Академический Документы
Профессиональный Документы
Культура Документы
The last definition is more appealing to us in this course. The key word in the definition
is "share." Sharing is the purpose of computer networking. The ability to share
information efficiently is what gives computer networking its power and its appeal i.e.
Networking is the concept of sharing resources and services.
Computer Networking
A computer network consists of two computers connected to each other by a cable that
allows them to share data i.e a network of computers is a group of interconnected systems
sharing resources and interacting using a shared communications link. A network,
therefore, is a set of interconnected systems with something to share such as data, a
printer,
a fax modem, or a service such as a database or an email system. Computer networking
arose as an answer to the need to share data.
The individual systems must be connected through a pathway (called the transmission
medium) that is used to transmit the resource or service between the computers. All
systems on the pathway must follow a set of common communication rules for data to
arrive at its intended destination and for the sending and receiving systems to understand
each other. The rules governing computer communication are called protocols.
Connecting together of computers and other devices is called a network, and the concept
of connected computers sharing resources is called networking
N.B
Sneakernet is the early form of computer networking but many of us have used it and
perhaps still use today. Sneakernet involves copying files onto floppy disks and giving
them to others to copy onto their computers. Think about it advantages and
disadvantages.
Reasons for using computer networking
Why Use a Computer Network?
The reasons for using computer networking are to: Provide services and to reduce equipment costs. Networks enable computers to
share their resources by offering services to other computers and users on a
network.
Sharing files (data)
Sharing printers and other devices (Hardware)
Enabling centralized administration and security of the resources within the
system
Supporting network applications such as electronic mail and database services
Basic components of a network
In general, all networks have certain components, functions, and features in common
Distributed Computing
Distributed computing emerged PCs were introduced into organizations. Instead of
centralized processing PCs provided multiple computers capable of independent
processing. Each PC could receive input and could process information locally, without
the aid of another computer. These PCs, however, did not have the computing power of a
mainframe. Thus, in most instances, a companys mainframe could not be replaced by a
PC.
Distributed computing was a major step forward in how businesses leveraged their
hardware resources. It provided smaller businesses with their own computational
capabilities, enabling them to perform less-complex computing tasks on the smaller,
relatively inexpensive machines.
Collaborative Computing
Collaborative computing enables computers in a distributed computing environment to
share processing power in addition to data, resources, and services. One computer might
borrow processing power by running a program on another computer on the network. Or,
processes might be designed so they can run on two or more computers. Collaborative
computing cannot take place without a network to enable the various computers to
communicate.
Types of Networking
Networks generally fall into one of two broad network categories:
Client-server networks or Server-Based Networks
Peer-To-Peer Networks
Peer-to-Peer Networking
In a peer-to-peer network, there are no dedicated servers, and there is no hierarchy among
the computers. All the computers are equal and therefore are known as peers. Each
computer functions as both a client and a server, and there is no administrator responsible
for the entire network. The user at each computer determines what data on that computer
is shared on the network. Small networksusually with fewer than 10 machinescan
work well in this configuration.
Size
Peer-to-peer networks are also called workgroups. The term "workgroup" implies a small
group of people. There are typically 10 or fewer computers in a peer-to-peer network.
Cost
Peer-to-peer networks are relatively simple. Because each computer functions as a client
and a server, there is no need for a powerful central server or for the other components
required for a high-capacity network. Peer-to-peer networks can be less expensive than
server-based networks.
Operating Systems
In a peer-to-peer network, the networking software does not require the same standard of
performance and level of security as the networking software designed for dedicated
servers. Dedicated servers function only as servers and not as clients or workstations.
Peer-to-peer networking is built into many operating systems. In those cases, no
additional software is required to set up a peer-to-peer network.
Where a Peer-to-Peer Network Is Appropriate
Peer-to-peer networks are good choices for environments where:
There are 10 users or fewer.
Users share resources, such as files and printers, but no specialized servers exist.
Security is not an issue.
The organization and the network will experience only limited growth within the
foreseeable future.
Advantages of Peer-To-Peer Network
Client/Server-Based Networking
A client/server network consists of a group of user-oriented PCs (called clients) that issue
requests to a server. The client PC is responsible for issuing requests for services to be
rendered. The servers function on the network is to service these requests. Servers
generally are higher-performance systems that are optimized to provide network services
to other PCs. The server machine often has a faster
CPU, more memory, and more disk space than a typical client machine. The client/server
model is a network in which the role of the client is to issue requests and the role of the
server is to service requests.
As networks increase in size, more than one server is usually needed. Spreading the
networking tasks among several servers ensures that each task will be performed as
efficiently as possible.
Specialized Servers
Servers for large networks have become specialized to accommodate the expanding
needs of users. Following are examples of different types of servers included on many
large networks.
File and Print Servers
File and print servers manage user access and use of file and printer resources. In other
words, file and print servers are used for file and data storage.
Application Servers
Application servers make the server side of client/server applications, as well as the data,
available to clients. For example, servers store vast amounts of data that is organized to
make it easy to retrieve. An application server differs from a file and print server. With a
file and print server, the data or file is downloaded to the computer making the request.
With an application server, the database stays on the server and only the results of a
request are downloaded to the computer making the request.
Mail Servers
Mail servers operate like application servers in that there are separate server and client
applications, with data selectively downloaded from the server to the client.
Fax Servers
Fax servers manage fax traffic into and out of the network by sharing one or more fax
modem boards.
Communications Servers
Communications servers handle data flow and e-mail messages between the servers' own
networks and other networks, mainframe computers, or remote users who dial in to the
servers over modems and telephone lines.
Directory Services Servers
Directory services servers enable users to locate, store, and secure information on the
network. For example, some server software combines computers into logical groupings
(called domains) that allow any user on the network to be given access to any resource on
the network.
Planning for specialized servers becomes important with an expanded network. The
planner must take into account any anticipated network growth so that network use will
not be disrupted if the role of a specific server needs to be changed.
The Role of Software in a Server-Based Environment
No matter how powerful or advanced a server might be, it is useless without an operating
system that can take advantage of its physical resources. Advanced server operating
systems, such as those from Microsoft and Novell NetWare, Windows NT Server, and
Banyan Vines are designed to take advantage of the most advanced server hardware
Communication Media
Communication is the activity or process of exchanging information in mutual
understanding form. A computer system can be vast resource of information. Once this
system is connected to a network, this information can be shared among all other users. A
communication media is required to connect different computer systems to facilitate the
information exchange.
Two main categories:
Guided wires, cables
Unguided wireless transmission, e.g. radio, microwave, infrared, sound, sonar
Guided Media
a) Twisted-Pair cables:
i.
Unshielded Twisted-Pair (UTP) cables
ii.
Shielded Twisted-Pair (STP) cables
b) Coaxial cables
c) Fiber-optic cables
Unguided Media
If, however, the two wires are twisted around each other at a regular intervals (between 2
to 12 twist per foot), each wire is the closer to the noise source for half the time and the
further away the other half. With the twisting interference can be equalized for both
wires. Twisting does not always eliminate the impact of noise, but does significantly
reduce it
Twisted-pair cable has become the dominant cable type for all new network designs that
employ copper cable. Among the several reasons for the popularity of twisted-pair cable,
the most significant is its low cost. Your telephone cable is an example of a twisted-pair
type cable.
Twisted cable comes in two forms: unshielded and shielded.
1. Unshielded Twisted (UTP) cable
UTP consists of a number of twisted pairs with simple plastic casing, usually wrapped
inside a plastic cover (for mechanical protection). Unshielded twisted-pair cable doesnt
incorporate a braided shield into its structure. UTP is commonly used in telephone
system.
The Electrical Industry Association (EIA) divides UTP into different categories by
quality grade. The rating for each category refers to conductor size, electrical
characteristics, and twists per foot.
Categories UTP Cables
Category 1: Applies to transmit traditional UTP telephones cabling, which is designed to
carry voice but not data. It is the lowest quality, only good for voice, mainly found in
very old buildings, not recommended now
Category 2: Certifies UTP cabling for bandwidth up to 4 Mbps and consists of four pair
of wires. Since 4 Mbps is slower than most networking technologies in the use today.
Category 2 is rarely encountered in networking environment, however it is good for voice
and low data rates (up to 4Mbps for low-speed token ring networks)
Category 3: Certifies UTP cabling for bandwidth up to 10Mbps. This includes most
conventional networking technologies, such as 10BaseT Ethernet and 4Mbps token ring
etc. Category 3 consists of four pairs, each having minimum 3 twists per foot. It is
common in phone networks in residential buildings.
Category 4: Certifies UTP cabling for bandwidth up to 10Mbps. This includes primarily
10BaseT Ethernet and 16Mbps token ring. Category 4 consists of four pairs. It is mainly
for token rings
Category5 (or 5e): Used for data transmission up to 100Mbps Category 5 also consists
of four pairs. (or 5e). Up to 100 Mbps and it is common for networks targeted for highspeed data communications
Category 6 more twists than Cat 5, up to 1 Gbps
N.B The price of the grades of cable increase as you move from Category 1 to Category 6
2. Shielded Twisted (STP)
UTP is particularly prone to cross talk, and the shielding included with STP is designed
specifically to reduce this problem. STP includes shielding to reduce cross talk as well as
to limit the effects of external interference. For most STP cables, this means that the
wiring includes a wire braid inside the cladding or sheath material as well as a foil wrap
around each individual wire. Shielded twisted-pair cabling consists of one or more
twisted pairs of cables enclosed in a foil wrap and woven copper shielding. This shield
improves the cable's transmission and interference characteristics, which, in turn, support
higher bandwidth over longer distance than UTP.
STP cables are similar to UTP cables, except there is a metal foil or braided-metal-mesh
cover that encases each pair of insulated wires
Coaxial Cable
Coaxial cables were the first cable types used in LANs. Coaxial cable gets its name
because two conductors share a common axis; the cable is most frequently referred to as
a coax. In general, coaxial cables, or coax, carry signals of higher freq (100KHz
500MHz) than UTP cables. Outer metallic wrapping serves both as a shield against noise
and as the second conductor that completes the circuit. Coaxial cable, commonly called
coax, has two conductors that share the same axis. A solid copper wire runs down the
center of the cable, and this wire is surrounded by plastic foam insulation. The foam is
surrounded by a second conductor, wire mesh tube, metallic foil, or both. The wire mesh
protects the wire from EMI. It is often called the shield. A tough plastic jacket forms the
cover of the cable, providing protection and insulation.
The components of a coaxial cable are as follows:
A center conductor, although usually solid copper wire, is sometimes made of
stranded wire.
.An outer conductor forms a tube surrounding the center conductor.
This conductor can consist of braided wires, metallic foil, or both. The outer conductor,
frequently called the shield, serves as a ground and also protects the inner conductor from
EMI.
An insulation layer keeps the outer conductor spaced evenly from the inner
conductor.
.A plastic encasement (jacket) protects the cable from damage
A type of coaxial cable that you may be familiar with is your television cable.
Types of Coaxial Cable (Thinnet, Thicknet)
Where Ethernet is concerned, there are two types of coaxial cable, called this Ethernet
(also known as thinnet or thinwire,) and thick Ethernet (also known as thinnet or
thickwire). The Institute of Electrical and Electronics Engineers (IEEE) designates these
cable types as 10Base2 and 10Base5, respectively, where these notations indicates:
Total bandwidth for the technology: in this case, 10 means 10Mbps
Base: indicates that the network uses baseband signaling and this applies to both types of
cable.
2 or 5: a rough indicator of maximum segment length, measured in hundreds of meters;
thinwire support a maximum segment length of 185 meters, which rounds up to 200;
thickwire supports a maximum segment length of 500 meter
Thinnet
Thinnet is a light and flexible cabling medium that is inexpensive and easy to install.
Thinnet cable can reliably transmit a signal for 185 meters (about 610 feet).
Thicknet
Thicknet (big surprise) is thicker than Thinnet. Thicknet coaxial cable is approximately
0.5 inches (13 mm) in diameter. Because it is thicker and does not bend as readily as
Thinnet, Thicknet cable is harder to work with. A thicker center core, however, means
that
Thicknet can carry more signals a longer distance than Thinnet. Thicknet can transmit a
signal approximately 500 meters (1,650 feet). Thicknet cable is sometimes called
Standard Ethernet . Thicknet can be used to connect two or more small Thinnet LANs
into a larger network. Because of its greater size, Thicknet is also more expensive than
Thinnet. However, Thicknet can be installed relatively safely outside, running from
building to building.
A light pulse can be used to signal a 1 bit; the absence of a pulse signals a 0 bit.
Visible light has a frequency of about 108 MHz, so the bandwidth of an optical
transmission system is potentially enormous.
An optical transmission system has three components: the transmission medium, the light
source and the detector. The transmission medium is an ultra-thin fiber of glass or fused
silica. The light source is either a LED (Light Emit Diode) or a laser diode, both of which
emits light pulses when a electrical current is applied. The detector is a photo diode,
which generates an electrical pulse when light falls on it.
An optical fiber consists of a core (denser material) and a cladding (less dense material)
Simplest one is a multimode step-index optical fiber
Multimode = multiple paths, whereas step-index = refractive index follows a stepfunction profile (i.e. an abrupt change of refractive index between the core and the
cladding)
Light bounces back and forth along the core
Common light sources: LEDs and lasers
Advantages
Noise resistance external light is blocked by outer jacket
Less signal attenuation a signal can run for miles without regeneration
(currently, the lowest measured loss is about ~4% or 0.16dB per km)
Higher bandwidth- Higher bandwidth: fiber optic cable can support dramatically
higher bandwidths (and hence data rate) than all other cables. Currently, data rates
and bandwidth utilization over fiber-optic cable are limited not by the medium but
by the signal generation and reception technology available. A typical bandwidth
for fiber optic is 100Mbps to 1Gbps.
Disadvantages
Cost Optical fibers are expensive
Installation/maintenance any crack in the core will degrade the signal, and all
connections must be perfectly aligned
Fragility : glass fiber is more easily broken than wire
Microwave
Microwave technology has applications in all three of the wireless networking scenarios:
LAN, extended LAN, and mobile networking. Microwave communication can take two
forms: terrestrial (ground) links and satellite links. The frequencies and technologies
employed by these two forms are similar, but distinct differences exist between them.
Terrestrial Microwave
Microwaves do not follow the curvature of the earth therefore require line of sight
transmission and reception equipment. The distance coverable by line of sight signals
depend to a large extend on the height of the antenna: the taller the antenna, the longer
the sight distance. Height allows the signals to travel farther without being stopped by the
curvature of the earth and raises the signals above many surface obstacles, such as low
hills and tall buildings that would otherwise block transmission.
Microwave signals propagate in one direction at a time, which means that two
frequencies are necessary for two ways communication such as telephone
communication. One frequency is reserved for transmission in one direction and other for
transmission in other. Each frequency requires its own transmitter and receiver. Today,
both pieces of equipment usually are combined in a single piece of equipment called
transceiver, which allows a single antenna to serve both frequencies and functions.
Microwave technology has applications in all three of the wireless networking scenarios:
LAN, extended LAN, and mobile networking. A microwave link is used frequently to
transmit signals in instances in which it would be impractical to run cables.
Satellite communication
Satellite transmission is much like line of sight microwave transmission in which one of
the stations is a satellite orbiting the earth. Satellite microwave systems relay
transmissions through communication satellites that operate in geosynchronous orbits
22,300 miles above the earth. Satellites orbiting at this distance remain located above a
fixed point on earth. The principle is the same as terrestrial microwave, with a satellite
acting as a super-tall antenna and repeater. Earth stations use parabolic antennas (satellite
dishes) to communicate with satellites. These satellites then can retransmit signals in
broad or narrow beams, depending on the locations set to receive the signals. When the
destination is on the opposite side of the earth, for example, the first satellite cannot
transmit directly to the receiver and thus must relay the signal through another satellite
Although in satellite transmission signals must still travel in straight lines, the limitations
imposed on distance by the curvature of the earth are reduced. In this way, satellite relays
allow microwave signals to span continents and ocean with a single bounce
Satellite microwave can provide transmission capability to and from any location on
earth, no matter how remote. This advantage makes high quality communication
available to undeveloped parts of the world without requiring a huge investment in
ground based infrastructure. Satellite themselves are extremely expensive, of course, but
leasing time or frequencies on one can be relatively cheap.
Transmission Impairments:
With any communication system, there is a high possibility that the signal that is received
will differ from the signal that is transmitted as a result of various transmission
impairments. For analog signals, these impairments introduce various random
modifications that degrade the signal quality. For digital signals, bit errors are introduced:
A binary 1 is transformed into a binary 0, and vice versa.
The most significant impairments are the following:
Attenuation
Noise
EMI
Crosstalk
Attenuation
When an electromagnetic signal is transmitted along any medium, it gradually become
weaker at greater distances, this is referred to as attenuation. To solve this problem
amplifier is used. The amplifier boosts the signals and extends the transmission distance
Attenuation is a measure of how much a signal weakens as it travels through a medium,
Attenuation is a contributing factor to why cable designs must specify limits in the
lengths of cable runs. When signal strength falls below certain limits, the electronic
equipment that receives the signal can experience difficulty isolating the original signal
from the noise present in all electronic transmissions.
Noise
Random electrical signals that can be picked up by the transmission medium and result in
degradation of the data.
Electromagnetic Interference (EMI)
Electromagnetic interference (EMI) consists of outside electromagnetic noise that
distorts the signal in a medium. When you listen to an
AM radio, for example, you often hear EMI in the form of noise caused by nearby motors
or lightning. Some network media are more susceptible to EMI than others.
Cross talk
Crosstalk is a special kind of interference caused by adjacent wires. Crosstalk occurs
when the signal from one wire is picked up by another wire. You may have experienced
this when talking on a telephone and hearing another conversation going on in the
background. Crosstalk is a particularly significant problem with computer networks
because large numbers of cables often are located close together, with minimal attention
to exact placement.
fair amount of network traffic. A common example of polling is when your computer
polls its printer to receive a print job.
Network Topologies
A topology defines the arrangement of nodes, cables, and connectivity devices that make
up the network. Two categories form the basis for all discussions of topologies:
Physical topology-describes the actual layout of the network transmission media.
Logical topology-describes the logical pathway a signal follows as it passes
among the network nodes.
Physical and logical topologies can take several forms. The most Common topologies for
understanding the Ethernet and token-ring topologies are:
Bus topologies
Ring topologies
Star topologies
Mesh topology
Each topology has its own strengths and weaknesses.
a) Bus Topologies
A bus physical topology is one in which all devices connect to a common, shared cable
(sometimes called the backbone). Bus topology is suited for the networks that use
contention-based access methods such as Carrier Sense Multiple Access with Collision
Detection (CSMA/CD) Ethernet which is the most common contention-based network
architecture, typically uses bus as a physical topology. Even 10BASE-T ethernet
networks use the bus as a logical topology but are configured in a star physical topology.
Its important to note that the bus topology is a Passive topology. This means that
computers on the bus only listen for data being sent, they are not responsible for moving
the data from one computer to the next. If one computer fails it has no effect on the rest
of the network. In an active topology network, the computers regenerate signals and are
responsible for moving the data through the network.
Above figure gives an example. In this example, Computer 1, 2, 3, 4 and 5, in that order
are part of logical ring. Computer 1 passes the token to computer 2, which passes it to
computer 3, which passes to computer 4, which passes the token to station 5 and finally
computer 1 will get the token (starting point).
The bus requires the least amount of cable to connect the computers together and
is therefore less expensive than other cabling arrangements.
It is easy to extend a bus. Two cables can be joined into one longer cable with a
BNC barrel connector, making a longer cable and allowing more computers to
join the network.
A break in the cable or lack of proper termination can bring the network down.
The ring topology is almost always implemented as a logical topology. Token ring, for
example, the most widespread token-passing network, always arranges the nodes in a
physical star (with all nodes connecting to a central hub), but passes data in a logical ring.
How a Ring Network Works
Every computer is connected to the next compute in the ring, and each retransmit what it
receives from the previous computer. The message flow around the ring in one direction.
Since each computer retransmits what it receives, a ring is an active network and is not
subject to the signal loss problem a bus experience. There is no termination because there
is no end to the ring
Token passing a method of sending data in a ring. A small packet called the token
passed around the ring to each computer in turn. If a computer has information to send, it
modifies the token, adds address information and the data and sends it down the ring. The
information travels around the ring until it either reaches its destination or returns to the
sender. When the intended destination computer receives the packet, it returns a message
to the sender including its arrival. A new token is then created by the sender and sent
down the ring, allowing another station to capture the token and begin transmission.
A token can circle a ring 200 meters in diameter at about 10,000 times a second.
Advantages of Ring topology
All the computers have equal access to the network.
Even with many users, network performance is even
Allows error checking, and acknowledgement.
Disadvantages of Ring topology
Failure of one computer can affect the whole network.
It is difficult to troubleshoot the ring network.
Adding or removing computers disturbs the network.
Ring Topology is Appropriate in Following Situation:
c) Star Topologies
Star topologies require that all devices connect to a central hub. The hub receives signals
from other network devices and routes the signals to the proper destinations. Star hubs
can be interconnected to form tree, or hierarchical, network topologies. A star physical
topology is often used to implement a bus or ring logical topology.
it. This type of hub is often called a multiport repeater. Active hub requires electrical
power to run. A passive hub, such as wiring panels, merely acts as a connection point and
does not amplify or regenerate the signal. Passive hubs do not require electrical power to
run. Using a hybrid hub, several types of cable can be used to implement a star network.
Hybrid hub is used to connect different types of cables. It is used to maximise the
networks efficiency and utilise the benefits different cables.
Advantages of the Star
It is easy to modify and add new computers to a star network without disturbing
the rest of the network. You simply run a new line from the computer to the
central location and plug it into the hub. When the capacity of the central hub is
exceeded, it can be replaced with one that has a larger number of ports to plug
lines into (or multiple hubs can be connected together to extend the number of
ports)
The centre of a star network is a good place to diagnose network faults. Intelligent
hubs (hubs with microprocessors that implement features in addition to repeating
network signals) also provide for centralised monitoring and management of the
network.
Single computer failure does not necessarily bring down the whole star network.
Several types of cable can be used in the same network with a hybrid hub.
Disadvantages of Star
If the central hub fails, the whole network fails to operate.
It cost more to cable a star network.
Star topology is appropriate in following situation:
It must be easy to add or remove client computer.
It must be easy to troubleshoot.
The network is large.
The network is expected to grow in the future.
Mesh Topology
A mesh topology is really a hybrid model representing an all-channel sort of physical
topology. It is a hybrid because a mesh topology can incorporate all the topologies
covered to this point. It is an all-channel topology in that every device is directly
connected to every other device on the network. When a new device is added, a
connection to all existing devices must be made. This provides for a great deal of fault
tolerance, but it involves extra work on the part of the network administrator. That is, if
any transmission media breaks, the data transfer can take alternative routes. However,
cabling becomes much more extensive and complicated
Most mesh topology networks are not true mesh networks. Rather, they are hybrid mesh
networks, which contain some redundant links but not all.
Advantages of Mesh
Because of the dedicated link, no traffic between computers.
Failures of one node computer not affect rest of the network.
Because of the dedicated link privacy and security are guaranteed
Point to point links make fault identification and fault isolation easy.
Disadvantages of Mesh
Due to the amount of cabling and number of input output ports, it is expensive.
Large space is required to run the cables.
Installation and reconfiguration are difficult.
When a Mesh Appropriates to Use
Direct transmission is required for privacy reason
Need to have dedicated link for fast transmission.
Variations of the Major Topologies
Hybrid Star
A star network can be extended by placing another star hub where a computer might
otherwise go, allowing several more computers or hubs to be connected to that hub
Star Bus
Hybrid Topologies
Often a network combines several topologies, as subnetworks linked together are a large
topology. For instance one department of business may have decided to use a bus
topology while another department has a ring. The two can be connected to each other a
central controller in a star topology.
NETWORK ARCHITECTURES
A network architecture is the design specification of the physical layout of connected
devices. This includes the cable being used (or
wireless media being deployed), the types of network cards being deployed, and the
mechanism through which data is sent on to the network and passed to each device.
Network architecture encompasses the total design and layout of the network
Ethernet
Ethernet is a very popular local area network architecture based on the CSMA/CD access
method.
The original ethernet specification was the basis for the IEEE 802.3 specifications
(Networking Standards to be covered later)
In present usage, the term ethernet refers to original ethernet (or Ethernet II, the latest
version) as well as the IEEE 802.3 standards
The different varieties of Ethernet networks are commonly referred to as ethernet
topologies. Typically, ethernet networks can use a bus physical topology, although, as
mentioned earlier, many
varieties of ethernet such as 10BASE-T use a star physical topology and a bus logical
topology.
Ethernet topologies:
10BASE2
10BASE5
10BASE-T
10BASE-FL
100VG-AnyLAN
100BASE-X
Note that the name of each ethernet topology begins with a number (10 or 100). That
number specifies the transmission speed for the network. For instance, 10BASE5 is
designed to operate at 10Mbps, and 100BASE-X operates at 100Mbps. BASE specifies
that baseband transmissions are being used. The T is for unshielded twisted-pair
wiring, FL is for fiber optic cable, VG-AnyLAN implies Voice Grade, and X
implies multiple media types.
Ethernet networks transmit data in small units called frames. The size of an ethernet
frame can be anywhere between 64 and 1,518 bytes. Eighteen bytes of the total frame
size are taken up by frame overhead, such as the source and destination addresses,
protocol information, and error-checking information
There are many different types of ethernet frames, such as the Ethernet II, 802.2, and
802.3 frames to name a few. It is important to remember that 802.2 and 802.3 are IEEE
specifications on how information is transferred onto the transmission media (Data Link
layer) as well as the specification on how the data should be packaged.
A typical Ethernet II frame has the following sections:
. Preamble. A field that signifies the beginning of the frame.
. Addresses. A field that identifies the source and destination addresses for the
frame.
. Type. A field that designates the Network layer protocol.
. Data. The data being transmitted.
. CRC. Cyclical Redundancy Check for error checking
Ethernet generally is used on light-to-medium traffic networks and performs best when a
networks data traffic transmits in short bursts. Ethernet is the most commonly used
network standard.
Ethernet Cabling
You can use a variety of cables to implement ethernet networks. Many of these cable
types, such as Thinnet, Thicknet, UTP, and STP,
Ethernet networks traditionally used coaxial cables of several different types. Fiber-optic
cables now are frequently employed to extend the geographic range of Ethernet networks.
Token Ring
Token ring uses a token-passing architecture that adheres to the 802.5 standard (describe
later)
The topology is physically a star, but token ring uses a logical ring to pass the token from
station to station. Each node must be attached to a concentrator called a multistation
access unit (MSAU or MAU).
In the earlier discussion of token passing, it may have occurred to you that if one
computer crashes, the others will be left waiting forever for the token. MSAUs add fault
tolerance to the network, so that a single failure doesnt stop the whole network. The
MSAU can determine when the network adapter of a PC fails to transmit and can bypass
it.
Token-ring network interface cards can run at 4Mbps or 16Mbps. Although 4Mbps cards
can run at that data rate only, 16Mbps cards can be configured to run at 4 or 16Mbps. All
cards on a given network ring must run at the same rate. If all cards are not configured
this way, either the machine connected to the card cannot have network access, or the
entire network can be ground to a halt.
As shown in Figure belowe, each node acts as a repeater that receives tokens and data
frames from its nearest active upstream neighbor (NAUN). After the node processes a
frame, the frame transmits downstream to the next attached node. Each token makes at
least one trip around the entire ring and then returns to the originating node. Workstations
that indicate problems send a beacon to identify an address of the potential failure.
5. When the computer that originally sent the frame receives it from the ring, it
acknowledges a successful transmission, takes the frame off the ring, and places the
token back on the ring.
ARCNet
ARCNet is an older architecture that is not found too often in the business world.
ARCNet utilizes a token-passing protocol that can have a star or bus physical topology.
These segments can be connected with either active or passive hubs.
ARCNet, when connected in a star topology, can use either twisted pair or coaxial cable
(RG-62).
If coaxial cable is used to create a star topology, the ends of the cable can be attached
directly to a BNC connector, without a terminator. When in a bus topology, ARCNet uses
a 93-ohm terminator, which is attached to each end of the bus in a similar fashion to an
Ethernet bus.
Some important facts about ARCNet are as follows: ARCNet uses a 93-ohm terminator. (Ethernet uses a 50-ohm terminator.)
ARCNet uses a token-like passing architecture, but does not require a
MAU(multistation access unit)
The maximum length between a node and an active hub is 610 meters.
The maximum length between a node and a passive hub is 30.5 meters.
The maximum network segment cable distance ARCNet supports is 6100 meters.
ARCNet can have a total of only 255 stations per network segment.
FDDI
FDDI is very similar to token ring in that it relies on a node to have token before it can
use the network. It differs from token ring in that it utilizes fiber-optic cable as its
transmission media, allowing for transmissions of up to 100Km. This standard permits up
to 100 devices on the network with a maximum distance between stations of up to 2
kilometers.
FDDI has two different configurations: Class A and B. Class A uses two counteracting
rings. Devices are attached to both rings. If one of these rings develops a fault, the other
ring can still be used to transmit data. Class B uses a single ring to transmit data.
NETWORKING STANDARDS
Communication between computers requires cabling to conncect the coummunicating
devices but byond he cabling numberous processes operate behind the scenes to keep
things running smoothly. For these processes to operate smoothly in a deverse and
complex copuitng environment, the comping community had established several
standared and speciifcations that define the interaction and interrelation of the various
components of network architecture.
The network industry uses two types of standards: de facto standards and de jure
standards. To understand the concept of open systems architecture, you must be familiar
with the concepts of de facto and de jure standards. As a society, people have
mechanisms in place to get the attention of others, to let them know that someone is
talking to them, and to establish when they finish talking. They also have methods for
verifying that the information passed along to a person was received and understood by
that person.
Network communication is very similar to human communication. People follow sets of
rules when they talk to one another. Like human communication, computer
communication is an extremely complex process, one that is often too complex to solve
all at once using just one set of rules. As a result, the industry has chosen to solve
different parts of the problem with compatible standards so that the solutions can be put
together like pieces of a puzzlea puzzle that comes together differently each time to
build a complete communication approach for any given situation
Rules and the Communication Process
Networks rely on many rules to manage information interchange. Some of the procedures
governed by network standards are as follows:
a) . Procedures used to communicate the establishment and ending of
communication
b) Signals used to represent data on the transmission media
c) . Types of signals to be used
d) . Access methods for relaying a signal across the media
e) . Methods used to direct a message to the intended destination
f) . Procedures used to control the rate of data flow
g) . Methods used to enable different computer types to communicate
h) . Ways to ensure that messages are received correctly
OSI (Open System Interconnection) is the most widely accepted model for understanding
the network communication. It is developed by ISO (International Standards
Organization) in 1977. ISO is a multinational body dedicated to worldwide agreement on
international standards. It covers all aspects of network communications in OSI reference
model. An open system is a set of protocols that allows any two different systems to
communicate regardless of the underlying architecture. Vendor-specific protocol close
off communication between unrelated systems.
The purpose of OSI model is to open communication between different system without
requiring changes to the logic of the underlying hardware and software. The OSI is not a
protocol; it is model for understanding and designing a network architecture that is
flexible, robust and open for communication with other systems.
The OSI model, first released in 1984 by the International Standards Organization (ISO),
provides a useful structure for defining and describing the various processes underlying
networking communications.
. The OSI model organizes communication protocols into seven levels with each level
addressing a narrow portion of the communication process.
In essence the OSI model is a framework that describes how a function from one
computer is transmitted to another computer on the network.
When the message is received by the destination computer, each layer removes the
header from its peer layer (stripped). Headers are removed by the receiving computer
after the information in the header has been utilized. Stripped headers are removed in the
reverse order in which they were added.
In summary, the information between the layers is passed along vertically. The
information between computers is essentially horizontal, though, because each layer in
one computer talks to its respective layer in the other computer.
It should be noted that the Physical layer does not append a header on to the information,
because this layer deals with providing a transmission route between computers.
Protocol Stacks
The OSI model (and other non-OSI protocol standards) break the complex process of
network communication into layers. Each layer represents a category of related tasks. A
protocol stack is an implementation of this layered protocol architecture. The protocols
and services associated with the protocol stack interact to prepare, transmit, and receive
network data.
Two computers must run compatible protocol stacks before they can communicate,
because each layer in one computers protocol stack must interact with a corresponding
layer in the other computers protocol stack. The message travels down the protocol
stack, through the network medium, and up the protocol stack of the receiving computer.
OSI Physical Layer Concepts
Physical layer is concerned with transmitting and receiving bits.
This layer defines several key characteristics of the Physical network, including the
following:
Physical structure of the network (physical topology)
Mechanical and electrical specifications for using the medium (not the medium
itself )
Bit transmission, encoding, and timing
Although the Physical layer does not define the physical medium, it defines clear
requirements that the medium must meet. These specifications differ depending on the
physical medium. Ethernet for UTP, for example, has different specifications from
coaxial Ethernet.
It also handles:
Line configuration: how can two or more devices be linked physically? Are
transmission lines to be shared or limited to use between two devices?
Flow control. Flow control determines the amount of data that can be
transmitted in a given time period. Flow control prevents the transmitting
device from overwhelming the receiver.
Error control. Error control detects errors in received frames and requests
retransmission of frames.
Data link layer is responsible for following:
Node to node delivery: the data link layer is responsible for node to node
delivery. The Data Link layer maintains physical device addresses (unique
addresses for networking hardware) and used to address data frames, and each
device is responsible for monitoring the network and receiving frames
addressed to that device
Flow control: It regulates the amount of data that can be transmitted at one
time.
Error control. Error control detects errors in received frames and requests
retransmission of frames.
The IEEE 802 standard divides the Data Link layer into two sublayers:
. Media Access Control (MAC). The MAC sublayer controls the means by
which multiple devices share the same media channel for the transmission of
information.
. Logical Link Control (LLC). The LLC sublayer establishes and maintains
links between communicating devices
Addressing: The Data Link layer maintains device addresses that enable messages to be
sent to a particular device. The addresses are called physical device addresses. Physical
device addresses are unique addresses associated with the networking hardware in the
computer. Physical device addresses are used to address data frames, and each device is
responsible for monitoring the network and receiving frames addressed to that device.
A bridge is a connectivity device that operates at the OSI Data Link layer.
OSI Network Layer Concepts
The Network layer handles communication with devices on logically separate networks
that are connected to form internetworks. Because internetworks can be large and can be
constructed of different types of networks, the Network layer utilizes routing algorithms
that guide packets from their source to their destination networks.
Within the Network layer, each network in the internetwork is assigned a network
address that is used to route packets. The Network layer manages the process of
addressing and delivering packets on internetworks.
Whereas the data link layer oversees station to station (node to node) delivery. The
network layer ensures that each packet gets from its point of origin to its destination
successfully and efficiently.
For this purpose the network layer provides two reliable services ie. switching and
routing.
Routing means selecting the best path for sending a packet from one point to
another when more than one path is available. In this case, each packet may
take a different route to the destination. Where the packets are collected and
resembled into their original order.
Source to destination delivery: moving the packet from its point of origin to its intended destination
across multiple network links. ie. selecting the best path for sending a packet from one
Routing: Deciding which of the multiple paths a packet should take. Routing
considerations include speed and cost.
Multiplexing: using a single physical line to carry data between many devices at the
same time.
with the network but hides the complexities of network operation from them. One of the
functions of the Transport layer is to break large messages into segments suitable for
network delivery
The transport layer is responsible for source to destination (end to end) delivery of the
entire message. Whereas the network layer oversees end to end delivery of individual
packets, it does not recognize any relationship between those packets.
Transport layer is responsible for following:
End to end message delivery: confirms the transmission and arrival of all packets of
a message at the destination point.
. Repackaging. When large messages are divided into segments for transport, the Transport layer must
repackage the segments when they are received before reassembling the original message.
Error control. When segments are lost during transmission or when segments have duplicate segment
IDs, the Transport layer must initiate error recovery. The Transport layer also detects corrupted
segments by managing end-to-end error control using techniques such as checksums.
End-to-end flow control. The Transport layer uses acknowledgments to manage end-to-end flow
control between two connected devices. Besides negative acknowledgments, some Transport layer
protocols can request the retransmission of the most recent segments.
Synchronization: Deciding in what order to pass the dialog units to the transport
layer, and where in the transmission to require conformation from the receiver.
Graceful close: Ensuring that the exchange has been completed appropriately before
the session close.
Simplex dialogs. These dialogs are responsible for one-way data transfers only.
Translation: changing the format of message (e.g. from ASCII to EBCDIC and vice
versa).
Compression: It also handles the compression and expansion of data when necessary
for transmission efficiency.
Mail services: provides the basis for electronic mail forwarding and storage.
Directory services: Provides distributed database sources and access for global
information about various object and services.
File access, transfer, and management: Allows a user at a remote computer to
access files in another host (to make changes or read data); to retrieve files
from a remote computer for use in the local computer.
Delivering Packets
Many internetworks often include redundant data paths that you can use to route
messages. Typically, a packet passes from the local LAN segment of the source PC
through a series of other LAN segments, until it reaches the LAN segment of the
destination PC. The OSI Network layer oversees the process of determining paths and
delivering packets across the internetwork.
Switching Techniques
The main objective of networking is to connect all the devices so that resources and
information can be shared efficiently. Whenever we have multiple devices, we have
problem of connecting them to make one-to-one connection possible. One solution is to
install a point to point link between each pair of devices such as in mesh topology or
between a central device and every other device as in star topology. These methods,
however, are impractical and wasteful when applied to very large network. The number
and length of the links require too many infrastructures to be cost efficient; and majority
of those links would be idle most of the time.
A better solution is to uses switching. A switch network consists of a series of interlinked nodes, called switches. Switched are hardware and/or software capable of creating
temporary connection between two or more devices linked to switch but not to each
other.
Switching techniques are mechanisms for moving data from one network segment to
another. These techniques are as follows:
Circuit switching
Message switching
Packet switching
Circuit Switching
Switching networks establish a path through the internetwork when the devices initiate a
conversation. Circuit switching provides devices with a dedicated path and a well-defined
bandwidth. These paths tend to be reliable and fast in performance.
Circuit Establishment
Information Transfer
Circuit Disconnection
Disadvantages.
Because other traffic cannot share the dedicated media path, bandwidth might
be inefficiently utilized. This can be compared to having a telephone
conversation, yet not speaking. You are using the line, thus not allowing
others to use it, but you are not transmitting any data.
Message Switching
Message switching treats each message as an independent entity. Each message carries
address information that describes the messages destination, and this information is used
at each switch to transfer the message to the next switch in the route. Message switches
are programmed with information concerning other switches in the network that can be
used to forward messages to their destinations. Message switches also may be
programmed with information about the most efficient routes
Message switching transfers the complete message from one switch to the next, where the
message is stored before being forwarded again. Because each message is stored before
being sent on to the next switch, this type of network frequently is called a store-and-
forward network. The message switches often are general-purpose computers and must
be equipped with sufficient storage (usually hard drives) to enable them to store messages
until forwarding is possible.
Message switching is commonly used in email because some delay is permissible in the
delivery of email. Other applications for message switching include group applications
such as workflow, calendaring, and groupware. The primary uses of message switching
have been to provide high-level network service (e.g. delayed delivery, broadcast) for
unintelligent devices. Since such devices have been replaced, message switching has
virtually disappeared. Also delays inherent in the process, as well as the requirement for
large capacity storage media at each node, make it unpopular for direct communication.
With data split into packets, individual communications are faster and more
efficient, which allows more computers to use network. When the packets
reach their destination, the computer collects and reassembles them in their
proper order to re-create the original data.
Packet Structure
All the packets have three basic parts:
1. Packet header: The packet header usually contains the source address and
destination address of the packet.
2. Data section: The data section consists of the actual data being sent. The sizes
of this section can very depending on the network type, 512 bytes to 4K.
3. Packet trailer: The packet trailer contains information to verify the validity of
the packet. Using a cyclic redundancy check (CRC) usually does this. The
CRC is a number on the packet calculated by the sending computer and added
to the trailer. When the receiving computer gets the packet, it recalculates the
CRC and compares it to the one in the trailer. If the CRCs match, it accepts
the packet as undamaged. If CRCs dont match, the receiving computer
requests that the packet be re-sent.
Upper-level protocols, those from the Network layer and higher, allow for the connection
of services and the services themselves. This can imply routing programs, addressing
schemes, and File and Print services.
In addition to TCP/IP and IPX/SPX, some of the common Transport and Network
layer protocols are the following:
NWLink. Microsofts version of the IPX/SPX protocol essentially spans the
Transport and Network layers.
NetBEUI. Designed for Microsoft networks, NetBEUI includes functions at the
Network and Transport layers.
NetBEUI isnt routable and therefore doesnt make full use of Network layer
capabilities.
AppleTalk Transaction Protocol (ATP) and Name Binding Protocol (NBP). ATP
and NBP are AppleTalk Transport layer protocols.
Data Link Control (DLC). This is used to connect to IBM Mainframes and
Hewlett-Packard JetDirect printers.
TCP/IPInternet Protocols
One reason for the popularity of TCP/IP is that no one vendor owns it, unlike the
IPX/SPX, DNA, SNA, or AppleTalk protocol suites, all of which are controlled by
specific companies. TCP/IP evolved in response to input from a wide variety of industry
sources.
The TCP/IP protocol suite (also commonly called the Internet protocol suite) was
originally developed by the United States Department of Defense (DoD) to provide
robust service on large internetworks that incorporate a variety of computer types.
TCP/IP is the most open of the protocol suites and is supported by the widest variety of
vendors. Virtually every brand of computing equipment now supports TCP/IP. This
TCP/IP was designed to be hardware-independent and thus is able to work over
established standards such as ethernet, token-ring, and ARCnet, to name but a few lower
OSI layer standards. Over time,
TCP/IP has been interfaced to the majority of Data Link and Physical layer technologies
The Internet protocols do not map cleanly to the OSI reference model. The DoD model
was, after all, developed long before the OSI model was defined. The model for the
Internet protocol suite has four layers.
.
The DoD models layers function as follows (see Figure 7.3).
. 107.219.2.34
2. TCP/IP Services
Dynamic Host Configuration Protocol (DHCP)
When dealing with IP addressing, it can be very management intensive to manually
assign IP addresses and subnet masks to every computer on the network. The Dynamic
Host Configuration
Protocol (DHCP) enables automatic assignment of IP addresses.
This is usually performed by one or more computers (DHCP Servers) that assigns IP
addresses and subnet masks, along with other configuration information, to a computer as
it initializes on the network.
Domain Name System (DNS)
The Domain Name System (DNS) protocol provides host name and IP address resolution
as a service to client applications. DNS servers enable humans to use logical node names,
utilizing a fully qualified domain name structure, to access network resources. Host
names can be up to 260 characters long.
implementations are available for most end-user platforms, including UNIX, DOS,
Windows, and Macintosh OS.
NETWORK SECURITY
Security
Security does prevent unauthorized access to a system, but only makes such access more
difficult. Organizations cannot afford to be without their IT capability for any length of
time or to allow the data to become corrupted or passed to unauthorized person. The basic
dangers are:
1. Loss of confidentiality, where secret information is made available to the
wrong people. This can rival the organizations future plans or give details of
customer list or product specifications to a rival.
2. Loss of integrity, where the data or the software are corrupted, either
deliberately or accidentally. When these corrupted, the reliability of the whole
IT system is put into question.
3. Loss of availability, where any part of the system is unavailable to the user.
This means that for the period of unavailability, the expensively provided IT
system is of no use.
IT security is intended to preserve the confidentiality, integrity and availability of the
system.
Threat Classification
Threats are things that could go wrong and may be classified as:
1.
Environmental;
2.
Logical;
3.
Procedural.
All of these threats can arise from the activities of people both inside and outside the
organization. Furthermore, they may also be classed as deliberate or accidental. In fact,
most research shows that organizations own staffs cause over 70% of all security
problems.
Environmental Threats
This involves physical damage to buildings, hardware, software, data, and
documentation, of personnel. Accidental threats include fire, flood, building collapse and
failure of essential services. Deliberate threats include sabotage and vandalism.
a) Fire
Fire is one of the more common causes of serious environmental computer
disaster. A frequent cause of damage is fire in the air conditioning system.
It is important to understand that most damage is caused by the corrosive
effect of smoke, rather than by the fire itself.
b) Flood
Floods are more likely to be caused by dripping tapes and burst pipes that
by rivers braking their banks. Fire is another part of the building may lead
to damaging the vital equipment.
c) Building Collapse
Earthquakes and subsidence of land could make a building unsafe. Partial
or total collapse can be caused by impact from falling aircraft or road
accident. Also, the threat of terrorist bomb attacks cannot be ignored!
Essential Services
All computers require power supply and mainframe computers usually require air
conditioning. Often communication links are essential. If any of these fail, computer
systems may be inaccessible or access to them restricted.
Prevention from Environmental threats:
Logical Threats
Logical threats are those affects access to and the integrity of data and software.
Accidental threats include software fault (bug), communication errors and inaccurate
input. Deliberate threats include unauthorized access to computer program and data
(hacking) and malicious or fraudulent a alteration of software and data (including the
introducing of computer viruses).
a) Unauthorized Access
Unauthorized access to a compute system by outsiders will usually be
achieved by hacking into dial-up communication links or by tapping into
private leased lines. Members of staff may also use these means to access
unauthorized information. Such activities can cause a loss of
confidentiality of data.
b) Virus:
A virus is a program of piece of coding which is originally deliberately
introduced into a computer system with the intention of corrupting
software and/or data. The effect of virus can vary from the mere
annoyance of message appearing on the screen to the destruction of
software and data file. A deliberate introduction of a virus is a serious
criminal offence under computer misuse act, 1990.
c) Theft:
The theft of large pieces of computer equipment is unusual, but personal
and laptop computers, floppy discs and software. The theft of hardware,
software or data not only causes unavailability but may also result in loss
of confidentiality.
Prevention from Logical Threats
Use security guard stop/check unauthorized personnel
Use video camera
Lock the room after office hours
Use password
Use anti virus software
Procedural Failure
Procedural threats arise from personnel failing to obey the rules. Accidental threats can
arise from ignorance of the correct procedures. Deliberate threats arise from personnel
failing to follow known procedures because they either find them too troublesome.
Physical Access
Only authorised personnel should be allowed restricted area.
Prevention from Procedural Failure
Provide regular training to the staff about security threats and its
prevention methods
Plaintext, P
Active intruder
(Can Change)
Intruder
Encryption
Method
Encryption
Key, K
Decryption
Method
Ciphertext
C=EK(P)
Decryption
Key
Plaintext, P
Encryption Methods
1. Substitution ciphers: In substitution cipher each letter or another letter or
group of letter to disguise it replaces group of letter.
Ex. Caesar Cipher ATTACK => DWWDFN
(Key: substitute each letter by its third successor)
2. Transposition Ciphers: Substitution ciphers preserve the order of the
plaintext symbols but disguise them. Transposition ciphers, in contrast,
reorder the letters but do not disguise them.
F