Академический Документы
Профессиональный Документы
Культура Документы
Basic Concepts 1
Networking Is All about Information
6
Local Area Network
9
Wide Area Network
The Internet has emerged as both the largest
and the least expensive WAN in the world.
WANs suffer from extremely limited
bandwidth.
The fastest commercially feasible wide area
data links are many times slower than the
slowest local area links.
This makes the sharing of resources over a
WAN difficult.
10
Sharing Information
Just as a lot of information is moved about,
some information is centrally controlled and
shared.
There is lot of info on the networked computers
and not everyone is given access to it.
The information must be kept consistent and
secure, and timely access must be given to those
who need the information to run the business.
11
Types of Info
Other types of information you might want
to centrally locate and share or control
include:
Inventory
Company letterhead and letter styles
Sales contact information
Company procedures manuals
Sensitive financial record
Service records
Company memos
12
Server
If you select one computer
to store the shared info
and have all other comp
ref the info on that comp
over the network, the
comp can help you
centralize the info and
maintain control over it.
The central comp is often
called a server, and special
software and operating
systems are often used in
server computers.
13
Sharing Hardware Resources
Computers that are not networked cannot
effectively share resources.
A network allows anyone connected to the
network to use the printer, not just the
individual sitting at the computer to which
the printer is attached.
14
Sharing Hardware Resources
Networked computers can also share
Fax modems
Scanners
Hard disks
Floppy disks
CD-ROMs
Tape backup units
Plotters
Almost any other device that can be attached to
a computer
15
Sharing Hardware Resources
You can attach some peripherals directly to the
network; they do not need to be attached to a
computer to be shared on the network. Figure
illustrates how anyone on a network can use a
shared printer.
16
Sharing Software Resources
Software resources can also be used more effectively
over a network. With stand-alone computers, the
software used on the computer must be present on
each computer’s hard disk, whether or not that
computer is used at that moment for that task.
Software costs can become prohibitive for a large
number of computers.
It is also difficult and time consuming to install and
configure the software individually on every one of
the computers.
17
Sharing Software Resources
With a network you can centrally install and
configure the software, vastly reducing the
work required to make computer programs
available to an organization.
You can also restrict access to programs.
18
Preserving Information
A network also allows for information to be
backed up to a central location.
Important information can be lost by mistake
or accident when a stand-alone computer has
no backup.
It is difficult to maintain regular backups on a
number of stand-alone computers.
When you back up to a central location (often
to a tape cartridge in the network server), you
have one place to look for the lost information,
and you can be assured that the information is
being backed up.
19
Protecting Information
A network provides a more secure environment for a
company’s important information.
With stand-alone computers, access to the computers
often means access to the information on the
computers.
Networks provide an additional layer of security by
way of passwords. You can give each network user a
different account name and password, allowing the
network server to distinguish among those who need
access to have it and protecting the information from
tampering by those who do not.
20
E-Mail
The computer network can also help people
communicate.
One of the greatest benefits to users of networks is
electronic mail, or e-mail.
Rather than exchanging memos and directives on
paper, engaging printing costs and delays, network
users can instantly send messages to others and even
check to see whether their message has been received.
You can attach electronic documents to mail
messages, instantly duplicate and forward mail, and
perform many more tasks
21
Networks
Based on the roles of the computers attached to
them, networks are divided into three types:
Server-based (also called client-server), containing
clients and the servers that support them.
Peer (also called-peer-to-peer), which have no
servers and use the network to share resources
among independent peers.
Hybrid network, which is a client-server network
that also has peers sharing resources. Most
networks are actually hybrid networks.
22
Server Based Networks
Server-based networks are defined by the
presence of servers on a network that provide
security and administration of the network.
Server-based networks divide processing tasks
between clients and servers. Clients request
services, such as file storage and printing, and
servers deliver them.
Server computers typically are more powerful
than client computers, or are optimized to
function as servers.
23
Domains
In Windows NT, server-based networks are organized
into what are called domains.
Domains are collections of networks and clients that
share security trust information.
Domain security and logon permission are controlled by
special servers called domain controllers.
There is one master domain controller, called the
Primary Domain Controller (PDC), which may be
assisted by secondary domain controllers called Backup
Domain Controllers (BDC) during busy times or when
the PDC is not available for some reason.
No computer users can access the resources of servers in
a domain until they have been authenticated by a domain
controller.
24
Bandwidth
Bandwidth is the capacity of a medium to convey
data.. One example of bandwidth is automobile
traffic. A two-lane road with a speed limit can
accommodate only so many cars before there are
too many and a traffic jam results. You can
increase the bandwidth of a road by making the
cars travel more quickly (which corresponds to
using a faster transmission method in networks)
or by making the road wider (which corresponds
to using more wires in networks).
25
Advantages of Server Based
Networks
Server based networks have a great
many advantages, including:
Strong central security
Central file storage, which allows all users to
work from the same set of data and provides
easy backup of critical data
Ability of servers to pool available hardware
and software, lowering overall costs
Ability to share expensive equipment, such
as laser printers
26
Advantages of Server Based
Networks
Optimized dedicated servers, which are faster
than peers at sharing network resources
Less intrusive security, since a single password
allows access to all shared resources on the
network
Freeing of users from the task of managing the
sharing of resources
Easy manageability of a large number of users
Central organization, which keeps data from
getting lost among computers
27
Disadvantages of Server Based
Networks
Server-based networks do have some
disadvantages, although they are mostly
related to the cost of server equipment,
including:
Expensive dedicated hardware
Expensive network operating system software
and client licenses
A dedicated network administrator (usually
required)
28
Peer Networks
Peer networks are defined by a lack of central
control over the network. There are no servers
in peer networks; users simply share disk space
and resources, such as printers and faxes, as
they see fit.
Peer networks are organized into workgroups.
Workgroups have very little security control.
There is no central login process. If you have
logged in to one peer on the network, you will
be able to use any resources on the network
that are not controlled by a specific password.
29
Peer Networks
Access to individual resources can be controlled if the
user who shared the resource requires a password to
access it. Because there is no central security trust,
you will have to know the individual password for
each secured shared resource you wish to access. This
can be quite inconvenient.
Peers are also not optimized to share resources.
Generally, when a number of users are accessing
resources on a peer, the user of that peer will notice
significantly degraded performance. Peers also
generally have licensing limitations that prevent more
than a small number of users from simultaneously
accessing resources.
30
Advantages of Peer Networks
Peer computers have many advantages, especially
for small businesses that cannot afford to invest in
expensive server hardware and software:
No extra investment in server hardware or software is
required
Easy setup
No network administrator required
Ability of users to control resources sharing
No reliance on other computers for their operation
Lower cost for small networks
31
Disadvantages of Peer
Peer networks,Networks
too, have their disadvantages,
including:
Additional load on computers because of resource
sharing
Inability of peers to handle as many network
connections as servers
Lack of central organization, which can make data
hard to find
No central point of storage for file archiving
Requirement that users administer their own
computers
Weak and intrusive security
Lack of central management, which makes large
peer networks hard to work with
32
Hybrid Networks
Hybrid networks have all three types of
computers operating on them and generally
have active domains and workgroups. This
means that while most shared resources are
located on servers, network users still have
access to any resources being shared by peers
in your workgroup. It also means network
users do not have to log on to the domain
controller to access workgroup resources being
shared by peers.
33
Advantages of Hybrid
Computing
Hybrid computing provides these
advantages:
The advantages of server-based networking
Many of the advantages of peer-based
networking
Ability of users and network administrators
to control security based on the importance
of the shared resource
34
Disadvantages of Hybrid
Computing
35
Peer Security vs. Server
Security
One large difference in the way peer-to-
peer and server-based networks operate
is in how they implement security.
Peer-to-peer networks are usually less
secure than are server-based networks,
because peer-to-peer networks commonly
use share-level security, while server-
based networks commonly use file-level
or access permission security.
36
Peer Security vs. Server
Security
In Windows 98, for example, the user of the computer can
allow any other computer on the network to access a shared
directory or device. The user can assign a password to the
shared resource if some degree of security is required.
However, the user cannot specify which users on the
network can access the resource—any user on the network
that knows the password can access the resource.
Another limitation of peer-to-peer shares implemented in
this manner is that each shared resource that you wish to
control access to must have its own password. The number
of passwords to resources that you must remember can
quickly grow unwieldy in a large network.
37
Peer Security vs. Server
Security
Most server-based networks implement security differently.
Instead of requiring a password for every shared resource you
wish to access, the server based network only requires one
password for you to access all resources on the network that you
have permission to use.
The security advantage of peer-to-peer networking is that each
user controls access to their own resources.
The security disadvantage of peer-to-peer networks is that you
cannot differentiate among network users when you allow access
to a resource.
The security advantage of server-based networking is that each
user is allowed access to only those resources that the user has
the privilege to access.
The security disadvantage of server-based networking is that
someone must centrally administer the security on your network.
38
Types of Servers
Common server types include
File servers
Print servers
Application servers
Message servers
Database servers
Windows NT Server supports all of these capabilities.
In fact, one Windows NT Server can, by itself, serve in
all of these capacities simultaneously on a small
network.
On larger networks, however, you need to spread these
roles among multiple servers.
39
File Servers
File servers offer services that allow network users
to share files. File services are the network
applications that store, retrieve, and move data.
With network file services, users can exchange, read,
write, and manage shared files and the data
contained in them.
File servers are designed specifically to support the
file services for a network such as:
File transfer
File storage and data migration
File update synchronization
File archiving
40
Print Servers
In a network printing can be done centrally
because a network can:-
Allow users to share printers
Allow you to place printers where convenient,
not just near individual computers
Achieve better workstation performance by
using high-speed network data transfer, print
queues, and spooling
Allow users to share network fax services
41
Print Services
Print services manage and control printing on a network,
allowing multiple and simultaneous access to printing
facilities.
The network operating system achieves this by using
print queues, which are special storage areas where print
jobs are stored and then sent to the printer in an
organized fashion.
The user can then continue working in an application
while the network takes care of the printing.
Network printing also cuts costs by allowing shared
access to printing devices. This is especially important
when it comes to the more expensive varieties of printers.
High-quality color printers, high-speed printers, and
large-format printers and plotters tend to cost a lot.
42
Print Services
Another print service is fax services.
With network print services, you can fax
straight from your workstation to a receiving
fax machine. This way, you can eliminate the
step of printing a hard copy and scanning it
into a fax machine.
From an application, you can send a document
to a fax queue, which then takes care of the
faxing.
Furthermore, with a fax server, you can receive
faxes directly on your workstation.
43
Application Server
Application services allow client PCs to
access and use extra computing power
and expensive software applications that
reside on a shared computer. You can
add specialized servers to provide
specific applications on a network. For
example, if your organization needed a
powerful database, you could add a
server to provide this application.
44
Message Servers
Message servers provide message services in a
wide variety of communication methods that go
far beyond simple file services. With file
services, data can pass between users only in
file form. With message services, data can take
the form of graphics, digitized video, or audio,
as well as text and binary data. As hypertext
links (electronic connections with other text,
images, sounds, and so on) become more
common in messages, message services are
becoming an extremely flexible and popular
means of transmitting data across a network.
45
Message Servers
Message services must coordinate the complex
interactions between users, documents, and
applications. For example, with message
services, you can send an electronic note,
attached to a voice-mail message, to a fellow
user on a network.
There are four main types of message services:
Electronic mail
Workgroup applications
Object-oriented applications
Directory services
46
Database Servers
Database services can provide a network with
powerful database capabilities that are available
for use on relatively weak PCs.
Most database systems are client-server based.
This means that the database applications run on
two separate components:
The client-end portion of the application runs on the
client, providing an interface and handling less
intensive functions, such as data requests.
The server-end portion of the application handles the
intensive performance of database operations. It runs
on the database server, managing the database,
processing queries, and replying to clients.
47
Characteristics of the Windows NT Operating System
48
An exabyte is slightly larger than one billion gigabytes.
Network Topologies
49
Network Topology
The way in which the connections are made is called the
topology of the network.
Network topology specifically refers to the physical layout
of the network, especially the locations of the computers
and how the cable is run between them.
It is important to select the right topology for how the
network will be used.
Each topology has its own strengths and weaknesses.
The four most common topologies are
the bus topology
the star topology
the ring topology
the mesh topology
50
Bus Topology
The bus topology is often used when a network
installation is small, simple, or temporary.
On a typical bus network, the cable is just one or
more wires, with no active electronics to amplify
the signal or pass it along from computer to
computer.
This makes the bus a passive topology.
51
How Bus Networks Works
When one computer sends a signal up (and down)
the wire, all the computers on the network receive
the information, but only one (the one with the
address that matches the one encoded in the
message) accepts the information. The rest
disregard the message.
Only one computer at a time can send a message;
therefore, the number of computers attached to a
bus network can significantly affect the speed of the
network. A computer must wait until the bus is free
before it can transmit.
These factors also affect star and ring networks.
52
How Bus Networks Works
Another important issue in bus networks is termination.
Since the bus is a passive topology, the electrical signal from
a transmitting computer is free to travel the entire length of
the cable. Without termination, when the signal reaches the
end of the wire, it bounces back and travels back up the wire.
When a signal echoes back and forth along an unterminated
bus, it is called ringing. To stop the signals from ringing, you
attach terminators at either end of the segment. The
terminators absorb the electrical energy and stop the
reflections.
Cables cannot be left unterminated in a bus network.
Ethernet 10Base2 (also known as thinnet) is an inexpensive
network based on the bus topology.
53
Computers Connected in Bus
Topology Network
54
Advantages of Bus Topology
There are several advantages to a bus topology:
The bus is simple, reliable in very small networks,
easy to use, and easy to understand.
The bus requires the least amount of cable to
connect the computers together and is therefore less
expensive than other cabling arrangements.
It is easy to extend a bus. Two cables can be joined
into one longer cable with a BNC barrel connector,
making a longer cable and allowing more computers
to join the network.
A repeater can also be used to extend a bus; a
repeater boosts the signal and allows it to travel a
longer distance.
55
Disadvantages of Bus Topology
A bus topology is commonly subject to the
following disadvantages:
Heavy network traffic can slow a bus considerably.
Because any computer can transmit at any time, and
computers on most bus networks do not coordinate
with each other to reserve times to transmit, a bus
network with a lot of computers can spend a lot of its
bandwidth (capacity for transmitting information)
with the computers interrupting each other instead of
communicating. The problem only gets worse as more
computers are added to the network
Contd…
56
Disadvantages of Bus Topology
Each barrel connector weakens the electrical
signal, and too many may prevent the signal
from being correctly received all along the bus.
It is difficult to troubleshoot a bus. A cable
break or malfunctioning computer anywhere
between two computers can cause them not to
be able to communicate with each other. A
cable break or loose connector will also cause
reflections and bring down the whole network,
causing all network activity to stop.
57
Star Topology
In a star topology, all the cables run from the computers
to a central location, where they are all connected by a
device called a hub.
Each computer on a star network communicates with a
central hub that resends the message either to all the
computers (in a broadcast star network) or only to the
destination computer (in a switched star network). The
hub in a broadcast star network can be active or passive.
An active hub regenerates the electrical signal and sends
it to all the computers connected to it. This type of hub is
often called a multiport repeater. Active hubs and
switches require electrical power to run.
58
Star Topology
A passive hub, such as wiring panels or
punch-down blocks, merely acts as a
connection point and does not amplify or
regenerate the signal.
Passive hubs do not require electrical power
to run.
You can use several types of cable to
implement a star network. A hybrid hub can
accommodate several types of cable in the
same star network.
59
Star Topology
In a star topology
the computers
are all connected
by cables to a
central point.
60
Hybrid Star Network
You can expand a star
network by placing
another star hub where
a computer might
otherwise go, allowing
several more
computers or hubs to
be connected to that
hub. This creates a
hybrid star network,
like the one shown in
Fig
62
Advantages of Star Network
The center of a star network is a good place to
diagnose network faults.
Intelligent hubs (hubs with microprocessors that
implement features in addition to repeating
network signals) also provide for centralized
monitoring and management of the network.
Single computer failures do not necessarily bring
down the whole star network. The hub can detect
a network fault and isolate the offending
computer or network cable and allow the rest of
the network to continue operating.
63
Disadvantages of Star Network
The star topology has a few disadvantages:
If the central hub fails, the whole network fails
to operate.
Many star networks require a device at the
central point to rebroadcast or switch network
traffic.
It costs more to cable a star network because
all network cables must be pulled to one
central point, requiring more cable than other
networking topologies.
64
Ring Topology
In a ring topology, each computer is connected
to the next computer, with the last one
connected to the first.
Rings are used in high-performance networks,
networks requiring that bandwidth be reserved
for time-sensitive features such as video and
audio, or when even performance is needed
when a large number of clients access the
network.
65
Ring Topology
In a ring topology computers are connected in a circle.
66
How Ring Network Works
Every computer is connected to the next computer in the
ring, and each retransmits what it receives from the previous
computer. The messages flow around the ring in one
direction. Since each computer retransmits what it receives, a
ring is an active network and is not subject to the signal loss
problems a bus experiences. There is no termination because
there is no end to the ring.
Some ring networks do token passing. A short message called
a token is passed around the ring until a computer wishes to
send information to another computer. That computer
modifies the token, adds an electronic address and data, and
sends it around the ring. Each computer in sequence receives
the token and the information and passes them to the next
computer until either the electronic address matches the
address of a computer or the token returns to its origin.
Contd…
67
How Ring Network Works
The receiving computer returns a message to the
originator indicating that the message has been
received. The sending computer then creates another
token and places it on the network, allowing another
station to capture the token and begin transmitting.
The token circulates until a station is ready to send
and captures the token.
This all happens very quickly: a token can circle a
ring 200 meters in diameter at about 10,000 times a
second. Some even faster networks circulate several
tokens at once. Other ring networks have two counter-
rotating rings that help them recover from network
faults.
FDDI is a fast fiber-optic network based on the ring
topology.
68
Advantages of Ring topology
The ring topology offers the following
advantages:
Because every computer is given equal access
to the token, no one computer can
monopolize the network.
The fair sharing of the network allows the
network to degrade gracefully (continue to
function in a useful, if slower, manner rather
than fail once capacity is exceeded) as more
users are added.
69
Disadvantages of Ring topology
The ring topology has the following
disadvantages:
Failure of one computer on the ring
can affect the whole network.
It is difficult to troubleshoot a ring
network.
Adding or removing computers
disrupts the network.
70
Star Bus Topology
The star bus topology combines
the bus and the star, linking
several star hubs together with
bus trunks. If one computer CS Dept
Trg Branch 71
Star Ring Topology
In the star ring, also called the
star wired ring, the network
cables are laid out much like a
star network, but a ring is
implemented in the central
hub. Outlying hubs can be
connected to the inner hub,
effectively extending a loop of
the inner ring.
Token Ring is considered a star
ring. Although its topology is
physically a star, it functions
logically in a ring.
72
Basic Network Components
Network Adapter Cards
A network adapter card plugs into the workstation,
providing the connection to the network. Adapter
cards come from many different manufacturers, and
support a wide variety of cable media and bus types
On power-up, the computer detects the new network
card, assigns the correct resources to it, and then
installs the networking software required for
connection to the network. All the user need do is
assign the network details like computer name.
73
Basic Network Components
For Ethernet cards, each card is identified by a
twelve digit hexadecimal number. This number
uniquely identifies the computer. These network
card numbers are used in the Medium Access
[MAC] Layer to identify the destination for the
data.
When talking to another computer, the data you
send to that computer is prefixed with the
number of the card you are sending the data to.
This allows intermediate devices in the network
to decide in which direction the data should go,
in order to transport the data to its correct
destination.
74
Basic Network Components
A typical adapter card looks like
75
NIC Installation
76
How Peripheral Cards Work
Peripheral cards require a software driver to
function. This software driver provides the
interface between the card and the
operating system, making the services
provided by the card available to the user.
The software driver is normally configured
to match the resource settings of the card.
This is done by a configuration utility, and
stored either in the executable file, or a
separate file (like .ini or .cfg).
77
Place of NIC driver in OSI
Model
Network adapter cards and drivers provide the services corresponding
to the data link layer in OSI model. In the IEEE model, the data link is
split into the Logical Link Control (LLC) sublayer, which corresponds
to the software drivers and the Media Access Control (MAC)
sublayer, which corresponds to the network adapter.
78
How Peripheral Cards Work
The software driver provides the follow functions
initialization routine
interrupt service routine
procedures to transmit and receive data
procedures for status, configuration and control
The basic operation looks something like,
card receives data
card generates interrupt by asserting interrupt request line
processor responds to interrupt request and jumps to service routine
Service routine instructs processor to read data from port location
interrupt service routine releases processor to continue previous
work
79
Network Components
Cabling
Cable is used to interconnect computers and network
components together.
There are three main cable types used today
Twisted pair
Coaxial cable
Fiber optics
The choice of cable depends upon a number of factors, like
Cost
Distance
Number of computers involved
Speed
Requirements [bandwidth] i.e., how fast data is to
be transferred
80
Network Components
Twisted Pair (Shielded Twisted Pair and
Unshielded Twisted Pair)
Shielded twisted pair uses a special braided wire which
surrounds all the other wires, which helps to reduce unwanted
interference.
The features of twisted pair cable are,
used in token ring (4 or 16MBps), 10BaseT (Ethernet 10MBps)
100BaseT (100Mbps)
reasonably cheap
reasonably easy to terminate [special crimp connector tools are
necessary for reliable operation
UTP is prone to interference, which limits speed and distances
category 2 = up to 1Mbps (Telephone wiring)
category 3 = up to 10Mbps (Ethernet and 10BaseT)
category 5 = 100MBps (supports 10BaseT and 100BaseT)
81
Network Components
Unshielded Twisted Pair cable
used in Category 5