Instructors:
Course objective:
To introduce students to computer networks and their classification. To introduce students to networking media with emphasis on LAN cabling. To introduce students to Ethernet technologies and their standards. To introduce to students principles of computer networks communication and devices.
Course content
Introduction to Networking: networks classification basics, peer-to-peer networks,LANs, Wireless LANs, VLANs and WANs, Intranet, Internet, Extranet, peerto-peer,client server, hybrid models. Networking Media fundamentals: evolution of networking media, merits and demerits of different media, UTP,
Computer Networks
Printers, Scanners, CD-ROMs, exchange files, or allow electronic communications. The computers on a network may be linked through cables, telephone lines, radio waves, satellites, or infrared light beams.
Communication Networks
What are communication networks and what advantages do they offer? A network, or a communication network , is a system of interconnected computers, telephones, or other communication devices that can communicate with one another and share applications and data. It is the tying together of so many communication devices in so many ways that is changing the world we live in. A network requires various devices, and a network operating software
TYPES OF COMPUTER NETWORKS Networks may be divided into different types and categories according to four different criteria:
Installation cost
Network coverageSmall area, about Cities, states and 1Mile range countries
23
B1-Private Networks
Most networks are for the private use of the organizations to which they belong; these are called private networks. Networks maintained by banks, insurance companies, airlines, hospitals, and most other businesses are of this nature.
24
B2-Public Networks
Public networks, on the other hand, are generally accessible to the average user, but may require registration and payment of connection fees. Internet is the most-widely known example of a public network. Technically, both private and public networks may be of LAN, MAN, or WAN type, although public networks, by their size and nature, tend to WANs.
25
26
27
broadcast model
A part of the message (an address) indicates for which node the message is intended. All nodes look at this address and ignore the message if it does not match their own address.
Wireless LANs:
Wireless LANs: Are used to connect LAN's without the additional cost or inconvenience of wiring a building. LAN radio uses radio transmissions to interconnect LAN components. Infrared uses beams of infrared light to establish network links between LAN components. Wireless LAN technology makes LANs easy to set up, relocate, and maintain. Disadvantages: High initial costs
Wireless LANs
Not all networks are connected with cabling; some networks are wireless. Wireless LANs use high frequency radio signals, infrared light beams, or lasers to communicate between the workstations and the file server or hubs Wireless networks are great for allowing laptop computers or remote computers to connect to the LAN. Wireless networks are also beneficial in older buildings where it may be difficult or impossible to install cables
Wireless LANs
Wireless LANs have several disadvantages. They provide poor security, and are susceptible to interference from lights and electronic devices. They are also slower than LANs using cabling
INTERNET
WAN & IP (Internet Protocol) A collection of networks interconnected and function as a single worldwide network is known as INTERNET WAN is used for interconnection;
INTRANET
Components of a LAN..
LANs are made up of several standard components/ hardware, software and other accessories Connection or cabling system: wired (twisted-pair cable, coaxial or fiber optic cable) or wireless (infrared and radio-wave transmission). Microcomputers/workstations with interface cards
COMPONENTS OF LAN
Network operating system-software Network Interface Cards ,Routers Switch, Bridges Repeater, Hubs Gateways, Modems
40
Components of a LAN
Network operating system-software that manages the activity of the network-providing multi-user and multitasking capabilities Unlike operating systems, such as DOS and Windows, that are designed for single users to control one computer, network operating systems (NOS) coordinate the activities of multiple computers across a network. The network operating system acts as a director to keep the network running smoothly. Other shared devices can be printers, fax machines, scanners, storage devices and other peripherals
Components of a LAN
A repeater is a device that regenerates and amplifies signals to create long-distance networks A switch is a high-speed multi-port bridge. Today, switches are replacing multi-port repeaters or concentrators in a UTP environment. An intelligent hub that maintains a bridging table, keeping track of which hardware addresses are located on which network segment Server- a computer with higher hard disk and higher speed than any other computer on the network.
Components of a LAN
There are various types of servers which can be connected in LANs, such as File server, Printer server, etc.
A File Server
A File server is a high capacity computer that provides various resources to the network. A file server has the following characteristics Needs a very fast computer with a large amount of RAM and storage space, a fast network interface card, and a tape back-up device Needs network operating system such as Novell Netware, Windows NT server, or Apple Share Controls the communication of information between the nodes on a network
Network Interface Card-NIC provides the link between your computer and your network. provide the physical connection between the network and the workstation.
Switch
A concentrator is a device that provides a central connection point for cables from workstations, servers, and peripherals. So, a switch is a concentrator. In a star topology, twisted-pair wire is run from each workstation to a central switch/hub. Most switches are active, that is they electrically amplify the signal as it moves from one device to another. Switches no longer broadcast network packets as hubs did in the past, they memorize addressing of computers and send the information to the correct location directly. Switches are: Usually configured with 8, 12, or 24 RJ-45 ports Often used in a star or star-wired ring topology Sold with specialized software for port management
Repeaters
Since a signal loses strength as it passes along a cable, it is often necessary to boost the signal with a device called a repeater. The repeater electrically amplifies the signal it receives and rebroadcasts it. Repeaters can be separate devices or they can be incorporated into a concentrator. They are used when the total length of your network cable exceeds the standards set for the type of cable being used. A good example of the use of repeaters would be in a Metroporitan area network using a star topology with unshielded twisted-pair cabling. The length limit for unshielded twisted-pair cable is 100 meters.
Repeaters
The most common configuration is for each workstation to be connected by twisted-pair cable to a multi-port active concentrator. The concentrator amplifies all the signals that pass through it allowing for the total length of cable on the network to exceed the 100 meter limit.
Bridges
A bridge is a device that allows you to segment a large network into two smaller, more efficient networks. If you are adding to an older wiring scheme and want the new network to be up-to-date, a bridge can connect the two. A bridge monitors the information traffic on both sides of the network so that it can pass packets of information to the correct location. Most bridges can "listen" to the network and automatically figure out the address of each computer on both sides of the bridge. The bridge can inspect each message and, if necessary, broadcast it on the other side of the network.
Bridges
The bridge manages the traffic to maintain optimum performance on both sides of the network. You might say that the bridge is like a traffic cop at a busy intersection during rush hour. It keeps information flowing on both sides of the network, but it does not allow unnecessary traffic through. Bridges can be used to connect different types of cabling, or physical topologies. They must, however, be used between networks with the same protocol Used to form a connection between two separate, but similar networks
Routers
A router translates information from one network to another; it is similar to a super intelligent bridge. Routers select the best path to route a message, based on the destination address and origin. The router can direct traffic to prevent head-on collisions, and is smart enough to know when to direct traffic along back roads and shortcuts. While bridges know the addresses of all computers on each side of the network, routers know the addresses of computers, bridges, and other routers on the network.
Routers
Routers can even "listen" to the entire network to determine which sections are busiest -- they can then redirect data around those sections until they clear up. If you have a school LAN that you want to connect to the Internet, you will need to purchase a router. In this case, the router serves as the translator between the information on your LAN and the Internet. It also determines the best route to send the data over the Internet.
Router
A special-purpose computer that directs data traffic when several paths are available A router examines the destination info in each arriving packet and then routes it through the most efficient path available The router either delivers the packet to the destination computer across a local network or forwards the packet to another router that is closer to the final destination
54
Gateway
Device sitting at the network node for interfacing with another network that uses different protocol. LANs may use a gateway (or router) to connect to the Internet.
55
Workstations
All of the user computers connected to a network are called workstations. A typical workstation is a computer that is configured with a network interface card, networking software, and the appropriate cables. Workstations do not necessarily need floppy disk drives because files can be saved on the file server. Almost any computer can serve as a network workstation.
Network Hardware/Components
Communication Channels/Media
What is communication channel/Media? Is a path-the physical medium- over which data travels in a telecommunication systems from its source to its destination. Channels are also called links, lines or media Types of communication channels Physical channel transmit data through the cable or wire. Use solid medium to connect sending and receiving devices. Wireless media transmit data through the air
Twisted Cable
Twisted pair cabling comes in two varieties: Shielded Twisted Pair (STP) and Unshielded Twisted Pair (UTP)
A disadvantage of UTP is that it may be susceptible to radio and electrical frequency interference
Shielded twisted pair (STP) is suitable for environments with electrical interference; however, the extra shielding can make the cables quite bulky. Shielded twisted pair is often used on networks using Token Ring topology.
Coaxial Cable
Coaxial cable resembles the wire used to connect a TV or VCR Has an inner conductor surrounded by a braided mesh Both conductors share a common center axial, hence the term "co-axial" Coaxial cabling has a single copper conductor at its center. A plastic layer provides insulation between the center conductor and a braided metal shield. The metal shield helps to block any outside interference from fluorescent lights, motors, and other computers.
Coaxial Cable
Although coaxial cabling is difficult to install, it is highly resistant to signal interference. In addition, it can support greater cable lengths between network devices than twisted pair cable. The two types of coaxial cabling are thick coaxial and thin coaxial.
Coaxial Cable
Advantages: bandwidth of up to 400 Mhz highly resistant to signal interference Transfer voice and data faster than twisted pair cable Disadvantage quite bulky and sometimes difficult to install Uses: used for connecting parts of LAN over long distance (300-600 meters)
Fiber Optic Cable The most common connector used with fiber optic cable is an ST connector. It is barrel shaped, similar to a BNC connector
LANs Topology
Network can be laid out in different ways . The physical layout, or shape, of a network is called a topology. Network topology can be physical or logical design Physical topology refer to physical design of network which includes devices, cables, location and installation of network. Logical topology refer to the amount of data to be transferred within the network.
LANs Topology There are Six basic network topologies: star, ring, bus, Mesh, tree, Hybrid (hierarchical)
Star topology
Most commonly used network topology design you will come across in LAN computer network. In star, all computers are connected to central device called hub/switch/router using UTP or STP.
Star topology
Advantages: easy to install and wire no disruptions to the network when connecting or removing devices easy to detect network problems Disadvantages: more expensive, requires a hub and more cable length than a linear bus topology all nodes shut down if the hub or concentrator fails The hub or concentrator manages and controls all functions of the network. It also acts as a repeater for the data flow.
Bus topology
Uses one common cable(backbone) to connect all devices in the network in linear shape. Consist of a main run of cable with a terminator at each end. NIC of all network devices are attached to a single backbone cable.
Bus topology
hen any computer sends out message in the network, it is broadcasted in the entire network but only intended computer accepts the message and process it. hen the backbone cable get damaged, it will shunt down the entire network, and no computer will run on the network, and no network can be made between computers until the backbone is replaced. he file server, workstations, and peripherals are
Bus topology
he easiest topology to install oes not require a lot of cables thernet cables are used in this type of topology
Bus topology
isadvantages ntire network shuts down if there is a break in the backbone cable ifficult to identify the problem if the entire network shuts down dvantages
Ring topology
A ring network is much like a bus network, except the length of wire, cable, or optical fiber connects to form a loop Local computer processors are tied together sequentially in a ring; with each device being connected to two other devices. Computers and other networking devices are attached to each other in such a way that they form a ring shape, i.e all messages(data) will travel either clockwise or counter-clockwise.
Ring topology
Disadvantages: Relatively expensive and difficult to install Adding/or removing computer disturbs the networks Failure of one computer on the ring affect the whole network Advantages: Ring networks do not require a central computer to control activity nor does it need a file server. Each computer can communicate directly with the other computers in the network Offers high bandwidth and can span larger distance.
Mesh topology
In mesh topology , computers are connected to each other by point-to-point circuits. It uses router to choose the shortest distance for the destination. In star, bus, ring: the message is broadcasted to the entire network and only intended computer accepts the message, but in mesh, the message is only sent to the destination computer after finding its route it self with the help of the router.
Mesh topology
In mesh topology one or more computers usually become switching centers, interlinking computers with each other. Advantage: The damage of on or several cables or computers may not affect the entire network. Disadvantage Very expensive
LAN ARCHITECTURES
Networks are all about sharing resources of computers, servers, scanners, etc to each other. This type of LAN architecture depend on the requirement of the network and needs before you choose any type. There are types of networks in LAN architecture: client/server peer to peer
Client/Server
Has one or more dedicated computers called server(s) All computers connected to other connecting devices is connected to the server. The server is responsible to perform according to the request sent to it by clients, eg. Server can act a print server, if the client request a print of document, the server will send print command to print and it will be printed. The same way to all files that are stored on the server and not on the client server, the same client can retrieve data on other computer on the same network. And this concept is called centralization
Client/Server
Peer-to-Peer(p2p)
Is the most commonly used computer networks Is very coast effective 10-15 computers can be connected each other using p2p networking model without problem All computers possesses the same status within the network and no computer controls any other computer but itself. This network does not have a server to control and monitor
Peer-to-Peer(p2p)
The security level is not high and each computer is itself responsible for security. File can be shared among computers, files like videos,audios,pictures,spreadsheet can be sent and received within the network. Printers, scanners and can be shared within all computers.
Peer-to-Peer(p2p) Peer-to-peer network operating systems allow users to share resources and files located on their computers and to access shared resources found on other computers. However, they do not have a file server or a centralized management source. In a peer-to-peer network, all computers are considered equal; they all have the same abilities to use the resources available on the network
Peer-to-Peer(p2p)
LAN TECHNOLOGIES
ETHERNET LOCAL TALK FDDI TOKEN RING
LocalTalk
LocalTalk is a network protocol that was developed by Apple Computer, Inc. for Macintosh computers. The method used by LocalTalk is called CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance). It is similar to CSMA/CD except that a computer signals its intent to transmit before it actually does so.
Token Ring
The Token Ring protocol was developed by IBM in the mid-1980s. The access method used involves token-passing. In Token Ring, the computers are connected so that the signal travels around the network from one computer to another in a logical ring. A single electronic token moves around the ring from one computer to the next. If a computer does not have information to transmit, it simply passes the token on to the next workstation. If a computer wishes to transmit and receives an empty token, it attaches data to the token. The token then proceeds around the ring until it comes to the computer for which the data is meant. At this point, the data is captured by the receiving computer. The Token Ring protocol requires a star-wired ring using twisted pair or fiber optic cable. It can operate at transmission speeds of 4 Mbps or 16 Mbps. Due to the increasing popularity of Ethernet, the use of Token Ring in school environments has decreased.
FDDI
Fiber Distributed Data Interface (FDDI) is a network protocol that is used primarily to interconnect two or more local area networks, often over large distances. The access method used by FDDI involves token-passing. FDDI uses a dual ring physical topology. Transmission normally occurs on one of the rings; however, if a break occurs, the system keeps information moving by automatically using portions of the second ring to create a new complete ring. A major advantage of FDDI is speed. It operates over fiber optic cable at 100 Mbps.
ATM
Asynchronous Transfer Mode (ATM) is a network protocol that transmits data at a speed of 155 Mbps and higher. ATM works by transmitting all data in small packets of a fixed size; whereas, other protocols transfer variable length packets. ATM supports a variety of media such as video, CD-quality audio, and imaging. ATM employs a star topology, which can work with fiber optic as well as twisted pair cable.