Professional Documents
Culture Documents
1.1: Introduction
Introduction
A network is a group of computers and other devices, such as
printers and modems, connected to each other. This enables the
computers to effectively share data and resources.
Network elements
Servers
Clients
Clients are the computers that can access the shared network
resources provided by a server.
Media
Shared data
Resources
Files, printers or other items that can be used by network users are
known as resources. These resources can be either hardware or
software resources.
1.2: Benefits of the computer Network
Previous Page | Table of Contents | Next Page
Data sharing
Resource sharing
Communication medium
Speed
Expensive to Install
Data Security
If a network is implemented properly, it is possible to greatly
improve the security of important data. In contrast, a poorly
secured network puts critical data at risk, exposing it to the
potential problems associated with hackers, unauthorized access.
Virus Infections
For this we can have backup fail server. When the files server
"goes down," then we can use the backup fail server. Having
backup server we can overcome this problem.
Kinds of network
Chapter 2.1: Peer-to-Peer Networks
Chapter 2.2: Server Based Networks
2.1:Peer-to-Peer Networks
Previous Chapter | Table of Contents | Next Page
Peer-to-Peer Networks
In a peer-to-peer network, there are no dedicated servers, and
there is no hierarchy among the computers. All the computers
are equal and therefore are known as peers. Each computer
functions as both a client and a server.
And there is no administrator responsible for the entire network.
The user at each computer determines what data on that
computer is shared on the network. Below figure shows a peer-
to-peer network in which each computer functions as both a
client and a server.
Types of network
Chapter 3.1: Local Area Network (LAN)
Chapter 3.2: Wide Area Network (WAN)
Chapter 3.3: Wireless Fidelity Wi-Fi
3.1:Local Area Network (LAN)
Topology
Protocols
To do this you will need some sort of bridge between the wireless
and wired network. This can be accomplished either with a
hardware access point or a software access point.
Typical indoor ranges are 150-300 feet, but can be shorter if the
building construction interferes with radio transmissions. Longer
ranges are possible, but performance will degrade with distance.
Outdoor ranges are quoted up to 1000 feet, but again this depends
upon the environment.
When using multiple access points, each access point wireless area
should overlap its neighbors. This provides a seamless area for
users to move around in using a feature called "roaming." See
Roaming for further information.
Some manufacturers produce extension points, which act as
wireless relays, extending the range of a single access point.
Multiple extension points can be strung together to provide wireless
access to far away locations from the central access point.
Roaming
IEEE 802.11
A typical Wi-Fi setup contains one or more Access Points (APs) and
one or more clients. An AP broadcasts its SSID (Service Set
Identifier, "Network name") via packets that are called beacons,
which are usually broadcast every 100 ms. The beacons are
transmitted at 1 Mbit/s, and are of relatively short duration and
therefore do not have a significant effect on performance. Since 1
Mbit/s is the lowest rate of Wi-Fi it assures that the client who
receives the beacon can communicate at least 1 Mbit/s. Based on
the settings (e.g. the SSID), the client may decide whether to
connect to an AP. If two APs of the same SSID are in range of the
client, the client firmware might use signal strength to decide which
of the two APs to make a connection to.
Wi-Fi Devices :
Wireless Routers
Advantages of Wi-Fi
Disadvantages of Wi-Fi
Network Architecture
Chapter 4.1: Ethernet
Ethernet
Network architecture combines standards, topologies and protocols
to produce a working network. Currently, the most popular
network architecture is Ethernet. A network that follows the
Ethernet architecture standard is known as an Ethernet network.
Three data rates are currently defined for operation over optical
fiber and twisted-pair cables:
10 Mbps-10Base-T Ethernet
10Base-T Ethernet
Fast Ethernet
Gigabit Ethernet
Bus Topology
Star Topology
o TCP/IP
o IPX
o NetBEUI
o DLC
o Ethernet Features
o Topology: Bus or Star
o Signal type: Baseband
o Protocol: TCP/IP, NetBEUL, DLC
o Access method: IEEE 802.3
o Transfer speed : 10 Mbps, 100 Mbps, 1000 Mbps
o Cable type: Thicknet, Thinnet, UTP
o Data packet format: Ethernet Frames
o Operating Systems: Can be used with most Network
operating systems
Token Ring
Token Ring networks use STP and UTP cabling, such as IBM Types 1, 2
and 3 cables, to connect the network adapter cards of the computers
to the central hub and to interconnect other hubs.
o Start and end end delimiters - Start and end of the frame.
o Access control - Specifies frame priority and whether it is a
token of a data frame
o Frame control - Media Access Control information or end
station information
o Destination and source address - Origin and destination
address
o Data - Data begin sect
o Frame check sequence - CRC error - checking information
o Frame status - Indicates if the frame was recognized,
copied or if the destination address was available
Hub or Switch
In a Token Ring network, the hub contains the actual ring in the
network. The hub of a Token Ring network is also referred to as
Multistation Access Unit (MAU), MultiStation Access Unit (MSAU) or
Smart Multistation Access Unit (SMAU).
The hub is attached to individual clients and servers by cables. The hub
of a Token Ring network is a passive hub and acts as a connection
point. The internal ring converts to an external ring at each connection
point when a computer is connected.
When all the ports on a hub have computers connected to them, the
Token Ring network can be enlarged by adding another hub. However,
each hub must be added in such a way that it becomes a part of the
logical ring.
Media filters
Media filters are used in the computers that use Type 3 telephone
twisted pair cabling to convert cable connectors and reduce line noise.
Media filters connect the token ring adapter card to a standard
RJ-11/RJ-45 telephone jack.
Repeaters
Due to the mix of data streaming, high speeds and unidirectional data
traveling, Token Ring networks are well suited to fiber optic cable.
Fiber optic cables are used in Token Ring networks to increase the
range of the network up to 10 times that possible with copper cabling.
However, fiber optic cables are more expensive than copper cables.
4.3: ArcNET
Previous Page | Table of Contents | Next Page
ArcNET
Attached Resource Computer Network (ArcNet) was developed by
Datapoint Corporation in 1977. It is a simple, inexpensive and
flexible network architecture designed for workgroup-sized
networks.
The use of star topology and cable filtering make ArcNet networks
reliable. In a distributed star design, ArcNet uses passive and
active hubs to control and route data tokens from one workstation
to the next. Since token passing is done at a fixed rate and
collisions do not occur, ArcNet is very stable.
4.4: LocalTalk
LocalTalk
4.5: FDDI
Previous Page | Table of Contents | Next Chapter
FDDI
The Fiber Distributed Data Interface (FDDI) specifies a 100-Mbps
token-passing, dual-ring LAN using fiber-optic cable. FDDI is
frequently used as high-speed backbone technology because of its
support for high bandwidth and greater distances than copper. It
should be noted that relatively recently, a related copper
specification, called Copper Distributed Data Interface (CDDI), has
emerged to provide 100-Mbps service over copper. CDDI is the
implementation of FDDI protocols over twisted-pair copper wire.
This chapter focuses mainly on FDDI specifications and operations,
but it also provides a high-level overview of CDDI.
Every network card in the world has a unique 48-bit serial number
called a MAC address, which is written to ROM carried on the card.
Every computer on a network must have a card with a unique MAC
address. The IEEE is responsible for assigning MAC addresses to the
vendors of network interface cards, which means that two cards
sharing the same MAC address is impossible.
There are four techniques used for transfer of data, the NIC may use one
or more of these techniques.
A network card typically has a twisted pair and BNC sockets where
the network cable is connected, and a few LEDs to inform the user
of whether the network is active, and whether or not there is data
being transmitted on it.
5.2: Cables
Network Cables
5.2: Cables
5.2.1: Twisted Pair
Previous Page | Table of Contents | Next Page
Twisted Pair
A thin-diameter wire commonly used for telephone and network
cabling. The wires are twisted around each other to minimize
interference from other twisted pairs in the cable. Twisted pairs
have less bandwidth than coaxial cable or optical fiber.
UTP cables are not shielded. This lack of shielding results in a high
degree of flexibility as well as rugged durability. UTP cables are
found in many ethernet networks and telephone systems.
S/STP cabling is STP cabling with metal shielding also covering the
group of shielded copper pairs. This type of cabling offers still
improved protection from interference from external sources.
S/UTP, also known as Fully shielded (or Foiled) Twisted Pair (FTP)
and Screened Fully shielded Twisted Pair (S/FTP), is a screened UTP
cable.
Coaxial cables are widely used for transmitting voice, video and
data over LANs. To select the appropriate type of coaxial cable
for our network, it is useful to learn about the benefits and
limitations of coaxial cable types.
I. Thinnet
II. Thiknet
Thinnet
Thiknet
The other type of coaxial cable, the thicknet cable, is a thicker
cable. It is about half an inch in diameter. The copper core is
thicker than a thinnet core. Since the thicknet cable has a thicker
copper core, it can carry a signal out of than a thinnet cable. It
can carry a signal for 500 meters (1,640 feet).
There are two primary types of fiber. For intercity cabling and
highest speed, singlemode fiber with a core diameter of less than 10
microns is used. Multimode fiber is very common for short distances
and has a core diameter from 50 to 100 microns.
The optical fiber can be used as a medium for telecommunication
and networking because it is flexible and can be bundled as cables.
Although fibers can be made out of either transparent plastic or
glass, the fibers used in long-distance telecommunications
applications are always glass, because of the lower optical
attenuation. Both multi-mode and single-mode fibers are used in
communications, with multi-mode fiber used mostly for short
distances (up to 500 m), and single-mode fiber used for longer
distance links. Because of the tighter tolerances required to couple
light into and between single-mode fibers, single-mode
transmitters, receivers, amplifiers and other components are
generally more expensive than multi-mode components.
Ethernet Switches
5.4: Routers
Routers
The router uses the information held in the network layer header
(i.e. IP header) to decide whether to forward each received packet,
and which network interface to use to send the packet. Most
packets are forwareded based on the packet's IP destination
address , along with routing information held within the router in a
routing table. Before a packet is forwarded, the processor checks
the Maximum Transfer Unit (MTU) of the specified interface.
Packets larger than the interface's MTU must be fragmented by the
router into two or more smaller packets. If a packet is received
which has the Don't Fragment (DF) bit set in the packet header ,
the packet is not fragmented, but instead discarded. In this case, an
ICMP error message is returned to the sender (i.e. to the original
packet's IP source address) informing it of the interface's MTU size.
This forms the basis for Path MTU discovery (PMTU) .
The routing and filter tables resemble similar tables in link layer
bridges and switches. Except, that instead of specifying link
hardware addresses ( MAC addresses ), the router table sepcify
network ( IP addresses ).
Patch panels
A panel of network ports contained together, usually within a
telecommunications closet, which connects incoming and outgoing
lines of a LAN or other communication, electronic or electrical
system.
Switch rack
Wall pallets
The wall outlet will be like a plug point which connects the internal
and external wiring, and the wall outlet is mostly used for secure
the internal cables.
5.6: Firewall
Firewall
Network Topologies
Chapter 6.1: Bus topology
Chapter 6.2: Ring topology
Chapter 6.3: Star topology
Chapter 6.4: Mesh topology
Chapter 6.5: Selecting a topology
6.1: Bus topology
Previous Chapter | Table of Contents | Next Page
Bus topology
A bus topology network is a network architecture in which a set of
clients are connected via a shared communications line, called a
bus. The bus topology is often referred to as a "linear bus" because
the computers are connected in a straight line. This is the simplest
and most common method of networking computers.
Only one computer at a time can send messages. Because only one
computer at a time can send data on a bus network, the number of
computers attached to the bus will affect network performance. The
more computers there are on a bus, the more computers will be
waiting to put data on the bus and, consequently, the slower the
network will be.
Advantages
Disadvantages
1. Difficult to administer/troubleshoot
2. Limited cable length and number of stations
3. A cable break can disable the entire network
4. Maintenance costs may be higher in the long run
5. Performance degrades as additional computers are added or on heavy
traffic
6. Low security (all computers on the bus can see all data transmissions)
7. One virus in the network will affect all of them (but not as badly as a star
or ring network)
8. Proper termination is required.(loop must be in closed path)
6.2: Ring topology
Ring topology
The data passes by each computer until it finds the one with an
address that matches the address on the data. The receiving computer
returns a message to the sending computer indicating that the data
has been received. After verification, the sending computer creates a
new token and releases it on the network. The token circulates within
the ring until a workstation needs it to send data. It might seem that
token passing would take a long time, but the token actually travels at
roughly the speed of light. A token can circle a ring 200 meters (656
feet) in diameter about 477,376 times per second.
Ring networks also carry the disadvantage that if one of the nodes in
the network breaks down then the entire network will break down with
it as it requires a full circle in order to function.
Advantages
Disadvantages
Mesh networks are self-healing: the network can still operate even
when a node breaks down or a connection goes bad. As a result, a
very reliable network is formed. This concept is applicable to wireless
networks, wired networks, and software interaction.
Advantages
Disadvantages
Selecting a Topology
There are many factors to consider when deciding which topology best suits the
needs of an organization. Below table provides some guidelines for selecting a
topology.
Topology
Advantages
Disadvantages
Bus
Ring
Star
Mesh
OSI Layer
Chapter 7.1: OSI Layer
Chapter 7.2: Application layer
Chapter 7.3: Presentation layer
Chapter 7.4: Session layer
Chapter 7.5: Transport layer
Chapter 7.6: Network layer
Chapter 7.7: Data-link layer
Chapter 7.8: Physical layer
7.2: Application layer
Previous Page | Table of Contents | Next Page
The application layer is the seventh level of the seven-layer OSI model. It interfaces directly to and performs
common application services for the application processes; it also issues requests to the presentation layer .
The common application layer services provide semantic conversion between associated application processes. Note:
Examples of common application services of general interest include the virtual file, virtual terminal , and job
transfer and manipulation protocols.
Examples:
FTP
DNS
SNMP
SMTP gateways
Web browser
X.400
FTAM
Database software
The presentation layer is the sixth level of the seven layer OSI model. It
responds to service requests from the application layer and issues service
requests to the session layer .
The presentation layer concerns itself not only with the format and
representation of actual user data, but also with data structure used by
programs. Therefore, the presentation layer negotiates data transfer syntax
for the application layer.
Examples:
The session layer is level five of the seven level OSI model. It responds
to service requests from the presentation layer and issues service
requests to the transport layer
The Session layer provides the mechanism for managing the dialogue
between end-user application processes. It provides for either full
duplex or half-duplex operation and establishes checkpointing,
adjournment, termination, and restart procedures.
Examples:
The transport layer usually turns the unreliable and very basic service
provided by the Network layer into a more powerful one. There is a long list
of services that can be optionally provided at this level. None of them are
compulsory, because not all applications want all the services available.
This is normally easier to deal with than connection-less models, so where the
Network layer only provides a connection-less service, often a connection-
oriented service is built on top of that in the Transport layer.
The Network layer doesn't generally guarantee that packets of data will arrive
in the same order that they were sent, but often this is a desirable feature, so
the Transport layer provides it. The simplest way of doing this is to give each
packet a number, and allow the receiver to reorder the packets.
Reliable Data
The underlying network may well be noisy, and the data received may not
always be the same as the data sent. The Transport layer can fix this:
typically by providing a checksum of the data which detects if there has been
a glitch of some kind. Of course, error free is impossible, but it is possible to
substantially reduce the numbers of undetected errors. This layer may also
retransmit packets which have gone missing en route.
Flow Control
Byte Orientation
Ports are essentially ways to address multiple entities in the same location.
For example, the first line of a postal address is a kind of port, and
distinguishes between different occupants of the same house. Computer
applications will each listen for information on their own ports, which is why
you can use more than one network-based application at the same time.
On the Internet there are a variety of Transport services, but the two most
common are TCP and UDP. TCP is the more complicated, providing a
connection and byte oriented stream which is almost error free, with flow
control, multiple ports, and same order delivery. UDP is a very simple
'datagram' service, which provides limited error reduction and multiple ports.
TCP stands for Transmission Control Protocol, while UDP stands for User
Datagram Protocol. Other options are the Datagram Congestion Control
Protocol (DCCP) and Stream Control Transmission Protocol (SCTP).
Examples:
The network layer is level three of the seven level OSI model. It responds to
service requests from the transport layer and issues service requests to the
data link layer.
The network layer addresses messages and translates logical addresses and
names into physical addresses. It also determines the route from the source
to the destination computer and manages traffic problems, such as switching
, routing , and controlling the congestion of data packets. In essence, the
network layer is responsible for end to end (source to destination) packet
delivery, whereas the data link layer is responsible for node to node (hop to
hop) packet delivery.
Here are some things that the network layer needs to address:
Examples
The data link layer is layer two of the seven-layer OSI model. It responds to
service requests from the network layer and issues service requests to the
physical layer. This is the layer which transfers data between adjacent
network nodes in a wide area network or between nodes on the same local
area network segment . The data link layer provides the functional and
procedural means to transfer data between network entities and might
provide the means to detect and possibly correct errors that may occur in the
Physical layer.
Examples of data link protocols are Ethernet for local area networks and PPP ,
HDLC and ADCCP for point-to-point connections.
The data link is all about getting information from one place to a selection of
other places. At this layer one does not need to be able to go everywhere,
just able to go somewhere else. So in social contact, one needs to know at
least one other person, but not necessarily know Fred, Bob, or James.
The data link provides data transfer across the physical link. That transfer
might or might not be reliable; many data link protocols do not have
acknowledgments of successful frame reception and acceptance, and some
data link protocols might not even have any form of checksum to check for
transmission errors. In those cases, higher-level protocols must provide flow
control, error checking, and acknowledgments and retransmission.
In some networks, such as IEEE 802 local area networks, the data link layer
is split into MAC and LLC sublayers; this means that the IEEE 802.2 LLC
protocol can be used with all of the IEEE 802 MAC layers, such as Ethernet,
Token Ring , IEEE 802.11 , etc., as well as with some non-802 MAC layers
such as FDDI.
Other data link layer protocols, such as HDLC, are specified to include both
sublayers, although some other protocols, such as Cisco HDLC , use HDLC's
low-level framing as a MAC layer in combination with a different LLC layer.
The sublayer below it is Media Access Control (MAC). Sometimes this refers to
the sublayer that determines who is allowed to access the media at any one
time (usually CSMA/CD ). Other times it refers to a frame structure with MAC
addresses inside, specially speaking about ethernet over switches.
Examples:
ARCnet
ATM
Ethernet
Frame Relay
LocalTalk
Token ring
The physical layer is level one in the seven level OSI model of computer
networking. It performs services requested by the data link layer. This level
refers to network hardware , physical cabling or a wireless electromagnetic
connection . It also deals with electrical specifications, collision control and
other low-level functions.
The physical layer is the most basic network layer, providing only the means
of transmitting raw bits. The shapes of the electrical connectors , which
frequencies to broadcast on, and similar low-level things are specified here.
An analogy of this layer in a physical mail network would be a specification for
various kinds of paper and ink.
The major functions and services performed by the physical layer are:
Establishment and termination of a connection to a communications
medium.
Examples:
DSL
ISDN
Chapter 8: Protocols
Protocols
Chapter 8.1: TCP/IP (Part 1)
8.1: TCP/IP
TCP/IP
TCP/IP Activities
The network medium used for transmitting the data is independent of the
above activities, just as the means of transport that transfers the letter from
one post office to another is independent of the letters content or address.
TCP/IP Protocol:
User Datagram Protocol (UDP) is a transport layer protocol that identifies the
destination application in network communications. UDP provides a
connectionless packet delivery service that offers fast but unreliable, best-
effort delivery of the data.
UDP does not require an acknowledgment for the data received and does not
attempt to retransmit data that is lost or corrupted. This means that less data
is sent, but neither the arrival of packets nor the correct sequencing of
delivered packets is acknowledged or guaranteed.
To use UDP, the source application must supply its UDP port number as well
as that of the destination application. It is important to note that UDP ports
are distinct and separate from TCP ports, even though some of them use the
same numbers.
Activities Performed by IP
You can visualize IP as the mailroom of the TCP/IP stack, where packet
sorting and delivery take place. The packets are passed down to IP by UDP or
TCP from the transport layer or passed up from the network interface layer.
The primary function of IP is to route the packets until they reach their
destination. Each packet includes the source IP address of the sender and the
destination IP address of the intended recipient. These IP addresses in a
packet remain the same throughout the packets journey across a network.
This is done by assigning a Time to Live (TTL) number to every packet. A TTL
specifies the maximum length of time that the packet can travel on the
network before being discarded.
Internet Control Message Protocol (ICMP)
Although the IP protocol is used to move data across routers, ICMP reports
errors and control messages on behalf of IP. ICMP does not attempt to make
IP a reliable protocol, because ICMP messages are unacknowledged and
therefore unreliable. It only attempts to report errors and provide feedback
on specific conditions. Although this may not seem effective, it is much more
efficient than using bandwidth to acknowledge each ICMP message.
ARP Cache
ARP compares every outbound packets destination IP address with the ARP
cache to determine the MAC address to which the packet will be sent. If there
is a matching entry, the MAC address is retrieved from the cache. If not, ARP
broadcasts a request for the computer owning the IP address in question to
reply with its MAC address.
Next, the computer with the corresponding IP address adds the initial
computers MAC address to its cache and then replies with its own MAC
address. When an ARP reply is received, the ARP cache is updated with the
new information and the packet can then be sent.
If the packet is going to another segment, ARP resolves the MAC address for
the router responsible for that segment, rather than resolving the address for
the final destination computer. The router is then responsible for either
finding the MAC address of the destination or forwarding the packet to
another router.
Network Cabling
Chapter 9.1: Network Wiring
There are several types of wiring schemas available. So, we have to consider
more appropriate schema for our network. EIA/TIA 568A Standard and 568A
and 568B Wiring Schemes are most popular wiring standard CAT 5e wiring.
568A Standard:
Category 5 (CAT5) cabling is good, solid cable for 100-Mbps LANs. The
Category 5 standard has been around since 1991, so it's well established.
You'll find existing Category 5 installations everywhere. If you still have a lot
of 10-Mbps equipment, CAT5 cabling will serve your needs. It also handles
100-Mbps Fast Ethernet transmissions very well.
Like CAT5, CAT5e is a 100-MHz standard, but it has the capacity to handle
bandwidth superior to that of CAT5. With these improvements, you can
expect problem-free, full-duplex, 4-pair Ethernet transmissions over your
CAT5e UTP.
COLOR-CODE STANDARDS
Here are the diagrams:
Note that the TX (transmitter) pins are connected to corresponding RX
(receiver) pins, plus to plus and minus to minus. And that you must use a
crossover cable to connect units with identical interfaces.
If you use a straight-through cable, one of the two units must, in effect,
perform the cross-over function.
Two wire color-code standards apply: EIA/TIA 568A and EIA/TIA 568B. The
codes are commonly depicted with RJ-45 jacks as follows (see below figure
from the front of the jacks):
We need a modular crimping tool during the cabling of the twisted pair and RJ
45 connectors. It's a tool in a shape of pliers which will securely crimp RJ-45
connectors. Even though the crimper has cutters, which we use to cut cables
and individual wires, and perhaps stripes the outer jacket.
UTP Stripping Tool
This tool works neat and produces good finishing; as well this tool is used to
cut cables and individual wires.
Diagonal Cutters
This tool is used for easier to cut the cable off at the reel and to fine tune the
cable ends during the process of assembling.
1. Pull the cable off the reel to the desired length and cut (see below figure).
2. Stripe one end of the cable with the stripper. This is about right to strip a
little over 1/2" of the cover off the cable. Turn the stripper about one turn or
so. Once scored, you should be able to twist the end of the jacket loose and
pull it off with one hand while holding the rest of the cable with the other.
3. Examine the wires for nicks. Cut off the end and start over if we see any.
We may have to adjust the blade with the screw at the front stripper. Cable
diameters and jacket thicknesses vary.
4. Spread and arrange the pairs roughly in the order of the desired cable end
5. Untwist the pairs and arrange the wires in the order of the desired cable
end. Flatten the end between thumb and forefinger. Trim the ends of the
wires so they are even with one another. It is very important that the
untwisted end be slightly less than 1/2" long.
7. Hold the wire near the RJ-45 plug with the clip down and firmly push it into
the left side of the front of the crimper. Hold the wire in place squeeze the
crimper handles quite firmly. The crimper pushes two plungers down on the
RJ-45 plug. One forces what amounts to a cleverly designed plastic
plug/wedge onto the cable jacket and very firmly clinches it. The other seats
the "pins," each with two teeth at its end, through the insulation and into the
conductors of their respective wires.
8. Test the crimp. If done properly an average person will not be able to pull
the plug off the cable with the bare hands.
9. Prepare the other end of the cable so it has the desired end and crimp.
10. If both ends of the cable are within reach, hold them next to each other
and with RJ-45 clips facing away. If the plugs are wired correctly, and they
are identical, it is a straight-thru cable. If they are wired correctly and they
are different, it is a crossover cable.