Вы находитесь на странице: 1из 16

PROYECTO FINAL

Edith Esmeralda Rodriguez Briano

1632939

Telecomunicaciones 3

Tabla de contenido
Understand local rea networks (LANs).............................................................................................. 5
Local Area Networks ....................................................................................................................... 5
Network Documentation............................................................................................................. 5
What are hosts? .......................................................................................................................... 5
What are central connecting devices? ........................................................................................ 5
How do hubs function? ............................................................................................................... 5
How do switches function? ......................................................................................................... 5
How do routers function? ........................................................................................................... 6
How do devices connect?............................................................................................................ 6
Ethernet cables............................................................................................................................ 6
Wireless Access Points (WAPs) ................................................................................................... 6
Data Transfer on a LAN ................................................................................................................... 6
How fast does data travel?.......................................................................................................... 7
Data transfer in LANs .................................................................................................................. 7
How does data know where to go? ............................................................................................ 7
Subnet Mask ................................................................................................................................ 7
Types of Local Area Networks ......................................................................................................... 8
Wired LANs (WLANs) ................................................................................................................... 8
Virtual LANs (VLANs) ................................................................................................................... 8
Perimeter Netwoks ..................................................................................................................... 8
Understand network topologies and Access methods ....................................................................... 9
Network Topologies ........................................................................................................................ 9
What is a network topology? ...................................................................................................... 9
Ethernet Standards ......................................................................................................................... 9
What is Ethernet?........................................................................................................................ 9
What are frames? ........................................................................................................................ 9
IEEE 802.3 .................................................................................................................................... 9
CSMA/CD Process ........................................................................................................................ 9
What is the Collision detected procedure? ........................................................................... 10
Client/Server VS Peer- To-Peer ..................................................................................................... 10
The Client/Server Model ........................................................................................................... 10
Types of servers......................................................................................................................... 10

The Peer-to-Peer Model ............................................................................................................ 10


Understand the OSI Model ............................................................................................................... 11
Layers of the OSI Model ................................................................................................................ 11
Standards................................................................................................................................... 11
What are protocols?.................................................................................................................. 11
What is the OSI Model?............................................................................................................. 11
Communications Subnetwork ....................................................................................................... 11
Defining the TCP/ IP Model ........................................................................................................... 11
TCP/IP Model............................................................................................................................. 11
Understand media types ................................................................................................................... 12
Wired Networks ........................................................................................................................ 12
Twisted-Pair Cables ....................................................................................................................... 12
Patch cables............................................................................................................................... 12
Cabling standards ...................................................................................................................... 12
Straight Through Cables ............................................................................................................ 12
Crossover Cables ....................................................................................................................... 12
Limitations of Twsited-Pair Cabling ........................................................................................... 13
What is interference? ................................................................................................................ 13
Shielded Twisted-Pair (STP) Cables ........................................................................................... 13
Plenum Rated ......................................................................................................................... 13
Fiber optic cables .......................................................................................................................... 13
Fiber optic Modes ..................................................................................................................... 13
Fiber Optic Connector Types ..................................................................................................... 13
Understand Wireless networking ..................................................................................................... 14
Wireless Devices............................................................................................................................ 14
Wireless networks ..................................................................................................................... 14
Wireless Network Adapters ...................................................................................................... 14
Wireless Access Points .............................................................................................................. 14
Wireless Repeaters.................................................................................................................... 14
Wireless Standards ........................................................................................................................ 14
802.11n...................................................................................................................................... 15
Wireless Network Topologies ................................................................................................... 15
What is Ad-hoc Mode? .............................................................................................................. 15

What is infrastructure Mode? ................................................................................................... 15


Service Set Identifier (SSID) ....................................................................................................... 15
Wireless Encryption Protocols .................................................................................................. 15
Protecting Wireless Communication......................................................................................... 15
IEEE 802.1X ................................................................................................................................ 15

Understand local rea networks (LANs)


Local Area Networks

A netwok is two devices connected to each other with a physical mdium, such as wires or radio
signals.
The conection allows those two devices to Exchange data.
Network enhance many aspects of life and busine for individuals and organizations, including:
communication and collaboration
sharing information and resources
organizing data
saving costs
Networks are organized base don their geographic location.
A local Area Network, or LAN, is a group of computers or devices that:
Are confined to a small geographic rea, such as a single building
Share a common communication mdium, such as cabled or Wireless connections.
Are connected to a central connecting device, like a hub, switch, or router.

Network Documentation

Describes, defines and explains the physical and logical method for connecting devies
The documentation phase occurs before a network is built, or when changes are made to the
network.
Microsoft Visio is a tool that can be used to document networks.

What are hosts?

Desktop PCs, laptops, cell phones, servers, routers and so on


A host can be any device that has an IP address an address used to send and receive data in a
network.
- IP addresses help identify devices and the networks where tehy are located.

What are central connecting devices?

Hubs, switches, and routers act as central connecting devices


Central connecting devices are responsible for:
Connecting hosts
Transmitting data
Different central connecting devices perform these functions in defferent ways.

How do hubs function?

Hosts send data to a hub


The hub then broadcast that data to all other connected hosts on the network.

How do switches function?

Hosts send data to a switch

Switches direct data to its intended destination


Unlike hubs, switches can send and receive data simultaneously
Switches are the most common device used to connect hosts to a network.

How do routers function?

Routers are at the edge of LANs


They act as a Gateway to other networks
Routers allow communication between hosts on different networks.

How do devices connect?

Computers have network adapters, also known as Network Interface Cards (NICs), that allow them
to connect to networks
NICs via wires or Wireless signals
- wired adapters feature an RJ45 port
- Wireless adapters feature an antenna and connect to networks using Wireless Access Points

Ethernet cables

Ethernet cables are made of copper wires


Tranmit data in the form of electrical pulses
- Wireless connections rely on different technologies

Wireless Access Points (WAPs)

WAPs provide a central point of Access for devices that want to connect to as Local Area Network
(LAN).
Wireless netwoks can consist of many types of devices other tan traditional PCs:
- Smart phones
- PDAs
- Tablet computers
- Micro computers
- PCs and laptops equipped with Wireless network adapters can connect to these networks as well

Data Transfer on a LAN

Serail Data Transfer


Transfer of one bit at a time
Data can travel in a single bit stream in both directions
Depends on type of connection

How fast does data travel?

A data transfer rate is the mximum bits per second (bps) that can be transmitted over a network.
Signified with a lowercase b
The lowercase b differentiates bits from bytes

Data transfer in LANs

1.
2.
3.
4.

1.
2.
3.

Before data is transferred, it has to go through the following process:


Large chunks of data are broken into segments
Addressing information is added to each segment, making it a packet
Packets then travel to the network adapter, where a Little more information is added and they
become Ethernet frames.
Each frame is then broken into a data stream of bits 0s and 1s- that travel over physical media
When data is received, it goes through the process in reverse:
The receiving computer reassembles the bits into an Ethernet frame.
It removes the frame information, and checks the packet information to make sure it was the
intended recipient.
The packet information is then stripped, and the data segment is reassembled into the file that we
click on in Windows Explorer.

How does data know where to go?

Most every computer and many other devices have an internet protocol IP address
Uniquely identifies a device and its associated network.
A typical example of an IPv4 address would be 192.168.1.1
Every IP address is broken down into two parts by a subnet mask
Network id 192.168.1
Host ID 1

Subnet Mask

A group of four numbers that define a computers network.

Types of Local Area Networks


Wired LANs (WLANs)

Hosts, such as PC sor laptops, are connected to central connecting devices by copper-based twisted
pair cabling.
Hosts connect to networks through WAPs.
To connect to a WAP, a device must have a Wireless network adapter.
In larger WLANs, the WAP has to connect to a wired switch.

Virtual LANs (VLANs)

With VLANs, devices in a LAN are grouped based on their function


Implemented to:
Organize networks
Enhance performance
Increase security
Physical location of devices does not matter

Perimeter Netwoks

Perimeter network, or demilitarized zones (DMZs), are small LANs that are set up outside of an
organizations LAN
DMZS typically consist of servers that provide services, like web hosting or email.
This setup allows users outside of an organizations LAN to Access the servers, but not the
organizations LAN.

Understand network topologies and Access methods


Network Topologies
What is a network topology?

A network topology defines the physical connections of hosts in a network.


There are multiple types of topologies, including: bus, star, ring, mesh.

Ethernet Standards
What is Ethernet?

A standard that defines how data is sent and received between devices.
Most widely used standard on the internet today
Standardized by the institute of electrical and Electronics Engineers (IEEE) as 802.3.

What are frames?

Devices on Ethernet networkstransmit frames


Sequence of bits containing a detectable beginning and end of a packet in the stream of bits.
Include physical address information that helps switches determine where to send data.

IEEE 802.3

Defines carrier sense multiple Access with collision detection (CSMA/CD)


Devices share a connection
If they send data at the same time, collisions occur
So, only one computer can transmit at a time.
CSMA/CD allows devices to send/receive data by limiting collisions

CSMA/CD Process
1.
2.

3.

Assemble a frame
Check if the mdium is free
a) If free, transmit a bit of the frame
b) If not, dont transmit and repeat step 2
Check if a collision was detected
a) If so, implement the collision detected procedure
b) If not, transmit the remaining bits in the frame

What is the Collision detected procedure?

1.
2.
3.

If a collision is detected, then a network adapter will perform the following steps:
Send out a jam signal to stop all communication on the mdium
Wait base don the number of collisions detected
Starts sending the remaining bits of the frame

Client/Server VS Peer- To-Peer


The Client/Server Model

Servers are computers dedicated to providing specific types of services or data


A client (a computer) uses software to ask a server for data or services
The server provides the data or service to the client

Types of servers

File server, print server, database server, network controller, messaging server, wweb server, CTIbased server.

The Peer-to-Peer Model

Peers are clients that have equal capabilities and responsibilities in this model
Ability to serve and request data
No server in this model
Examples of file sharing networks
Napster
Gnutella
G2
Other technologies also take advantage of P2P file sharing:
Skype
VoIP
Cloud computing

Understand the OSI Model


Layers of the OSI Model
Standards

Standards are sets of rules that ensure hardware and software released from different companies
work together

What are protocols?

Protocols: Clearly defined rules and procedures that allow different manufacturers to crate
hardware and software that work together at a specific layer.

What is the OSI Model?

Means of simplifying the complicated functions and precesses of networking


Created by the international organization for standardization or ISO
Features seven layers, each with its own distinct set of protocols and functions

Communications Subnetwork

1.
2.
3.

The communications subnetwork consists of layers 1 through 3


Physical
Data Link
Network

Defining the TCP/ IP Model


TCP/IP Model

The TCP/IP model is similar to the OSI model


This model is composed of only four layers

Understand media types


Wired Networks

Thoug Wireless connections are gaining in popularity, we still depend on wired networks to send
our data
The most common type of wire used in networking is made of copper
The cable we rely on to send our data at ultra fast speeds is made of glass fiber

Twisted-Pair Cables

Twisted-pair cables are the most common cables found in LANs


Fast
Efficient
Cheap when compared to other connection types
There are multiple types of twisted-pair cables, and they can be installed temporarily or
permanently
Each twisted-pair cable has eight wires
The eight wires are grouped into four pairs: blue, orange, Green, and Brown.
Each pair is twisted along the entire length of the cable, then all pairs are twisted together and
surrounded by a plastic jacket
Twisting reduces crosstalk and interference

Patch cables

The cables that we use to connect our devices to SOHO routers or RJ45 ports
are called patch cables
Each end of a patch cable is terminated with an RJ45 plug, using a cabling
standard
There are two types of patch cables: straight through and crossover.

Cabling standards

Developed by the Telecommunications Industry Association/Electronics Industries Alliance


(TIA/EIA)
When making a patch cable, the wires of a twisted pair cable are placed in order
A plug is then crimped, or secured, once the wires are in place

Straight Through Cables

Straight through cables are used to connect computers to central connecting devices, such
as switches or SOHO routers
- Most common type of a patch cable
Called straight through because the wires on each end are organized using the same
standard

Crossover Cables

Crossiver cables are used to connect like devices, such as a computer to a computer
They are called crossover because the wires on each end are organized using different
cabling standards

Limitations of Twsited-Pair Cabling

Twisted-pair cables can only run about 100 meters before the electric signal suffers from
atteniation
Twisted-pair cabling is also susceptible to interference

What is interference?

Interference is anything that disrupts or modifies a signal traveling along a wire


There are multiple types of interference including: electromagnetic interference (EMI),
radio frequency interference (RFI) and Crosstalk

Shielded Twisted-Pair (STP) Cables

Interference can be addressed through the use of Shielded Twisted Pair (STP) cables
STP cables have an aluminum shield inside the plastic jacket that surrounds the pairs of
wires

Plenum Rated

Cables installed inside walls or above drop ceilings where they cannot be accessed by
sprinkler systems in the case of a fire should be plenum-rated or low-smoke rated
Plenum-rated cables have a Teflon coating that makes them more impervious to fire
They are used in these situations because standard twsited-pair cables have a PVC jacket,
which can emit deadly gas into the air

Fiber optic cables

Transmit data using light, instead of electricity


- Commonly known as fiber
Made of glas sor plastic strands that are extremely small and flexible
Used when higher data transfer rates are required, or when data has to be transferred
longer distances

Fiber optic Modes

Fiber optic cable takes two different forms: single-mode and multi-mode.

Fiber Optic Connector Types

Unlike twisted pair cables that terminate with RJ45 connectors, fiber optic cables can
terminate in a number of connector types, including: FC connector, LC, MR-RJ, SC, ST,
TOSLINK.

Understand Wireless networking


Wireless Devices
Wireless networks

For a Wireless network to work, all devices must have a Wireless network adapter
Connects to Wireless acess point (WAP) that is capable of sending and receiving data
wirelessly
Wireless accesss points then transmit data over a wire, such as an Ethernet cable, through
a network to its final destination

Wireless Network Adapters

Wireless network adapters enable connectivity between devices and a WAP


Wireless network adapters work by translating bits into radio signals, which are then sent
to a WAP
Wireless network adapters can come in many forms: usb, internal adapter cards, external
adapter cards, onboard adapters, etc.

Wireless Access Points

Wireless Access points can also come in many forms: SOHO routers, dedicated WAPs
connected to switches.
Wireless Access points also work by translating bits into radio signals, which are then sent
to or received from devices on a network

Wireless Repeaters

Wireless networks are limited by how far a Wireless signal can transmit
To address this problema, we use Wireless repeaters
Wireless repeaters are placed at the edge of a network to extend the signal range of the
WAP
Repeaters read the signal coming from the WAP and repeat it to any devices on the
network within its rnge and vice versa

Wireless Standards

For Wireless networks to function, all devices must use the same Wireless networking
standard
There are a number of standards that define Wireless networking
- These standards are also governed by the IEEE and are referred to as IEEE 802.11
IEEE 802.11, or Wi-Fi, standards dictacte the data transfer rate, connection frequency, and
more

802.11n

802.11n is a standard commonly used in organizations because of its speed, and a number
of other factors

Wireless Network Topologies

Similar to wired networks, there are different ways to connect devices in WLANs
Recall that these arrangements are called physical topologies
Two common ways to connect devices wirelessly are: Ad-hoc mode, Infrastructure mode.

What is Ad-hoc Mode?

Wireless devices using the Ad-hoc mode are organized similar to a mesh topology in a
wired network
Clients communicate directly with one another
- This is called a peer-topeer network
Ad-hoc mode is used less commonly tan infrastructure mode

What is infrastructure Mode?

Infrastructure mode is the most common way to connect devices wirelessly


Wireless clients connect to a WAP
When clients want to connect, they use the service set identifier (SSID)
Before a device can Access the network it has to be authenticated using password

Service Set Identifier (SSID)

Name of the Wireless network, and it is broadcast over the airwaves


Can identify a WAP by its SSID
For security, the SSID can be hidden from public discovery

Wireless Encryption Protocols

Encryption is the process of scrambling data to make it unreadable to hackers


Data is scrambled and unscrambled using an encryption key
The longer the key, the harder it is for somebody to hack your data

Protecting Wireless Communication

Though exceptionally convenient, Wireless communication is not secure


The reason why is that data traveling wirelessly is accesible to anyone, unless it is
protected
There are multiple Wireless encryption protocols that can be used for Wireless network

IEEE 802.1X

The IEEE 802.1X standard can also be used to secure Wireless connections

Вам также может понравиться