Professional Documents
Culture Documents
1.1
Clients and Servers
Every computer connected to a network is called
a host or end device.
Servers are computers that provide information to
end devices on the network. For example, email
servers, web servers, or file server
Clients are computers that send requests to the
servers to retrieve information such as a web page
from a web server or email from an email server.
Client and server software usually run on separate
computers.
However, in small businesses or homes, it is typical
for a client to also function as the server. These
networks are called peer-to-peer networks.
Peer-to-peer networking advantages: easy to set
up, less complex, and lower cost.
Disadvantages: no centralized administration, not
as secure, not scalable, and slower performance.
Network Components
A network can be as simple as a single cable connecting two computers or as
complex as a collection of networks that span the globe.
Network infrastructure contains three broad categories of network components:
Devices
Media
Services
End Devices
An end device is where a message originates from or where it is received.
Data originates with an end device, flows through the network, and arrives at an end device
An intermediary device interconnects end devices in a network. Examples
include: switches, wireless access points, routers, and firewalls.
The management of data as it flows through a network is also the role of an
intermediary device including:
Regenerate and retransmit data signals.
Maintain information about what pathways exist through the network and internetwork.
Notify other devices of errors and communication failures.
Network Media
Communication across a network is carried through a medium
which allows a message to travel from source to destination.
Networks typically use three types of media:
Metallic wires within cables, such as copper
Glass, such as fiber optic cables
Wireless transmission
In addition to the device representations on the right, it is
important to remember and understand the following terms:
Network Interface Card (NIC)
Physical Port
Interface
The Internet, Intranets, and Extranets
Network Architecture
Network Architecture refers to the technologies that support the infrastructure that
moves data across the network.
There are four basic characteristics that the underlying architectures need to
address to meet user expectations:
Fault Tolerance
Scalability
Quality of Service (QoS)
Security
A fault tolerant network limits the impact of a failure by limiting the number of
affected devices. Multiple paths are required for fault tolerance.
A scalable network can expand quickly and easily to support new users and
applications without impacting the performance of services to existing users.
Quality of Service
Voice and live video transmissions require higher expectations for those
services being delivered.
Have you ever watched a live video with constant breaks and pauses? This
is caused when there is a higher demand for bandwidth than available –
and QoS isn’t configured.
Quality of Service (QoS) is the primary mechanism used to ensure reliable
delivery of content for all users.
With a QoS policy in place, the router can more easily manage the flow of
data and voice traffic.
There are two main types of network security that must be addressed:
Network infrastructure security
Physical security of network devices
Preventing unauthorized access to the management software on those devices
Information Security
Protection of the information or data transmitted over the network
TYPE OF CONNECTION
Point to point
A dedicated link is provided between two
devices
Most of them uses an actual length of wire or
cable to connect the two ends but other Point
options
– to – point connection
,such as microwave satellite are possible
Multipoint
More than two devices share a single line.
The capacity is shared either spatially or
temporally.
Spatially: Several devices can use link simultaneously
Temporally: Users take turns , it is a timeshared
Multipoint connection
9
Topology
Physical topology
Is how the wires are run
The way in which a network is laid out physically
Logical topology is how the signal travels.
A device can be wired to implement any logical topology.
LANs are logical busses or rings, depending on how the hub is
wired
4 basic types: mesh, star, bus, ring
The most common physical topology is the star.
All the wires come back to a central point
May often see hybrid
10
Mesh Topology
12
Tree topology
Is a variation of star
Not every device plugs directly into the central hub. The
majority of devices connect to secondary hub that in turn
is connected to the central hub
The advantages and disadvantages of tree topology are
generally the same as those of star.
The addition of secondary hubs bring more advantage:
Allow more devices to be attached to a single central
hub, therefore increase the distance a signal can travel
between devices.
13
Bus Topology
A multipoint topology
Consists of cables connecting PCs or file servers
Terminator attached to each end of bus cable segment
to absorb signal and prevent signal reflection back on to covered path
Transmitting packet across bus
Detected by all nodes on segment
Given time limit to reach destination
Advantages of bus design
Requires less cable than other topologies
Easy to install and extend bus with a workstation
Disadvantages of bus topology
Not secured
Can become quickly congested with network traffic
A fault in bus cable stops all transmissions even between devices on the same
side of the problem. The damaged area reflects signals back the direction of
origin, creating noise in both directions
It can difficult to add new devices (adding more require modification of the
backbone).
14
Ring Topology
Each device is dedicated point-to-point
connection only with the two devices on either
side of it
Signal is passed from device to device until it
reaches destination
Each device functions as a repeater
Advantage
Relatively easy to install and reconfigure
Fault isolation is simplified
Disadvantage
Unidirectional traffic
A break in the ring can disable the entire network.
This can be solved by use dual ring
15
Hybrid topology
Repeaters
16
HUB
19
Bridge
Bridge has a table to
Maps address to ports.
Used in filtering decisions
20
Switches
• Like a bridge, switch can dynamically learn the
MAC address attached to various ports by
looking at the source MAC address on frames
coming into a port.
• Initially, however the switch is unaware of what
MAC address reside off of which ports.
• When a switch receives a frame destined for a
MAC address not yet present in the switch’s
MAC address table, the switch floods that frame
out of all of the switch port, other than the port
on which the frame arrived.
Switches
Eight collision
Domains, Two
Broadcast Domain
Routers
Eight collision
Domains, Two
Broadcast Domain