Introduction
A network is a group of computers and other devices, such as printers and modems, connected to each other. This enables the computers to effectively share data and resources.
The concept of sharing resources over a network is called networking. The computers in a network can share data, messages, graphics, printers, fax machines, modems, and other hardware and software resources.
Network elements
Servers
Servers are the computers that provide the shared resources to network users. There is usually only one server in a small network, but bigger networks may have more than one server.
Clients
Clients are the computers that can access the shared network resources provided by a server.
Media
The computers in a network are connected to each other by hardware components, such as cables. These components are called the media.
Shared data
A server provides shared resources and data over a network. The files that are provided by the server over the network are called shared data. This shared data can be a document, a worksheet or a folder.
Resources
Files, printers or other items that can be used by network users are known as resources. These resources can be either hardware or software resources.
Benefits of the computer Network
In most organizations, a network offers benefits, such as data sharing and online communication that are not provided by a stand-alone environment (An environment in which there is several computers that are not connected to each other is called a stand-alone environment.). In this topic, you will identify the benefits of a network.
Data sharing
The data can be easily sharable in a network so other user can access it at any time. For example, a user working in a team wants to share some data with the other team members. In a stand-alone environment, to share the data you can verbally exchanging information or writing memos or putting the data on a floppy and copying it to the machines of other members. If it network the data can be easily made sharable in a network so that the other team members can access.A centralized data storage system enables multiple users to access data in different locations.
Resource sharing
Resource sharing is also an important benefit of a computer network. For example, if there are four people in a family, each having their own computer, they will require four modems (for the Internet connection) and four printers, if they want to use the resources at the same time. A computer network, on the other hand, provides a cheaper alternative by the provision of resource sharing.In this way, all the four computers can be interconnected, using a network, and just one modem and printer can efficiently provide the services to all four members. The facility of shared folders can also be availed by family members.
Centralized Software Management
One of the greatest benefits of installing a network is the fact that all of the software can be loaded on one computer (the file server). This eliminates that need to spend time and energy installing updates and tracking files on independent computers throughout the building.
Communication medium
A computer network can provide a powerful communication medium among people spread widely at different physical locations. It acts as a powerful communication medium when it comes to sharing information and resources.
Data Security and Management
In a business environment, a network allows the administrators to much better manage the company's critical data. Instead of having this data spread over dozens or even hundreds of small computers in a haphazard fashion as their users create it, data can be centralized on shared servers. This makes it easy for everyone to find the data, makes it possible for the administrators to ensure that the data is regularly backed up, and also allows for the implementation of security measures to control who can read or change various pieces of critical information.
Speed
Sharing and transferring files within Networks are very fast. Networks provide a very rapid method for sharing and transferring files. The sharing of data with the other users in a stand-alone environment requires physical transfer of data. This can be done by copying the data on a floppy disk or taking a printout. This requires more time and is inconvenient as compared to sharing the data over a network.
Disadvantages of the computer Network
Expensive to Install
Although a network will generally save money over time, the initial costs of installation can be prohibitive. Cables, network cards, and software are expensive, and the installation may require the services of a technician.
Data Security
If a network is implemented properly, it is possible to greatly improve the security of important data. In contrast, a poorly secured network puts critical data at risk, exposing it to the potential problems associated with hackers, unauthorized access.
Cables May Break
One broken cable can stop the entire network.
File Server May Fail
Although a file server is no more susceptible to failure than any other computer, when the files server "goes down," the entire network may come to a halt. When this happens, the entire hospital may lose access to necessary programs and files.
Virus Infections
If any computer system in a network gets affected by computer virus , there is a possible threat of other systems getting affected too. Viruses get spread on a network easily because of the interconnectivity of workstations. Such spread can be dangerous if the computers have important database which can get corrupted by the virus.
To overcome Network Disadvantages
Security issues and Virus Infections issues
The increase in businesses connecting their systems and using the Internet has its drawbacks. When all computers are networked, one user's problems may affect everyone. You should consider the greater potential for data loss, security breaches and viruses when creating a network.It is important to ensure data security through regular backing up the files, password routines, and system logs. It is important to remove access from employees who leave, otherwise they may still be able to access customer records.As your data will be stored in one location on the server, physical security is very important. You should improve the quality of your system security to protect your business from potential virus attacks and hacking. This should include anti virus software and a firewall or software barrier.If your staffs need to access the network while off-site, consider a virtual private network. This creates a secure link and protects information sent and received.
File Server Fail down issues
For this we can have backup fail server. When the files server "goes down," then we can use the backup fail server. Having backup server we can overcome this problem.
Peer-to-Peer NetworksIn a peer-to-peer network, there are no dedicated servers, and there is no hierarchy among the computers. All the computers are equal and therefore are known as peers. Each computer functions as both a client and a server. And there is no administrator responsible for the entire network. The user at each computer determines what data on that computer is shared on the network. Below figure shows a peer-to-peer network in which each computer functions as both a client and a server. Computers in a peer-to-peer network are called peers. In a peer-to-peer network, all computers are considered equal; they all have the same abilities to use the resources available on the network. Each computer can function both as a client and a server. Computers are not dedicated to function as servers. They use the network to share resources among the independent peers. The computer whose applications are required by the other networked computers functions as a server. The other computers function as clients. Therefore, a dedicated administrator is not assigned for network management. A peer-to-peer network is a small group of people using a network. Peer-to-peer networks members usually perform similar tasks, which necessitates the sharing of resources. The peer-to-peer networks support 10 computers. The users in a peer-to-peer network are located in the same geographical area. Operating systems, such as Microsoft Windows 98 or Microsoft Windows XP, can be used to set up a peer-to-peer network. Additional software is not required because peer-to-peer networking is built into the systems. Another important point of peer-to-peer networks is that the users of each computer plan and control the security of their resources. The users determine the resources on their computers, which can be shared on the network. The shared network resources, such as disk space, printers or faxes, can be used by anyone who has access to the network. This is possible only if the shared network resources are not password protected. Peer-to-peer networks have weak and intrusive security because a central server is not used to administer and secure the network. In addition, some users may not implement security. A peer-to-peer network does not support a central login process. This implies that a user who logs on to one peer can access any shared network resource, which is not controlled by a specific password. Peer-to-peer networks are relatively simple. Because each computer functions as a client and a server, there is no need for a powerful central server or for the other components required for a high-capacity network. Peer-to-peer networks can be less expensive than server-based networks. Peer-to-peer networks are simple and inexpensive to install and maintain. The cost of implementing peer-to-peer networks is low because a central server is not used to administer the network. In addition, the components for a high-capacity network are not required in a peer-to-peer network. In a peer-to-peer network, the users handle administration. This means that all the users need to be trained in how to share files, folders, and printers. In a peer-to-peer network, suddenly shutting down your computer can cause one of your colleagues to be unable to print. Peer-to-peer networks are appropriate for environments where all the users are located in the same geographical area and the network security is not an important factor. In addition, these networks are useful when the network expansion is limited. Advantages of a peer-to-peer network:
Disadvantages of a peer-to-peer network:
Server Based NetworksA dedicated server is one that functions only as a server and is not used as a client or workstation. Server based networks (see below Figure) have become the standard models for networking. In a server-based network, clients rely on the services that the server provides, such as file storing and printing. Client computers are generally less powerful than server computers. A server-based network using network operating system is that the networks are organized into domains. A domain is a collection of networks and clients that share security information. Domain security and logon permissions are controlled by special servers called domain controllers. Users cannot access the resources of servers in a domain until a domain controller has authenticated them. In server-based networks, a network administrator centrally manages the resource security. The administrator defines and manages user access to network resources. Another beneficial of server-based networks is central file storage. Server-based networks provide easy backup of critical data. Data backup is another useful characteristic of server based networks. Server based networks can support a larger number of users than peer-to-peer networks. To support a large number of users, server-based networks use monitoring and network management tools. Servers must perform varied and complex tasks. (See below figure) Security is often the primary reason for choosing a server-based approach to networking. In a server-based environment, one administrator who sets the policy and applies it to every user on the network can manage security. (see below figure) Advantages of a client/server network
Disadvantages of a client/server network
Wired Local Area Network (LAN)It is the simplest type of network in which computers are connected to each other by cables. Each of the computers on the LAN is also called a node . A LAN is characterized by three primary attributes:
The topology is the pattern used to connect the computers together. With a bus topology, a network cable connects each computer to the next one, forming a chain. With a star topology, each of the computers is connected to a central nexus called a hub/Switch. A ring topology is essentially a bus network with the two ends joined together. (You will see more about network topologies in Chapter 6)
Four basic types of media are used in local-area networks; coaxial cable, twisted-pair wires, fiber-optic cable, And wireless.
The topology and the medium used on a particular network are specified by the protocol. (You will see more about protocol in Chapter 8). LAN computer networks that usually cover a limited range, say, within the boundary of a building. A LAN computer network is two or more computers that communicate with each other through some medium. The primary usage of local-area networks (LANs) is the sharing of hardware, software, or information, such as data files, multimedia files, or electronic mail. Resource sharing provided by local-area networks improves efficiency and reduces overhead. There are a number of ways in which nodes can communicate over a network. The simplest is to establish a dedicated link between the transmitting and receiving stations. This technique is known as circuit switching. A better way of communicating is to use a technique known as packet switching, in which a dedicated path is not reserved between the source and the destination. Data are wrapped up in a packet and launched into the network. In this way, a node only has exclusive access to the medium while it is sending a packet. During its inactive period, other nodes can transmit. A typical packet is divided into preamble, address, control, data, and error-check fields. The computers in a LAN are connected by using cables. This method cannot be used to connect computers that are in different locations, for example, in buildings across a town or city. Therefore, a LAN is not suitable for large businesses with offices in several locations. Wireless Local Area NetworkThe term wireless networking refers to technology that enables two or more computers to communicate using standard network protocols, but without network cabling. Peer-to-peer wireless network consists of a number of computers each equipped with a wireless networking interface card. Each computer can communicate directly with all of the other wireless enabled computers. They can share files and printers this way, but may not be able to access wired LAN resources, unless one of the computers acts as a bridge to the wired LAN using special software. A wireless network can also use an access point, or base station. In this type of network the access point acts like a hub, providing connectivity for the wireless computers. It can connect the wireless LAN to a wired LAN, allowing wireless computer access to LAN resources, such as file servers or existing Internet Connectivity. There are two types of access points:
Hardware access points offer complete support of most wireless features, but check your requirements carefully.
Software Access Points which run on a computer equipped with a wireless network interface card as used in peer-to-peer wireless network. The software routers that can be used as a basic Software Access Point, and include features not commonly found in hardware solutions. Connected wireless LAN to wired LANTo do this you will need some sort of bridge between the wireless and wired network. This can be accomplished either with a hardware access point or a software access point. Hardware access points are available with various types of network interfaces, such as Ethernet or Token Ring, but typically require extra hardware to be purchased if you're networking requirements change. If networking requirements go beyond just interconnecting a wired network to a small wireless network, a software access point may be the best solution. A software access point does not limit the type or number of network interfaces you use. It may also allow considerable flexibility in providing access to different network types, such as different types of Ethernet, Wireless and Token Ring networks. Such connections are only limited by the number of slots or interfaces in the computer used for this task. Further to this the software access point may include significant additional features such as shared Internet access, web caching or content filtering, providing significant benefits to users and administrators. Wireless networking offers a cost-effective solution to users with difficult physical installations such as campuses, hospitals or businesses with more than one location in immediate proximity but separated by public thoroughfare. This type of installation requires two access points. Each access point acts as a bridge or router connecting its own LAN to the wireless connection. The wireless connection allows the two access points to communicate with each other, and therefore interconnect the two LAN's. Wireless Network RangeEach access point has a finite range within which a wireless connection can be maintained between the client computer and the access point. The actual distance varies depending upon the environment; manufacturers typically state both indoor and outdoor ranges to give a reasonable indication of reliable performance. Also it should be noted that when operating at the limits of range the performance may drop, as the quality of connection deteriorates and the system compensates. Typical indoor ranges are 150-300 feet, but can be shorter if the building construction interferes with radio transmissions. Longer ranges are possible, but performance will degrade with distance. Outdoor ranges are quoted up to 1000 feet, but again this depends upon the environment. There are ways to extend the basic operating range of Wireless communications, by using more than a single access point or using a wireless relay /extension point. Multiple access points can be connected to a wired LAN, or sometimes even to a second wireless LAN if the access point supports this. In most cases, separate access points are interconnected via a wired LAN, providing wireless connectivity in specific areas such as offices or rooms, but connected to a main wired LAN for access to network resources, such as file servers. If a single area is too large to be covered by a single access point, then multiple access points or extension points can be used. Note that an "extension point" is not defined in the wireless standard, but have been developed by some manufacturers. When using multiple access points, each access point wireless area should overlap its neighbors. This provides a seamless area for users to move around in using a feature called "roaming." See Roaming for further information. Some manufacturers produce extension points, which act as wireless relays, extending the range of a single access point. Multiple extension points can be strung together to provide wireless access to far away locations from the central access point. RoamingA wireless computer can "roam" from one access point to another, with the software and hardware maintaining a steady network connection by monitoring the signal strength from in-range access points and locking on to the one with the best quality. Usually this is completely transparent to the user; they are not aware that a different access point is being used from area to area. Some access point configurations require security authentication when swapping access points, usually in the form of a password dialog box. Access points are required to have overlapping wireless areas to achieve this as can be seen in the following diagram. A user can move from Area 1 to Area 2 transparently. The Wireless networking hardware automatically swaps to the Access Point with the best signal. Sharing an internet connection in wireless networkTo share an Internet connection across a LAN you need two things:
If your LAN is wireless. You need hardware or software access point and a wireless LAN. Any computer equipped with a wireless network card running suitable Internet sharing software can be used as a software access point. A number of vendors offer hardware access points. A hardware access point may provide Internet Sharing capabilities to Wired LAN computers, but does not usually provide much flexibility beyond very simple configurations. If an existing wired LAN already has an Internet connection, then the hardware access points simply connect to LAN and allow wireless computers to access the existing Internet connection in the same way as wired LAN computers. Wireless Network securityWireless communications obviously provide potential security issues, as an intruder does not need physical access to the traditional wired network in order to gain access to data communications. However, 802.11 wireless communications cannot be received much less decoded by simple scanners, short wave receivers etc. This has led to the common misconception that wireless communications cannot be eavesdropped at all. However, eavesdropping is possible using specialist equipment. To protect against any potential security issues, 802.11 wireless communications have a function called WEP (Wired Equivalent Privacy), a form of encryption which provides privacy comparable to that of a traditional wired network. If the wireless network has information that should be secure then WEP should be used, ensuring the data is protected at traditional wired network levels.
Also it should be noted that traditional Virtual Private Networking (VPN) techniques will work over wireless networks in the same way as traditional wired networks. Wide Area Network (WAN)A wide area network (WAN) is a telecommunications network, usually used for connecting computers, that spans a wide geographical area. WANs can by used to connect cities, states, or even countries. An example of a WAN connection would be a company with two offices in distant cities, each with its own LAN and connected by a leased telephone line. This type of WAN is illustrated in below figure. Each end of the leased line is connected to a router and the routers are connected to individual LANs. Any computer on either of the LANs can communicate with any one of the other computers at the other end of the WAN link or with a computer on its own LAN. WANs are often used by larger corporations or organizations to facilitate the exchange of data and in a wide variety of industries, corporations with facilities at multiple locations have embraced WANs. Increasingly, however, even small businesses are utilizing WANs as a way of increasing their communications capabilities. Although WANs serve a purpose similar to that of local area networks (LANs), WANs are structured and operated quite differently. The user of a WAN usually does not own the communications lines that connect the remote computer systems; instead, the user subscribes to a service through a telecommunications provider. Unlike LANs, WANs typically do not link individual computers, but rather are used to link LANs. WANs also transmit data at slower speeds than LANs. WANs have existed for decades, but new technologies, services, and applications have developed over the years to dramatically increase their efficacy for business. WANs were originally developed for digital leased-line services carrying only voice, rather than data. As such, they connected the private branch exchanges (PBXs) of remote offices of the same company. WANs are still used for voice services, but today they are used more frequently for data and image transmission (such as video conferencing). These added applications have spurred significant growth in WAN usage, primarily because of the surge in LAN connections to the wider networks. WANs are either point-to-point, involving a direct connection between two sites, or operate across packet-switched networks, in which data is transmitted in packets over shared circuits. Point-to-point WAN service may involve either analog dial-up lines, in which a modem is used to connect the computer to the telephone line, or dedicated leased digital telephone lines, also known as "private lines." Analog lines, which may be either part of a public-switched telephone network or leased lines, are suitable for batch data transmissions, such as congruent order entry and point-of-sale transactions. Dedicated digital phone lines permit uninterrupted, secure data transmission at fixed costs. Point-to-point WAN service providers include both local telephone companies and long distance carriers. Packet-switched network services are typically chosen by organizations which have low volumes of data or numerous sites, for which multiple dedicated lines would be too expensive. Depending on the service, WANs can be used for almost any data sharing purpose for which LANs can be used. Slower transmission speeds, however, may make some applications less practical for WANs. The most basic uses of WANs are for electronic mail and file transfer, but WANs can also permit users at remote sites to access and enter data on a central site's database, such as instantaneously updating accounting records. New types of network-based software that facilitate productivity and production tracking, such as groupware and work-flow automation software, can also be used over WANs. Using groupware, workers at dispersed locations can more easily collaborate on projects. WANs also give remote offices access to a central office's other data communications services, including the Internet. Wireless Fidelity Wi-FiA typical Wi-Fi setup contains one or more Access Points (APs) and one or more clients. An AP broadcasts its SSID (Service Set Identifier, "Network name") via packets that are called beacons, which are usually broadcast every 100 ms. The beacons are transmitted at 1 Mbit/s, and are of relatively short duration and therefore do not have a significant effect on performance. Since 1 Mbit/s is the lowest rate of Wi-Fi it assures that the client who receives the beacon can communicate at least 1 Mbit/s. Based on the settings (e.g. the SSID), the client may decide whether to connect to an AP. If two APs of the same SSID are in range of the client, the client firmware might use signal strength to decide which of the two APs to make a connection to. The Wi-Fi standard leaves connection criteria and roaming totally open to the client. This is a strength of Wi-Fi, but also means that one wireless adapter may perform substantially better than the other. Since Wi-Fi transmits in the air, it has the same properties as a non-switched ethernet network. Wi-Fi Devices :
Advantages of Wi-Fi
Disadvantages of Wi-Fi
EthernetNetwork architecture combines standards, topologies and protocols to produce a working network. Currently, the most popular network architecture is Ethernet. A network that follows the Ethernet architecture standard is known as an Ethernet network. The first Ethernet network was introduced in 1975 by Robert Metcalfe and David Boffs at Xerox Palo Alto Research Center . This network was designed as a 2.94 Mbps system that could connect over 100 computers on a one kilometer cable. Xerox, Intel and Digital extended the original specification to 10 Mbps. This design formed the basis for the IEEE 802.3 specification defined by the IEEE 802 committee. The IEEE 802.3 specification defines Ethernet standards including cabling and topology alternatives. The term Ethernet refers to the family of local-area network (LAN) products covered by the IEEE 802.3 standard that defines what is commonly known as the CSMA/CD protocol. This is a system where each computer listens to the cable before sending anything through the network. If the network is clear, the computer will transmit. If some other node is already transmitting on the cable, the computer will wait and try again when the line is clear. Sometimes, two computers attempt to transmit at the same instant. When this happens a collision occurs. Each computer then backs off and waits a random amount of time before attempting to retransmit. With this access method, it is normal to have collisions. However, the delay caused by collisions and retransmitting is very small and does not normally affect the speed of transmission on the network. It is one of the most widely implemented LAN standards. Three data rates are currently defined for operation over optical fiber and twisted-pair cables:
Each 10Base5 cable segment can have a maximum of 100 computers. The maximum permissible distance between a computer and a transceiver is 50 meters (164 feet). The maximum total length of joined segments in a 10Base5 network is 2,500 meters (8,200 feet).
Ethernet has survived as the major LAN technology (it is currently used for approximately 85 percent of the world's LAN-connected PCs and workstations) because its protocol has the following characteristics:
Ethernet LANs consist of network nodes and interconnecting media. The network nodes fall into two major classes:
The current Ethernet media options include two general types of copper cable: unshielded twisted-pair (UTP) and shielded twisted-pair (STP), plus several types of optical fiber cable. Traditionally, Ethernet uses the linear bus topology for data transmission. Some Ethernet networks also use the star bus topology.
Ethernet networks can use thinnet coaxial, thicknet coaxial or unshielded twisted pair (UTP) cables. Ethernet uses baseband transmission to transmit encoded signals over a cable. Ethernet is popular in the scientific and academic communities because it supports multiple protocols. Examples of the protocols supported by Ethernet are:
Ethernet breaks data down into frames. A frame is a package of information transmitted as a single unit. The length of an Ethernet frame can be between 64 and 1,518 bytes, but the Ethernet frame itself uses at least 18 bytes for control information. Therefore, the data in an Ethernet frame can be between 46 and 1,500 bytes. Every Ethernet frame contains control information and follows the same basic organization. For example, the Ethernet frame used for TCP/IP contains preamble, detonation, type, CRC in addition to the data.
Ethernet performance can be improved by dividing a crowded segment into two less-populated segments that are joined with a bridge or a router. This reduces traffic on each segment. Since there are fewer computers attempting to transmit on the segment, access time improves. Ethernet is the most popular network architecture in use today and can be used with most network operating systems.
Token RingThe Token Ring protocol was developed by IBM in the mid-1980s. The related IEEE 802.5 specification is almost identical to and completely compatible with IBM's Token Ring network. In fact, the IEEE 802.5 specification was modeled after IBM Token Ring, and it continues to shadow IBM's Token Ring development. The term Token Ringgenerally is used to refer to both IBM's Token Ring network and IEEE 802.5 networks. Token Ring and IEEE 802.5 networks are basically compatible, although the specifications differ in minor ways. IBM's Token Ring network specifies a star, with all end stations attached to a device called a multistation access unit (MSAU). In contrast, IEEE 802.5 does not specify a topology, although virtually all IEEE 802.5 implementations are based on a star. Other differences exist, including media type (IEEE 802.5 does not specify a media type, although IBM Token Ring networks use twisted-pair wire) and routing information field size. Below figure summarizes IBM Token Ring network and IEEE 802.5 specifications. Token Ring Operation
Token Ring standard specifies a ring topology, the IBM implementation of token ring uses the star-wired ring topology with all the computers on the network connected to a central hub.The Token Ring protocol requires a star-wired ring using twisted pair or fiber optic cable. It can operate at transmission speeds of 4 Mbps or 16 Mbps. Token Ring networks use STP and UTP cabling, such as IBM Types 1, 2 and 3 cables, to connect the network adapter cards of the computers to the central hub and to interconnect other hubs. Data in a Token Ring network is transmitted in the form of frames with start and end delimiters. The basic format of a Token Ring data frame is showed in below figure with the descriptions of each field in the data frame.
Token Ring is a stable architecture with the capacity to handle high-bandwidth applications, such as desktop videoconferencing and multimedia. The right choice of equipment is the key to high-performance, scaleable Token Ring networks. Hardware components of a Token Ring network
ArcNETAttached Resource Computer Network (ArcNet) was developed by Datapoint Corporation in 1977. It is a simple, inexpensive and flexible network architecture designed for workgroup-sized networks. ArcNet technology is described by the ANSI standard 878.1 and predates the IEEE Project 802 standards. ArcNet should not be confused with the IEEE Token Bus standard, IEEE 802.4. However, ArcNet does loosely comply to this token passing specification. ArcNet technology is described by the ANSI standard 878.1 and predates the IEEE Project 802 standards. ArcNet should not be confused with the IEEE Token Bus standard, IEEE 802.4. However, ArcNet does loosely comply to this token passing specification. The token moves from one computer to another based on node addresses instead of the physical location of computers. This means that ArcNet passes the token to the next address regardless of whether the address is on a workstation in the same room or in a separate building. Each computer in an ArcNet network is connected by a cable to a hub, which can be an active, a passive or a smart hub. The standard cabling used for ArcNet is 93 ohm RG-62 A/U coaxial cable. ArcNet also supports twisted pair and fiber optic cables. The use of star topology and cable filtering make ArcNet networks reliable. In a distributed star design, ArcNet uses passive and active hubs to control and route data tokens from one workstation to the next. Since token passing is done at a fixed rate and collisions do not occur, ArcNet is very stable. LocalTalkLocalTalk is a network protocol that was developed by Apple Computer, Inc. for Macintosh computers. The method used by LocalTalk is called CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance). It is similar to CSMA/CD except that a computer signals its intent to transmit before it actually does so. LocalTalk adapters and special twisted pair cable can be used to connect a series of computers through the serial port. The Macintosh operating system allows the establishment of a peer-to-peer network without the need for additional software. With the addition of the server version of AppleShare software, a client/server network can be established. The LocalTalk protocol allows for linear bus, star, or tree topologies using twisted pair cable. A primary disadvantage of LocalTalk is speed. Its speed of transmission is only 230 Kbps. FDDIThe Fiber Distributed Data Interface (FDDI) specifies a 100-Mbps token-passing, dual-ring LAN using fiber-optic cable. FDDI is frequently used as high-speed backbone technology because of its support for high bandwidth and greater distances than copper. It should be noted that relatively recently, a related copper specification, called Copper Distributed Data Interface (CDDI), has emerged to provide 100-Mbps service over copper. CDDI is the implementation of FDDI protocols over twisted-pair copper wire. This chapter focuses mainly on FDDI specifications and operations, but it also provides a high-level overview of CDDI.FDDI uses dual-ring architecture with traffic on each ring flowing in opposite directions (called counter-rotating). The dual rings consist of a primary and a secondary ring. During normal operation, the primary ring is used for data transmission, and the secondary ring remains idle. As will be discussed in detail later in this chapter, the primary purpose of the dual rings is to provide superior reliability and robustness. Figure shows the counter-rotating primary and secondary FDDI rings. FDDI uses optical fiber as the primary transmission medium, but it also can run over copper cabling. As mentioned earlier, FDDI over copper is referred to as Copper-Distributed Data Interface (CDDI). Optical fiber has several advantages over copper media. In particular, security, reliability, and performance all are enhanced with optical fiber media because fiber does not emit electrical signals. A physical medium that does emit electrical signals (copper) can be tapped and therefore would permit unauthorized access to the data that is transiting the medium. In addition, fiber is immune to electrical interference from radio frequency interference (RFI) and electromagnetic interference (EMI). Fiber historically has supported much higher bandwidth (throughput potential) than copper, although recent technological advances have made copper capable of transmitting at 100 Mbps. Finally, FDDI allows 2 km between stations using multimode fiber, and even longer distances using a single mode FDDI defines two types of optical fiber: single-mode and multimode. A mode is a ray of light that enters the fiber at a particular angle. Multimode fiber uses LED as the light-generating device, while single-mode fiber generally uses lasers. Below figure depicts single-mode fiber using a laser light source and multimode fiber using a light emitting diode (LED) light source. FDDI specifies the physical and media-access portions of the OSI reference model. FDDI is not actually a single specification, but it is a collection of four separate specifications, each with a specific function. Combined, these specifications have the capability to provide high-speed connectivity between upper-layer protocols such as TCP/IP and IPX, and media such as fiber-optic cabling. The FDDI frame format is similar to the format of a Token Ring frame. This is one of the areas in which FDDI borrows heavily from earlier LAN technologies, such as Token Ring. FDDI frames can be as large as 4,500 bytes. Figure shows the frame format of an FDDI data frame and token.
Ethernet Network Interface Card (NIC)A network card (network adapter, network interface card, NIC, Ethernet adapter etc.) is a piece of computer hardware designed to allow computers to communicate over a computer network. It is an OSI model layer 2 item. Every network card in the world has a unique 48-bit serial number called a MAC address, which is written to ROM carried on the card. Every computer on a network must have a card with a unique MAC address. The IEEE is responsible for assigning MAC addresses to the vendors of network interface cards, which means that two cards sharing the same MAC address is impossible. Whereas network cards used to be expansion cards to plug into a computer bus, most new computers have a network interface built into the motherboard, so a separate network card is not required unless multiple interfaces are needed or some other type of network is used. The card implements the electronic circuitry required to communicate using a specific physical layer and data link layer standard such as Ethernet or token ring. This provides a base for a full network protocol stack, allowing communication among small groups of computers on the same LAN and large-scale network communications through routable protocols, such as IP.
A network card typically has a twisted pair and BNC sockets where the network cable is connected, and a few LEDs to inform the user of whether the network is active, and whether or not there is data being transmitted on it. The Network Cards are typically available in 10/100/1000 Mbit/s. This means they can support a transfer rate of 10 or 100 or 1000 Mbit/s. Network CablesCable is the medium through which information usually moves from one network device to another. There are several types of cable which are commonly used with LANs. In some cases, a network will utilize only one type of cable, other networks will use a variety of cable types. The type of cable chosen for a network is related to the network's topology, protocol, and size. Understanding the characteristics of different types of cable and how they relate to other aspects of a network is necessary for the development of a successful network. The following sections discuss the types of cables used in networks. Twisted PairA thin-diameter wire commonly used for telephone and network cabling. The wires are twisted around each other to minimize interference from other twisted pairs in the cable. Twisted pairs have less bandwidth than coaxial cable or optical fiber. UTP (Unshielded Twisted Pair) & STP (Shielded Twisted Pair)Twisted pair cables are available unshielded (UTP) and shielded (STP), with UTP being the most common. STP is used in noisy and static field interference environments (factories) where the shield around each of the wire pairs, plus an overall shield, protects against excessive electromagnetic interference. A variation of STP, known as ScTP for "Screened Twisted Pair" or FTP for "Foil Twisted Pair," uses only the overall shield and provides more protection than UTP, but not as much as STP. Unshielded Twisted Pair (UTP)UTP cables are not shielded. This lack of shielding results in a high degree of flexibility as well as rugged durability. UTP cables are found in many ethernet networks and telephone systems. Shielded Twisted Pair (STP)STP cabling includes metal shielding over each individual pair of copper wires. This type of shielding protects cable from external EMI (electromagnetic interferences). e.g. the 150 ohm shielded twisted pair cables defined by the IBM Cabling System specifications and used with Token Ring networks. Screened Shielded Twisted Pair (S/STP)S/STP cabling is STP cabling with metal shielding also covering the group of shielded copper pairs. This type of cabling offers still improved protection from interference from external sources. Screened Unshielded Twisted Pair (S/UTP)S/UTP, also known as Fully shielded (or Foiled) Twisted Pair (FTP) and Screened Fully shielded Twisted Pair (S/FTP), is a screened UTP cable. Twisted pair cabling is standardized into various categories by numbers, which indicate signal integrity attributes. Category 5 cable is commonly used for Ethernet with 10BASE-T or 100BASE-TX. Coaxial cablesCoaxial cables are widely used for transmitting voice, video and data over LANs. To select the appropriate type of coaxial cable for our network, it is useful to learn about the benefits and limitations of coaxial cable types. There are two types of cable available based on the thickness of core
Fiber Optic CableA thin glass strand designed for light transmission. A single hair-thin fiber is capable of transmitting trillions of bits per second. In addition to their huge transmission capacity, optical fibers offer many advantages over electricity and copper wire. Light pulses are not affected by random radiation in the environment, and their error rate is significantly lower. Fibers allow longer distances to be spanned before the signal has to be regenerated by expensive "repeaters." Fibers are more secure, because taps in the line can be detected, and lastly, fiber installation is streamlined due to their dramatically lower weight and smaller size compared to copper cables. There are two primary types of fiber. For intercity cabling and highest speed, singlemode fiber with a core diameter of less than 10 microns is used. Multimode fiber is very common for short distances and has a core diameter from 50 to 100 microns. The optical fiber can be used as a medium for telecommunication and networking because it is flexible and can be bundled as cables. Although fibers can be made out of either transparent plastic or glass, the fibers used in long-distance telecommunications applications are always glass, because of the lower optical attenuation. Both multi-mode and single-mode fibers are used in communications, with multi-mode fiber used mostly for short distances (up to 500 m), and single-mode fiber used for longer distance links. Because of the tighter tolerances required to couple light into and between single-mode fibers, single-mode transmitters, receivers, amplifiers and other components are generally more expensive than multi-mode components. The light used is typically infrared light, at wavelengths near to the minimum absorption wavelength of the fiber in use. The fiber absorption is minimal for 1550 nm light and dispersion is minimal at 1310 nm making these the optimal wavelength regions for data transmission. A local minimum of absorption is found near 850 nm, a wavelength for which low cost transmitters and receivers can be designed, and this wavelength is often used for short distance applications. Fibers are generally used in pairs, with one fiber of the pair carrying a signal in each direction. For modern glass optical fiber, the maximum transmission distance is limited not by attenuation but by dispersion, or spreading of optical pulses as they travel along the fiber. Dispersion in optical fibers is caused by a variety of factors. Intermodal dispersion, caused by the different axial speeds of different transverse modes, limits the performance of multi-mode fiber. Because single-mode fiber supports only one transverse mode, intermodal dispersion is eliminated. For single-mode fiber performance is limited by chromatic dispersion, which occurs because the index of the glass varies slightly depending on the wavelength of the light, and light from real optical transmitters has nonzero spectral width. Polarization mode dispersion, which can limit the performance of single-mode systems, occurs because although the single-mode fiber can sustain only one transverse mode, it can carry this mode with two different polarizations, and slight imperfections or distortions in a fiber can alter the propagation velocities for the two polarizations. Dispersion limits the bandwidth of the fiber because the spreading optical pulse limits the rate that pulses can follow one another on the fiber and still be distinguishable at the receiver. Because the effect of dispersion increases with the length of the fiber, a fiber transmission system is often characterized by its bandwidth-distance product, often expressed in units of MHzÃ-km. This value is a product of bandwidth and distance because there is a tradeoff between the bandwidth of the signal and the distance it can be carried. For example, a common multimode fiber with bandwidth-distance product of 500 MHzÃ-km could carry a 500 MHz signal for 1 km or a 1000 MHz signal for 0.5 km. In single-mode fiber systems, both the fiber characteristics and the spectral width of the transmitter contribute to determining the bandwidth-distance product of the system. Typical single-mode systems can sustain transmission distances of 80 to 140 km (50 to 87 miles) between regenerations of the signal. By using an extremely narrow-spectrum laser source, data rates of up to 40 gigabits per second are achieved in real-world applications. Ethernet SwitchesAn Ethernet Switch is a LAN interconnection device which operates at the data link layer (layer 2) of the OSI reference model. A switch is fundamentally similar to a bridge , but usually supports a larger number of connected LAN segments and has a richer management capability. A network switch is a computer networking device that connects network segments. It uses the logic of a Network bridge but allows a physical and logical star topology. It is often used to replace network hubs. A switch is also often referred to as an intelligent hub or switching hub. As a frame comes into a switch, the switch saves the originating MAC address and the originating port in the switch's MAC address table. The switch then selectively transmits the frame from specific ports based on the frame's destination MAC address and previous entries in the MAC address table.
RoutersA router is an Intermediate System (IS) which operates at the network layer of the OSI reference model. Routers may be used to connect two or more IP networks , or an IP network to an internet connection. A router consists of a computer with at least two network interface cards supporting theIP protocol . The router receives packets from each interface via a network interface and forwards the received packets to an appropriate output network interface. Received packets have all link layer protocol headers removed, and transmitted packets have a new link protocol header added prior to transmission. The router uses the information held in the network layer header (i.e. IP header) to decide whether to forward each received packet, and which network interface to use to send the packet. Most packets are forwareded based on the packet's IP destination address , along with routing information held within the router in a routing table. Before a packet is forwarded, the processor checks the Maximum Transfer Unit (MTU) of the specified interface. Packets larger than the interface's MTU must be fragmented by the router into two or more smaller packets. If a packet is received which has the Don't Fragment (DF) bit set in the packet header , the packet is not fragmented, but instead discarded. In this case, an ICMP error message is returned to the sender (i.e. to the original packet's IP source address) informing it of the interface's MTU size. This forms the basis for Path MTU discovery (PMTU) . The routing and filter tables resemble similar tables in link layer bridges and switches. Except, that instead of specifying link hardware addresses ( MAC addresses ), the router table sepcify network ( IP addresses ). The routing table lists known IP destination addresses with the appropraite network interface to be used to reach that destiantion. A default entry may be specified to be used for all addresses not explicitly defined in the table. A filter table may also be used to ensure that unwanted packets are discarded. The filter may be used to deny access to particular protocols or to prevent unauthorised access from remote computers by discarding packets to specified destination addresses. A router forwards packets from one IP network to another IP network. Like other systems, it determines the IP network from the logical AND of an IP address with the associated subnetwork address mask. One execption to this rule is when a router receives an IP packet to a network broadcast address. In this case, the router discards the packet. Forwarding broadcast packet can lead to severe storms of packets, and if uncontrolled could lead to network overload. Routers are often used to connect together networks which use different types of links (for instance an HDLC link connecting a WAN to a local Ethernet LAN ). The optimum (and maximum) packet lengths (i.e. the maximum transmission unit (MTU) ) is different for different types of network. A router may therefore uses IP to provide segmentation of packets into a suitable size for transmission on a network. Patch panelsA panel of network ports contained together, usually within a telecommunications closet, which connects incoming and outgoing lines of a LAN or other communication, electronic or electrical system. In a LAN , the patch panel connects the network's computers to each other and to the outside lines that enable the LAN to connect to the Internet or another WAN. Connections are made with patch cords. The patch panel allows circuits to be arranged and rearranged by plugging and unplugging the patch cords. Switch rackA rack which can accommodate the Ethernet switch and patch panel, and usually this located on the common place for all the computers. Wall palletsThe wall outlet will be like a plug point which connects the internal and external wiring, and the wall outlet is mostly used for secure the internal cables. FirewallA firewall protects networked computers from intentional hostile intrusion that could compromise confidentiality or result in data corruption or denial of service. It may be a hardware device or a software program running on a secure host computer. In either case, it must have at least two network interfaces, one for the network it is intended to protect, and one for the network it is exposed to.
A firewall sits at the junction point or gateway between the two networks, usually a private network and a public network such as the Internet. The earliest firewalls were simply routers. The term firewall comes from the fact that by segmenting a network into different physical subnetworks, they limited the damage that could spread from one subnet to another just like firedoors or firewalls. A firewall examines all traffic routed between the two networks to see if it meets certain criteria. If it does, it is routed between the networks, otherwise it is stopped. A firewall filters both inbound and outbound traffic. It can also manage public access to private networked resources such as host applications. It can be used to log all attempts to enter the private network and trigger alarms when hostile or unauthorized entry is attempted. Firewalls can filter packets based on their source and destination addresses and port numbers. This is known as address filtering. Firewalls can also filter specific types of network traffic. This is also known as protocol filtering because the decision to forward or reject traffic is dependant upon the protocol used, for example HTTP, ftp or telnet. Firewalls can also filter traffic by packet attribute or state. A firewall cannot prevent individual users with modems from dialling into or out of the network, bypassing the firewall altogether. Employee misconduct or carelessness cannot be controlled by firewalls. Policies involving the use and misuse of passwords and user accounts must be strictly enforced. These are management issues that should be raised during the planning of any security policy but that cannot be solved with firewalls alone. Bus topologyA bus topology network is a network architecture in which a set of clients are connected via a shared communications line, called a bus. The bus topology is often referred to as a "linear bus" because the computers are connected in a straight line. This is the simplest and most common method of networking computers. Below figure shows a typical bus topology. It consists of a single cable called a trunk (also called a backbone or segment) that connects all of the computers in the network in a single line. Computers on a bus topology network communicate by addressing data to a particular computer and sending out that data on the cable as electronic signals. Network data in the form of electronic signals is sent to all the computers on the network. Only the computer whose address matches the address encoded in the original signal accepts the information. All other computers reject the data. Figure shows a message being sent from 0020af151d8b to 02608c133456. Only one computer at a time can send messages. Because only one computer at a time can send data on a bus network, the number of computers attached to the bus will affect network performance. The more computers there are on a bus, the more computers will be waiting to put data on the bus and, consequently, the slower the network will be. There is no standard way to measure the impact of a given number of computers on the speed of any given network. The effect on performance is not related solely to the number of computers. The following is a list of factors that in addition to the number of networked computers will affect the performance of a network:
Computers on a bus either transmit data to other computers on the network or listen for data from other computers on the network. They are not responsible for moving data from one computer to the next. Consequently, if one computer fails, it does not affect the rest of the network. Because the data, or electronic signal, is sent to the entire network, it travels from one end of the cable to the other. If the signal is allowed to continue uninterrupted, it will keep bouncing back and forth along the cable and prevent other computers from sending signals. Therefore, the signal must be stopped after it has had a chance to reach the proper destination address. To stop the signal from bouncing, a component called a terminator is placed at each end of the cable to absorb free signals. Absorbing the signal clears the cable so that other computers can send data. Both ends of each cable segment on the network must be plugged into something. For example, a cable end can be plugged into a computer or a connector to extend the cable length. Any open cable ends not plugged into something must be terminated to prevent signal bounce. Figure 2.2.3 shows a properly terminated bus topology network. Advantages and Disadvantages of a Bus Network
Disadvantages
Star topologyStar networks are one of the most common computer network topologies. In its simplest form, a star network consists of one central switch , hub or computer which acts as a router to transmit messages. In the star topology, cable segments from each computer are connected to a centralized component called a hub . Figure 2.2.6 shows four computers and a hub connected in a star topology. Signals are transmitted from the sending computer through the hub to all computers on the network. This topology originated in the early days of computing when computers were connected to a centralized mainframe computer. The star network offers the advantage of centralized resources and management. However, because each computer is connected to a central point, this topology requires a great deal of cable in a large network installation. Also, if the central point fails, the entire network goes down. If one computer or the cable that connects it to the hub fails on a star network, only the failed computer will not be able to send or receive network data. The rest of the network continues to function normally. Another characteristic of the star topology is that it is easy to modify. Computers can be added or removed from the network without disturbing the functioning of the network. The star topology supports the expansion of networks. This is done by placing another hub where a computer can be located. This enables several more computers or hubs to be connected to the main hub. A disadvantage of the star topology is that the cost of cabling is higher in a network based on this topology because all the network cables need to be extended to one central point. Advantages and Disadvantages of a Ring NetworkAdvantages
Disadvantages
Mesh topologyA mesh topology network offers superior redundancy and reliability. In a mesh topology, each computer is connected to every other computer by separate cabling. This configuration provides redundant paths throughout the network so that if one cable fails, another will take over the traffic. While ease of troubleshooting and increased reliability is definite pluses, these networks are expensive to install because they use a lot of cabling. Often, a mesh topology will be used in conjunction with other topologies to form a hybrid topology. Mesh networks are self-healing: the network can still operate even when a node breaks down or a connection goes bad. As a result, a very reliable network is formed. This concept is applicable to wireless networks, wired networks, and software interaction. A mesh network is a networking technique which allows inexpensive peer network nodes to supply back haul services to other nodes in the same network. It effectively extends a network by sharing access to higher cost network infrastructure. Advantages and Disadvantages of a mesh networkAdvantages
Disadvantages
Selecting a TopologyThere are many factors to consider when deciding which topology best suits the needs of an organization. Below table provides some guidelines for selecting a topology.
OSI LayerOSI (Open Systems Interconnection) is a standard description or "reference model" for how messages should be transmitted between any two points in a telecommunicationnetwork. Its purpose is to guide product implementers so that their products will consistently work with other products. The reference model defines seven layers of functions that take place at each end of a communication. Although OSI is not always strictly adhered to in terms of keeping related functions together in a well-defined layer, many if not most products involved in telecommunication make an attempt to describe them in relation to the OSI model. It is also valuable as a single reference view of communication that furnishes everyone a common ground for education and discussion. Developed by representatives of major computer and telecommunication companies beginning in 1983, OSI was originally intended to be a detailed specification of interfaces. Instead, the committee decided to establish a common reference model for which others could develop detailed interfaces that in turn could become standards. OSI was officially adopted as an international standard by the International Organization of Standards ( ISO ). Currently, it is Recommendation X.200 of the ITU-TS. The main idea in OSI is that the process of communication between two end points in a telecommunication network can be divided into layers, with each layer adding its own set of special, related functions. Each communicating user or program is at a computer equipped with these seven layers of function. So, in a given message between users, there will be a flow of data through each layer at one end down through the layers in that computer and, at the other end, when the message arrives, another flow of data up through the layers in the receiving computer and ultimately to the end user or program. The actual programming and hardware that furnishes these seven layers of function is usually a combination of the computer operating system , applications (such as your Web browser), TCP/IP or alternative transport and network protocols, and the software and hardware that enable you to put a signal on one of the lines attached to your computer. OSI divides telecommunication into seven layers. The layers are in two groups. The upper four layers are used whenever a message passes from or to a user. The lower three layers (up to the network layer) are used when any message passes through the host computer. Messages intended for this computer pass to the upper layers. Messages destined for some other host are not passed up to the upper layers but are forwarded to another host. The seven layers are:
Layer 7: The application layerThe application layer is the seventh level of the seven-layer OSI model. It interfaces directly to and performs common application services for the application processes; it also issues requests to the presentation layer . The common application layer services provide semantic conversion between associated application processes. Note: Examples of common application services of general interest include the virtual file, virtual terminal , and job transfer and manipulation protocols. Examples:
Layer 6: The presentation layerThe presentation layer is the sixth level of the seven layer OSI model. It responds to service requests from the application layer and issues service requests to the session layer . The presentation layer concerns itself not only with the format and representation of actual user data, but also with data structure used by programs. Therefore, the presentation layer negotiates data transfer syntax for the application layer. The presentation layer is responsible for the delivery and formatting of information to the application layer for further processing or display. It relieves the application layer of concern regarding syntactical differences in data representation within the end- usersystems. Note: An example of a presentation service would be the conversion of anEBCDIC -coded text file to an ASCII -coded file. The idea of the application layer should be able to point at the data to be moved, and the Presentation layer will deal with the rest. Encryption is typically done at this level too, though it can be done at the application , session , transport , or network layer ; each having its own advantages and disadvantages. Another example is representing structure, which is normally standardised at this level, often by using XML . As well as simple pieces of data, like strings, more complicated things are standardised in this layer. Two common examples are 'objects' in object-oriented programming , and the exact way that streaming video is transmited. In many widely used applications and protocols, no distinction is made between the presentation and application layers. For example, HTTP , generally regarded as an application layer protocol, has presentation layer aspects such as the ability to identify character encodings for proper conversion, which is then done in the application layer. Examples:
Layer 5: The session layerThe session layer is level five of the seven level OSI model. It responds to service requests from the presentation layer and issues service requests to the transport layer . The Session layer provides the mechanism for managing the dialogue between end-user application processes. It provides for either full duplex or half-duplex operation and establishes checkpointing, adjournment, termination, and restart procedures. The Session layer is typically completely unused, but it does have a few places where it is useful. The idea is to allow information on different streams, perhaps originating from different sources, to be properly combined. In particular, it deals with synchronization issues, and ensuring nobody ever sees inconsistent versions of data, and similar things. One application which is fairly intuitively clear is web conferencing . Here, we want to make sure that the streams of audio and video match up - or in other words, that we do not have lipsync problems. We may also want to do "floor control" - ensuring that the person displayed on screen and whose words are relayed is the one selected by the speaker, or by some other criteria. Another big application is in live TV programs, where streams of audio and video need to be seamlessly merged from one to the other so that we do not have half a second of blank airtime, or half a second when we transmit two pictures simultaneously. Examples:
| |||||||||||||||||
No comments:
Post a Comment