SlideShare uma empresa Scribd logo
1 de 213
Unit of Competence:-
Determine Best Fit Topology
LO 1: Identify key information
source
Information Sheet.1
Identifying information repositories
1.1. Identify information repositories across
the business
Defining information
What is information? What is the relationship between
information, data and knowledge?
O When information is entered and stored in a
computer, it is generally referred to as “data.”
O After processing (such as formatting and printing),
output data can again be perceived as “information.”
O When information is packaged or used for
understanding or doing something, it is known as
"knowledge".
O An information repository is a collection of
interrelated information maintained across a
network on multiple servers.
O It creates a unified resource for anyone
connected with the system to access when they
need
O In information technology, a repository is "a
central place in which an aggregation of data is
kept and maintained in an organized way, usually
in computer storage.
LO #2- Determine user needs
2.1. Identifying different segments of
network based on business
requirements
 A computer network or data network is
a telecommunications network which
allows computers to exchange data.
 In computer networks, networked computing
devices exchange data with each other using
a data link.
O The connections between nodes are
established using either cable media
or wireless media.
O The best-known computer network is the
Internet.
O Network computer devices that originate,
route and terminate the data are called
network nodes.
O Nodes can include hosts such as personal
computers, phones, servers as well
as networking hardware.
O Two such devices can be said to be
networked together when one device is able
to exchange information with the other
device, whether or not they have a direct
connection to each other.
O Computer networks differ in:
• the transmission medium used to carry their
signals,
• the communications protocols to organize
network traffic,
• the network’s size,
• topology and organizational intent.
O Computer networks support an huge number
of applications and services such as:
• access to the World Wide Web,
• digital video, digital audio,
• shared use of application and storage
servers,
• printers, and fax machines, and
• use of email and instant messaging
applications as well as many others.
User Requirements
O User requirements is the set of
requirements gathered or derived from user
input and is what is needed by users to
successfully accomplish their tasks on the
system.
O Typically, When gathering requirements,
everyone involved with that network is
considered a potential user.
Figure 1. Types of user requirements.
O In general, the system should adapt to users and their
environments, provide quick and reliable information
access and transfer, and offer quality service to the
user.
O This indicates the following general requirements:
 Timeliness Adaptability
 Interactivity Security
 Reliability Affordability
 Presentation quality Future growth
 Functionality Supportability
O User requirements are the least technical
and are also the most subjective. As
shown in Figure 2.3,
O requirements become more technical as
they move from users to the network.
O All of these requirements will be
developed in more detail as we proceed
through the application, device, and
network components.
Figure 2. User requirements
O Requirements are presented as a guide for
you to use in developing requirements for
your network, and they may change
depending on the user's environment.
Timeliness
O is a requirement that the user is able to
access, transfer, or modify information
within a tolerable time frame.
O What a "tolerable" time frame is, of course,
depends on the user's perception of delay in
the system.
O For example, a user may want to download
files from a server and complete each transfer
within 10 minutes.
Interactivity
O is similar to timeliness but focuses on a
response time from the system (as well as the
network) that is on the order of the response
times of users.
O In the preceding example, we could consider
the 10 minutes needed to download a file as
the response time for the system.
O We further say that the file transfer is
interacting with the user (which it is), but
the degree of interactivity in this example is
very low and not of much interest from an
architectural or design perspective.
O Therefore, interactivity is a measure of the
response times of the system and network
when they are required to actively interact
with users.
Reliability,
O that is, availability/accessibility from the user's
perspective, is a requirement for consistently
available service.
O Not only must the user be able to have access to
system resources a very high percentage of the
time, but the level of service to the user must be
consistent.
O It is likely that a combination of all performance
characteristics would be used to describe
reliability.
Adaptability
O is the ability of the system to adapt to
users' changing needs. Some examples of
this are in distance-independence and
mobility.
O Mobility refers to mobile or nomadic
computing, where the user can access
services and resources from any location,
using portable devices and wireless access
to the network.
Security
O from the user perspective is a requirement
to guarantee the confidentiality, integrity,
and authenticity of a user's information and
physical resources, as well as access to
user and system resources.
Types of Computer Network
O Based on the area coverage of the network,
computer networks can be divides into three
O Local Area Network (LAN)
O Wide area Network (WAN)
O Metropolitan area Network (MAN)
LANs
O Local area networks are used to interconnect
distributed communities of computers located
within a single building or localized group of
buildings.
O Since all equipment is located within a single
establishment, LAN’s are normally installed and
maintained by the organization.
O Hence, they are also referred to as private data
networks. Example: network in your class
MAN:
O Is a larger network that usually spans
several buildings in the same city or town.
O Example: networks among Addis Ababa
sub city administrations (KifleKetemas)
WANs
O When data communication is necessary or
desired beyond the reach of a MAN, a wide area
network (WAN) over public carrier networks is
established.
O Institutions transferring large amounts of data
between offices often decide to lease dedicated
transmission lines from public carriers, in what is
termed an enterprise-wide private network.
O Example: network among news agency offices in
different region of Ethiopia.
VPN (Virtual Private Network:
O is an encrypted connection over the Internet
from a device to a network.
O The encrypted connection helps ensure that
sensitive data is safely transmitted.
O It prevents unauthorized people from
snooping on the traffic and allows the user
to conduct work remotely.
A virtual LAN (VLAN)
O is any broadcast domain that is partitioned
and isolated in a computer network at the
data link layer (OSI layer 2).
O LAN is the abbreviation for local area
network and in this context virtual refers to
a physical object recreated and altered by
additional logic.
O A Virtual Local Area Network (VLAN) is a
logical division of computer systems in a
LAN (Local Area Network) that are
connected to a switch, based on their
functionalities.
O VLANs are implemented for enhancing
security between various departments and
also for easy configuration.
Wireless Local Area Network (WLAN) –
O a network that connects two or more
devices using a wireless distribution method
and provides access to the public Internet.
O Most WLANs are based on Institute of
Electrical and Electronic Engineers
(IEEE) 802.11 standards, or known as Wi-Fi.
Types of networks based on
configuration (Node Relationship)
Terms to be familiar
O Servers: Computers that provide shared
resources to network users.
O Clients: Computers that access shared network
resources provided by a server.
O Media: the wires that make the physical
connections.
O Shared data: Files provided to clients by
servers across the network.
O Shared printers and other peripherals:
Additional resources provided by servers.
O Resources: any service or device, such as files,
printers, or other items, made available for use by
members of the network.
O Based on the computers relationship on the
network, computer networks can be
categorized as:
 Peer to Peer and
 Server based network
Peer-to-Peer Networks
O In a peer-to-peer network, there are no dedicated
servers, and there is no hierarchy among the
computers.
O All the computers are equal and therefore are known as
peers.
O Each computer functions as both a client and a server,
and there is no administrator responsible for the entire
network.
O The user at each computer determines what data on
that computer is shared on the network. Peer to peer
network are also called Workgroup
Where a Peer-to-Peer Network Is Appropriate
O Peer-to-peer networks are good choices for
environments where:
 There are 10 users or fewer.
 Users share resources, such as files and printers,
but no specialized servers exist.
 Security is not an issue.
 The organization and the network will experience
only limited growth within the foreseeable future.
O Where these factors apply, a peer-to-peer network will
probably be a better choice than a server-based
network.
Advantages of peer to peer network
O Easy to install and configure
O The cost of installation and operation is less
O A full time network administrator is not
required
Disadvantages of peer to peer network
O Shared resources can be accessed by
everyone
O Backup has to be performed on each
computer separately
O No centralized security
Server Based network (client/server network)
O In an environment with more than 10 users, a
peer-to-peer network—with computers acting as
both servers and clients—will probably not be
adequate.
O Therefore, most networks have dedicated servers.
O A dedicated server is one that functions only as a
server and is not used as a client or workstation.
O
O Servers are described as "dedicated“/give
over to/ because they are not themselves
clients, and because they are optimized to
service requests from network clients
quickly and to ensure the security of files
and directories.
O Server based network is also known as
Domain.
Advantages of server based network
O Centralized resources
O Easier to backup files
O Easier to find files
O Efficient
O Security
O One machine can secure entire network
O One central login
O Scalability
Disadvantage of client server
O If the server goes down, it takes part or the
whole network with it
O It is more expensive to install
O Needs to be maintained by staff with high IT
skills
Specialized servers
O Servers must perform varied and complex tasks.
O Servers for large networks have become specialized to
accommodate the expanding needs of users.
O Following are examples of different types of servers
included on many large networks
File and Print Servers
O File and print servers manage user access and use of
file and printer resources.
Application Servers
O Application servers make the server side of
client/server applications, as well as the data, available
to clients.
Mail Servers
O Mail servers operate like application servers
in that there are separate server and client
applications, with data selectively
downloaded from the server to the client.
Fax Servers
O Fax servers manage fax traffic into and out
of the network by sharing one or more fax
modem boards.
Communications Servers
O Communications servers handle data flow and e-
mail messages between the servers' own
networks and other networks, mainframe
computers, or remote users who dial in to the
servers over modems and telephone lines.
Directory Services Servers
O Directory services servers enable users to
locate/find, store, and secure information on the
network
Key Factors to Consider When Creating an IT
Network
1. Understand your network goals. Surprisingly,
not all businesses consider what the actual
goal of their IT network is.
2. Create a budget and acquire components.
3. Training, security, and scalability.
4. IT maintenance.
Information Sheet 2.2.
Determining segment needs using network functional
analysis
Determine best-fit topology for a local network
Determine user needs
O Identify the different segments of the proposed
network based on business requirements
O Determine segment needs, using network
functional analysis
O Estimate traffic content and volumes based on
business requirements
O Develop a prioritized organizational network
functional matrix
Develop local area network specification
1. Determine the resource requirements for each
network segment on the basis of functional analysis
2. Analyze features of the physical environment for the
effect on network design
3. Conduct a costing process for possible topology
options
4. Consider topology options with reference to available
resources and network functional matrix
5. Select and document appropriate network topology
based on business requirements and functional
analysis
2.3. Determining resource requirements for
each network segment
Network Topology
O The term topology, or more specifically, network
topology, refers to the arrangement or physical
layout of computers, cables, and other
components on the network.
O "Topology" is the standard term that most
network professionals use when they refer to
the network's basic design.
O In addition to the term "topology," you will
find several other terms that are used to
define a network's design:
• Physical layout
• Design
• Diagram
• Map
O A network's topology affects its capabilities.
O The choice of one topology over another will
have an impact on the:
• Type of equipment the network needs.
• Capabilities of the equipment.
• Growth of the network.
• Way the network is managed.
Category of Topology
O Logical: describes the way network data
flows through the physical components.
O Physical: Physical topology describes how
the physical components on a network are
connected.
Standard Topologies
O All network designs stem from four basic
topologies:
1. Bus
2. Star
3. Ring
4. Mesh
Bus Topology
O The bus topology is often referred to as a
"linear bus" because the computers are
connected in a straight line.
O This is the simplest and most common
method of networking computers.
Figure 6. Communication on the Bus
O Computers on a bus topology network
communicate by addressing data to a
particular computer and sending out that
data on the cable as electronic signals.
O To understand how computers communicate
on a bus, you need to be familiar with three
concepts:
• Sending the signal
• Signal bounce
• Terminator
Sending the Signal
O Network data in the form of electronic signals is
sent to all the computers on the network.
O Only the computer whose address matches the
address encoded in the original signal accepts the
information.
O All other computers reject the data. Only one
computer at a time can send messages.
O Because only one computer at a time can send
data on a bus network, the number of computers
attached to the bus will affect network
performance.
Advantages of a Linear Bus Topology
O Easy to connect a computer or peripheral
to a linear bus.
O Requires less cable length than a star
topology.
O Inexpensive, easy to install, simple to
understand, easy to extend.
Disadvantages of a linear Bus Topology
O Entire network shuts down if there is a
break in the main cable.
O Terminators are required at both ends of
the backbone cable
O Difficult to identify the problem if the
entire network shuts down.
Star Topology
O In the star topology, cable segments from
each computer are connected to a
centralized component called a hub or
switch.
O Signals are transmitted from the sending
computer through the hub or switch to all
computers on the network
Figure 7. Star topology
Advantage of Star topology
O If one computer on the star topology fails,
only the failed computer is unable to send
or receive data.
O Easy to install and wire
O No disruptions to the network when
connecting or removing devices.
O Easy to detect faults and to remove
parts.
Disadvantage of star topology
O Requires more cable length than a linear
topology
O If the Hub /Switch fails, the entire
network fails.
O More expensive than linear bus topologies
because of the cost of the central device
Ring Topology
O The ring topology connects computers on a
single circle of cable. Unlike the bus
topology, there are no terminated ends.
O The signals travel around the loop in one
direction and pass through each computer,
which can act as a repeater to boost the
signal and send it on to the next computer.
O One method of transmitting data around a ring is
called token passing. (A token is a special series of
bits that travels around a token-ring network.)
O The token is passed from computer to computer
until it gets to a computer that has data to send.
O The sending computer modifies the token, puts an
electronic address on the data, and sends it
around the ring.
O The data passes by each computer until it finds
the one with an address that matches the address
on the data.
O The receiving computer returns a message to the
sending computer indicating that the data has been
received.
O After verification, the sending computer creates a
new token and releases it on the network.
O The token circulates within the ring until a
workstation needs it to send data.
Figure 8. Ring topology
Advantage of Ring topology
 each computer acts as a repeater,
regenerating the signal and sending it on to
the next computer, thereby preserving signal
strength.
 All computers have equal access to network
media,
 installation can be simple, and Very fast
transmission rates possible
Disadvantage of Ring topology
O Only one computer at a time can send data
on a single token ring.
O Also, ring topologies are usually more
expensive than bus technologies.
O If one computer fails, the network will fail
Mesh Topology
O A mesh topology network offers superior
redundancy and reliability.
O In a mesh topology, each computer is connected
to every other computer by separate cabling.
O This configuration provides redundant paths
throughout the network so that if one cable fails,
another will take over the traffic.
O These networks are expensive to install because
they use a lot of cabling.
Figure 9. Mesh topology
Advantage of Mesh topology
An advantage of a mesh topology is its
back-up capabilities by providing multiple
paths through the network.
Disadvantage of Mesh topology
Because redundant paths require more cable
than is needed in other topologies, a mesh
topology can be expensive.
Figure 10 Hybrid Topology
Star Bus
O The star bus is a combination of the bus and
star topologies. In a star-bus topology,
several star topology networks are linked
together with linear bus trunks.
O If one computer goes down, it will not affect
the rest of the network. The other
computers can continue to communicate.
O If a hub goes down, all computers on that
hub are unable to communicate.
Star Ring
O The star ring (sometimes called a star-wired
ring) appears similar to the star bus.
O Both the star ring and the star bus are
centered in a hub that contains the actual
ring or bus.
O Linear-bus trunks connect the hubs in a
star bus, while the hubs in a star ring are
connected in a star pattern by the main hub.
Figure 11. Star ring topology
Selecting a topology
O There are many factors to consider when
deciding which topology best suits the needs
of an organization.
O The following table provides some guidelines
for selecting a topology.
Table 9. Summary of topology
Topolo
gy
Advantages Disadvantages
Bus  Use of cable is
economical.
 Media is inexpensive and
easy to work with.
 System is simple and
reliable.
 Bus is easy to extend.
 Network can slow down in
heavy traffic.
 Problems are difficult to
isolate.
 Cable break can affect many
users.
Ring  System provides
equal access for all
computers.
 Performance is even
despite many users.
 Failure of one computer
can impact the rest of the
network.
 Problems are hard to
isolate.
 Network reconfiguration
disrupts operation.
Star  Modifying system and adding
new computers is easy.
 Centralized monitoring and
management are possible.
 Failure of one computer does
not affect the rest of the
network.
 If the centralized point
fails, the network fails.
Mesh  System provides increased
redundancy and reliability as
well as ease of troubleshooting.
 System is expensive to
install because it uses
a lot of cabling.
Network connectivity devices
Network Interface Cards (NIC)
O Also called network adapter
O Receive data and convert it into electrical
signals
O Receive electrical signals and convert them
into data
O Determine if the data received is for a
particular computer
O Control the flow of data through the cable
O Network adapters constitute the physical
interface between the computer and the
network cable.
O Network adapters, also known as network
interface cards, are installed into an
expansion slot in each computer and server
on the network.
After the network adapter is installed, the
network cable is attached to the adapter's port
to physically connect the computer to the
network.
Figure 12. Network Interface Cards
O As the data passes through the cable to the
network adapter, it is formatted into packets.
O A packet is a logical grouping of information that
includes a header, which contains location
information and user data.
O The header contains address fields that include
information about the data's origin and
destination.
O The network adapter reads the destination
address to determine if the packet is to be
delivered to this computer.
O If it is, the network adapter then passes the
packet on to the operating system for
processing.
O If not, the network adapter discards the
packet.
O Each network adapter has a unique address
that is incorporated into chips on the card.
O This address is called the physical, or media
access control (MAC), address.
O The network adapter performs the following
functions:
 Receives data from the computer's operating
system and converts it into electrical signals
that are transmitted onto the cable
 Receives electrical signals from the cable and
translates them into data that the computer's
operating system can understand
 Determines whether data received from the
cable is intended for the computer
 Controls the flow of data between the
computer and the cabling system
O To ensure compatibility between the
computer and the network, the network
adapter must meet the following criteria:
 Fit in the computer's expansion slot
 Use the correct type of cable connector
for the cabling
 Be supported by the computer's
operating system
Repeaters
O As signals travel along a cable, they degrade
and become distorted in a process called
"attenuation."
O If a cable is long enough, attenuation will
finally make a signal unrecognizable.
O Installing a repeater enables signals to travel
farther.
O Use a repeater to:
 Connect two segments of similar or
dissimilar media.
 Regenerate the signal to increase the
distance transmitted.
 Connect two segments in the most cost-
effective manner.
O Do not use a repeater when:
 There is heavy network traffic.
 Segments are using different access
methods.
 Data filtering is needed.
Hubs
O Hubs are connectivity devices that connect
computers in a star topology.
O Hubs contain multiple ports for connecting to
network components. If you use a hub, a break in
the network does not affect the entire network;
only the segment and the computer attached to
that segment fail.
O A Hub works at the physical layer of the OSI
Reference Model to regenerate the network's
signals and resend them out on other segments.
O Hubs are multiport repeater. A single data
packet sent through a hub goes to all
connected computers.
O There are two types of hubs: Passive Hubs and
Active Hubs:
 Passive Hubs:
O Send the incoming signal directly through their
ports without any signal processing.
 Active Hubs:
O Sometimes called multiport repeaters, receive
incoming signals, process the signals, and
retransmit them at their original strengths and
definitions to the connected computers or
components.
Use a hub to:
O Easily change and expand wiring systems.
O Enable central monitoring of network activity and
traffic.
Bridges
O Like a repeater, a bridge can join segments
or workgroup LANs. However, a bridge can
also divide a network to isolate traffic or
problems.
O For example, if the volume of traffic from
one or two computers or a single
department is flooding the network with data
and slowing down the entire operation, a
bridge could isolate/separate those
computers or that department.
O
Bridges can be used to:
O Expand the length of a segment.
O Provide for an increased number of computers
on the network.
O Reduce traffic blocks resulting from an
excessive number of attached computers.
O Split an overloaded network into two separate
networks, reducing the amount of traffic on each
segment and making each network more
efficient.
O Link unlike physical media such as twisted-pair
and coaxial Ethernet.
O
How Bridges Work
O Because bridges work at the data-link layer of
the OSI reference model, all information
contained in the higher levels of the OSI
reference model is unavailable to them.
O Rather than distinguish between one protocol
and another, bridges simply pass all protocols
along the network.
O All protocols pass across bridges, so it is up to
the individual computers to determine which
protocols they can recognize.
O The data-link layer has two sub layers:
 the Logical Link Control (LLC) sub layer and
 the Media Access Control (MAC) sub layer.
O Bridges work at the MAC sub layer and are
sometimes referred to as MAC-layer bridges.
O A MAC-layer bridge:
 Listens to all traffic.
 Checks the source and destination addresses
of each packet.
 Builds a routing table, as information becomes
available.
 Forwards packets in the following manner:
O If the destination is not listed in the
routing table, the bridge forwards the
packets to all segments.
O If the destination is listed in the routing
table, the bridge forwards the packets to
that.
Switch
O Switches are similar to bridges but offer a more
direct network connection between the source
and destination computers.
O When a switch receives a data packet, it creates
a separate internal connection, or segment,
between any two of its ports and forwards the
data packet to the appropriate port of the
destination computer only, based on information
in each packet's header.
Use a switch to:
O Send a packet directly from the source
computer to the destination computer.
O Provide for a greater rate of data
transmission.
Routers
O In an environment that consists of several
network segments with differing protocols and
architectures, a bridge might be inadequate for
ensuring fast communication among all
segments.
O A network this complex needs a device that not
only knows the address of each segment, but
can also determine the best path for sending
data and filtering broadcast traffic to the local
segment. Such a device is called a "router."
O Routers work at the network layer of the OSI
reference model. This means they can switch
and route packets across multiple networks.
O They do this by exchanging protocol-specific
information between separate networks.
O Routers read complex network addressing
information in the packet and, because they
function at a higher layer in the OSI reference
model than bridges.
O Routers can provide the following functions
of a bridge:
 Filtering and isolating traffic
 Connecting network segments
Types of Routers
O The two major types of routers are:
Static.
O Static routers require an administrator to manually set up
and configure the routing table and to specify each route.
Dynamic.
O Dynamic routers are designed to discover routes
automatically and therefore require a minimal amount of
setup and configuration.
O More sophisticated than static routers, they examine
information from other routers and make packet-by-packet
decisions about how to send data across the network.
Brouters
O A brouter, as the name implies, combines the
qualities of both a bridge and a router.
O A brouter can act as a router for one protocol
and as a bridge for all the others.
O Brouters can:
O Route selected routable protocols.
O Bridge non-routable protocols.
O Deliver more cost-effective and more manageable
internetworking than separate bridges and routers.
Gateways
O Gateways enable communication between
different architectures and environments.
O They repackage and convert data going from
one environment to another so that each
environment can understand the other
environment's data.
O A gateway repackages information to match
the requirements of the destination system.
O A gateway links two systems that do not
use the same:
 Communication protocols.
 Data-formatting structures.
 Languages.
 Architecture.
O Gateways interconnect heterogeneous
networks; for example, they can connect
Microsoft Windows NT Server to IBM's
Systems Network Architecture (SNA).
O Gateways change the format of the data to
make it conform to the application program
at the receiving end.
Network Transmission media
O Transmission medium is the way in which data is
transmitted from one place to another.
O It provides a pathway over which the message can
travel from sender –to-receiver.
O Each of the message can be sent in the form of
data by converting the into binary digits.
O These binary digits are then encoded into a signal
that can be transmitted over the appropriate
medium.
Transmission Medium
Wired/ Guided
Media
Wireless/ Un Guided
Media
Twisted
Pair Cable
Coaxial
Cable
Fiber
Optic
Cable
Laser
transmission
Infrared
transmission
Transmission Media
O Transmission Medium is the physical path
between transmitter and receiver in a data
communication system.
O The characteristics and quality of data
transmission are determined both by the
characteristics of the medium and
characteristics of the signal.
O Media of data transmission are divided in to:
1. Guided Transmission media-
Data transmission is through solid medium
(wired system).
2. Unguided Transmission media–
Data transmission through air /space (i.e.
wireless system)
1. Guided transmission media (Cable)
O Transmission capacity of guided media is
described with respect to:
O Data rate or bandwidth
O Distance the media can run
O Commonly Types of Cables
1. Twisted pair
2. Coaxial cable
3. Optical fiber
Coaxial Cable
O Are copper cables with better shielding than
twisted pair cable, so that transmitted signals
may travel longer distance at higher speeds.
O The shield minimizes electrical and radio
frequency interference.
O Coaxial cabling is the primary type of cabling used
by the cable television industry and is also widely
used for computer networks, such as Ethernet.
O Coaxial cable has two wires of copper.
O The core/inner copper wire in Centre and is made
of solid conductor. It is enclosed in an insulating
sheath.
O The second/outer copper wire is wrapped around,
and is used to protect from external
electromagnetic interference(noise).
O This all is covered by plastic cover used to
protect the inner layer from physical damage such
as fire or water.
Outer
Insulator
Copper
wire
Insulator
Metal
Shielding
Fig. Coaxial cable
Coaxial Cable Standard
O Coaxial cables are categorized by their
Radio Government (RG) ratings. Each RG
number denotes a unique set of physical
specifications.
• 50-Ohm RG-7 or RG-11 :used with
thick Ethernet.
• 50-Ohm RG-58 :used with thin
Ethernet.
• 75-Ohm RG-59 :used with
cable television.
Types of Coaxial Cable
O There are two types of coaxial cable:
 Thin (thinnet) cable
 Thick (thicknet) cable
O Which type of coaxial cable you select
depends on the needs of your particular
network.
O
Thinnet Cable
O Thinnet cable is a flexible coaxial cable about 0.64
centimeters (0.25 inches) thick. Because this type
of coaxial cable is flexible and easy to work with, it
can be used in almost any type of network
installation.
O Thinnet coaxial cable can carry a signal for a
distance of up to approximately 185 meters (about
607 feet) before the signal starts to suffer from
attenuation
Thicknet Cable
O Thicknet cable is a relatively rigid coaxial
cable about 1.27 centimeters (0.5 inches) in
diameter.
O Thicknet cable is sometimes referred to as
Standard Ethernet because it was the first
type of cable used with the popular network
architecture Ethernet.
O Thicknet cable's copper core is thicker than
a thinnet cable core..
O The thicker the copper core, the farther the
cable can carry signals. This means that
thicknet can carry signals farther than
thinnet cable.
O Thicknet cable can carry a signal for 500
meters (about 1640 feet).
O Therefore, because of thicknet's ability to
support data transfer over longer distances,
it is sometimes used as a backbone to
connect several smaller thinnet-based
networks.
 Both thinnet and thicknet cable
use a connection component,
known as a BNC connector, to
make the
connections between the
cable and the computers.
Coaxial-Cable Connection Hardware
Twisted-Pair Cable
O In its simplest form, twisted-pair cable consists
of two insulated strands of copper wire twisted
around each other
O A number of twisted-pair wires are often
grouped together and enclosed in a protective
sheath to form a cable.
O Two types of twisted pair cable
 Unshielded twisted pair cable(UTP)
 Shielded twisted pair cable (STP)
Unshielded Twisted-Pair (UTP) Cable
O UTP, using the 10BaseT specification, is the
most popular type of twisted-pair cable and
is fast becoming the most popular LAN
cabling.
O The maximum cable length segment is 100
meters, about 328 feet
O UTP cost less than STP and easily available due to
its many use.
O Due to its low cost, UTP cabling is used
extensively for local area networks(LAN) and
telephone connections.
O UTP cables consist of 2 or 4 pairs of twisted cable.
O Cable with 2 pair use RJ-11 connector used with
Ethernet cabling in Computer, and 4 pair cable use
RJ-45 connector is used in connecting telephone
units.
O There are five categories of UTP
Category 1
O This refers to traditional UTP telephone cable that
can carry voice but not data transmissions.
O Most telephone cable prior to 1983 was Category
1 cable.
Category 2
O This category certifies UTP cable for data
transmissions up to 4 megabits per second (Mbps).
O It consists of four twisted pairs of copper wire.
Category 3
O This category certifies UTP cable for data transmissions up
to 16 Mbps. It consists of four twisted pairs of copper wire
with three twists per foot.
Category 4
O This category certifies UTP cable for data transmissions up
to 20 Mbps. It consists of
O four twisted pairs of copper wire.
Category 5
O This category certifies UTP cable for data transmissions up
to 100 Mbps. It consists of four twisted pairs of copper
wire.
Shielded Twisted-Pair (STP) Cable
O STP cable uses a woven copper-braid jacket that
is more protective and of a higher quality than
the jacket used by UTP.
O STP also uses a foil wrap around each of the wire
pairs. This gives STP excellent shielding to
protect the transmitted data from outside
interference, which in turn allows it to support
higher transmission rates over longer distances
than UTP.
STP UTP
 The RJ-45 connector is slightly larger and will not
fit into the RJ-11 telephone jack. The RJ-45
connector houses eight cable connections, while
the RJ-11 houses only four.
Fiber-Optic Cable
O In fiber-optic cable, made high quality of thin
glass or plastic and is used to transfer digital data
signals in the form of light up to distance of
thousand of miles.
O This is a relatively safe way to send data
because, unlike copper-based cables that carry
data in the form of electronic signals, no
electrical impulses are carried over the fiber-
optic cable.
O Fiber optic cables are not affected by
electromagnetic interference, so noise and
distortion is very less.
• Fiber-optic cable is good for very high-speed,
high-capacity data transmission because of the
purity of the signal and lack of signal attenuation.
Advantages of Optical Fiber:-
• Fiber optic cables have a much higher bandwidth
than metal cables. This means that they can carry
more data.
• Smaller size and Lighter weight.
• Low attenuation
• Not affected Electromagnetic interference .
• Signals carrying data can travel long distances
without weakening
• Suitable for industrial and noisy areas
Disadvantages of Optical Fiber:-
O Optical fiber cables are expensive
O Difficult to install
O Maintenance is expensive and difficult
Fiber-Optic Cabling Considerations
O Use fiber-optic cable if you:
 Need to transmit data at very high
speeds over long distances in very secure
media.
O Do not use fiber-optic cable if you:
 Are under a tight budget.
 Do not have the expertise available to
properly install it and connect devices to
it.
Consideration for cable selection
O Which cabling you select will depend on the
needs of a particular site.
O The cabling you purchase to set up a LAN for a
small business has different requirements from
those of a larger organization, such as a major
banking institution.
Installation Logistics
O How easy is the cable to install and work with?
In a small installation where distances are short
and security isn't a major issue.
Shielding
O The level of shielding required will affect cable cost.
Almost every network uses some form of shielded
cable.
O The noisier the area in which the cable is run, the
more shielding will be required.
Crosstalk
O Crosstalk and noise can cause serious problems in
large networks where data integrity is crucial.
O Inexpensive cabling has low resistance to outside
electrical fields generated by power lines, motors,
relays, and radio transmitters. This makes it vulnerable
to both noise and crosstalk.
Transmission Rates
O Transmission rates are measured in megabits per second.
O A standard reference point for current LAN transmission
over copper cable is 100 Mbps. Fiber-optic cable transmits
at more than 1 Gbps.
Cost
O Higher grades of cables can carry data securely over long
distances, but they are relatively expensive;
O lower- grade cables, which provide less data security over
shorter distances, are relatively inexpensive.
Signal Attenuation
Characteristics Thinnet
coaxial
(10Base2)
Cable
Thicknet
coaxial
(10Base5)
Cable
Twisted-pair
(10BaseT)
Cable
Fiber-optic
Cable
Cable cost More than
UTP
More than
thinnet
UTP: Least
expensive
STP: More than
thinnet
More than
thinnet, but
less than
thicknet
Usable
cable
length
185 meters
(about
607 feet)
500 meters
(about
1640 feet)
UTP and STP:
100 meters
(about 328
feet)
2 kilometers
(6562
feet)
Transmissio
n rates
4-100 Mbps 4-100 Mbps UTP: 4-100
Mbps
STP: 16-500
Mbps
100 Mbps or
more
( > 1Gbps)
Flexibility Fairly flexible Less flexible
than thinnet
UTP: Most
flexible STP:
Less flexible
than UTP
Less flexible
than thicknet
Ease
of
install
ation
Easy to install Moderately easy
to install
UTP: Very easy;
often preinstalled
STP: Moderately
easy
Difficult to
install
Vulnerabil
ity to
interferen
ce
Good
resistance to
interference
Good
resistance to
interference
UTP: Very
vulnerable STP:
Good resistance
Not vulnerable
to interference
Special
features
Electronic
support
components are
less expensive
than twisted-
pair cable
Electronic
support
components are
less expensive
than twisted-pair
cable
UTP: Same as
telephone wire;
often preinstalled in
buildings
STP: Supports
higher transmission
rates than UTP
Supports
voice, data,
and video
Characteri
stics
Thinnet
coaxial
(10Base2
) Cable
Thicknet
coaxial
(10Base5)
Cable
Twisted-pair
(10BaseT
) Cable
Fiber-optic Cable
Preferred
uses
Medium to
large sites
with high
security
needs
Linking
thinnet
networks
UTP: smaller
sites on
budget.
STP: Token
Ring in any
size
Any size
installation
requiring speed
and high data
security and
integrity
2. Unguided (wireless transmission) media
o It is also referred to as Wireless or Unbounded
transmission media.
o No physical medium is required for the
transmission of electromagnetic signals.
O Features:
O The signal is broadcasted through air
O Less Secure
O Used for larger distances
O There are 3 types of Signals transmitted
through unguided media:
(i) Radio waves –
 These are easy to generate and can penetrate
through buildings.
 The sending and receiving antennas need not
be aligned.
 Frequency Range:3KHz – 1GHz. AM and FM
radios and cordless phones use Radio waves
for transmission.
ii) Microwaves –
O It is a line of sight transmission i.e. the
sending and receiving antennas need to
be properly aligned with each other.
O The distance covered by the signal is
directly proportional to the height of the
antenna.
O These are majorly used for mobile phone
communication and television distribution.
(iii) Infrared –
O Infrared waves are used for very short
distance communication.
O They cannot penetrate through obstacles.
This prevents interference between
systems.
O It is used in TV remotes, wireless mouse,
keyboard, printer, etc.
O In infrared transmission the communicating
bodies should be
O In direct line of sight
O If there is any body in between the
communicating bodies will be unable to
communicate
O Can not be used outdoors
WiFi
O stands for Wireless Fidelity. WiFi uses Radio
waves to provide wireless high-speed internet
and network connections.
O A WiFi connection is established using a
wireless adapter to create hotspots. WiFi is for
LAN (Local Area Network) applications.
O WiFi antennas size small enough to be placed
on a very small router.
O WiFi can be used to connect with printer,
computers, gaming consoles and many more.
Wi-Max
O It stands for Wireless Inter-operability for
Microwave Access.
O WiMax handle a larger inter-operable
network. WiMax is for MAN (Metropolitan
Area Network) applications.
O WiMax can be used to provide internet
services such as mobile data and WiFi
spots.
Introduction to Network Operating Systems
(NOs)
O Just as a computer cannot operate without
a computer operating system, a network of
computers cannot operate without a
network operating system.
O Without a network operating system of some
kind, individual computers cannot share
resources, and other users cannot make use
of those resources.
O Network operating system software is
integrated into a number of popular
operating systems including
O Windows 2000 Server/
O Windows 2000 Professional,
O Windows NT Server/
O Windows NT Workstation
O Windows Xp, Windows Vista,
O Windows 7 and AppleTalk.
Coordinating Hardware and Software
O A computer's operating system coordinates the
interaction between the computer and the
programs—or applications—it is running.
O It controls the allocation and use of hardware
resources such as:
O Memory.
O CPU time.
O Disk space.
O Peripheral devices.
O A network operating system
O Ties together all computers and peripherals.
O Coordinates the functions of all computers and
peripherals.
O Provides security by controlling access to data
and peripherals.
O Two major components of network software are:
O Network software that is installed on clients.
O Network software that is installed on servers.
Client Software
O In a stand-alone system, when the user types a
command that requests the computer to perform
a task, the request goes over the computer's
local bus to the computer's CPU.
O For example, if you want to see a directory
listing on one of the local hard disks, the CPU
interprets and executes the request and then
displays the results in a directory listing in the
window.
Server Software
O With server software, users at other machines,
the client computers, can share the server's
data and peripherals including printers, plotters,
and directories.
O The request is forwarded by the redirector on to
the network, where it is passed to the file and
print server containing the shared directory.
O The request is granted, and the directory listing
is provided.
Functions of NOs
Resource Sharing
O Sharing is the term used to describe
resources made publicly available for access
by anyone on the network.
O Most NOSs not only allow sharing, but also
determine the degree of sharing. Options for
sharing include:
O Allowing different users different levels of access
to the resources.
O Coordinating access to resources to make sure
that two users do not use the same resource
at the same time.
O For example, an office manager wants everyone
on the network to be familiar with a certain
document (file), so she shares the document.
O However, she controls access to the document
by sharing it in such a way that:
O Some users will be able only to read it.
O Some users will be able to read it and make
changes in it.
Managing Users
O Network operating systems also allow a network
administrator to determine which people, or groups of
people, will be able to access network resources.
O A network administrator can use the NOS to:
O Create user privileges, tracked by the network
operating system, that indicate who gets to use the
network.
O Grant or deny user privileges on the network.
O Remove users from the list of users that the network
operating system tracks.
Managing the Network
O Some advanced NOSs include management tools
to help administrators keep track of network
behavior.
O If a problem develops on the network,
management tools can detect signs of trouble
and present these in a chart, or other, format.
O With these tools, the network manager can take
corrective action before the problem halts the
network.
Network Access method
The Function of Access Methods
O The set of rules that defines how a
computer puts data onto the network cable
and takes data from the cable is called an
access method.
O Once data is moving on the network, access
methods help to regulate the flow of network
traffic.
O Access methods prevent computers from
gaining simultaneous access to the cable.
O By making sure that only one computer at a
time can put data on the network cable,
O Access methods ensure that the sending
and receiving of network data is an orderly
process.
Major Access Methods
O The two methods designed to prevent
simultaneous use of the network media
include:
A. Carrier-sense multiple access methods
(with collision detection or with collision
avoidance).
B. Token-passing methods that allow only a
single opportunity to send data.
1. Carrier-Sense Multiple Access with Collision
Detection (CSMA/CD) Access Method
O Before sending data each computer checks the
network cable
O Only when a computer senses that the cable is
free and that there is no traffic on the cable can
it send data
O Once the computer has transmitted data on the
cable, no other computer can transmit data until
the original data has reached its destination and
the cable is free again
O If a computer detects a possible collision, it
waits for a random period of time before
retransmitting (collision detection)
2. Token-Passing Access Method
O In this access method, a special type of packet, called
a token, circulates around a cable ring from computer
to computer.
O When any computer on the ring needs to send data
across the network, it must wait for a free token.
When a free token is detected, the computer will take
control of it if the computer has data to send.
O The computer can now transmit data. Data is
transmitted in frames, and additional information, such
as addressing, is attached to the frame in the form of
headers and trailers.
Packet Components
Header
O The header includes:
O An alert signal to indicate that the packet
is being transmitted.
O The source address.
O The destination address.
O Clock information to synchronize
transmission.
O
Data
O This describes the actual data being sent. This
part of the packet varies in size, depending on
the network.
O The data section on most networks varies from
512 bytes—or 0.5 kilobytes (KB)—to 4 KB.
O Because most original data strings are much
longer than 4k, data must be broken into chunks
small enough to be put into packets.
O It takes many packets to complete the
transmission of a large file.
Trailer
O The exact content of the trailer varies
depending on the communication method, or
protocol.
O However, the trailer usually contains an
error-checking component called a cyclical
redundancy check (CRC).
Network Standards
Ethernet and its Features
O Ethernet is currently the most popular
network architecture. Notice that the cable
is terminated at both ends.
O This baseband architecture uses a bus
topology, usually transmits at 10 Mbps, and
relies on CSMA/CD to regulate traffic on
the main cable segment.
The Ethernet Frame Format
O A frame is a package of information
transmitted as a single unit.
O An Ethernet frame can be between 64 and
1518 bytes long, but the Ethernet frame
itself uses at least 18 bytes; therefore, the
data in an Ethernet frame can be between
46 and 1500 bytes long.
O Every frame contains control information
and follows the same basic organization.
Frame field Description
Preamble Marks the start of the frame
Destination and source The origin and destination addresses
Type Used to identify the network layer protocol,
usually either IP or IPX
(Novell's Internetwork Packet Exchange)
Cyclical redundancy
check (CRC)
Error-checking field to determine if the
frame arrived without being corrupted
Ethernet specifications
The 10-Mbps IEEE Standards
O This section looks at four 10 Mbps
Ethernet topologies:
O 10BaseT
O 10Base2
O 10Base5
O 10BaseFL
10BaseT Standard
O 10 Mbps, baseband, over twisted-pair cable
Mostly uses UTP but can also use STP
O Has a physical star and logical bus topology
O The maximum length of a 10BaseT segment is
100 meters. Repeaters can be used to extend
this maximum cable length.
O The minimum cable length between computers is
2.5 meters, A 10BaseT LAN will serve 1024
computers
10Base2 Standard
O It transmits at 10 Mbps over a baseband wire and
can carry a signal about two times 100 meters
(the actual distance is 185 Meters.
O This type of network uses thin coaxial cable, or
thinnet, which has a maximum segment length of
185 meters and a minimum cable length of at
least 0.5 meters between workstations.
O There is also a 30-computer maximum per 185-
meter segment.
10Base5 Standard
O The IEEE specification for this topology is 10 Mbps,
baseband, and 500-meter (five 100-meter) segments.
O It is also called standard Ethernet. This topology makes
use of thick coaxial cable , also known as thicknet.
O Thicknet generally uses a bus topology and can
support as many as 100 nodes (stations, repeaters, and
so on) per backbone segment.
O The distances and tolerances for thicknet are greater
than those for thinnet: a thicknet segment can be 500
meters long for a total network length of 2500 meters.
10BaseFL Standard
O The IEEE committee published a specification for
running Ethernet over fiber-optic cable.
O The 10BaseFL (10Mbps, baseband, over fiber-
optic cable) is an Ethernet network that typically
uses fiber-optic cable to connect computers and
repeaters.
O The primary reason for using 10BaseFL is to
accommodate long cable runs between
repeaters, such as between buildings.
O The maximum distance for a 10BaseFL segment
is 2000 meters.
The 100-Mbps IEEE Standards
O New Ethernet standards are pushing the traditional
Ethernet limits beyond the original 10 Mbps.
O These new capabilities are being developed to handle
such high band width applications as:
O Computer-aided design (CAD).
O Computer-aided manufacturing (CAM).
O Video.
O Imaging and document storage.
O Two Ethernet standards that can meet the
increased demands are:
O 100BaseVG-AnyLAN Ethernet.
O 100BaseX Ethernet (Fast Ethernet).
O Both 100BaseVG-AnyLAN and Fast Ethernet
are about 5 to 10 times faster than standard
Ethernet. They are also compatible with existing
10BaseT cabling systems.
100VG-AnyLAN Standard
O The 100VG (Voice Grade) AnyLAN is an
emerging networking technology that combines
elements of both Ethernet and Token Ring
architectures.
O This technology goes by any of the following
names, all of which refer to the same type of
network:
O 100VG-AnyLAN
O 100BaseVG
O VG
O AnyLAN
Specifications
O Some of the current 100VG-AnyLAN specifications
include:
O A minimum data rate of 100 Mbps.
O The ability to support a cascaded star topology over
Category 3, 4, and 5 twisted-pair and fiber-optic
cable.
O The demand-priority access method that allows for
two priority levels (low and high).
O The ability to support an option for filtering
individually addressed frames at the hub to enhance
privacy.
O Support for both Ethernet frames and Token Ring
packets.
100BaseX Ethernet Standard
O This standard, sometimes called Fast
Ethernet, is an extension of the existing
Ethernet standard.
O It runs on UTP Category 5 data-grade cable
and uses CSMA/CD in a star-wired bus
topology, similar to 10BaseT where all
cables are attached to a hub.
O
Media Specifications
O 100BaseX incorporates three media
specifications:
O 100BaseT4 (4-pair Category 3, 4, or 5
UTP)
O 100BaseTX (2-pair Category 5 UTP or
STP)
O 100BaseFX (2-strand fiber-optic cable)
Mode of transmission
O The term transmission mode defines the
direction of data flow between two linked
devices.
O The manner or way in which data is
transmitted from one place to another is called
Data Transmission Mode.
O There are three ways for transmitting data
from one location to another. These are:
1. Simplex mode
2. Half-Duplex mode
3. Full-Duplex mode
1. Simplex Mode
O The most basic form of data or information
transmission is called simplex.
O This means that data is sent in one direction
only, from sender to receiver.
O With simplex transmission, problems
encountered during the transmission are not
detected and corrected. Senders cannot
even be sure that the data is received
Examples of simplex transmission are radio
and television.
2. Half duplex mode
O In Half-duplex mode, the communication can
take place in both directions, but only in one
direction at a time.
O In this mode, data is sent and received
alternatively.
O In half-duplex mode, at a time only one end
transmits data while other end receives.
O In addition, it is possible to perform error
detection and request the sender to re-
transmit information.
 The Internet browsing is an example of half duplex.
When we issue a request to download a web
document, then that document is downloaded and
displayed before we issue another request.
3. Full duplex mode
O In Full-duplex mode, the communication
can take place in both directions
simultaneously, i.e. at the same time on
the same channel.
O It is the fastest directional mode of
communication. Example of this mode is
conversation of the persons through
telephone.
The telephone communication system is an
example of full duplex communication mode.
Parallel V’s Serial Transmission
O There are two types of data transmission
modes. These are:
1. Parallel Transmission
2. Serial Transmission
1. Parallel Transmission
O In parallel transmission, bits of data flow concurrently
through separate communication lines.
O Inside the computer binary data flows from one unit to
another using parallel mode.
O If the computer uses 32-bits internal structure, all the 32-
bits of data are transferred simultaneously on 32-lane
connections.
O Similarly, parallel transmission is commonly used to
transfer data from computer to printer.
O The printer is connected to the parallel port of computer
and parallel cable that has many wires is used to connect
the printer to computer. It is very fast data transmission
mode.
2. Serial Transmission
O In serial data transmission, bits of data flow in
sequential order through single
communication line.
O The flow of traffic on one-lane residential
street is an example of serial data
transmission mode.
O Serial transmission is typically slower than
parallel transmission, because data is sent
sequentially in a bit-by-bit fashion.
O Serial mouse uses serial transmission mode
in computer.
Network addressing
O Addressing on a network can take one of
three forms:
Computer names:
O on a typical network, most users prefer to
use computer names to communicate;
computer names are far easier to remember
than IP addresses.
O A computer name is the logical equivalent of
an IP or MAC address
IP(Internet protocol):
O Although users can use IP addresses,
customarily IP addresses are used primarily
by applications to communicate with
locations on or outside the network
MAC(Media Access Control) address:
O MAC addresses are the physical addresses
of network devices and if users use
computer names and application use IP
addresses,
O then computers and other networked
devices use MAC addresses to access other
devices on the network
O With three ways to address elements on a
network, there must be ways to resolve
each type of address to its equivalents.
MAC addressing
O A host’s MAC address is based on a 12-digit
hexadecimal address.
O The MAC address is identified in the second layer of
the seven layer OSI model, the Data link layer
O Although the MAC address is always used in
networking. It cannot be routed.
O The MAC address is not routable because of:
I. It does not pass through routers (because of its
position in the OSI model)
II. It has no network address.
IP Addressing
O An IP address consists of two parts a network
address that identifies the network and a host
address that identifies the particular host, or
node.
O Types of IP address
O Internet protocol version 4/IPV4
O Internet protocol Version 6/IPV6
O Every computer on a network must have a
unique address. If two computers have the
same address an address conflict occurs.
IPV4
O The IP address identifies and differentiates a
given machine from all others on the network.
O It consists of a 32-bit binary number that is
usually displayed as four octets expressed in
decimal and separated by periods.
O You must have a unique IP address for each
machine on the network.
Table 10. Show32-bit binary number
8bit 8bit 8bit 8bit
Network classes
O Internet addresses are allocated by the
InterNIC (http://www.internic.net), the
organization that administers the Internet.
O These IP addresses are divided into classes.
The most common of these are classes A, B,
and C.
O Classes D and E exist, but are not generally
used by end users.
O Each of the address classes has a different
default subnet mask.
O Network classes used to provide an
addressing scheme that can accommodate
large and small networks.
O All networks in practical use have different
sizes.
O For example, a company that will have 50
computers, will not need a network of 5000
computers,
O And on the contrary, a company that needs
5000 computers does not need a network
that can only hold 50 computers.
O This is the main reason that engineers
decided that IP address space should be
divided in different classes in order to meet
different requirements.
O There are five different classes of networks:
A, B, C, D and E.
O Classes D and E are reserved. Class D is
reserved for multicasting purpose and class
E for experimental purpose.
Class A networks
O designed to meet the needs of large
networks
O This class will only support 126 networks;
but each network can support 16,777,214
hosts.
O The first octet of the IP address is network
portion and the rest the node portion
Class B networks
O was designed for medium-sized networks
O This class will support 16,384 networks; and
limited to 65,534 hosts per network.
O The first two octet are the network portion
Octet 3 and 4 are for nodes
O Used for network that have b/n 256 and
65,534 nodes
Class C networks
O Was designed for small networks; thus the
number of hosts per network will be small,
however it will support many more networks
total.
O The first three octet are the network portion and
the remaining one for node
O A maximum of 2,097,152 (221 ) networks can be
defined with up to 254 (Type equation here.
28
-2) hosts per network
Class A
•The first bit is 0
Network ID
The possible class A IP ranges
1.0.0.0-127.255.255.255
Networks Class Range
Class B
 The first two bits are 1 and 0
The possible IP range for class B is
128.0.0.0-191.255.255.255
Class C
• The first three bits are 1,1 and 0
The possible IP range for class C is
192.0.0.0- 223.255.255.255
Class Prefix
bits(ntk)
Max. num. of
network
Suffix
bits(host)
Available Hosts per
Network
Valid Address Ranges
A 7 27
=128 24 224
-2=16,777,214 1.0.0.1 through
126.255.255.254
B 14 214
=16,384 16 216
-2 =65,534 128.0.0.1 through
191.255.255.254
C 21 221
=2,097,152 8 28
-2=254 192.0.0.1 through
222.255.255.254
D & E
Reserved
224.0.0.0 through
255.255.255.254
Table 10. IP address class summary
O If you are connecting your machine to a pre-
existing network, the network address
O for Class A, the first octet;
O for Class B, the first two octets; and
O for Class C, the first three octets) is the
same as those of other machines on the
network.
O In this case, you only need to create a
unique host address.
O If you are creating an entirely new network and
you want to connect to the Internet, you need to
contact the internet service provider or Network
Information Center to have a network address.
O When you determine the IP address, remember:
 Each logical network must have its own network
address.
 All hosts in a network must have the same network
address.
 All hosts in a network must have unique host
addresses.
IP address type
1. Private IP addresses
O Private IP addresses are typically used on
local networks including home, school and
business LANs.
O Private networks are non-routable. Devices
with private IP addresses cannot connect
directly to the Internet.
O Likewise, computers outside the local network
cannot connect directly to a device with a private
IP.
O Instead, access to such devices must be brokered
by a router.
O Class A 10.0.0.1 through 10.255.255.254
O Class B 172.16.0.1 through 172. 31.255.254
O Class C 192.168.0.1 through 192.168.255.254
2. Public IP address
O An IP address can be public - for use on the
Internet or other wide area network (WAN).
Static verses Dynamic IP address
O IP addresses can be determined:
O Statically (assigned to a computer by a
system administrator) or
O Dynamically (assigned by another device
on the network on demand).
Reserved IP address
O Certain host addresses are reserved and can’t be
assigned to devices on a network. These are:
O Network address used to identify the network
itself with all host bits zero.
Example: 192.168.1.0
O broadcast address used for broadcasting packets
to all devices on the network with all host bits one
Example: 192.168.1.255
O So usable host with in a network calculated
by 2n-2 (two is subtracted because these
are reserved for the network and broadcast.
O where n is the number of bits used for the
host portion of the address.
O Class D and class E are also reserved
addresses used for different purposes such
as research.
O
Subnet mask (network mask)
O A subnet mask or sub network mask is a 32
bit number which is used to identify which
portion of the IP address identifies the
network portion and which part indicates the
host part or portion.
O In subnet mask, all bits of the network ID
portion are set to 1 and all bits of the host
address portion are set to 0.
O Any address bits that have corresponding mask
bits set to 1 represent the network ID, and any
address bits that have corresponding mask bits
set to 0 represent the host/node ID.
O For class full networks there are default mask
O Class C -> 255.255.255.0
O Class B -> 255.255.0.0
O Class A -> 255.0.0.0

Mais conteúdo relacionado

Semelhante a DETERMNE BEST FIT-ip-address.pptx

fmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of networkfmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of networkammulu99
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorialRodel Morales
 
Computer network unit 1 notes
Computer network unit  1 notesComputer network unit  1 notes
Computer network unit 1 notesRavi Rajput
 
Dotson - Network Tutorial
Dotson - Network TutorialDotson - Network Tutorial
Dotson - Network TutorialBOXLIGHT Inc
 
Introduction to Computer Networking
Introduction to Computer NetworkingIntroduction to Computer Networking
Introduction to Computer Networkingshankars73
 
Networking And Telecommunications
Networking And TelecommunicationsNetworking And Telecommunications
Networking And TelecommunicationsUMaine
 
UNIT 4 computer networking powerpoint presentation .pdf
UNIT 4 computer networking powerpoint presentation .pdfUNIT 4 computer networking powerpoint presentation .pdf
UNIT 4 computer networking powerpoint presentation .pdfshubhangisonawane6
 
Seminar report-networking
Seminar report-networkingSeminar report-networking
Seminar report-networkingJyoti Kumari
 
Chapter 2.pptx
Chapter 2.pptxChapter 2.pptx
Chapter 2.pptxMDKhalik1
 
Fundamentals of internet_measurement_a_tutorial
Fundamentals of internet_measurement_a_tutorialFundamentals of internet_measurement_a_tutorial
Fundamentals of internet_measurement_a_tutorialTuristicae
 
Katie & toms_computer_network_project
Katie & toms_computer_network_projectKatie & toms_computer_network_project
Katie & toms_computer_network_projectkatiettoml
 
Introduction to Computer Networks
Introduction to Computer NetworksIntroduction to Computer Networks
Introduction to Computer NetworksPankaj Gautam
 

Semelhante a DETERMNE BEST FIT-ip-address.pptx (20)

Cn
CnCn
Cn
 
Cnetworks
CnetworksCnetworks
Cnetworks
 
fmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of networkfmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of network
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorial
 
E content network
E content networkE content network
E content network
 
Computer network unit 1 notes
Computer network unit  1 notesComputer network unit  1 notes
Computer network unit 1 notes
 
Dotson - Network Tutorial
Dotson - Network TutorialDotson - Network Tutorial
Dotson - Network Tutorial
 
Lesson 1 introduction
Lesson 1 introductionLesson 1 introduction
Lesson 1 introduction
 
Introduction to Computer Networking
Introduction to Computer NetworkingIntroduction to Computer Networking
Introduction to Computer Networking
 
Networking And Telecommunications
Networking And TelecommunicationsNetworking And Telecommunications
Networking And Telecommunications
 
Network administration Book
Network administration BookNetwork administration Book
Network administration Book
 
UNIT 4 computer networking powerpoint presentation .pdf
UNIT 4 computer networking powerpoint presentation .pdfUNIT 4 computer networking powerpoint presentation .pdf
UNIT 4 computer networking powerpoint presentation .pdf
 
Seminar report-networking
Seminar report-networkingSeminar report-networking
Seminar report-networking
 
Chapter 2.pptx
Chapter 2.pptxChapter 2.pptx
Chapter 2.pptx
 
Internet
InternetInternet
Internet
 
Fundamentals of internet_measurement_a_tutorial
Fundamentals of internet_measurement_a_tutorialFundamentals of internet_measurement_a_tutorial
Fundamentals of internet_measurement_a_tutorial
 
Katie & toms_computer_network_project
Katie & toms_computer_network_projectKatie & toms_computer_network_project
Katie & toms_computer_network_project
 
Introduction to Computer Networks
Introduction to Computer NetworksIntroduction to Computer Networks
Introduction to Computer Networks
 
Networking fundamentalsss
Networking fundamentalsssNetworking fundamentalsss
Networking fundamentalsss
 
Presentation1 Networking.pptx
Presentation1 Networking.pptxPresentation1 Networking.pptx
Presentation1 Networking.pptx
 

Último

WAEC Carpentry and Joinery Past Questions
WAEC Carpentry and Joinery Past QuestionsWAEC Carpentry and Joinery Past Questions
WAEC Carpentry and Joinery Past QuestionsCharles Obaleagbon
 
VIP Call Girls Service Mehdipatnam Hyderabad Call +91-8250192130
VIP Call Girls Service Mehdipatnam Hyderabad Call +91-8250192130VIP Call Girls Service Mehdipatnam Hyderabad Call +91-8250192130
VIP Call Girls Service Mehdipatnam Hyderabad Call +91-8250192130Suhani Kapoor
 
VIP Model Call Girls Kalyani Nagar ( Pune ) Call ON 8005736733 Starting From ...
VIP Model Call Girls Kalyani Nagar ( Pune ) Call ON 8005736733 Starting From ...VIP Model Call Girls Kalyani Nagar ( Pune ) Call ON 8005736733 Starting From ...
VIP Model Call Girls Kalyani Nagar ( Pune ) Call ON 8005736733 Starting From ...SUHANI PANDEY
 
CALL ON ➥8923113531 🔝Call Girls Kalyanpur Lucknow best Female service 🧵
CALL ON ➥8923113531 🔝Call Girls Kalyanpur Lucknow best Female service  🧵CALL ON ➥8923113531 🔝Call Girls Kalyanpur Lucknow best Female service  🧵
CALL ON ➥8923113531 🔝Call Girls Kalyanpur Lucknow best Female service 🧵anilsa9823
 
Case Study of Hotel Taj Vivanta, Pune
Case Study of Hotel Taj Vivanta, PuneCase Study of Hotel Taj Vivanta, Pune
Case Study of Hotel Taj Vivanta, PuneLukeKholes
 
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Gi...
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Gi...Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Gi...
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Gi...Pooja Nehwal
 
Tapestry Clothing Brands: Collapsing the Funnel
Tapestry Clothing Brands: Collapsing the FunnelTapestry Clothing Brands: Collapsing the Funnel
Tapestry Clothing Brands: Collapsing the Funneljen_giacalone
 
VVIP CALL GIRLS Lucknow 💓 Lucknow < Renuka Sharma > 7877925207 Escorts Service
VVIP CALL GIRLS Lucknow 💓 Lucknow < Renuka Sharma > 7877925207 Escorts ServiceVVIP CALL GIRLS Lucknow 💓 Lucknow < Renuka Sharma > 7877925207 Escorts Service
VVIP CALL GIRLS Lucknow 💓 Lucknow < Renuka Sharma > 7877925207 Escorts Servicearoranaina404
 
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Hy...
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Hy...Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Hy...
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Hy...Pooja Nehwal
 
The_Canvas_of_Creative_Mastery_Newsletter_April_2024_Version.pdf
The_Canvas_of_Creative_Mastery_Newsletter_April_2024_Version.pdfThe_Canvas_of_Creative_Mastery_Newsletter_April_2024_Version.pdf
The_Canvas_of_Creative_Mastery_Newsletter_April_2024_Version.pdfAmirYakdi
 
Fashion trends before and after covid.pptx
Fashion trends before and after covid.pptxFashion trends before and after covid.pptx
Fashion trends before and after covid.pptxVanshNarang19
 
Stark Industries Marketing Plan (1).pptx
Stark Industries Marketing Plan (1).pptxStark Industries Marketing Plan (1).pptx
Stark Industries Marketing Plan (1).pptxjeswinjees
 
Government polytechnic college-1.pptxabcd
Government polytechnic college-1.pptxabcdGovernment polytechnic college-1.pptxabcd
Government polytechnic college-1.pptxabcdshivubhavv
 
CBD Belapur Individual Call Girls In 08976425520 Panvel Only Genuine Call Girls
CBD Belapur Individual Call Girls In 08976425520 Panvel Only Genuine Call GirlsCBD Belapur Individual Call Girls In 08976425520 Panvel Only Genuine Call Girls
CBD Belapur Individual Call Girls In 08976425520 Panvel Only Genuine Call Girlsmodelanjalisharma4
 
Best VIP Call Girls Noida Sector 44 Call Me: 8448380779
Best VIP Call Girls Noida Sector 44 Call Me: 8448380779Best VIP Call Girls Noida Sector 44 Call Me: 8448380779
Best VIP Call Girls Noida Sector 44 Call Me: 8448380779Delhi Call girls
 
Delhi Call Girls Paharganj 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Paharganj 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Paharganj 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Paharganj 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
The history of music videos a level presentation
The history of music videos a level presentationThe history of music videos a level presentation
The history of music videos a level presentationamedia6
 
VVIP Pune Call Girls Dange Chowk (8250192130) Pune Escorts Nearby with Comple...
VVIP Pune Call Girls Dange Chowk (8250192130) Pune Escorts Nearby with Comple...VVIP Pune Call Girls Dange Chowk (8250192130) Pune Escorts Nearby with Comple...
VVIP Pune Call Girls Dange Chowk (8250192130) Pune Escorts Nearby with Comple...Call Girls in Nagpur High Profile
 

Último (20)

WAEC Carpentry and Joinery Past Questions
WAEC Carpentry and Joinery Past QuestionsWAEC Carpentry and Joinery Past Questions
WAEC Carpentry and Joinery Past Questions
 
VIP Call Girls Service Mehdipatnam Hyderabad Call +91-8250192130
VIP Call Girls Service Mehdipatnam Hyderabad Call +91-8250192130VIP Call Girls Service Mehdipatnam Hyderabad Call +91-8250192130
VIP Call Girls Service Mehdipatnam Hyderabad Call +91-8250192130
 
VIP Model Call Girls Kalyani Nagar ( Pune ) Call ON 8005736733 Starting From ...
VIP Model Call Girls Kalyani Nagar ( Pune ) Call ON 8005736733 Starting From ...VIP Model Call Girls Kalyani Nagar ( Pune ) Call ON 8005736733 Starting From ...
VIP Model Call Girls Kalyani Nagar ( Pune ) Call ON 8005736733 Starting From ...
 
CALL ON ➥8923113531 🔝Call Girls Kalyanpur Lucknow best Female service 🧵
CALL ON ➥8923113531 🔝Call Girls Kalyanpur Lucknow best Female service  🧵CALL ON ➥8923113531 🔝Call Girls Kalyanpur Lucknow best Female service  🧵
CALL ON ➥8923113531 🔝Call Girls Kalyanpur Lucknow best Female service 🧵
 
B. Smith. (Architectural Portfolio.).pdf
B. Smith. (Architectural Portfolio.).pdfB. Smith. (Architectural Portfolio.).pdf
B. Smith. (Architectural Portfolio.).pdf
 
Case Study of Hotel Taj Vivanta, Pune
Case Study of Hotel Taj Vivanta, PuneCase Study of Hotel Taj Vivanta, Pune
Case Study of Hotel Taj Vivanta, Pune
 
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Gi...
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Gi...Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Gi...
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Gi...
 
Tapestry Clothing Brands: Collapsing the Funnel
Tapestry Clothing Brands: Collapsing the FunnelTapestry Clothing Brands: Collapsing the Funnel
Tapestry Clothing Brands: Collapsing the Funnel
 
VVIP CALL GIRLS Lucknow 💓 Lucknow < Renuka Sharma > 7877925207 Escorts Service
VVIP CALL GIRLS Lucknow 💓 Lucknow < Renuka Sharma > 7877925207 Escorts ServiceVVIP CALL GIRLS Lucknow 💓 Lucknow < Renuka Sharma > 7877925207 Escorts Service
VVIP CALL GIRLS Lucknow 💓 Lucknow < Renuka Sharma > 7877925207 Escorts Service
 
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Hy...
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Hy...Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Hy...
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Hy...
 
The_Canvas_of_Creative_Mastery_Newsletter_April_2024_Version.pdf
The_Canvas_of_Creative_Mastery_Newsletter_April_2024_Version.pdfThe_Canvas_of_Creative_Mastery_Newsletter_April_2024_Version.pdf
The_Canvas_of_Creative_Mastery_Newsletter_April_2024_Version.pdf
 
Fashion trends before and after covid.pptx
Fashion trends before and after covid.pptxFashion trends before and after covid.pptx
Fashion trends before and after covid.pptx
 
Stark Industries Marketing Plan (1).pptx
Stark Industries Marketing Plan (1).pptxStark Industries Marketing Plan (1).pptx
Stark Industries Marketing Plan (1).pptx
 
꧁❤ Hauz Khas Call Girls Service Hauz Khas Delhi ❤꧂ 9999965857 ☎️ Hard And Sex...
꧁❤ Hauz Khas Call Girls Service Hauz Khas Delhi ❤꧂ 9999965857 ☎️ Hard And Sex...꧁❤ Hauz Khas Call Girls Service Hauz Khas Delhi ❤꧂ 9999965857 ☎️ Hard And Sex...
꧁❤ Hauz Khas Call Girls Service Hauz Khas Delhi ❤꧂ 9999965857 ☎️ Hard And Sex...
 
Government polytechnic college-1.pptxabcd
Government polytechnic college-1.pptxabcdGovernment polytechnic college-1.pptxabcd
Government polytechnic college-1.pptxabcd
 
CBD Belapur Individual Call Girls In 08976425520 Panvel Only Genuine Call Girls
CBD Belapur Individual Call Girls In 08976425520 Panvel Only Genuine Call GirlsCBD Belapur Individual Call Girls In 08976425520 Panvel Only Genuine Call Girls
CBD Belapur Individual Call Girls In 08976425520 Panvel Only Genuine Call Girls
 
Best VIP Call Girls Noida Sector 44 Call Me: 8448380779
Best VIP Call Girls Noida Sector 44 Call Me: 8448380779Best VIP Call Girls Noida Sector 44 Call Me: 8448380779
Best VIP Call Girls Noida Sector 44 Call Me: 8448380779
 
Delhi Call Girls Paharganj 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Paharganj 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Paharganj 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Paharganj 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
The history of music videos a level presentation
The history of music videos a level presentationThe history of music videos a level presentation
The history of music videos a level presentation
 
VVIP Pune Call Girls Dange Chowk (8250192130) Pune Escorts Nearby with Comple...
VVIP Pune Call Girls Dange Chowk (8250192130) Pune Escorts Nearby with Comple...VVIP Pune Call Girls Dange Chowk (8250192130) Pune Escorts Nearby with Comple...
VVIP Pune Call Girls Dange Chowk (8250192130) Pune Escorts Nearby with Comple...
 

DETERMNE BEST FIT-ip-address.pptx

  • 1. Unit of Competence:- Determine Best Fit Topology LO 1: Identify key information source
  • 2. Information Sheet.1 Identifying information repositories 1.1. Identify information repositories across the business Defining information What is information? What is the relationship between information, data and knowledge? O When information is entered and stored in a computer, it is generally referred to as “data.” O After processing (such as formatting and printing), output data can again be perceived as “information.” O When information is packaged or used for understanding or doing something, it is known as "knowledge".
  • 3. O An information repository is a collection of interrelated information maintained across a network on multiple servers. O It creates a unified resource for anyone connected with the system to access when they need O In information technology, a repository is "a central place in which an aggregation of data is kept and maintained in an organized way, usually in computer storage.
  • 4. LO #2- Determine user needs 2.1. Identifying different segments of network based on business requirements  A computer network or data network is a telecommunications network which allows computers to exchange data.  In computer networks, networked computing devices exchange data with each other using a data link.
  • 5. O The connections between nodes are established using either cable media or wireless media. O The best-known computer network is the Internet. O Network computer devices that originate, route and terminate the data are called network nodes. O Nodes can include hosts such as personal computers, phones, servers as well as networking hardware.
  • 6. O Two such devices can be said to be networked together when one device is able to exchange information with the other device, whether or not they have a direct connection to each other. O Computer networks differ in: • the transmission medium used to carry their signals, • the communications protocols to organize network traffic, • the network’s size, • topology and organizational intent.
  • 7. O Computer networks support an huge number of applications and services such as: • access to the World Wide Web, • digital video, digital audio, • shared use of application and storage servers, • printers, and fax machines, and • use of email and instant messaging applications as well as many others.
  • 8. User Requirements O User requirements is the set of requirements gathered or derived from user input and is what is needed by users to successfully accomplish their tasks on the system. O Typically, When gathering requirements, everyone involved with that network is considered a potential user.
  • 9. Figure 1. Types of user requirements.
  • 10. O In general, the system should adapt to users and their environments, provide quick and reliable information access and transfer, and offer quality service to the user. O This indicates the following general requirements:  Timeliness Adaptability  Interactivity Security  Reliability Affordability  Presentation quality Future growth  Functionality Supportability
  • 11. O User requirements are the least technical and are also the most subjective. As shown in Figure 2.3, O requirements become more technical as they move from users to the network. O All of these requirements will be developed in more detail as we proceed through the application, device, and network components.
  • 12. Figure 2. User requirements
  • 13. O Requirements are presented as a guide for you to use in developing requirements for your network, and they may change depending on the user's environment. Timeliness O is a requirement that the user is able to access, transfer, or modify information within a tolerable time frame. O What a "tolerable" time frame is, of course, depends on the user's perception of delay in the system.
  • 14. O For example, a user may want to download files from a server and complete each transfer within 10 minutes. Interactivity O is similar to timeliness but focuses on a response time from the system (as well as the network) that is on the order of the response times of users. O In the preceding example, we could consider the 10 minutes needed to download a file as the response time for the system.
  • 15. O We further say that the file transfer is interacting with the user (which it is), but the degree of interactivity in this example is very low and not of much interest from an architectural or design perspective. O Therefore, interactivity is a measure of the response times of the system and network when they are required to actively interact with users.
  • 16. Reliability, O that is, availability/accessibility from the user's perspective, is a requirement for consistently available service. O Not only must the user be able to have access to system resources a very high percentage of the time, but the level of service to the user must be consistent. O It is likely that a combination of all performance characteristics would be used to describe reliability.
  • 17. Adaptability O is the ability of the system to adapt to users' changing needs. Some examples of this are in distance-independence and mobility. O Mobility refers to mobile or nomadic computing, where the user can access services and resources from any location, using portable devices and wireless access to the network.
  • 18. Security O from the user perspective is a requirement to guarantee the confidentiality, integrity, and authenticity of a user's information and physical resources, as well as access to user and system resources.
  • 19. Types of Computer Network O Based on the area coverage of the network, computer networks can be divides into three O Local Area Network (LAN) O Wide area Network (WAN) O Metropolitan area Network (MAN)
  • 20. LANs O Local area networks are used to interconnect distributed communities of computers located within a single building or localized group of buildings. O Since all equipment is located within a single establishment, LAN’s are normally installed and maintained by the organization. O Hence, they are also referred to as private data networks. Example: network in your class
  • 21. MAN: O Is a larger network that usually spans several buildings in the same city or town. O Example: networks among Addis Ababa sub city administrations (KifleKetemas)
  • 22. WANs O When data communication is necessary or desired beyond the reach of a MAN, a wide area network (WAN) over public carrier networks is established. O Institutions transferring large amounts of data between offices often decide to lease dedicated transmission lines from public carriers, in what is termed an enterprise-wide private network. O Example: network among news agency offices in different region of Ethiopia.
  • 23. VPN (Virtual Private Network: O is an encrypted connection over the Internet from a device to a network. O The encrypted connection helps ensure that sensitive data is safely transmitted. O It prevents unauthorized people from snooping on the traffic and allows the user to conduct work remotely.
  • 24. A virtual LAN (VLAN) O is any broadcast domain that is partitioned and isolated in a computer network at the data link layer (OSI layer 2). O LAN is the abbreviation for local area network and in this context virtual refers to a physical object recreated and altered by additional logic.
  • 25. O A Virtual Local Area Network (VLAN) is a logical division of computer systems in a LAN (Local Area Network) that are connected to a switch, based on their functionalities. O VLANs are implemented for enhancing security between various departments and also for easy configuration.
  • 26. Wireless Local Area Network (WLAN) – O a network that connects two or more devices using a wireless distribution method and provides access to the public Internet. O Most WLANs are based on Institute of Electrical and Electronic Engineers (IEEE) 802.11 standards, or known as Wi-Fi.
  • 27. Types of networks based on configuration (Node Relationship) Terms to be familiar O Servers: Computers that provide shared resources to network users. O Clients: Computers that access shared network resources provided by a server. O Media: the wires that make the physical connections. O Shared data: Files provided to clients by servers across the network.
  • 28. O Shared printers and other peripherals: Additional resources provided by servers. O Resources: any service or device, such as files, printers, or other items, made available for use by members of the network.
  • 29. O Based on the computers relationship on the network, computer networks can be categorized as:  Peer to Peer and  Server based network
  • 30. Peer-to-Peer Networks O In a peer-to-peer network, there are no dedicated servers, and there is no hierarchy among the computers. O All the computers are equal and therefore are known as peers. O Each computer functions as both a client and a server, and there is no administrator responsible for the entire network. O The user at each computer determines what data on that computer is shared on the network. Peer to peer network are also called Workgroup
  • 31. Where a Peer-to-Peer Network Is Appropriate O Peer-to-peer networks are good choices for environments where:  There are 10 users or fewer.  Users share resources, such as files and printers, but no specialized servers exist.  Security is not an issue.  The organization and the network will experience only limited growth within the foreseeable future. O Where these factors apply, a peer-to-peer network will probably be a better choice than a server-based network.
  • 32. Advantages of peer to peer network O Easy to install and configure O The cost of installation and operation is less O A full time network administrator is not required
  • 33. Disadvantages of peer to peer network O Shared resources can be accessed by everyone O Backup has to be performed on each computer separately O No centralized security
  • 34. Server Based network (client/server network) O In an environment with more than 10 users, a peer-to-peer network—with computers acting as both servers and clients—will probably not be adequate. O Therefore, most networks have dedicated servers. O A dedicated server is one that functions only as a server and is not used as a client or workstation. O
  • 35. O Servers are described as "dedicated“/give over to/ because they are not themselves clients, and because they are optimized to service requests from network clients quickly and to ensure the security of files and directories. O Server based network is also known as Domain.
  • 36. Advantages of server based network O Centralized resources O Easier to backup files O Easier to find files O Efficient O Security O One machine can secure entire network O One central login O Scalability
  • 37. Disadvantage of client server O If the server goes down, it takes part or the whole network with it O It is more expensive to install O Needs to be maintained by staff with high IT skills
  • 38. Specialized servers O Servers must perform varied and complex tasks. O Servers for large networks have become specialized to accommodate the expanding needs of users. O Following are examples of different types of servers included on many large networks File and Print Servers O File and print servers manage user access and use of file and printer resources. Application Servers O Application servers make the server side of client/server applications, as well as the data, available to clients.
  • 39. Mail Servers O Mail servers operate like application servers in that there are separate server and client applications, with data selectively downloaded from the server to the client. Fax Servers O Fax servers manage fax traffic into and out of the network by sharing one or more fax modem boards.
  • 40. Communications Servers O Communications servers handle data flow and e- mail messages between the servers' own networks and other networks, mainframe computers, or remote users who dial in to the servers over modems and telephone lines. Directory Services Servers O Directory services servers enable users to locate/find, store, and secure information on the network
  • 41. Key Factors to Consider When Creating an IT Network 1. Understand your network goals. Surprisingly, not all businesses consider what the actual goal of their IT network is. 2. Create a budget and acquire components. 3. Training, security, and scalability. 4. IT maintenance.
  • 42. Information Sheet 2.2. Determining segment needs using network functional analysis Determine best-fit topology for a local network Determine user needs O Identify the different segments of the proposed network based on business requirements O Determine segment needs, using network functional analysis O Estimate traffic content and volumes based on business requirements O Develop a prioritized organizational network functional matrix
  • 43. Develop local area network specification 1. Determine the resource requirements for each network segment on the basis of functional analysis 2. Analyze features of the physical environment for the effect on network design 3. Conduct a costing process for possible topology options 4. Consider topology options with reference to available resources and network functional matrix 5. Select and document appropriate network topology based on business requirements and functional analysis
  • 44. 2.3. Determining resource requirements for each network segment Network Topology O The term topology, or more specifically, network topology, refers to the arrangement or physical layout of computers, cables, and other components on the network. O "Topology" is the standard term that most network professionals use when they refer to the network's basic design.
  • 45. O In addition to the term "topology," you will find several other terms that are used to define a network's design: • Physical layout • Design • Diagram • Map
  • 46. O A network's topology affects its capabilities. O The choice of one topology over another will have an impact on the: • Type of equipment the network needs. • Capabilities of the equipment. • Growth of the network. • Way the network is managed.
  • 47. Category of Topology O Logical: describes the way network data flows through the physical components. O Physical: Physical topology describes how the physical components on a network are connected.
  • 48. Standard Topologies O All network designs stem from four basic topologies: 1. Bus 2. Star 3. Ring 4. Mesh
  • 49. Bus Topology O The bus topology is often referred to as a "linear bus" because the computers are connected in a straight line. O This is the simplest and most common method of networking computers.
  • 51. O Computers on a bus topology network communicate by addressing data to a particular computer and sending out that data on the cable as electronic signals. O To understand how computers communicate on a bus, you need to be familiar with three concepts: • Sending the signal • Signal bounce • Terminator
  • 52. Sending the Signal O Network data in the form of electronic signals is sent to all the computers on the network. O Only the computer whose address matches the address encoded in the original signal accepts the information. O All other computers reject the data. Only one computer at a time can send messages. O Because only one computer at a time can send data on a bus network, the number of computers attached to the bus will affect network performance.
  • 53. Advantages of a Linear Bus Topology O Easy to connect a computer or peripheral to a linear bus. O Requires less cable length than a star topology. O Inexpensive, easy to install, simple to understand, easy to extend.
  • 54. Disadvantages of a linear Bus Topology O Entire network shuts down if there is a break in the main cable. O Terminators are required at both ends of the backbone cable O Difficult to identify the problem if the entire network shuts down.
  • 55. Star Topology O In the star topology, cable segments from each computer are connected to a centralized component called a hub or switch. O Signals are transmitted from the sending computer through the hub or switch to all computers on the network
  • 56. Figure 7. Star topology
  • 57. Advantage of Star topology O If one computer on the star topology fails, only the failed computer is unable to send or receive data. O Easy to install and wire O No disruptions to the network when connecting or removing devices. O Easy to detect faults and to remove parts.
  • 58. Disadvantage of star topology O Requires more cable length than a linear topology O If the Hub /Switch fails, the entire network fails. O More expensive than linear bus topologies because of the cost of the central device
  • 59. Ring Topology O The ring topology connects computers on a single circle of cable. Unlike the bus topology, there are no terminated ends. O The signals travel around the loop in one direction and pass through each computer, which can act as a repeater to boost the signal and send it on to the next computer.
  • 60. O One method of transmitting data around a ring is called token passing. (A token is a special series of bits that travels around a token-ring network.) O The token is passed from computer to computer until it gets to a computer that has data to send. O The sending computer modifies the token, puts an electronic address on the data, and sends it around the ring.
  • 61. O The data passes by each computer until it finds the one with an address that matches the address on the data. O The receiving computer returns a message to the sending computer indicating that the data has been received. O After verification, the sending computer creates a new token and releases it on the network. O The token circulates within the ring until a workstation needs it to send data.
  • 62. Figure 8. Ring topology
  • 63. Advantage of Ring topology  each computer acts as a repeater, regenerating the signal and sending it on to the next computer, thereby preserving signal strength.  All computers have equal access to network media,  installation can be simple, and Very fast transmission rates possible
  • 64. Disadvantage of Ring topology O Only one computer at a time can send data on a single token ring. O Also, ring topologies are usually more expensive than bus technologies. O If one computer fails, the network will fail
  • 65. Mesh Topology O A mesh topology network offers superior redundancy and reliability. O In a mesh topology, each computer is connected to every other computer by separate cabling. O This configuration provides redundant paths throughout the network so that if one cable fails, another will take over the traffic. O These networks are expensive to install because they use a lot of cabling.
  • 66. Figure 9. Mesh topology
  • 67. Advantage of Mesh topology An advantage of a mesh topology is its back-up capabilities by providing multiple paths through the network. Disadvantage of Mesh topology Because redundant paths require more cable than is needed in other topologies, a mesh topology can be expensive.
  • 68. Figure 10 Hybrid Topology
  • 69. Star Bus O The star bus is a combination of the bus and star topologies. In a star-bus topology, several star topology networks are linked together with linear bus trunks. O If one computer goes down, it will not affect the rest of the network. The other computers can continue to communicate. O If a hub goes down, all computers on that hub are unable to communicate.
  • 70. Star Ring O The star ring (sometimes called a star-wired ring) appears similar to the star bus. O Both the star ring and the star bus are centered in a hub that contains the actual ring or bus. O Linear-bus trunks connect the hubs in a star bus, while the hubs in a star ring are connected in a star pattern by the main hub.
  • 71. Figure 11. Star ring topology
  • 72. Selecting a topology O There are many factors to consider when deciding which topology best suits the needs of an organization. O The following table provides some guidelines for selecting a topology.
  • 73. Table 9. Summary of topology Topolo gy Advantages Disadvantages Bus  Use of cable is economical.  Media is inexpensive and easy to work with.  System is simple and reliable.  Bus is easy to extend.  Network can slow down in heavy traffic.  Problems are difficult to isolate.  Cable break can affect many users.
  • 74. Ring  System provides equal access for all computers.  Performance is even despite many users.  Failure of one computer can impact the rest of the network.  Problems are hard to isolate.  Network reconfiguration disrupts operation.
  • 75. Star  Modifying system and adding new computers is easy.  Centralized monitoring and management are possible.  Failure of one computer does not affect the rest of the network.  If the centralized point fails, the network fails. Mesh  System provides increased redundancy and reliability as well as ease of troubleshooting.  System is expensive to install because it uses a lot of cabling.
  • 76. Network connectivity devices Network Interface Cards (NIC) O Also called network adapter O Receive data and convert it into electrical signals O Receive electrical signals and convert them into data O Determine if the data received is for a particular computer O Control the flow of data through the cable
  • 77. O Network adapters constitute the physical interface between the computer and the network cable. O Network adapters, also known as network interface cards, are installed into an expansion slot in each computer and server on the network.
  • 78. After the network adapter is installed, the network cable is attached to the adapter's port to physically connect the computer to the network. Figure 12. Network Interface Cards
  • 79. O As the data passes through the cable to the network adapter, it is formatted into packets. O A packet is a logical grouping of information that includes a header, which contains location information and user data. O The header contains address fields that include information about the data's origin and destination. O The network adapter reads the destination address to determine if the packet is to be delivered to this computer.
  • 80. O If it is, the network adapter then passes the packet on to the operating system for processing. O If not, the network adapter discards the packet. O Each network adapter has a unique address that is incorporated into chips on the card. O This address is called the physical, or media access control (MAC), address.
  • 81. O The network adapter performs the following functions:  Receives data from the computer's operating system and converts it into electrical signals that are transmitted onto the cable  Receives electrical signals from the cable and translates them into data that the computer's operating system can understand  Determines whether data received from the cable is intended for the computer  Controls the flow of data between the computer and the cabling system
  • 82. O To ensure compatibility between the computer and the network, the network adapter must meet the following criteria:  Fit in the computer's expansion slot  Use the correct type of cable connector for the cabling  Be supported by the computer's operating system
  • 83. Repeaters O As signals travel along a cable, they degrade and become distorted in a process called "attenuation." O If a cable is long enough, attenuation will finally make a signal unrecognizable. O Installing a repeater enables signals to travel farther.
  • 84. O Use a repeater to:  Connect two segments of similar or dissimilar media.  Regenerate the signal to increase the distance transmitted.  Connect two segments in the most cost- effective manner.
  • 85. O Do not use a repeater when:  There is heavy network traffic.  Segments are using different access methods.  Data filtering is needed.
  • 86. Hubs O Hubs are connectivity devices that connect computers in a star topology. O Hubs contain multiple ports for connecting to network components. If you use a hub, a break in the network does not affect the entire network; only the segment and the computer attached to that segment fail. O A Hub works at the physical layer of the OSI Reference Model to regenerate the network's signals and resend them out on other segments.
  • 87. O Hubs are multiport repeater. A single data packet sent through a hub goes to all connected computers. O There are two types of hubs: Passive Hubs and Active Hubs:  Passive Hubs: O Send the incoming signal directly through their ports without any signal processing.
  • 88.  Active Hubs: O Sometimes called multiport repeaters, receive incoming signals, process the signals, and retransmit them at their original strengths and definitions to the connected computers or components. Use a hub to: O Easily change and expand wiring systems. O Enable central monitoring of network activity and traffic.
  • 89. Bridges O Like a repeater, a bridge can join segments or workgroup LANs. However, a bridge can also divide a network to isolate traffic or problems. O For example, if the volume of traffic from one or two computers or a single department is flooding the network with data and slowing down the entire operation, a bridge could isolate/separate those computers or that department. O
  • 90. Bridges can be used to: O Expand the length of a segment. O Provide for an increased number of computers on the network. O Reduce traffic blocks resulting from an excessive number of attached computers. O Split an overloaded network into two separate networks, reducing the amount of traffic on each segment and making each network more efficient. O Link unlike physical media such as twisted-pair and coaxial Ethernet. O
  • 91. How Bridges Work O Because bridges work at the data-link layer of the OSI reference model, all information contained in the higher levels of the OSI reference model is unavailable to them. O Rather than distinguish between one protocol and another, bridges simply pass all protocols along the network. O All protocols pass across bridges, so it is up to the individual computers to determine which protocols they can recognize.
  • 92. O The data-link layer has two sub layers:  the Logical Link Control (LLC) sub layer and  the Media Access Control (MAC) sub layer. O Bridges work at the MAC sub layer and are sometimes referred to as MAC-layer bridges. O A MAC-layer bridge:  Listens to all traffic.  Checks the source and destination addresses of each packet.  Builds a routing table, as information becomes available.
  • 93.  Forwards packets in the following manner: O If the destination is not listed in the routing table, the bridge forwards the packets to all segments. O If the destination is listed in the routing table, the bridge forwards the packets to that.
  • 94. Switch O Switches are similar to bridges but offer a more direct network connection between the source and destination computers. O When a switch receives a data packet, it creates a separate internal connection, or segment, between any two of its ports and forwards the data packet to the appropriate port of the destination computer only, based on information in each packet's header.
  • 95. Use a switch to: O Send a packet directly from the source computer to the destination computer. O Provide for a greater rate of data transmission.
  • 96. Routers O In an environment that consists of several network segments with differing protocols and architectures, a bridge might be inadequate for ensuring fast communication among all segments. O A network this complex needs a device that not only knows the address of each segment, but can also determine the best path for sending data and filtering broadcast traffic to the local segment. Such a device is called a "router."
  • 97. O Routers work at the network layer of the OSI reference model. This means they can switch and route packets across multiple networks. O They do this by exchanging protocol-specific information between separate networks. O Routers read complex network addressing information in the packet and, because they function at a higher layer in the OSI reference model than bridges.
  • 98. O Routers can provide the following functions of a bridge:  Filtering and isolating traffic  Connecting network segments
  • 99. Types of Routers O The two major types of routers are: Static. O Static routers require an administrator to manually set up and configure the routing table and to specify each route. Dynamic. O Dynamic routers are designed to discover routes automatically and therefore require a minimal amount of setup and configuration. O More sophisticated than static routers, they examine information from other routers and make packet-by-packet decisions about how to send data across the network.
  • 100. Brouters O A brouter, as the name implies, combines the qualities of both a bridge and a router. O A brouter can act as a router for one protocol and as a bridge for all the others. O Brouters can: O Route selected routable protocols. O Bridge non-routable protocols. O Deliver more cost-effective and more manageable internetworking than separate bridges and routers.
  • 101. Gateways O Gateways enable communication between different architectures and environments. O They repackage and convert data going from one environment to another so that each environment can understand the other environment's data. O A gateway repackages information to match the requirements of the destination system.
  • 102. O A gateway links two systems that do not use the same:  Communication protocols.  Data-formatting structures.  Languages.  Architecture.
  • 103. O Gateways interconnect heterogeneous networks; for example, they can connect Microsoft Windows NT Server to IBM's Systems Network Architecture (SNA). O Gateways change the format of the data to make it conform to the application program at the receiving end.
  • 104. Network Transmission media O Transmission medium is the way in which data is transmitted from one place to another. O It provides a pathway over which the message can travel from sender –to-receiver. O Each of the message can be sent in the form of data by converting the into binary digits. O These binary digits are then encoded into a signal that can be transmitted over the appropriate medium.
  • 105. Transmission Medium Wired/ Guided Media Wireless/ Un Guided Media Twisted Pair Cable Coaxial Cable Fiber Optic Cable Laser transmission Infrared transmission
  • 106. Transmission Media O Transmission Medium is the physical path between transmitter and receiver in a data communication system. O The characteristics and quality of data transmission are determined both by the characteristics of the medium and characteristics of the signal.
  • 107. O Media of data transmission are divided in to: 1. Guided Transmission media- Data transmission is through solid medium (wired system). 2. Unguided Transmission media– Data transmission through air /space (i.e. wireless system)
  • 108. 1. Guided transmission media (Cable) O Transmission capacity of guided media is described with respect to: O Data rate or bandwidth O Distance the media can run O Commonly Types of Cables 1. Twisted pair 2. Coaxial cable 3. Optical fiber
  • 109. Coaxial Cable O Are copper cables with better shielding than twisted pair cable, so that transmitted signals may travel longer distance at higher speeds. O The shield minimizes electrical and radio frequency interference. O Coaxial cabling is the primary type of cabling used by the cable television industry and is also widely used for computer networks, such as Ethernet.
  • 110. O Coaxial cable has two wires of copper. O The core/inner copper wire in Centre and is made of solid conductor. It is enclosed in an insulating sheath. O The second/outer copper wire is wrapped around, and is used to protect from external electromagnetic interference(noise). O This all is covered by plastic cover used to protect the inner layer from physical damage such as fire or water.
  • 112. Coaxial Cable Standard O Coaxial cables are categorized by their Radio Government (RG) ratings. Each RG number denotes a unique set of physical specifications. • 50-Ohm RG-7 or RG-11 :used with thick Ethernet. • 50-Ohm RG-58 :used with thin Ethernet. • 75-Ohm RG-59 :used with cable television.
  • 113. Types of Coaxial Cable O There are two types of coaxial cable:  Thin (thinnet) cable  Thick (thicknet) cable O Which type of coaxial cable you select depends on the needs of your particular network. O
  • 114. Thinnet Cable O Thinnet cable is a flexible coaxial cable about 0.64 centimeters (0.25 inches) thick. Because this type of coaxial cable is flexible and easy to work with, it can be used in almost any type of network installation. O Thinnet coaxial cable can carry a signal for a distance of up to approximately 185 meters (about 607 feet) before the signal starts to suffer from attenuation
  • 115. Thicknet Cable O Thicknet cable is a relatively rigid coaxial cable about 1.27 centimeters (0.5 inches) in diameter. O Thicknet cable is sometimes referred to as Standard Ethernet because it was the first type of cable used with the popular network architecture Ethernet. O Thicknet cable's copper core is thicker than a thinnet cable core..
  • 116. O The thicker the copper core, the farther the cable can carry signals. This means that thicknet can carry signals farther than thinnet cable. O Thicknet cable can carry a signal for 500 meters (about 1640 feet). O Therefore, because of thicknet's ability to support data transfer over longer distances, it is sometimes used as a backbone to connect several smaller thinnet-based networks.
  • 117.  Both thinnet and thicknet cable use a connection component, known as a BNC connector, to make the connections between the cable and the computers. Coaxial-Cable Connection Hardware
  • 118. Twisted-Pair Cable O In its simplest form, twisted-pair cable consists of two insulated strands of copper wire twisted around each other O A number of twisted-pair wires are often grouped together and enclosed in a protective sheath to form a cable. O Two types of twisted pair cable  Unshielded twisted pair cable(UTP)  Shielded twisted pair cable (STP)
  • 119. Unshielded Twisted-Pair (UTP) Cable O UTP, using the 10BaseT specification, is the most popular type of twisted-pair cable and is fast becoming the most popular LAN cabling. O The maximum cable length segment is 100 meters, about 328 feet
  • 120. O UTP cost less than STP and easily available due to its many use. O Due to its low cost, UTP cabling is used extensively for local area networks(LAN) and telephone connections. O UTP cables consist of 2 or 4 pairs of twisted cable. O Cable with 2 pair use RJ-11 connector used with Ethernet cabling in Computer, and 4 pair cable use RJ-45 connector is used in connecting telephone units.
  • 121. O There are five categories of UTP Category 1 O This refers to traditional UTP telephone cable that can carry voice but not data transmissions. O Most telephone cable prior to 1983 was Category 1 cable. Category 2 O This category certifies UTP cable for data transmissions up to 4 megabits per second (Mbps). O It consists of four twisted pairs of copper wire.
  • 122. Category 3 O This category certifies UTP cable for data transmissions up to 16 Mbps. It consists of four twisted pairs of copper wire with three twists per foot. Category 4 O This category certifies UTP cable for data transmissions up to 20 Mbps. It consists of O four twisted pairs of copper wire. Category 5 O This category certifies UTP cable for data transmissions up to 100 Mbps. It consists of four twisted pairs of copper wire.
  • 123. Shielded Twisted-Pair (STP) Cable O STP cable uses a woven copper-braid jacket that is more protective and of a higher quality than the jacket used by UTP. O STP also uses a foil wrap around each of the wire pairs. This gives STP excellent shielding to protect the transmitted data from outside interference, which in turn allows it to support higher transmission rates over longer distances than UTP.
  • 125.  The RJ-45 connector is slightly larger and will not fit into the RJ-11 telephone jack. The RJ-45 connector houses eight cable connections, while the RJ-11 houses only four.
  • 126. Fiber-Optic Cable O In fiber-optic cable, made high quality of thin glass or plastic and is used to transfer digital data signals in the form of light up to distance of thousand of miles. O This is a relatively safe way to send data because, unlike copper-based cables that carry data in the form of electronic signals, no electrical impulses are carried over the fiber- optic cable. O Fiber optic cables are not affected by electromagnetic interference, so noise and distortion is very less.
  • 127. • Fiber-optic cable is good for very high-speed, high-capacity data transmission because of the purity of the signal and lack of signal attenuation.
  • 128. Advantages of Optical Fiber:- • Fiber optic cables have a much higher bandwidth than metal cables. This means that they can carry more data. • Smaller size and Lighter weight. • Low attenuation • Not affected Electromagnetic interference . • Signals carrying data can travel long distances without weakening • Suitable for industrial and noisy areas
  • 129. Disadvantages of Optical Fiber:- O Optical fiber cables are expensive O Difficult to install O Maintenance is expensive and difficult
  • 130. Fiber-Optic Cabling Considerations O Use fiber-optic cable if you:  Need to transmit data at very high speeds over long distances in very secure media. O Do not use fiber-optic cable if you:  Are under a tight budget.  Do not have the expertise available to properly install it and connect devices to it.
  • 131. Consideration for cable selection O Which cabling you select will depend on the needs of a particular site. O The cabling you purchase to set up a LAN for a small business has different requirements from those of a larger organization, such as a major banking institution. Installation Logistics O How easy is the cable to install and work with? In a small installation where distances are short and security isn't a major issue.
  • 132. Shielding O The level of shielding required will affect cable cost. Almost every network uses some form of shielded cable. O The noisier the area in which the cable is run, the more shielding will be required. Crosstalk O Crosstalk and noise can cause serious problems in large networks where data integrity is crucial. O Inexpensive cabling has low resistance to outside electrical fields generated by power lines, motors, relays, and radio transmitters. This makes it vulnerable to both noise and crosstalk.
  • 133. Transmission Rates O Transmission rates are measured in megabits per second. O A standard reference point for current LAN transmission over copper cable is 100 Mbps. Fiber-optic cable transmits at more than 1 Gbps. Cost O Higher grades of cables can carry data securely over long distances, but they are relatively expensive; O lower- grade cables, which provide less data security over shorter distances, are relatively inexpensive. Signal Attenuation
  • 134. Characteristics Thinnet coaxial (10Base2) Cable Thicknet coaxial (10Base5) Cable Twisted-pair (10BaseT) Cable Fiber-optic Cable Cable cost More than UTP More than thinnet UTP: Least expensive STP: More than thinnet More than thinnet, but less than thicknet
  • 135. Usable cable length 185 meters (about 607 feet) 500 meters (about 1640 feet) UTP and STP: 100 meters (about 328 feet) 2 kilometers (6562 feet) Transmissio n rates 4-100 Mbps 4-100 Mbps UTP: 4-100 Mbps STP: 16-500 Mbps 100 Mbps or more ( > 1Gbps) Flexibility Fairly flexible Less flexible than thinnet UTP: Most flexible STP: Less flexible than UTP Less flexible than thicknet
  • 136. Ease of install ation Easy to install Moderately easy to install UTP: Very easy; often preinstalled STP: Moderately easy Difficult to install Vulnerabil ity to interferen ce Good resistance to interference Good resistance to interference UTP: Very vulnerable STP: Good resistance Not vulnerable to interference Special features Electronic support components are less expensive than twisted- pair cable Electronic support components are less expensive than twisted-pair cable UTP: Same as telephone wire; often preinstalled in buildings STP: Supports higher transmission rates than UTP Supports voice, data, and video
  • 137. Characteri stics Thinnet coaxial (10Base2 ) Cable Thicknet coaxial (10Base5) Cable Twisted-pair (10BaseT ) Cable Fiber-optic Cable Preferred uses Medium to large sites with high security needs Linking thinnet networks UTP: smaller sites on budget. STP: Token Ring in any size Any size installation requiring speed and high data security and integrity
  • 138. 2. Unguided (wireless transmission) media o It is also referred to as Wireless or Unbounded transmission media. o No physical medium is required for the transmission of electromagnetic signals. O Features: O The signal is broadcasted through air O Less Secure O Used for larger distances
  • 139. O There are 3 types of Signals transmitted through unguided media: (i) Radio waves –  These are easy to generate and can penetrate through buildings.  The sending and receiving antennas need not be aligned.  Frequency Range:3KHz – 1GHz. AM and FM radios and cordless phones use Radio waves for transmission.
  • 140. ii) Microwaves – O It is a line of sight transmission i.e. the sending and receiving antennas need to be properly aligned with each other. O The distance covered by the signal is directly proportional to the height of the antenna. O These are majorly used for mobile phone communication and television distribution.
  • 141. (iii) Infrared – O Infrared waves are used for very short distance communication. O They cannot penetrate through obstacles. This prevents interference between systems. O It is used in TV remotes, wireless mouse, keyboard, printer, etc.
  • 142. O In infrared transmission the communicating bodies should be O In direct line of sight O If there is any body in between the communicating bodies will be unable to communicate O Can not be used outdoors
  • 143. WiFi O stands for Wireless Fidelity. WiFi uses Radio waves to provide wireless high-speed internet and network connections. O A WiFi connection is established using a wireless adapter to create hotspots. WiFi is for LAN (Local Area Network) applications. O WiFi antennas size small enough to be placed on a very small router. O WiFi can be used to connect with printer, computers, gaming consoles and many more.
  • 144. Wi-Max O It stands for Wireless Inter-operability for Microwave Access. O WiMax handle a larger inter-operable network. WiMax is for MAN (Metropolitan Area Network) applications. O WiMax can be used to provide internet services such as mobile data and WiFi spots.
  • 145. Introduction to Network Operating Systems (NOs) O Just as a computer cannot operate without a computer operating system, a network of computers cannot operate without a network operating system. O Without a network operating system of some kind, individual computers cannot share resources, and other users cannot make use of those resources.
  • 146. O Network operating system software is integrated into a number of popular operating systems including O Windows 2000 Server/ O Windows 2000 Professional, O Windows NT Server/ O Windows NT Workstation O Windows Xp, Windows Vista, O Windows 7 and AppleTalk.
  • 147. Coordinating Hardware and Software O A computer's operating system coordinates the interaction between the computer and the programs—or applications—it is running. O It controls the allocation and use of hardware resources such as: O Memory. O CPU time. O Disk space. O Peripheral devices.
  • 148. O A network operating system O Ties together all computers and peripherals. O Coordinates the functions of all computers and peripherals. O Provides security by controlling access to data and peripherals. O Two major components of network software are: O Network software that is installed on clients. O Network software that is installed on servers.
  • 149. Client Software O In a stand-alone system, when the user types a command that requests the computer to perform a task, the request goes over the computer's local bus to the computer's CPU. O For example, if you want to see a directory listing on one of the local hard disks, the CPU interprets and executes the request and then displays the results in a directory listing in the window.
  • 150. Server Software O With server software, users at other machines, the client computers, can share the server's data and peripherals including printers, plotters, and directories. O The request is forwarded by the redirector on to the network, where it is passed to the file and print server containing the shared directory. O The request is granted, and the directory listing is provided.
  • 151. Functions of NOs Resource Sharing O Sharing is the term used to describe resources made publicly available for access by anyone on the network. O Most NOSs not only allow sharing, but also determine the degree of sharing. Options for sharing include: O Allowing different users different levels of access to the resources.
  • 152. O Coordinating access to resources to make sure that two users do not use the same resource at the same time. O For example, an office manager wants everyone on the network to be familiar with a certain document (file), so she shares the document. O However, she controls access to the document by sharing it in such a way that: O Some users will be able only to read it. O Some users will be able to read it and make changes in it.
  • 153. Managing Users O Network operating systems also allow a network administrator to determine which people, or groups of people, will be able to access network resources. O A network administrator can use the NOS to: O Create user privileges, tracked by the network operating system, that indicate who gets to use the network. O Grant or deny user privileges on the network. O Remove users from the list of users that the network operating system tracks.
  • 154. Managing the Network O Some advanced NOSs include management tools to help administrators keep track of network behavior. O If a problem develops on the network, management tools can detect signs of trouble and present these in a chart, or other, format. O With these tools, the network manager can take corrective action before the problem halts the network.
  • 155. Network Access method The Function of Access Methods O The set of rules that defines how a computer puts data onto the network cable and takes data from the cable is called an access method. O Once data is moving on the network, access methods help to regulate the flow of network traffic.
  • 156. O Access methods prevent computers from gaining simultaneous access to the cable. O By making sure that only one computer at a time can put data on the network cable, O Access methods ensure that the sending and receiving of network data is an orderly process.
  • 157. Major Access Methods O The two methods designed to prevent simultaneous use of the network media include: A. Carrier-sense multiple access methods (with collision detection or with collision avoidance). B. Token-passing methods that allow only a single opportunity to send data.
  • 158. 1. Carrier-Sense Multiple Access with Collision Detection (CSMA/CD) Access Method O Before sending data each computer checks the network cable O Only when a computer senses that the cable is free and that there is no traffic on the cable can it send data O Once the computer has transmitted data on the cable, no other computer can transmit data until the original data has reached its destination and the cable is free again O If a computer detects a possible collision, it waits for a random period of time before retransmitting (collision detection)
  • 159. 2. Token-Passing Access Method O In this access method, a special type of packet, called a token, circulates around a cable ring from computer to computer. O When any computer on the ring needs to send data across the network, it must wait for a free token. When a free token is detected, the computer will take control of it if the computer has data to send. O The computer can now transmit data. Data is transmitted in frames, and additional information, such as addressing, is attached to the frame in the form of headers and trailers.
  • 161. Header O The header includes: O An alert signal to indicate that the packet is being transmitted. O The source address. O The destination address. O Clock information to synchronize transmission. O
  • 162. Data O This describes the actual data being sent. This part of the packet varies in size, depending on the network. O The data section on most networks varies from 512 bytes—or 0.5 kilobytes (KB)—to 4 KB. O Because most original data strings are much longer than 4k, data must be broken into chunks small enough to be put into packets. O It takes many packets to complete the transmission of a large file.
  • 163. Trailer O The exact content of the trailer varies depending on the communication method, or protocol. O However, the trailer usually contains an error-checking component called a cyclical redundancy check (CRC).
  • 164. Network Standards Ethernet and its Features O Ethernet is currently the most popular network architecture. Notice that the cable is terminated at both ends. O This baseband architecture uses a bus topology, usually transmits at 10 Mbps, and relies on CSMA/CD to regulate traffic on the main cable segment.
  • 165. The Ethernet Frame Format O A frame is a package of information transmitted as a single unit. O An Ethernet frame can be between 64 and 1518 bytes long, but the Ethernet frame itself uses at least 18 bytes; therefore, the data in an Ethernet frame can be between 46 and 1500 bytes long. O Every frame contains control information and follows the same basic organization.
  • 166.
  • 167. Frame field Description Preamble Marks the start of the frame Destination and source The origin and destination addresses Type Used to identify the network layer protocol, usually either IP or IPX (Novell's Internetwork Packet Exchange) Cyclical redundancy check (CRC) Error-checking field to determine if the frame arrived without being corrupted
  • 168. Ethernet specifications The 10-Mbps IEEE Standards O This section looks at four 10 Mbps Ethernet topologies: O 10BaseT O 10Base2 O 10Base5 O 10BaseFL
  • 169. 10BaseT Standard O 10 Mbps, baseband, over twisted-pair cable Mostly uses UTP but can also use STP O Has a physical star and logical bus topology O The maximum length of a 10BaseT segment is 100 meters. Repeaters can be used to extend this maximum cable length. O The minimum cable length between computers is 2.5 meters, A 10BaseT LAN will serve 1024 computers
  • 170. 10Base2 Standard O It transmits at 10 Mbps over a baseband wire and can carry a signal about two times 100 meters (the actual distance is 185 Meters. O This type of network uses thin coaxial cable, or thinnet, which has a maximum segment length of 185 meters and a minimum cable length of at least 0.5 meters between workstations. O There is also a 30-computer maximum per 185- meter segment.
  • 171. 10Base5 Standard O The IEEE specification for this topology is 10 Mbps, baseband, and 500-meter (five 100-meter) segments. O It is also called standard Ethernet. This topology makes use of thick coaxial cable , also known as thicknet. O Thicknet generally uses a bus topology and can support as many as 100 nodes (stations, repeaters, and so on) per backbone segment. O The distances and tolerances for thicknet are greater than those for thinnet: a thicknet segment can be 500 meters long for a total network length of 2500 meters.
  • 172. 10BaseFL Standard O The IEEE committee published a specification for running Ethernet over fiber-optic cable. O The 10BaseFL (10Mbps, baseband, over fiber- optic cable) is an Ethernet network that typically uses fiber-optic cable to connect computers and repeaters. O The primary reason for using 10BaseFL is to accommodate long cable runs between repeaters, such as between buildings. O The maximum distance for a 10BaseFL segment is 2000 meters.
  • 173. The 100-Mbps IEEE Standards O New Ethernet standards are pushing the traditional Ethernet limits beyond the original 10 Mbps. O These new capabilities are being developed to handle such high band width applications as: O Computer-aided design (CAD). O Computer-aided manufacturing (CAM). O Video. O Imaging and document storage.
  • 174. O Two Ethernet standards that can meet the increased demands are: O 100BaseVG-AnyLAN Ethernet. O 100BaseX Ethernet (Fast Ethernet). O Both 100BaseVG-AnyLAN and Fast Ethernet are about 5 to 10 times faster than standard Ethernet. They are also compatible with existing 10BaseT cabling systems.
  • 175. 100VG-AnyLAN Standard O The 100VG (Voice Grade) AnyLAN is an emerging networking technology that combines elements of both Ethernet and Token Ring architectures. O This technology goes by any of the following names, all of which refer to the same type of network: O 100VG-AnyLAN O 100BaseVG O VG O AnyLAN
  • 176. Specifications O Some of the current 100VG-AnyLAN specifications include: O A minimum data rate of 100 Mbps. O The ability to support a cascaded star topology over Category 3, 4, and 5 twisted-pair and fiber-optic cable. O The demand-priority access method that allows for two priority levels (low and high). O The ability to support an option for filtering individually addressed frames at the hub to enhance privacy. O Support for both Ethernet frames and Token Ring packets.
  • 177. 100BaseX Ethernet Standard O This standard, sometimes called Fast Ethernet, is an extension of the existing Ethernet standard. O It runs on UTP Category 5 data-grade cable and uses CSMA/CD in a star-wired bus topology, similar to 10BaseT where all cables are attached to a hub. O
  • 178. Media Specifications O 100BaseX incorporates three media specifications: O 100BaseT4 (4-pair Category 3, 4, or 5 UTP) O 100BaseTX (2-pair Category 5 UTP or STP) O 100BaseFX (2-strand fiber-optic cable)
  • 179. Mode of transmission O The term transmission mode defines the direction of data flow between two linked devices. O The manner or way in which data is transmitted from one place to another is called Data Transmission Mode. O There are three ways for transmitting data from one location to another. These are: 1. Simplex mode 2. Half-Duplex mode 3. Full-Duplex mode
  • 180. 1. Simplex Mode O The most basic form of data or information transmission is called simplex. O This means that data is sent in one direction only, from sender to receiver. O With simplex transmission, problems encountered during the transmission are not detected and corrected. Senders cannot even be sure that the data is received
  • 181. Examples of simplex transmission are radio and television.
  • 182. 2. Half duplex mode O In Half-duplex mode, the communication can take place in both directions, but only in one direction at a time. O In this mode, data is sent and received alternatively. O In half-duplex mode, at a time only one end transmits data while other end receives. O In addition, it is possible to perform error detection and request the sender to re- transmit information.
  • 183.  The Internet browsing is an example of half duplex. When we issue a request to download a web document, then that document is downloaded and displayed before we issue another request.
  • 184. 3. Full duplex mode O In Full-duplex mode, the communication can take place in both directions simultaneously, i.e. at the same time on the same channel. O It is the fastest directional mode of communication. Example of this mode is conversation of the persons through telephone.
  • 185. The telephone communication system is an example of full duplex communication mode.
  • 186. Parallel V’s Serial Transmission O There are two types of data transmission modes. These are: 1. Parallel Transmission 2. Serial Transmission
  • 187. 1. Parallel Transmission O In parallel transmission, bits of data flow concurrently through separate communication lines. O Inside the computer binary data flows from one unit to another using parallel mode. O If the computer uses 32-bits internal structure, all the 32- bits of data are transferred simultaneously on 32-lane connections. O Similarly, parallel transmission is commonly used to transfer data from computer to printer. O The printer is connected to the parallel port of computer and parallel cable that has many wires is used to connect the printer to computer. It is very fast data transmission mode.
  • 188. 2. Serial Transmission O In serial data transmission, bits of data flow in sequential order through single communication line. O The flow of traffic on one-lane residential street is an example of serial data transmission mode. O Serial transmission is typically slower than parallel transmission, because data is sent sequentially in a bit-by-bit fashion. O Serial mouse uses serial transmission mode in computer.
  • 189. Network addressing O Addressing on a network can take one of three forms: Computer names: O on a typical network, most users prefer to use computer names to communicate; computer names are far easier to remember than IP addresses. O A computer name is the logical equivalent of an IP or MAC address
  • 190. IP(Internet protocol): O Although users can use IP addresses, customarily IP addresses are used primarily by applications to communicate with locations on or outside the network
  • 191. MAC(Media Access Control) address: O MAC addresses are the physical addresses of network devices and if users use computer names and application use IP addresses, O then computers and other networked devices use MAC addresses to access other devices on the network O With three ways to address elements on a network, there must be ways to resolve each type of address to its equivalents.
  • 192. MAC addressing O A host’s MAC address is based on a 12-digit hexadecimal address. O The MAC address is identified in the second layer of the seven layer OSI model, the Data link layer O Although the MAC address is always used in networking. It cannot be routed. O The MAC address is not routable because of: I. It does not pass through routers (because of its position in the OSI model) II. It has no network address.
  • 193. IP Addressing O An IP address consists of two parts a network address that identifies the network and a host address that identifies the particular host, or node. O Types of IP address O Internet protocol version 4/IPV4 O Internet protocol Version 6/IPV6 O Every computer on a network must have a unique address. If two computers have the same address an address conflict occurs.
  • 194. IPV4 O The IP address identifies and differentiates a given machine from all others on the network. O It consists of a 32-bit binary number that is usually displayed as four octets expressed in decimal and separated by periods. O You must have a unique IP address for each machine on the network. Table 10. Show32-bit binary number 8bit 8bit 8bit 8bit
  • 195. Network classes O Internet addresses are allocated by the InterNIC (http://www.internic.net), the organization that administers the Internet. O These IP addresses are divided into classes. The most common of these are classes A, B, and C. O Classes D and E exist, but are not generally used by end users. O Each of the address classes has a different default subnet mask.
  • 196. O Network classes used to provide an addressing scheme that can accommodate large and small networks. O All networks in practical use have different sizes. O For example, a company that will have 50 computers, will not need a network of 5000 computers, O And on the contrary, a company that needs 5000 computers does not need a network that can only hold 50 computers.
  • 197. O This is the main reason that engineers decided that IP address space should be divided in different classes in order to meet different requirements. O There are five different classes of networks: A, B, C, D and E. O Classes D and E are reserved. Class D is reserved for multicasting purpose and class E for experimental purpose.
  • 198. Class A networks O designed to meet the needs of large networks O This class will only support 126 networks; but each network can support 16,777,214 hosts. O The first octet of the IP address is network portion and the rest the node portion
  • 199. Class B networks O was designed for medium-sized networks O This class will support 16,384 networks; and limited to 65,534 hosts per network. O The first two octet are the network portion Octet 3 and 4 are for nodes O Used for network that have b/n 256 and 65,534 nodes
  • 200. Class C networks O Was designed for small networks; thus the number of hosts per network will be small, however it will support many more networks total. O The first three octet are the network portion and the remaining one for node O A maximum of 2,097,152 (221 ) networks can be defined with up to 254 (Type equation here. 28 -2) hosts per network
  • 201. Class A •The first bit is 0 Network ID The possible class A IP ranges 1.0.0.0-127.255.255.255 Networks Class Range
  • 202. Class B  The first two bits are 1 and 0 The possible IP range for class B is 128.0.0.0-191.255.255.255
  • 203. Class C • The first three bits are 1,1 and 0 The possible IP range for class C is 192.0.0.0- 223.255.255.255
  • 204. Class Prefix bits(ntk) Max. num. of network Suffix bits(host) Available Hosts per Network Valid Address Ranges A 7 27 =128 24 224 -2=16,777,214 1.0.0.1 through 126.255.255.254 B 14 214 =16,384 16 216 -2 =65,534 128.0.0.1 through 191.255.255.254 C 21 221 =2,097,152 8 28 -2=254 192.0.0.1 through 222.255.255.254 D & E Reserved 224.0.0.0 through 255.255.255.254 Table 10. IP address class summary
  • 205. O If you are connecting your machine to a pre- existing network, the network address O for Class A, the first octet; O for Class B, the first two octets; and O for Class C, the first three octets) is the same as those of other machines on the network. O In this case, you only need to create a unique host address.
  • 206. O If you are creating an entirely new network and you want to connect to the Internet, you need to contact the internet service provider or Network Information Center to have a network address. O When you determine the IP address, remember:  Each logical network must have its own network address.  All hosts in a network must have the same network address.  All hosts in a network must have unique host addresses.
  • 207. IP address type 1. Private IP addresses O Private IP addresses are typically used on local networks including home, school and business LANs. O Private networks are non-routable. Devices with private IP addresses cannot connect directly to the Internet.
  • 208. O Likewise, computers outside the local network cannot connect directly to a device with a private IP. O Instead, access to such devices must be brokered by a router. O Class A 10.0.0.1 through 10.255.255.254 O Class B 172.16.0.1 through 172. 31.255.254 O Class C 192.168.0.1 through 192.168.255.254
  • 209. 2. Public IP address O An IP address can be public - for use on the Internet or other wide area network (WAN). Static verses Dynamic IP address O IP addresses can be determined: O Statically (assigned to a computer by a system administrator) or O Dynamically (assigned by another device on the network on demand).
  • 210. Reserved IP address O Certain host addresses are reserved and can’t be assigned to devices on a network. These are: O Network address used to identify the network itself with all host bits zero. Example: 192.168.1.0 O broadcast address used for broadcasting packets to all devices on the network with all host bits one Example: 192.168.1.255
  • 211. O So usable host with in a network calculated by 2n-2 (two is subtracted because these are reserved for the network and broadcast. O where n is the number of bits used for the host portion of the address. O Class D and class E are also reserved addresses used for different purposes such as research. O
  • 212. Subnet mask (network mask) O A subnet mask or sub network mask is a 32 bit number which is used to identify which portion of the IP address identifies the network portion and which part indicates the host part or portion. O In subnet mask, all bits of the network ID portion are set to 1 and all bits of the host address portion are set to 0.
  • 213. O Any address bits that have corresponding mask bits set to 1 represent the network ID, and any address bits that have corresponding mask bits set to 0 represent the host/node ID. O For class full networks there are default mask O Class C -> 255.255.255.0 O Class B -> 255.255.0.0 O Class A -> 255.0.0.0