidential
What is a Topology?
In Computer Networking “topology” refers to the layout or design of
the connected devices. Network Topologies can be physical or
logical.
Physical Topology means the physical design of a network
including the devices, location and cable installation.
Logical Topology refers to the fact that how data actually transfers
in a network as opposed to its design.
Confidential
Identifying Main Types of Physical Topologies
Bus
Ring
Star
Mesh
Hybrids
Confidential
Explaining Bus Topology
Confidential
Explaining Bus Topology continue
All workstations connect to the same cable segment
Commonly used for implementing Ethernet at 10mbps
The cable is terminated at each end
Wiring is normally done point to point
A faulty cable or workstation will take the entire LAN down
Two wire, generally implemented using coaxial cable during the
1980's
Confidential
Explaining Bus Topology continue
There are THREE common wiring implementations for bus networks
10Base2 (thin-net, Cheaper Net) 50-ohm cable using BNC T connectors, cards provide transceiver
10Base5 (Thick Net) 50-ohm cable using 15-pin AUI D-type connectors and external transceivers
10BaseT (UTP) UTP cable using RJ45 connectors and a wiring centre
Confidential
Explaining Bus Topology continue
Computers can connect to coaxial cables on a bus by tapping directly through the core of the cable. The vampire taps pierce the thick net cable but not the BNC.
Confidential
Explaining Bus Topology continue
BNC-style T-connectors make attaching computers to a bus a
simpler operation. This is shown in the following figure.
Confidential
Ethernet 802.3: Carrier Sense Multiple Access with Collision Detection (CSMA/CD)
Multiple access refers to the fact that in bus systems, each station has access to the common cable.
Carrier sense refers to the fact that each station listens to see if no other station is transmitting before sending data.
Collision detection refers to the principle of listening to see if other stations are transmitting whilst we are transmitting.
Confidential
Physical Bus Cable Limits
10Base2 Thin Ethernet Network Layout Limitations Maximum number of trunk segments = 5 Maximum trunk segment length = 607 feet (185 meters) Maximum network trunk cable = 3035 feet (925 meters) Maximum number of stations on a trunk segment = 30 Minimum distance between t connectors = 1.5 feet (0.5 meters) Rules Each end of the trunk segment is terminated in 50-ohms One of the terminators is grounded Connector splices are kept to a minimum Cabling BNC-T type connectors RG58-AU 50-ohm cable, 0.2"
Confidential
Physical Bus Cable Limits continue
A 10Base2 Thin Ethernet Network Layout
Confidential
10Base5 Thick Ethernet Network Layout
Limitations Maximum number of trunk segments = 5 Maximum trunk segment length = 1640 feet (500 meters) Maximum network trunk cable = 8200 feet (2500 meters) Maximum number of stations on a trunk segment = 100 Minimum distance between transceivers = 8 feet (2.5 meters) Maximum transceiver cable length = 165 feet (50 meters) Rules Each end of the trunk segment is terminated in 50-ohm One of the terminators is grounded Connector splices are kept to a minimum Cabling Transceivers 802.3 50-ohm cable RG-11 Male DIX connector
Confidential
10Base5 Thick Ethernet Network Layout
A 10Base5 Thick Ethernet Network Layout
Confidential
10BaseT UTP Network Layout
Limitations Maximum segment length of 100 Meters Hub to Hub or repeater to repeater links limited to 100 Meters Rules Star topology 4 repeater/5 segment rule of 10base5 is retained Only two nodes per segment are allowed Cabling RJ-45 Connectors Category 3 UTP minimum, preferably Category 5
Confidential
10BaseT UTP Network Layout
A 10Base5 Thick Ethernet Network Layout
Confidential
Bus Network Topology Summary
Advantages Disadvantages
Easy to implementLimits on cable length and Workstation numbers
Low Cost
Difficult to isolate network faultsA cable fault affects all workstationsAs the number of workstations increase, the speed of the network slows down
Confidential
Explaining Ring Topology
The main features are: Workstations connect to the ring Faulty workstations can be bypassed More cabling required than bus The connectors used tend to cause a lot of problems Commonly used to implement token ring at 4 and 16 Mbps Four wire, generally STP or UTP
Confidential
Explaining Ring Topology continue
Confidential
Physical Implementation of a Ring Network
Each workstation is connected back to a Multiple Access Unit (MAU), which supports up to eight workstations. Additional MAU are cascaded to provide greater workstation numbers.
Confidential
IEEE 802.5 Token Ring
Confidential
IEEE 802.5 Token Ring
Confidential
IEEE 802.5 Token Ring
Confidential
IEEE 802.5 Token Ring
Either
Confidential
IEEE 802.5 Token Ring
Or
Confidential
Physical Ring Cable Limits: TOKEN RING NETWORK LAYOUT
Limitations Maximum number of workstations = 96 Maximum number of 8228 MAU's = 12 Maximum patch cable distance between an 8228 MAU and a station (not including 8'
adapter cable) = 150 feet (45 meters) Maximum patch cable distance between two 8228's = 150 feet (45 meters) Maximum patch cable connecting all 8228's = 400 feet (120 meters) Rules Stations are connected into the jacks of the 8228 units Patch cables interconnect RO to RI for 8228 units. The last RO is connected to the first RI to form a ring. Cable Patch cables generally type 6 (26 awg) or 1 (22 awg) Type 1 for lengths > 66 feet (20 meters) IBM 8310574 MIC connectors Alternatively, UTP with RJ45 connectors
Confidential
Ring Topology: Summary
Advantages Disadvantages
Cable failures affect limited users Costly Wiring
Equal access for all users Difficult Connections
Each workstation has full access speed to the ring
Expensive Adaptor Cards
As workstation numbers increaseperformance diminishes slightly
Confidential
Explaining Star Topology
The main features are: All wiring is done from a central point (the server or hub) Each node (file server, workstations, and peripherals) connected
directly to a central network hub or concentrator Data on a star network passes through the hub or concentrator
before continuing to its destination The hub or concentrator manages and controls all functions of the
network. It also acts as a repeater for the data flow Has the greatest cable lengths of any topology (and thus uses the
most amount of cable) This configuration is common with twisted pair cable; however, it
can also be used with coaxial cable or fiber optic cable Generally STP or UTP, four wire
Confidential
Star Topology
Confidential
Star-Wired Ring
A star-wired ring topology may appear (externally) to be the same
as a star topology. Internally, the MAU (multistation access unit) of a
star-wired ring contains wiring that allows information to pass from
one device to another in a circle or ring. The Token Ring protocol
uses a star-wired ring topology
Confidential
Star Topology: Summary
Advantages Disadvantages
Easy to add new workstations
Hub failure cripples all workstationsconnected to that hub
Centralized controlHubs are slightly more expensive than thin-Ethernet
Centralized network/hub monitoring
Confidential
Explaining FDDI Topology
The main features are: Has a speed of 100 Mbps Normally implemented over fiber optic (fast-Ethernet, UTP) Dual redundancy built in by use of primary and secondary
ring Automatic bypassing and isolation of faulty nodes
Confidential
Explaining FDDI Topology
Confidential
Fiber Distributed Data Interface
FDDI is based on two counter rotating 100-Mbit/sec token-passing
rings. The rings consist of point to point wiring between nodes which
repeat the data as it is received.
The primary ring is used for data transmission; the secondary is
used for data transmission or to back up the primary ring in the
event of a link or station failure. FDDI supports a sustained transfer
rate of about 80Mbps, a maximum of 1000 connections (500 nodes)
and a total distance of 200 kilometers end to end. There is a
maximum distance of 2 kilometers between active nodes.
Confidential
FDDI Station Types
There are two main types of stations, class A which attach directly
to dual rings; or class B which attach to a station acting as a
concentrator.
A concentrator is a specialized workstation that attaches to the ring
and has multiple ports that allow attachment of other devices in a
physical star configuration. These may be cascaded.
Confidential
Explaining Mesh Topology
Confidential
Understanding Hybrid Networks
Hybrid networks are the complex networks, which can be built of
two or more above mentioned topologies .
Confidential
Tree Network
Confidential
Hierarchical Star Network
Confidential
Star-Wireless Network
Confidential
Considerations When Choosing a Topology
Money. A linear bus network may be the least expensive way to
install a network; you do not have to purchase concentrators.
Length of cable needed. The linear bus network uses shorter
lengths of cable.
Future growth. With a star topology, expanding a network is easily
done by adding another concentrator.
Cable type. The most common cable in schools is unshielded
twisted pair, which is most often used with star topologies.
Confidential
Understanding Wi-Fi Connectivity
What Is Wi-Fi? The very short version is that Wi-Fi is a way for
wireless devices to communicate. Wi-Fi, short for wireless fidelity, is the Wi-Fi Alliance's name for a wireless standard, or protocol, used for wireless communication, Known collectively as IEEE 802.11.
Confidential
The 802.11 Standard and Its Variations
Generally, the core 802.11 standard is intended to specify a way for
computers to network using the 2.4GHz and 5GHz free spectrums.
(When computers network, it is said that they are forming a local
area network, or LAN. When computers network wirelessly, it is
called a Wireless LAN, or WLAN.)
Confidential
The 802.11b Standard
The key things to know about 802.11b: The 802.11b standard uses the 2.4GHz spectrum. The 802.11b standard uses a technology called Direct
Sequence Spread Spectrum (DSSS) to minimize interference with other devices transmitting on the 2.4GHz spectrum.
The 802.11b standard has a theoretical throughput speed of 11 megabytes per second (Mbps).
Confidential
The 802.11a and 802.11g Standards
The 802.11a standard uses the 5GHz band for transmission, which minimizes the possibility of interference with the plethora of 2.4GHz devices out there (think microwaves, garage door openers, and so on) and promises a theoretic throughput of 24Mbps.
Still newer than 802.11a, 802.11g operates on the 2.4GHz spectrum and boasts throughput as fast as 54Mbps.
In other words, both 802.11a and 802.11g show the promise of being considerably faster than 802.11b.
The chief advantage of 802.11a is that it will run into less interruption from other devices because it does not use the crowded 2.4 GHz band.
Moving to 802.11a has some pluses and minuses, but moving to 802.11g is a no-brainer—because 802.11g systems are backward-compatible with 802.11b, and faster. This backward compatibility of 802.11g devices is a requirement for Wi-Fi certification.
Confidential
The 802.11i Standard
The IEEE is in the process of developing a new security standard
for 802.11 that is named 802.11i. The Wi-Fi Alliance has released a
subset of the 802.11i standard that the Alliance has developed
called "Wi-Fi Protected Access."
Confidential
Understanding Half- and Full-Duplex Modes
Half-duplexCollision detection is turned on The device can only
send or receive at any given time Devices connected to a hub must
use half-duplex communication Up to the rated bandwidth (10 Mbps
for 10BaseT, 100 Mbps for 100BaseT, etc.)
Full-duplexCollision detection is turned off The device can send and
receive at the same time Requires full-duplex capable NICs
Requires switches with dedicated switch ports (a single device per
port) Double the rated bandwidth (20 Mbps for 10BaseT, 200 Mbps
for 100BaseT, etc.)
Confidential