Anda di halaman 1dari 14

[TYPE THE COMPANY NAME]

Networking Technology Report

Unit Code/ Title: Tutor : Student ID:

COMP 012 Networking Technology Dr M Darwish 00000000000000

1) Networks and Academic Establishment A computer network is a group of computers of two or more which are linked through cables (or are located in a certain distance between each other but still use connection wirelessly. Many companies have a considerable large numbers of computers. In workforce every computers need to work in isolation from the others. Many organisations have decided to connect their Computers to be able to extract and correlate information about the entire company. The role of network is to make all programs, equipment and most importantly informations to be all collaborating and alliance together. Network can support an academic establishment which has four building. A user happens to be 3 miles away from his data should not prevent him from using the data. Network will make easier for a user to use his data throughout every building in the university or college. This made informal for students and staff to use their informations and data throughout the entire buildings. Numbers of Student and staff in academic establishment are huge and the resource implications of networks needed are Local Area Network (LAN). A local area network is a connection of computers located in university. A LAN is composed of any numbers varying between several to a group of computer sharing resources (software, printer, scanner, and many more devices). A LAN is an ideal for academic establishment use because of the fact that some resources are share in the network which is financially a solution for example using a colour printer each room. The interconnection of LAN allows workstations are controlled by a server which is commanded by a network manager, user can access using logging number to the station but s/he can only access application, its own files, files saved as read-only in a shared drive. Academic establishment required two approaches called peer to peer and client server networks. First of all, a peer-to-peer computer network is where computer are link to one another, where the network is based on how many computer are linked and that its purposed for sharing files but most importantly these type of connect is used for university and college. In the connection of peer-to-peer all connected parties are client and server both at

the same time. Client is a system administrator; all data of internal stakeholders are stored on powerful computers called servers. However employees and student will have straight forward computer called Clients in front of them. (E.g. spread sheet they are producing). Peer-to-peer networking advantages are providing flexibility when it comes to expanding the system to deal with large number of client. Client server networking is slightly dissimilar as it provides a method of keeping data secure. The functions of client and server computers are widely used and practice the basis of much network usage. It is appropriate either way, when the client and server are both in the same building or when they are far apart. Majority, one server can deals a large number of clients. In order to understand the interaction it could be carried out between client and server, we decide to analyse communication methods, initially client send a message over the network to the server process, formerly it required await for reply message. While waiting for reply, the serve receive request, then it start processing the requested work and send reply back. By adopting the client/server approaches, business will benefits from it particularly over centralised services. Faster development as programmers: this means client /server are fast and becoming most needed application in workforce. Its flexible and fast speed application when it comes to developing times. Approximately it takes 6 months to develop a client servers model. This is reducing time. Based on network management, and not vertical management: - this means business can run efficient and hence making more profits. A large number of customers focused: secure data of large number of clients. More integrated & built in sync with business needs: this means different businesses have different needs and client /server can help each business individually according to their need. Easy contact to information: Client can contact data easily.

2) Hardware components and the role of network operating system (NOS) software LAN topologies are an arrangement in which the components of a LAN are connected to each other i.e. the layout of the devices and the links between components between them. It is good to make different between logical and physical network topology. Logical topology is the way the network works, whereas physical is the appearance of the network. There are three main different types of network topology: Bus topology: is a type of a network whose components are connected by a single cable to which the devices are attached and share. Data transmitted by one computer pass through the common cable until it reaches to the receiver end (terminator). Bus topology is limited by the numbers of devices that can be connected so it uses bridges to expand that number of devices. There is a problem for terminators (every set of computers using a bus network topology), which is data can be accidentally collided with another data send by other computers link in the bus topology. To reduce collision a logical bus topology use a techniques called CSMA/CD (carrier sense access/ collision detect). Every machine listens first to the bus whether it is traffic free or not. If there is a message going on the bus, it waits a random amount of time and tries to send afterward.

Ring topology: is another type of network whose devices or components are attached in which each computer of the network is connected to two others in such a way that the first and last components are connected to each other.

Data transmitted flows in circular directions from one machine to the other; this type of logical topology is one of the physical ways to prevent data collision by using token ring. It means that a machine can only use the network if it has the token control with it because of that it makes collision free.

Star topology: is topology which devices are connected to a central hub. Data is transmitted directly through the hub which make much weaker topology because if the hub fails, all the computers connected to the hub will disconnect. (Copy computer image from clip Art) A tree topology is a network that has the characteristics of linear bus and star topologies. It combines groups of star-configured workstations linked to a linear bus backbone cable. Tree topologies are used to expand an existing network, and enable academic establishment to arrange a network to meet their needs.

Image from: http://fcit.usf.edu/network/chap5/chap5.htm

The table below shows advantages and disadvantages of different topologies. Topologies Type Advantages Disadvantages Its easy when Entire network will failed connecting computers. if there is a break in the main cable. Need less cable length as all computers are all Terminators are in a line. required at both ends of the backbone cable. Its very difficult to identify the problem if the entire network shuts down. Length of each segment is limited by the type of cabling used. Further, If the backbone line breaks, the entire segment will shut down. More complicated to configure and wire than other topologies.

Linear Bus Topology

Tree Topology

It has point-to-point wiring for individual segments. It gets supported by several hardware and software venders.

Star Topology

Its easier when However Star topology installing and wiring. needs more cable length than a linear topology. It does prevent disruptions to the Failures of hub, switch, network when or concentrator will connecting or removing caused nodes attached devices. to be disabled. Its very efficient to It cost more than linear detect faults and to bus topologies because remove parts. of the cost of the hubs, switch and concentrator.

Networking operating system Network computers required a network operating system to operate efficient. The reason is individual computers cannot share resources, and other users cannot make use of those resources without a network Operating System (NOSs). Microsoft Windows, Mac OS X and Linux are network operating system's manufacturer and they are able to include operating system software to their computers. A computer's operating system systematise the interaction between the computer hardware and the software programs it is running. It controls the sharing and use of hardware resources (Memory, CPU time, and Disk space). 3) The Connection of Different Network Components To make the connection of networks components possible there are several interconnection devices which makes easier for data to be transferred: o Hubs: is a device that connects a numerous computers together by using unshielded twisted pair (UTP) cables with RJ45 connectors at each end. It is a cheap method of expanding a network, security wise it doesnt prevent data to be seen by other user of the network because it just

amplifies data received from a computer to the other computer attached to the hub. o Switches: it does the same job as hubs but it is much cleverer because it receives and sent data only from both correspondent computers. The benefit of this type of device is that network traffic is reduced which eliminate the chances of collision at all. Switches are commonly used for their performance than hubs. o Repeaters: is devices used for extending cable lengths. A repeater amplifies and retransmits messages without any process. Due to the limitation of lengths of an Ethernet cable repeaters are design to do that job. o Bridges: seemed like repeaters but much intelligent, they used to connect, for example two different floors in the same building. o Routers: it does the same job as bridges but routers operate at a network layer whereas bridges connect OSI layer. A router is a device that extracts the destination of a packet it receives, selects the best path to that destination, and forwards data packets to the next device along this path. They connect networks together; a LAN to a WAN for example, to access the Internet. Router determines how data can flow from source to destination in the most efficient way. o Gateways: is a device that translates one type of network data to another network data, where the two networks are different topology i.e. ring to star. A signal is an electrical or electromagnetic action emit by some sort of voltage that is a function of time that converts the information of the radio or TV program or of communication with another devices. Analogue Signal Analogue signal is any variable signal continuously in both time and amplitude. It is an electronic system with a continuous variable signal. This signal take only one or two levels, its described as the proportional relationship between a signal and a voltage or a current that represent a signal. This Electrical signals may represent information by changing their voltage, current, frequency, or total charge. Information is converted from some other physical form (such as

sound, light, temperature, pressure, position) to an electrical signal by a transducer. A transducer is sometimes defined as any device that converts a signal from one form to another. For example it converts one type of energy to another for various purposes including measurement or information transfer (pressure sensors). Digital Signal It consists of pulses of voltage or current which represent the information to be processed by a computer in which the original information is converted into a string of bits before being transmitted. Digital signals can be sent for long distances and suffer less interference than analogue signal. A network card is the physical access between the computer and cable. It adapts the data sent by the computer into a form which can be used by the networking medium, further it transfers that data to another computer and controls all dataflow between the computer and cable. It also defined the data coming from the cable into bytes so that the computer's CPU can read it.

4)Open System interconnection (OSI) model and common network architectures. A driver is software that allows a computer to work with a specific device. The computers operating system cannot function proper with the device until the driver for that device is installed and configured successfully. The software driver will enable to tell the computer how the device works; this is allowing the device to perform efficient and effective. Drivers are need for almost every type of devices for example; mouse keyboard devices, hard and floppy-disk drives, Multimedia devices (microphones, cameras, and recorders) Network interface cards (NICs) and Printers. Camera provides a good illustration of how drivers support and make device perform with the computer operating system. Cameras are manufactured by different manufacturers all have different features and functions. Its

impossible for computer manufacturer such as Microsoft and MAC to equip new computers with all the software necessary to identify and work with every type of camera. Therefore, camera manufacturers make drivers available for each camera. Before user start importing picture file to his/her computer, user must install the driver for that camera on to his/her computer's hard drive. Drivers can be stored on a disk sold it with the device equipment. OSI is known as operating system interconnection which defined how a modern network functions. OSI systems have seven layers and device driver interact with data link control layer which can be found in the seven layers model. Each layer relies on sub-layer. The device driver does rely on lowest layer which is the Hardware.

Source from: Networking a Beginner Guide, Hallberg (2010). Physical Layer- This is bottom layers; it called Physical. It defines the physical characteristics used to make a network connection. The requirements of physical layers can be: voltage levels, cable used, and timing of electrical signals. Data Link Layer - In this layer, Data link control is relying on the appropriate physical protocol. It creates a reliable transport from the physical layers to the network layers which will transmit its data.

10

Network Data Layer- This layer does handle many actions for instant logical, protocols, routing and addressing. This layer deals on how the data will be sent to recipient. Transport Layer - This layer continues flow control of data and manages for error checking and recovery of data between the devices. It provides flow control from one network application to another. It does observe if data is coming from more than one network application and puts together each application's data into a single flow. Session Layer this layer establishes, maintains and connects from a user network to ends communication with the receiving device. Session cooperate the client and peer to peer network on subject flow control, transfer information and transaction processing. Presentation Layer- this layer takes the data provided by the lower level layer and transforms into a standard format so it can present to the system. Application Layer- This is the layer helped with the operating system and the applications that interact whenever the user chooses to transfer files, read messages or performs other network-related activities. Hallberg (2010). IEEE 802 to existing OSI layers The IEEE produced the 802-standards for example 802.5 Token Ring and 802.11 for wireless networks. IEEE and OSI exchanged information that helped producing two compatible standards. The IEEE 802 standards outline physical network components which are cabling and network interfaces, and agree to the Data Link control and/or Physical layer of the OSI model. The IEEE advanced the standards and divided the Data Link layer into two sub layers: the LLC and the MAC sub layer. LLC sub layer: - this is stand for Logical Link Control. The LLC layer is the top sub layer of the Data Link layer and it does configuration referring the IEEE 802.2 standard. LLC cover the basic physical network technologies by hiding their differences to provide a single interface to the Network layer. The LLC sub layer practices Source Service Access Points (SSAPs) and Destination Service Access Points (DSAPs) to support the lower layers connect with the Network layer protocols, acting as an middle between the different network protocols

11

(IPX, TCP/IP, etc.) and the different network technologies (Ethernet, Token Ring, etc.). Additionally, the responsibility of LLC layer is to arrange and responses of individual setting. MAC sub-layer: This is short for Media Access Control layer, the role of MAC is looks after the physical addressing and lets upper layers contact to the physical media, it does deals with the frame addressing, also error checking. This layer can contact and controls the physical networks through Network Interface Card (NIC). It helps to breaks data into bits which will be easy to transfer them on the Physical layer who pass them on the wire (and vice versa). IEEE LAN standards such as 802.3, 802.4, 802.5, and 802.11 define standards for the MAC sub layer as well as the Physical layer. COMMON NETWORK ARCHITECTURES James McCabe 3rd edition book called Network Analysis architecture and design provide good definition of network architecture. He said Network Architecture is like art, science of designing, constructing or the discipline dealing with the principles of design and building. James McCabe (2007). Network architecture is a proposal of a computer communication network, which allows a tools basis for designing, building and managing a communication network. Network Architecture is set of layer and protocols. Layering is an up-to-date network design principle which divides the communication tasks into a number of smaller parts, each part accomplishing a particular sub-task and interacting with the other parts in a small number of well-defined ways. Layering allows the parts of a communication to be designed and tested. The network architecture can influence and control of the network, the specification of architecture is understand will learn how to design, maintain, and troubleshoot Internet, intranet, and extract connections, including localand wide-area networks. This specialisation will also build your knowledge of developing security and disaster recovery plans. Open Systems Interconnection (OSI) network architecture, was produced by International Organization for Standardization. They did set a standard for

12

communication in the network across different equipment and applications by different vendors. OSI layers 7 layers can be explained as the primary network architecture model which can deployed inter- computing and inter- networking communications. Different Network Architectures can exist and developed by many vendors, such as IBM SNA (Systems Network Architecture), Digital Equipment Corporation (DEC; now part of HP) DNA (Digital Network Architecture), Apple computer's AppleTalk, and Novell's NetWare.

13

References Andrew S. T, (2003) 4th Computer networks Upper Saddle River, NJ: Prentice Hall PTR. James D. C, (2007) 3rd Ed Network analysis, architecture, and design Amsterdam ; Boston : Elsevier/Morgan Kaufmann Publishers Leonid G. K, Ning. C, Wei-Tao S., David G. , Shing-Wa W. (2011) Broadband optical access networks Hoboken, N.J. : Wiley. Michael D. and Richard R. 2nd ed. (2003) Data communications and computer networks: for computer scientists and engineers Harlow, England: Pearson/Prentice Hall Thomas C. J, (2003) Distributed storage networks: architecture, protocols and management Chichester: Wiley. Albert W.C. & Thomas Y.C. . (2011). For Senior IT Management. Available: http://www.doc.ic.ac.uk/~nd/surprise_95/journal/vol4/wcy/report.html. Last accessed 28th Feb 2012. UNknown . (2011). Network Architecture. Available: http://www.edrawsoft.com/Network-Architecture.php. Last accessed 27th Jan 2012. unknown . (2011). 7 layers OSI model. Available: http://www.techexams.net/technotes/networkplus/osimodel.shtml. Last accessed 28th Jan 2012. Unknown . (2010). Device driver and OSI. Available: http://pluto.ksi.edu/~cyh/cis370/ebook/ch05d.htm. Last accessed 2nd Jan 2012.

Anda mungkin juga menyukai