You are on page 1of 86

McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved.

McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved.
Network Basics

McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved.
Network Definition
• Set of technologies that connects
computers
• Allows communication and collaboration
between users

9A-3
n/.w

9A-4
The Uses of a Network
• Simultaneous access to data
– Data files are shared
• Access can be limited
– Shared files stored on a server
– Software can be shared
• Site licenses
• Network versions
• Application servers

9A-5
The Uses of a Network
• Shared peripheral device
– Printers and faxes are common shares
– Reduces the cost per user
– Devices can be connected to the network
– Print servers control network printing
• Manage the print queue

9A-6
Sharing Data

File server contains documents


used by other computers.

9A-7
The Uses of a Network
• Personal communication
– Email
• Instantaneous communication
– Conferencing
• Tele conferencing
• Videoconferencing
• Audio-conferencing
• Data-conferencing
– Voice over IP
• Phone communication over network wires

9A-8
Voice Over IP

9A-9
The Uses of a Network
• Easier data backup
– Backup copies data to removable media
– Server data backed up in one step

9A-10
Common Network Types
• Local Area Network (LAN)
– Contains printers, servers and computers
– Systems are close to each other
– Contained in one office or building
– Organizations often have several LANS

9A-11
• There are different technologies used to
connect local area network:-
1.Bus technology
2.Ring technology
3.Star technology
• There are other types of network
technologies also like mesh technology.

9A-12
• Examples of local area network (LAN)
• Here are the examples of LAN:-
• Networking in home, office.
• Networking between two computers.
• Wi-Fi (When we consider wireless LAN)

9A-13
Common Network Types
• Wide Area Networks (WAN)
– Two or more LANs connected
– Over a large geographic area
– Typically use public or leased lines
• Phone lines
• Satellite
– The Internet is a WAN

9A-14
1.In an enterprise, a WAN is created to connect
branch offices with one another or to connect
remote employees working at home with the
company's main office. In a university or campus
setting, students might rely on WANs to access
library databases or university research.  

9A-15
1.A bank, including its branch offices and ATM
machines, is another example of an organization
using a WAN. The branches may be in multiple
U.S. states, or even global locations, but they are all
linked through various secure connections. Both
bank employees and customers are users. 
2.It can be said that the internet is the world’s largest
WAN because it’s the largest and most diverse form
of a computer network in the world.

9A-16
Hybrid Network Types
• Campus Area Networks (CAN)
– A LAN in one large geographic area
– Resources related to the same organization
– Each department shares the LAN

9A-17
Hybrid Network Types
• Metropolitan Area Network (MAN)
– Large network that connects different
organizations
– Shares regional resources
– A network provider sells time

9A-18
Example

9A-19
Examples
• Cable TV network
• Telephone networks providing high-speed
DSL lines

9A-20
Hybrid Network Types
• Home Area Network (HAN)
– Small scale network
– Connects computers and entertainment
appliances
– Found mainly in the home

9A-21
Hybrid Network Types
• Personal Area Network (PAN)
– Very small scale network
– Range is less than 2 meters
– Cell phones, PDAs, MP3 players

9A-22
How Networks Are Structured
• Server based network
– Node is any network device
– Servers control what the node accesses
– Users gain access by logging in
– Server is the most important computer

9A-23
How Networks Are Structured
• Client/Server network
– Nodes and servers share data roles
– Nodes are called clients
– Servers are used to control access
– Database software
• Access to data controlled by server
– Server is the most important computer

9A-24
How Networks Are Structured
• Peer to peer networks (P2PN)
– All nodes are equal
– Nodes access resources on other nodes
– Each node controls its own resources
– Most modern OS allow P2PN
– Distributing computing is a form
– Kazaa

9A-25
Network Topologies
• Topology
– Logical layout of wires and equipment
– Choice affects
• Network performance
• Network size
• Network collision detection
– Several different types

9A-26
Network Topologies
• Packets
– Pieces of data transmitted over a network
• Packets are created by sending node
• Data is reassembled by receiving node
– Packet header
• Sending and receiving address
– Packet payload
• Number and size of data
• Actual data
– Packet error control
9A-27
Network Topologies
• Bus topology
– Also called linear bus
– One wire connects all nodes
– Terminator ends the wires
– Advantages
• Easy to setup
• Small amount of wire
– Disadvantages
• Slow
• Easy to crash
9A-28
Network Topologies
• Star topology
– All nodes connect to a hub
• Packets sent to hub
• Hub sends packet to destination
– Advantages
• Easy to setup
• One cable can not crash network
– Disadvantages
• One hub crashing downs entire network
• Uses lots of cable
– Most common topology
9A-29
Star Topology

9A-30
Network Topologies
• Ring topology
– Nodes connected in a circle
– Tokens used to transmit data
• Nodes must wait for token to send
– Advantages
• Time to send data is known
• No data collisions
– Disadvantages
• Slow
• Lots of cable

9A-31
Network Topologies
• Mesh topology
– All computers connected together
– Internet is a mesh network
– Advantage
• Data will always be delivered
– Disadvantages
• Lots of cable
• Hard to setup

9A-32
Mesh Topology

9A-33
Network Media
• Links that connect nodes
• Choice impacts
– Speed
– Security
– Size

9A-34
Wire Based Media
• Twisted-pair cabling
– Most common LAN
cable
– Called Cat5 or
100BaseT
– Four pairs of copper
cable twisted
– May be shielded from
interference
– Speeds range from
1 Mbps to 1,000 Mbps

9A-35
Wire Based Media
• Coaxial cable
– Similar to cable TV wire
– One wire runs through cable
– Shielded from interference
– Speeds up to 10 Mbps
– Nearly obsolete

9A-36
Wire Based Media
• Fiber-optic cable
– Data is transmitted
with light pulses
– Glass strand instead
of cable
– Immune to
interference
– Very secure
– Hard to work with
– Speeds up to
100 Gbps

9A-37
Wireless Media
• Data transmitted through the air
• LANs use radio waves
• WANs use microwave signals
• Easy to setup
• Difficult to secure

9A-38
Network Hardware
• Network interface cards
– Network adapter
– Connects node to the media
– Unique Machine Access Code (MAC)

9A-39
Network Hardware
• Network linking devices
– Connect nodes in the network
– Cable runs from node to device
– Crossover cable connects two computers

9A-40
Network Hardware
• Hubs
– Center of a star network
– All nodes receive transmitted packets
– Slow and insecure

9A-41
Network Hardware
• Switches
– Replacement for hubs
– Only intended node receives transmission
– Fast and secure

9A-42
Network Hardware
• Bridge
– Connects two or more LANs together
– Packets sent to remote LAN cross
• Other packets do not cross
– Segments the network on MAC addresses

9A-43
Network Hardware
• Router
– Connects two or more LANs together
– Packets sent to remote LAN cross
– Network is segmented by IP address
– Connect internal networks to the Internet
– Need configured before installation

9A-44
Network Hardware
• Gateway
– Connects two dissimilar networks
– Connects coax to twisted pair
– Most gateways contained in other devices

9A-45
Network Cabling
• Cabling specifications
– Bandwidth measures cable speed
• Typically measured in Mbps
– Maximum cable length
– Connector describes the type of plug

9A-46
Network Cabling
• Ethernet
– Very popular cabling technology
– 10 Base T, 10Base2, 10Base5
– Maximum bandwidth 10 Mbps
– Maximum distances100 to 500 meters

9A-47
Network Cabling
• Fast Ethernet
– Newer version of Ethernet
– Bandwidth is 100 Mbps
– Uses Cat5 or greater cable
• Sometimes called 100Base T
– Requires a switch

9A-48
Network Cabling
• Gigabit Ethernet
– High bandwidth version of Ethernet
– 1 to 10 Gbps
– Cat 5 or fiber optic cable
– Video applications

9A-49
Network Cabling
• Token ring
– Uses shielded twisted pair cabling
– Bandwidth between 10 and 25 Mbps
– Uses a multiple access unit (MAU)
– Popular in manufacturing and finance

9A-50
Network Protocols
• Language of the network
– Rules of communication
– Error resolution
– Defines collision and collision recovery
– Size of packet
– Naming rules for computers

9A-51
Network Protocols
• TCP/IP
– Transmission Control Protocol/Internet
Protocol
– Most popular protocol
– Machines assigned a name of 4 numbers
• IP address
• 209.8.166.179 is the White House’s web site
– Dynamic Host Configuration Protocol
• Simplifies assignment of IP addresses
– Required for Internet access
9A-52
Network Protocols
• IPX/SPX
– Internet Packet Exchange/Sequenced
Packet Exchange
– Older protocol
– Associated with Novell Netware
– Replaced by TCP/IP

9A-53
Network Protocols
• NetBEUI
– Network BIOS Extended User Interface
– Used by Windows to name computers
– Transmission details handled by TCP/IP

9A-54
Network Protocols
• Token ring
– Popular in manufacturing and finance
– Nodes communicate when they have the
token

9A-55
ISO is the organization.
OSI is the model.

Topics discussed in this section:


Layered Architecture
Peer-to-Peer Processes
Encapsulation

1.56
Layered Architecture
Layers
Seven layers of the OSI model
Layer 7. Application

Layer 6. Presentation
Layer 5. Session

Receiver
Layer 4. Transport
Sender

Layer 3. Network

Layer 2. Data Link


Layer 1. Physical

1.57
Layered Architecture
 A layered model
 Each layer performs a subset of the required
communication functions
 Each layer relies on the next lower layer to
perform more primitive functions
 Each layer provides services to the next higher
layer
 Changes in one layer should not require changes
in other layers
 The processes on each machine at a given layer
are called peer-to-peer process

1.58
PEER – TO – PEER PROCESS
 Communication must move downward through the layers
on the sending device, over the communication channel,
and upward to the receiving device
 Each layer in the sending device adds its own
information to the message it receives from the layer just
above it and passes the whole package to the layer just
below it
 At the receiving device, the message is unwrapped layer
by layer, with each process receiving and removing the
data meant for it

1.59
PEER – TO – PEER PROCESS
 The passing of the data and network information down
through the layers of the sending device and backup
through the layers of the receiving device is made
possible by interface between each pair of adjacent
layers
 Interface defines what information and services a layer
must provide for the layer above it.

1.60
The interaction between layers in the OSI model

1.61
An exchange using the OSI model

1.62
LAYERS IN THE OSI MODEL

Topics discussed in this section:


1. Physical Layer
2. Data Link Layer
3. Network Layer
4. Transport Layer
5. Session Layer
6. Presentation Layer
7. Application Layer

1.63
Physical Layer
The physical layer is responsible for movements of
individual bits from one hop (node) to the next.

 Function
 Physical characteristics of interfaces and media
 Representation of bits
 Data rate
 Synchronization of bits
 Line configuration (point-to-point or multipoint)
 Physical topology (mesh, star, ring or bus)
 Transmission mode ( simplex, half-duplex or duplex)

1.64
Physical layer

1.65
Data Link Layer
The data link layer is responsible for moving
frames from one hop (node) to the next.

 Function
 Framing
 Physical addressing
 Flow control
 Error control
 Access control

1.66
Data link layer

1.67
Hop-to-hop delivery

1.68
Example 1

In following Figure a node with physical address 10 sends a frame to a node


with physical address 87. The two nodes are connected by a link. At the
data link level this frame contains physical addresses in the header. These
are the only addresses needed. The rest of the header contains other
information needed at this level. The trailer usually contains extra bits
needed for error detection

1.69
Network Layer
The network layer is responsible for the
delivery of individual packets from
the source host to the destination host.

 Source-to-destination delivery
 Responsible from the delivery of packets from the
original source to the final destination
 Functions
 Logical addressing

 routing

1.70
Network layer

1.71
Source-to-destination delivery

1.72
Example 2

We want to send data from a


node with network address A and
physical address 10, located on
one LAN, to a node with a
network address P and physical
address 95, located on another
LAN. Because the two devices are
located on different networks, we
cannot use physical addresses
only; the physical addresses only
have local influence. What we
need here are universal addresses
that can pass through the LAN
boundaries. The network (logical)
addresses have this characteristic.

1.73
Transport Layer
The transport layer is responsible for the delivery
of a message from one process to another.

 Process-to- process delivery


 Functions
 Port addressing
 Segmentation and reassembly
 Connection control ( Connection-oriented or connection-less)
 Flow control
 Error control
1.74
Transport layer

Segmentation and reassembly

1.75
Reliable process-to-process delivery of a message

1.76
Example 3

Data coming from the


upper layers have port
addresses j and k (j is the
address of the sending
process, and k is the
address of the receiving
process). Since the data size
is larger than the network
layer can handle, the data
are split into two packets,
each packet retaining the
port addresses (j and k).
Then in the network layer,
network addresses (A and
P) are added to each
packet.

1.77
Session Layer
The session layer is responsible for dialog
control and synchronization.

 It establishes, maintains and synchronize the


interaction between communicating system
 Function
 Dialog control
 Synchronization (checkpoints)

1.78
Session layer

Synchronization

1.79
Presentation Layer
The presentation layer is responsible for translation,
compression, and encryption.

 Concerned with the syntax and semantics of the


information exchanged between two system
 Functions
 Translation ( EBCDIC-coded text file  ASCII-coded
file)

 Encryption and Decryption


 Compression

1.80
Presentation layer

1.81
Application Layer
The application layer is responsible for
providing services to the user.

 Functions
 Network virtual terminal (Remote log-in)

 File transfer and access

 Mail services

 Directory services (Distributed Database)

 Accessing the World Wide Web

1.82
Application layer

1.83
Summary of layers

1.84
Summary of layers

OSI Model  

Data
Layer Function
unit

User 7. Application Network process to application


support Data 6. Presentation Data representation and encryption
layers
5. Session Inter-host communication
Sender

Receiver
User
Segment 4. Transport End-to-end connections and reliability
Network
Path determination and logical
Packet 3. Network
Network addressing
support Frame 2. Data Link Physical addressing
layers
Bit 1. Physical Media, signal and binary transmission

1.85
End of Chapter

McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved.

You might also like