Escolar Documentos
Profissional Documentos
Cultura Documentos
Networking
A process of communicating devices between the logical addressing is known as networking.
NET WORK & NETWORKING Inter Network Connection of network is called as inter network . Inter Networking Logical communication process is on inter network is known as Inter networking.
Eg. Routers is a communication name Gateway is a data name.
WHY NETWORK IS NEED Computers connected over a network can make that information exchange easier and faster. The information moves directly from computer to computer rather than through a human intermediary. People can concentrate on getting their work done rather than on moving information around the company.
Networks are an interconnection of computers. These computers can be linked together using a wide variety of different cabling types, and for a wide variety of different purposes. The basic reasons why computers are networked are
To share resources (files, printers, modems, fax machines) To share application software (MS Office) To increase productivity (make it easier to share data amongst users)
TYPES OF NETWORKS
LAN WAN MAN
A local area network (LAN) is a number of computers connected to each other by cable in a single location by a common medium i.e switch, hub and etc, usually a single floor of a building or all the computers in a small company within the geographical area.
CHARACTERSTICS OF LAN
WIDE AREA NETWORK A wide area network links computers in different locations. M
C E M E SE CU N DE RA BA D
A R M Y H Q
N E W D E L H I
CHARACTERSTICS OF WAN
Operates over a large geographical area. Allow access over serial interface Works at a local speed 2mbps is maximum speed in internet. Connects devices separates wide even global area.
BANDWIDTH
Bandwidth is the capacity of a medium to convey data.. One example of bandwidth is automobile traffic. A two-lane road with a speed limit can accommodate only so many cars before there are too many and a traffic jam results. You can increase the bandwidth of a road by making the cars travel more quickly (which corresponds to using a faster transmission method in networks) or by making the road wider (which corresponds to using more wires in networks).
BASE BAND
The cable connecting the computer can carry one signal at a time, and all the system take turn using it. This type of network is called Base band network. In the base band network, when a computer transmits data it might be broken into many packet and transmits separately. The receiving system reassembles them back into
BASE BAND
HELLO HOW ARE YOU
The alternative to a packet switching network is cct switching. In CSN two system established a cct before communication and broken cct only after the finish the communication between them.
Broad Band
In the broad band net work carries multiple signals in a single cable at a same time . The example of broad band network is
In half duplex communications two computer communicate over a long, data typical travels in only one directions at a time because the base band network used for most LANs supports only a single signal. This is called half duplex communications An example of an Half duplex communications is two way radio set in which only one part can transmit at any one time and each pat must say over to signal.
data flows move in one direction only, (radio or cable television broadcasts)
data flows both ways, but only one direction at a time (e.g., CB radio) (requires control info)
Full duplex communications The two systems that can communicate in both directions simultaneously are called full duplex mode communications The most common example of a full duplex network is once again the telephone system. Both part can speak simultaneously during the telephone call and each part can hear the other at the same time.
Sharing Information
Just as a lot of information is moved about, some information is centrally controlled and shared. There is lot of info on the networked computers and not everyone is given access to it. The information must be kept consistent and secure, and timely access must be given to those who need the information to run the business.
Types of Info
Other types of information you might want to centrally locate and share or control include:
Inventory Company letterhead and letter styles Sales contact information Company procedures manuals Sensitive financial record Service records Company memos
Server
If you select one computer to store the shared info and have all other comp ref the info on that comp over the network, the comp can help you centralize the info and maintain control over it. The central comp is often called a server, and special software and operating systems are often used in server computers.
Computers that are not networked cannot effectively share resources. A network allows anyone connected to the network to use the printer, not just the individual sitting at the computer to which the printer is attached.
You can attach some peripherals directly to the network; they do not need to be attached to a computer to be shared on the network. Figure illustrates how anyone on a network can use a shared printer.
With a network you can centrally install and configure the software, vastly reducing the work required to make computer programs available to an organization. You can also restrict access to programs.
Preserving Information
A network also allows for information to be backed up to a central location. Important information can be lost by mistake or accident when a stand-alone computer has no backup. It is difficult to maintain regular backups on a number of stand-alone computers. When you back up to a central location (often to a tape cartridge in the network server), you have one place to look for the lost information, and you can be assured that the information is being backed up.
Protecting Information
A network provides a more secure environment for a companys important information. With stand-alone computers, access to the computers often means access to the information on the computers. Networks provide an additional layer of security by way of passwords. You can give each network user a different account name and password, allowing the network server to distinguish among those who need access to have it and protecting the information from tampering by those who do not.
E-Mail
The computer network can also help people communicate. One of the greatest benefits to users of networks is electronic mail, or e-mail. Rather than exchanging memos and directives on paper, engaging printing costs and delays, network users can instantly send messages to others and even check to see whether their message has been received. You can attach electronic documents to mail messages, instantly duplicate and forward mail, and perform many more tasks
Networks
Based on the roles of the computers attached to them, networks are divided into three types:
Server-based (also called client-server), containing clients and the servers that support them. Peer (also called-peer-to-peer), which have no servers and use the network to share resources among independent peers. Hybrid network, which is a client-server network that also has peers sharing resources. Most networks are actually hybrid networks.
Server-based Networking
Users log in once to access resources. Stronger security because of server management Shared files by members Shared printers and other resources E-mail capability through an email server Applications stored in a central location Backups scheduled and performed from a central location Shared resources can reflect the work patterns of subgroups. More efficient software upgrades
Domains
In Windows NT, server-based networks are organized into what are called domains. Domains are collections of networks and clients that share security trust information. Domain security and logon permission are controlled by special servers called domain controllers. There is one master domain controller, called the Primary Domain Controller (PDC), which may be assisted by secondary domain controllers called Backup Domain Controllers (BDC) during busy times or when the PDC is not available for some reason. No computer users can access the resources of servers in a domain until they have been authenticated by a domain controller.
Optimized dedicated servers, which are faster than peers at sharing network resources Less intrusive security, since a single password allows access to all shared resources on the network Freeing of users from the task of managing the sharing of resources Easy manageability of a large number of users Central organization, which keeps data from getting lost among computers
Server-based networks do have some disadvantages, although they are mostly related to the cost of server equipment, including:
Expensive dedicated hardware Expensive network operating system software and client licenses A dedicated network administrator (usually required)
Overview
Peer-to-Peer Network Model
Hub
Computer2 Os: win 2k Prof User: u2 Computer4 Os: win Nt Workstation User: u4
Peer Networks
Peer networks are defined by a lack of central control over the network. There are no servers in peer networks; users simply share disk space and resources, such as printers and faxes, as they see fit. Peer networks are organized into workgroups. Workgroups have very little security control. There is no central login process. If you have logged in to one peer on the network, you will be able to use any resources on the network that are not controlled by a specific password.
Peer Networks
Access to individual resources can be controlled if the user who shared the resource requires a password to access it. Because there is no central security trust, you will have to know the individual password for each secured shared resource you wish to access. This can be quite inconvenient. Peers are also not optimized to share resources. Generally, when a number of users are accessing resources on a peer, the user of that peer will notice significantly degraded performance. Peers also generally have licensing limitations that prevent more than a small number of users from simultaneously accessing resources.
Disadvantages of Peer Networks Peer networks, too, have their disadvantages, including:
Additional load on computers because of resource sharing Inability of peers to handle as many network connections as servers Lack of central organization, which can make data hard to find No central point of storage for file archiving Requirement that users administer their own computers Weak and intrusive security Lack of central management, which makes large peer networks hard to work with
Hybrid Networks
Hybrid networks have all three types of computers operating on them and generally have active domains and workgroups. This means that while most shared resources are located on servers, network users still have access to any resources being shared by peers in your workgroup. It also means network users do not have to log on to the domain controller to access workgroup resources being shared by peers.
One large difference in the way peer-to-peer and server-based networks operate is in how they implement security. Peer-to-peer networks are usually less secure than are server-based networks, because peer-to-peer networks commonly use share-level security, while server-based networks commonly use file-level or access permission security.
Types of Servers
Common server types include
File servers Print servers Application servers Message servers Database servers
Windows NT Server supports all of these capabilities. In fact, one Windows NT Server can, by itself, serve in all of these capacities simultaneously on a small network. On larger networks, however, you need to spread these roles among multiple servers.
Logical Topologies
Network Topologies
Network Topology
The way in which the connections are made of the physical devices is called the topology of the network. Network topology specifically refers to the physical layout of the network, especially the locations of the computers and how the cable is run between them. It is important to select the right topology for how the network will be used. Each topology has its own strengths and weaknesses. The four most common topologies are
the bus topology the star topology the ring topology the mesh topology
Bus Topology
The bus topology is often used when a network installation is small, simple, or temporary. On a typical bus network, the cable is just one or more wires, with no active electronics to amplify the signal or pass it along from computer to computer. This makes the bus a passive topology.
Contd
Star Topology
In a star topology, all the cables run from the computers to a central location, where they are all connected by a device called a hub. Each computer on a star network communicates with a central hub that resends the message either to all the computers (in a broadcast star network) or only to the destination computer (in a switched star network). The hub in a broadcast star network can be active or passive. An active hub regenerates the electrical signal and sends it to all the computers connected to it. This type of hub is often called a multiport repeater. Active hubs and switches require electrical power to run.
Star Topology
A passive hub, such as wiring panels or punch-down blocks, merely acts as a connection point and does not amplify or regenerate the signal. Passive hubs do not require electrical power to run. You can use several types of cable to implement a star network. A hybrid hub can accommodate several types of cable in the same star network.
Star Topology
In a star topology the computers are all connected by cables to a central point.
The hybrid star network has several central star network points linked in a star.
Ring Topology
In a ring topology, each computer is connected to the next computer, with the last one connected to the first. Rings are used in high-performance networks, networks requiring that bandwidth be reserved for time-sensitive features such as video and audio, or when even performance is needed when a large number of clients access the network.
Ring Topology
CE Dept
Trg Branch
NIC Installation
Peripheral cards require a software driver to function. This software driver provides the interface between the card and the operating system, making the services provided by the card available to the user. The software driver is normally configured to match the resource settings of the card. This is done by a configuration utility, and stored either in the executable file, or a separate file (like .ini or .cfg).
Network adapter cards and drivers provide the services corresponding to the data link layer in OSI model. In the IEEE model, the data link is split into the Logical Link Control (LLC) sublayer, which corresponds to the software drivers and the Media Access Control (MAC) sublayer, which corresponds to the network adapter.
Network Components
Cabling
Cable is used to interconnect computers and network components together. There are three main cable types used today
Twisted pair Coaxial cable Fiber optics
Also used in telephone trunk lines (up to several thousand pairs) Shielded twisted pair also exists, but is more expensive
Network Components
Twisted Pair (Shielded Twisted Pair and Unshielded Twisted Pair) Shielded twisted pair uses a special braided wire which surrounds all the other wires, which helps to reduce unwanted interference. The features of twisted pair cable are, used in token ring (4 or 16MBps), 10BaseT (Ethernet 10MBps) 100BaseT (100Mbps) reasonably cheap reasonably easy to terminate [special crimp connector tools are necessary for reliable operation UTP is prone to interference, which limits speed and distances category 2 = up to 1Mbps (Telephone wiring) category 3 = up to 10Mbps (Ethernet and 10BaseT) category 5 = 100MBps (supports 10BaseT and 100BaseT)
Network Components
Unshielded Twisted Pair cable used in Category 5
Category 5 cable uses 8 wires. The various jack connectors used in the wiring closet look like
The patch cord which connects the workstation to the wall jack looks like,
Cross cable
1 2 3 4
6 7 8
2 3 4 5 6
7 8
RJ-45 Connector
How to determine the type of patch cable
Align the ends of the cable side by side so that the contacts are facing you, then compare the colors from left to right.
If the colors are in the same order on both plugs, the cable is straight through. If the colors appear in the reverse order, the cable is reversed.
Network Components
Coaxial Cable Coaxial cable so as named because it contains two conductors within the sheath. At the centre of the cable is the copper core that actually carries the electrical signals. Surrounding the core is a layer of insulation and also it is called second conductor. The second conductor works as ground. There are two types of coaxial cable
RG8 used in LAN also known as thick Ethernet. RG-58 used for LAN and known as thin Ethernet.
Optical Fiber
Excessive signal weakening and dispersion
Center light likely to arrive at the same time as the other parts
Network Components
Fiber optic is often used to overcome distance limitations. It can be used to join two hubs together, which normally could not be connected due to distance limitations. In this instance, a UTP to Fiber transceiver (often referred to as a FOT) is necessary. It costs more than either twisted pair or coax, and requires special connectors and jointing methods. ST connector SC connector
Network Components
The features of fiber-optic cable systems are,
expensive used for backbones (linking LANs together) or FDDI rings (100Mbps) high capacity (100Mbps) immune to electromagnetic interference low loss difficult to join connectors are expensive long distance
NW COMN DEVICES
HUB
SWITCH
BRIDGE ROUTER
Network hubs
A hub is a device used to connect all the computers on a star or ring network. Like NIC adapters hubs are associated with specific data link layer protocols. Ethernet hub are the most common because Ethernet is the most popular data link layers protocols, but token ring MAUs are hubs also and other protocols such as FDDI, can also use hubs. An Ethernet hub is also called a multi port repeater. A repeater is a device that amplifies a signal and it passes through it to counteract the effect of attenuation. When data enter s the hub through any of its ports, the hub amplifies the signal and transmits it out to all of the other ports. This enables a star network to share a single medium even through each computer has its own separate cable. The hub relays every packet transmitted by any computer on the network to all the other computer while amplifying the signal..
TYPES OF HUB
ACTIVE HUB PASSIVE HUB
ACTIVE HUB:- An active hub is usually powered and it actually amplifies and clean up the signal it receives, thus doubling the effective segment distance limitation for the specific topology.
PASSIVE HUB:- A passive hub is typically unpowerd and makes only physical electrical connections.
There are three main points to remember about hubs: a) Many kinds of nodes can be connected to the hub with networking cable. b) All hubs can be up linked together, either with straight-through cable or cross-over cable, depending on whether or not the hub has an uplink port. c) Performance will decrease as the number of users is increased. Always remember that hubs can only communicate in half duplex mode, which means that a computer on the network can only send data when it is not receiving.
1.
10baseT
2.
3.
A standard 10baseT hub cannot connect to hardware that runs at 100Mbps unless a switch or hub with auto-sensing capabilities is used between them.
SWITCH
Introduction
Switches are a fundamental part of most networks. They make it possible for several users to send information over a network at the same time without slowing each other down. Just like routers allow different networks to communicate with each other, switches allow different nodes (a network connection point, typically a computer ) of a network to communicate directly with one another in a smooth and efficient manner. The switch establishes a connection between two segments.
Layer 2
3 4
1 2 3 4
When a frame is received, the switch reads its [data link layer] destination address and sends the frame out the corresponding port in its forwarding table.
Port
MAC Adr
Reads the source MAC address of the incoming frame and records it to the corresponding port number Reads the destination MAC address. If not in the Table then it broadcasts the frame to all ports Waits for the destination computers to respond, and repeats the first step
TYPES OF SWITCHES
There are a lot of different types of switches and networks. Switches that provide a separate connection for each node in a any internal network is called LAN switches. Architecture types Cut-Through Switches Store-Forward Switches Back pressure Switches
Low latency; but may waste capacity (errorred messages) Only on the same speed incoming and outgoing circuits
Read the first 64 byte segment (contains the header) Perform error check, if it is okay then start transmitting Compromise between previous two modes
Both Logical and physical topology of the network becomes a star topology Switch reads destination address of the frame and only sends it to the corresponding port
While a hub broadcasts frames to all ports
Performance Comparison
Capable of using about only 50% of capacity (10BaseT) before collisions become a problem
It operates in layer 1
It send the data each port
It operates in layer 2
Send the data on reqd port
Hub works in half duplex Switch run in full duplex mode mode
Data transfering speed is less than switch Bandwidth is 10Mbps with time sharing
Data transfering speed is greater than hub Bandwidth is same as each port
CSMA/CD
Carrier Sense (CS):
Listen to the bus to see if another computer is transmitting
Before sending anything
CONNECTIVITY
OF SWITCH
client
HUB
client
SWITCH
client
client
BRIDGE
INTRODUCTION:Bridge is physical device typically a box of two port which connect two network at Data Link Layer. A Bridge provides packet filtering at Data link layer .A bridge to join to existing Lan or two split one lan in to two segment. Bridge operate in promiscuous mode. Meaning that they read and process all the packet Tx over the network segment. Data packet enter the bridge through either one of the port and the bridge then read the destination address in each packet header and decides how to process that packet . This is called packet filtering. If the destination address of a packet arriving from one network segment is that of a cmptr on the other segment, the bridge Tx it out from other port. If the destination address of a cmptr on a same network segment as the cmptr that generated it, the bridge discard the packet.
bridge
Bridges &Collision
A collisions domain is a network that is constructed so that when two cmptrs transmit packet at the same time a collision occurs. When we add the new hub in existing network that the same collision domain as the original network because Hub relay the signal without filtering the packet Bridge do not relay the signals to other network until they have receive the entire packet. For this reason two cmptr on different side of the bridge do not cause to conflict. Bridge maintain the internal address table that listed the hardware address of the cmptr on both segment . When bridge receive the packet and read the destination address DLL header. It check the address against its lists. If the address is associated with the segment other than that from which the packet arrived, the bridge relay it to that segment there are two type of bridge (a) Local Bridge (b)Translation Bridge (c ) Remote Bridge
Local Bridge
Standard type of bridge use to connect network segment of same type and same location is called local bridge. This is simplest type of bridge ,it does not modify the data in packet. It simply read the address in the data link layer protocol and pass the packet or discard it.
Translation bridge
It is DLL device that connect network using different network media or different protocol. This bridge is more complicated than local bridge. The bridge can thus connect an eathernet segment to FDDI (Fiber Distributed Data Interface) segment or connect two different type of eathernet type segment such as (100BaseTx)
Remote Bridge
Remote bridge is designed to connect two network segment at distance locations using some form of wide area network link. The link can be a modem connection leased telephone line or any type of WAN technology. The advantage of using a bridge in this manner is that you reduce the amount of traffic passing over the WAN link., which is usually far slowler and more expensive than the local Network.
ROUTER
INTRODUCTION Routers are packet forwarding devices or it is a device that forwards data packet along network . Routers are located at gateway the places where two or more networks connect. . A router is connected to at least two networks, Commonly two LANs or WAN or a LAN and its ISPs network. Routers allow transmission of data between network segments
LAN / WAN
ROUTER
LAN / WAN
Routers are specialized computers that send your messages and those of every other Internet user speeding to their destinations along thousands of pathways.
FUNCTION OF ROUTER
ROUTING
Routing is the process of moving data throughout a network , passing through several network segments. Router gets information about which path to take from files on the routers called routing tables. These table contain information about which router network interface to place information on in order to send it to a particular network segment.Routers will not pass unknown or broadcast packets. A router will route a packet only if it has a specific destination.
PC
Router A
Router B
Router C
PC
PC
KEEPING THE MESSAGES MOVING TRANSMITTING PACKETS KNOWING WHERE TO SEND DATA UNDERSTANDING THE PROTOCOLS TRACING MESSAGE
Routing tables in to two ways:1. Static routing ( network administrator manually updated the routing table}
2. Dynamic routing ( send out special packets to request updates of the other routers on the network or send their own updates)
There are two connections between the router and our ISP T-1 connection that supports 1.5 megabits per second. ISDN line that supports 128 kilobits per second.
MODEM
Introduction
A modem is a internet peripheral device which enables computers to communicate with each other over conventional telephone lines. The term modem stands for modulator/demodulator. The purpose of a modem is to convert digital signal to analog signal (modulate) and analog signal to digital signal (demodulate ).
The modern digital information processing devices to exchange information over the portion of the global communications networks that is still analog .Wireless modems convert digital data into radio signals and back. Modems came into existence in the 1960s as a way to allow terminals to connect to computers over the phone lines.
Telephone network
Modem
FUNCTION OF MODEM
modem Telephone network
computer
1 0 0 1 1 1 0 1
TYPES OF MODEM
INTERNAL MODEM
EXTERNAL MODEM
PC CARD MODEM
SOFTWARE MODEM