Você está na página 1de 8

Networking Essentials Notes Chapter 1 Introduction to Networking

The concept of Networking The term network has many definitions, most people would agree that networks are collections of two or more connected computers. The concept of connected computers sharing resources is called networking. Once computers are joined in a networks, people can: share information or data. share hardware and software Administer and support the network centrally

Major types of networks There are three types of networks. Local Area Network (LAN): A LAN is a high-speed data network that covers a relatively small geographic area. It typically connects workstations, personal computers, printers, servers, and other devices. Metropolitan Area Network (MAN): A MAN is a relatively new class of network, it covers larger geographic areas, such as cities or school districts. There are three important features which discriminate MANs from LANs or WANs:
1. The network size falls intermediate between LANs and WANs. A MAN typically covers an area of between 5 and 50 km diameter. Many MANs cover an area the size of a city. A MAN (like a WAN) is not generally owned by a single organisation. The MAN, its communications links and equipment are generally owned by either a consortium of users or by a single network provider who sells the service to the users. A MAN often acts as a high speed network to allow sharing of regional resources (similar to a large LAN).

2.

3.

Wide Area Network (WAN): A WAN is a data communications network that covers a relatively broad geographic area and that often uses transmission facilities provided by common carriers, such as telephone companies.

Network configuration
Peer-to-Peer and Server-based networks Computer network can be configured as peer-to-peer or server based. The type of network you choose to implement depends on: size of the organization level of security required type of business

Networking Essentials, chapter 1

Page 1of 8

level of administrative support available amount of network traffic needs of network users network budget

Peer to Peer Networks

Fig. 1. Peer-to-peer network No dedicated server or hierarchy, also called a workgroup. Usually 10 or fewer workstations. Users act as their own administrator and security. No specialized servers exist. Computers are in same general area. Limited growth. Less expensive

Server Based Networks

Fig. 2. Server based 10 or more users. Employs specialized servers. 1. File and Print servers: manage user access and use of files and printer resources.

Networking Essentials, chapter 1

Page 2of 8

2. Application servers: make the server side of client/server application, as well as the data, available to clients. 3. Mail servers: operate like application servers in that there are separate server and client applications. 4. Fax servers: manage fax traffic into and out of the network. 5. Communications servers (gateways): handle data flow between the servers own networks and other networks, mainframe computers, or remote users (dial in users) 6. Directory services servers: enables users to locate, store and secure information on the network. Central administration. Greater security. Centralized backup. Data Redundancy. Supports many users

Combination Networks Combines the features of both Peer to Peer and Server based networks Users can share resources among themselves as well as access server-based resources.

Note (The following is not network configuration type)


Network Attached Storage In the last few years, it has become very attractive to network administrators to replace file servers with new breed of device known as Network Attached Storage (NAS). NAS such as SNAP server is basically a small network device with network interface card and a large hard disk. NAS usually runs special proprietary operating system that allows the small device to function as a file server. The main advantage of NAS is: o o o Inexpensive compared to traditional file servers. Very easy to administer. Very easy to setup.

Networking Essentials, chapter 1

Page 3of 8

Table 1.1 Comparison of Network Types


Consideration Size Security Administration Peer-to-Peer Network Good for 10 or fewer computers Security established by the user of each computer Server-Based Network Limited only by server and network hardware Extensive and consistent resource and user security

Individual users responsible for their own Centrally located for network control; administration; no full-time administrator requires at least one knowledgeable necessary administrator

Network topology
Standard topologies and variations There are 4 basic topologies with variations ( Note: The layout of a network, the way computers and
other devices are connected together is called topology.)

Basic Topologies Bus Topology

Fig. 3. Bus topology Bus consists of a single linear cable called a trunk. The data packet travels the cable until it is accepted by the computer whose address matches it. Because all computers share the cable, only one computer at a time can successfully send messages. Therefore, the more computers on a bus, the slower the network. Bus is a passive topology, which means that computers connected to a bus topology only listen for a signal being transmitted over the data-transmission media. They dont move data from one computer to the next. Thus, if one computer goes down, it doesnt affect the rest of the network. Performance degrades as more computers are added to the bus. Signal bounce is eliminated by a terminator at each end of the bus.

Networking Essentials, chapter 1

Page 4of 8

signal bounce: signal travels from one end of the cable to the other and if signal is
allowed to continue like this, it will bouncing back and forth and hence prevent other computers from sending signals.

Barrel connectors can be used to lengthen cable. Repeaters can be used to regenerate signals. Usually uses Thinnet or Thicknet o both of these require 50 ohm terminator

good for a temporary, small (fewer than 10 people) network But its difficult to isolate malfunctions and if the backbone goes down, the entire network goes down.

Star Topology

Fig. 4. Star topology Computers are connected by cable segments to a centralized hub. Signal travels through the hub to all other computers. Requires more cable. If hub goes down, entire network goes down. If a computer goes down, the network functions normally. most scalable and reconfigurable of all topologies

Ring Topology

Networking Essentials, chapter 1

Page 5of 8

Fig. 5. Ring topology Computers are connected on a single circle of cable. usually seen in a Token Ring or FDDI (fiber optic) network Each computer acts as a repeater and keeps the signal strong => no need for repeaters on a ring topology No termination required => because its a ring Token passing is used in Token Ring networks. The token is passed from one computer to the next, only the computer with the token can transmit. The receiving computer strips the data from the token and sends the token back to the sending computer with an acknowledgment. After verification, the token is regenerated. relatively easy to install, requiring ;minimal hardware Failure of one computer can have an impact on the entire network

Mesh

Fig. 6. Mesh topology The mesh topology connects each computer on the network to the others Meshes use a significantly larger amount of network cabling than do the other network topologies, which makes it more expensive. The mesh topology is highly fault tolerant.

Networking Essentials, chapter 1

Page 6of 8

Every computer has multiple possible connection paths to the other computers on the network, so a single cable break will not stop network communications between any two computers.

Star Bus Topology

Fig. 6. Star Bus topology Several star topologies linked with a linear bus. No single computer can take the whole network down. If a single hub fails, only the computers and hubs connected to that hub are affected.

Star Ring Topology

Fig.7. Star-wired ring topology Also known as star wired ring because the hub (Multi-Station Access Unit-MAU) itself is wired as a ring. This means it's a physical star, but a logical ring. This topology is popular for Token Ring networks because it is easier to implement than a physical ring, but it still provides the token passing capabilities of a physical ring inside the hub. Just like in the ring topology, computers are given equal access to the network media through the passing of the token. A single computer failure cannot stop the entire network, but if the hub fails, the ring that the hub controls also fails.

Hybrid Mesh most important aspect is that a mesh is fault tolerant a true mesh is expensive because of all the wire needed

Networking Essentials, chapter 1

Page 7of 8

another option is to mesh only the servers that contain information that everyone has to get to. This way the servers (not all the workstations) have fault tolerance at the cabling level.

Table 1.2 Topology Advantages and Disadvantages


Topology Bus Advantages Use of cable is economical. Media is inexpensive and easy to work with. System is simple and reliable. Bus is easy to extend. Ring System provides equal access for all computers. Performance is even despite many users. Disadvantages Network can slow down in heavy traffic. Problems are difficult to isolate. Cable break can affect many users.

Failure of one computer can impact the rest of the network. Problems are hard to isolate. Network reconfiguration disrupts operation.

Star

Modifying system and adding new computers is easy. Centralized monitoring and management are possible. Failure of one computer does not affect the rest of the network.

If the centralized point fails, the network fails.

Mesh

System provides increased redundancy and reliability as well as ease of troubleshooting.

System is expensive to install because it uses a lot of cabling.

Networking Essentials, chapter 1

Page 8of 8

Você também pode gostar