You are on page 1of 26

Chapter 2

1.1
Clients and Servers
 Every computer connected to a network is called
a host or end device.
 Servers are computers that provide information to
end devices on the network. For example, email
servers, web servers, or file server
 Clients are computers that send requests to the
servers to retrieve information such as a web page
from a web server or email from an email server.
 Client and server software usually run on separate
computers.
 However, in small businesses or homes, it is typical
for a client to also function as the server. These
networks are called peer-to-peer networks.
 Peer-to-peer networking advantages: easy to set
up, less complex, and lower cost.
 Disadvantages: no centralized administration, not
as secure, not scalable, and slower performance.
Network Components
 A network can be as simple as a single cable connecting two computers or as
complex as a collection of networks that span the globe.
 Network infrastructure contains three broad categories of network components:
 Devices
 Media
 Services
 End Devices
 An end device is where a message originates from or where it is received.
 Data originates with an end device, flows through the network, and arrives at an end device
 An intermediary device interconnects end devices in a network. Examples
include: switches, wireless access points, routers, and firewalls.
 The management of data as it flows through a network is also the role of an
intermediary device including:
 Regenerate and retransmit data signals.
 Maintain information about what pathways exist through the network and internetwork.
 Notify other devices of errors and communication failures.
Network Media
 Communication across a network is carried through a medium
which allows a message to travel from source to destination.
 Networks typically use three types of media:
 Metallic wires within cables, such as copper
 Glass, such as fiber optic cables
 Wireless transmission
 In addition to the device representations on the right, it is
important to remember and understand the following terms:
 Network Interface Card (NIC)
 Physical Port
 Interface
The Internet, Intranets, and Extranets

Intranets and Extranets


 Unlike the Internet, an intranet is a private
collection of LANs and WANs internal to an
organization that is meant to be accessible only
to the organizations members or others with
authorization.
 An organization might use an extranet to
provide secure access to their network for
individuals who work for a different organization
that need access to their data on their network.
 An extranet is defined as the network that
restricts access to company files and folders
from unknown people and permits only
partners, vendors and suppliers who are
authorized to do so.
Converged Networks

Traditional Separate Networks


 An example of multiple networks might be a school 30
years ago. Some classrooms were cabled for data
networks. Those same classrooms were cabled for
telephone networks, and also cabled separately for
video.
 Each of these networks used different technologies to
carry the communication signals using a different set
of rules and standards.
 Converged data networks carry multiple services on
one link including data, voice, and video.
 Unlike dedicated networks, converged networks can
deliver data, voice, and video between different types
of devices over the same network infrastructure.
 The network infrastructure uses the same set of rules
and standards.
Reliable Network

Network Architecture
 Network Architecture refers to the technologies that support the infrastructure that
moves data across the network.
 There are four basic characteristics that the underlying architectures need to
address to meet user expectations:
 Fault Tolerance
 Scalability
 Quality of Service (QoS)
 Security
 A fault tolerant network limits the impact of a failure by limiting the number of
affected devices. Multiple paths are required for fault tolerance.
 A scalable network can expand quickly and easily to support new users and
applications without impacting the performance of services to existing users.
Quality of Service
 Voice and live video transmissions require higher expectations for those
services being delivered.
 Have you ever watched a live video with constant breaks and pauses? This
is caused when there is a higher demand for bandwidth than available –
and QoS isn’t configured.
 Quality of Service (QoS) is the primary mechanism used to ensure reliable
delivery of content for all users.
 With a QoS policy in place, the router can more easily manage the flow of
data and voice traffic.
 There are two main types of network security that must be addressed:
 Network infrastructure security
 Physical security of network devices
 Preventing unauthorized access to the management software on those devices
 Information Security
 Protection of the information or data transmitted over the network
TYPE OF CONNECTION

 Point to point
 A dedicated link is provided between two
devices
 Most of them uses an actual length of wire or
cable to connect the two ends but other Point
options
– to – point connection
,such as microwave satellite are possible
 Multipoint
 More than two devices share a single line.
 The capacity is shared either spatially or
temporally.
 Spatially: Several devices can use link simultaneously
 Temporally: Users take turns , it is a timeshared

Multipoint connection

9
Topology
 Physical topology
 Is how the wires are run
 The way in which a network is laid out physically
 Logical topology is how the signal travels.
 A device can be wired to implement any logical topology.
 LANs are logical busses or rings, depending on how the hub is
wired
 4 basic types: mesh, star, bus, ring
 The most common physical topology is the star.
 All the wires come back to a central point
 May often see hybrid

10
Mesh Topology

 Every device has a dedicated point-to-point link to


every other devices in network
 Mesh topology often used in MANs and WANs
 A fully connected mesh network has n(n-1)/2 physical channels to
link n devices, Every device on the network must have n-1 I/O ports
 Advantage
 Privacy or security(every message travels along a dedicated
line, only the intended recipient sees it. Physical boundaries
prevents other user from gaining access the message
 eliminating the traffic problems. The use of dedicated links
guarantees that each connection can carry its own data load; that
can occur when links must be shared by multiple devices.
 A mesh is robust. If one link becomes unusable, it does not
incapacitate the entire system.
 Fault identification and fault isolation easy. This enables the
network manager to discover the precise location of fault and
aids in finding its cause and solution.
 Disadvantage
 Need more resource (cable & ports)
 Expensive to implement 11
Star Topology
 Each device has a dedicated point-to-point link only
to a central device (hub, switch, router)
 No direct traffic and link between devices
 Advantages of star topology
 Easy to install and reconfigure and less expensive
 Each device need only one link and I/O port to connect it to
any other devices.)
 Robustness, If one link fails, only that link affected and
other links remain active.
 Identification and fault isolation
 Disadvantages of star topology
 Failure of central device may cause network failure
 Requires more cable than (Ring ,bus)

12
Tree topology

 Is a variation of star
 Not every device plugs directly into the central hub. The
majority of devices connect to secondary hub that in turn
is connected to the central hub
 The advantages and disadvantages of tree topology are
generally the same as those of star.

The addition of secondary hubs bring more advantage:
 Allow more devices to be attached to a single central
hub, therefore increase the distance a signal can travel
between devices.

13
Bus Topology
 A multipoint topology
 Consists of cables connecting PCs or file servers
 Terminator attached to each end of bus cable segment
 to absorb signal and prevent signal reflection back on to covered path

Transmitting packet across bus
 Detected by all nodes on segment
 Given time limit to reach destination
 Advantages of bus design
 Requires less cable than other topologies
 Easy to install and extend bus with a workstation
 Disadvantages of bus topology
 Not secured
 Can become quickly congested with network traffic
 A fault in bus cable stops all transmissions even between devices on the same
side of the problem. The damaged area reflects signals back the direction of
origin, creating noise in both directions
 It can difficult to add new devices (adding more require modification of the
backbone).

14
Ring Topology
 Each device is dedicated point-to-point
connection only with the two devices on either
side of it
 Signal is passed from device to device until it
reaches destination
 Each device functions as a repeater
 Advantage
 Relatively easy to install and reconfigure
 Fault isolation is simplified

 Disadvantage
 Unidirectional traffic
 A break in the ring can disable the entire network.
This can be solved by use dual ring
15
 Hybrid topology
Repeaters

 Can extend the physical length of a LAN


 Receive the signal before it becomes too weak or
corrupted and regenerates the original bit pattern
 connects two segments of the same LAN
 Segments connected are still part of one single LAN
 Portions of the network separated by repeaters are called segments
 Repeaters acts as two-port node and has no filtering capability
 A repeater cannot connect two LANs of different
protocols

16
HUB

• A HUB is at layer 1 of the OSI model.


• A HUB does not make forwarding decisions.
• A HUB receives bits in on one port and then
retransmits those bits out all other ports.
• HUB most often use UTP cabling to connect
to other network devices.
• Actually a multiport repeater
• Used to create connections between stations in
a physical star topology
HUB
• Regenerate
and repeat
signals
• Used as
network
concentration
points
• Multiport
repeater
Bridge
 device that connects two LAN segments together, which may be similar
or dissimilar, such as Ethernet and Token Ring. A bridge is inserted in
the network to keep traffic contained within the segments to improve
performance
 Bridge has filtering capability, but repeaters has not.
 Checks the MAC (physical) address of the destination when receives a
frame, and decide if the frame should be forwarded or dropped
 forwards the new copy only to the segment (specific port) to which the
address belongs
 Bridge has a table that maps addresses to the port.
• A bridge makes intelligent forwarding decisions based on the
destination MAC address present in a frame.
• A bridge analyzes source MAC address information on frames entering
the bridge and populates an internal MAC address table based on
learned information

19
Bridge
 Bridge has a table to
 Maps address to ports.
 Used in filtering decisions

20
Switches
• Like a bridge, switch can dynamically learn the
MAC address attached to various ports by
looking at the source MAC address on frames
coming into a port.
• Initially, however the switch is unaware of what
MAC address reside off of which ports.
• When a switch receives a frame destined for a
MAC address not yet present in the switch’s
MAC address table, the switch floods that frame
out of all of the switch port, other than the port
on which the frame arrived.
Switches

Designed to create two or more LAN segments, each of


which is a separate collision domain
Multilayer Switches
• Although a Layer 2 switch, makes forwarding
decisions based on MAC address
information, a multilayer switch can make
forwarding decisions based on upper-layer
information.

• A multilayer switch could function as a


router, and make forwarding decisions on IP
address information.
Multilayer Switches

Eight collision
Domains, Two
Broadcast Domain
Routers

• A Router is a layer 3 device, meaning that it makes


forwarding decisions based on logical network address
information. Such as IP addresses.

• A router has the capability to consider high-layer traffic


parameters in making its forwarding decisions.

• Each port on a Router is a separate collision domain and a


separate broadcast domain.

• Routers are typically more feature-rich and support a


broader range of interface types.
Routers

Eight collision
Domains, Two
Broadcast Domain

You might also like