2.1-Networking-Notes-By-EMK
2.1-Networking-Notes-By-EMK
Objective:
Show understanding of purpose and benefits of networking devices.
Show understanding of characteristics of a LAN and a WAN.
Explain client-server and peer-to-peer models of networked computers.
Roles of different computers within network and subnetwork models. Benefits and
drawbacks of each model. Justify use of a model for a given situation.
Show understanding of thin-client and thick-client and differences between them.
Show understanding of bus, star, mesh and hybrid topologies. Understand how packets are
transmitted between two hosts in given topology. Justify use of topology for given situation.
Show understanding of differences between and implications of use of wireless and wired
networks. Describe characteristics of copper cable, fiber optic cable, radio waves (including
WiFi), microwaves, satellites.
Describe hardware that is used to support a LAN. Including switch, server, Network Interface
Card, Wireless Network Interface Card, Wireless Access Points , cables, bridge, repeater.
Describe role and function of a router in a network.
What is Network?
"Network is a linked set of two or more computer systems, which may be capable of
sharing computer resources such as printers, CD-ROM and databases."
Networks may be wired or wireless.
Category of Networks
Private networks are owned by a single company or organisation (they are LANs or
intranets with restricted user access, for example, passwords and user ids are
required to join network).
Public networks are owned by a communications carrier company (such as a
telecoms company); many organisations will use network and there are usually no
specific password requirements to enter network – but sub-networks may be under
security management.
One of the hubs or switches is usually connected to a router and/or modem to allow LAN
to connect to the internet or become part of a wide area network (WAN).
Hub is hardware device used to connect together a number of devices to form a LAN;
directs incoming data packets to all devices on the network (LAN).
Switch is hardware device used to connect together a number of devices to form a LAN;
directs incoming data packets to a specific destination address only.
Router is hardware device which enables data packets to be routed between different
networks (for example, can join LANs to form a WAN).
Modem is modulator demodulator; device which converts digital data to analogue data
(to be sent down a telephone wire); conversely it converts analogue data to digital data
(which a computer can process).
Client-Server Model
Client-server model uses separate dedicated servers and specific client workstations;
client computers will be connected to server computer(s).
Users are able to access most of files, which are stored on dedicated servers.
Server dictates which users are able to access which files. (Note: sharing of
data is most important part of the client-server model.)
Client-server model allows installation of software onto a client’s computer.
The model uses central security databases which control access to the shared
resources. (Note: passwords and user IDs are required to log into the network.)
Once a user is logged into the system, they will have access to only those resources
and files assigned to them by the network administrator, so offers greater security
than peer-to-peer networks.
Client-server networks can be as large as you want them to be and they are much
easier to scale up than peer-to-peer networks.
A central server looks after the storing, delivery and sending of emails.
Client-server model offers most stable system, for example, if someone deletes a
shared resource from server, back-up would restore deleted resource.
Client-server network can become bottlenecked if there are several client requests
at time.
Node is a device connected to network (it can be computer, storage or peripheral device).
On a Peer-To-Peer network, each node joins network to allow;
Provision of Services to all other network users; services available are listed on nominated
‘look up’ computer – when a node requests a service, ‘look up’ computer is contacted to
find out which of other network nodes can provide required service.
Other users on network to simply access data from another node.
Communication with other peers connected to network.
Peers to be both suppliers and consumers (unlike client-server model where consumers
and resources are kept entirely separate from each other).
Peers to participate as equals on network (this is different to client-server model where a
webserver and client have different responsibilities).
Peer to Peer model is used in scenarios where few number of nodes are required (small
business) where it is relatively easy for users to be in contact with each other. More
number of nodes leads to performance and management issues.
Peer-to-peer network offers little data security since there is no central security system.
This means it is impossible to know who is authorized to share certain data.
In Peer to Peer network users can create their own network node share point which is only
real security aspect since this gives them some kind of control. However, there are no Real
authentication procedures.
Examples of peer-to-peer network model:
A user would choose peer-to-peer network model for one following reasons:
Network of users is fairly small.
There is no need for robust security.
They require workstation-based applications rather than being server-based.
An example would be a small business where there is frequent user interaction and there is
no need to have features of a client-server network.
Peer-to-peer model advantages Client-Server Model advantages
It avoids possibility of congestion on network It allows an organisation to control
when many clients are simultaneously downloading and use of files.
attempting to download files
Parts of a file can be downloaded separately. Files can be better protected from malware
Parts are available from more than one host. attacks because files are stored on one
server which will be regularly scanned
using appropriate anti-virus software.
Types of Clients
Client-server model offers thin clients and Thick clients. These can often refer to both
Hardware and Software.
Thin Client
Thin Client can either be a device or software which needs to be
connected to a powerful computer or server to allow processing to take place. Thin client
will not work unless it is connected at all times to computer or server.
Example of Thin Clients:
Software example would be a Web browser which has very limited functions unless
it is connected to a server.
Other examples is mobile phone apps which need constant access to a server to
work.
Thick Client
Server performs minimal processing for client. clients do most of their
own processing independently. most of the resources are installed locally. Thick client can
either be device or software that can work offline or online. It is still able to do some
processing whether it is connected to a server or not.
Example of Thick Client:
Hardware example is a normal PC/laptop since it would have its own storage, RAM and
operating system which means it is capable of operating effectively online or offline.
Software Example is computer game which can run independently on a user’s computer,
but can also connect to an online server to allow gamers to play and communicate with
each other.
Pros and Cons of using Thick Client
Pros Cons
More robust. device can carry out Less secure (relies on clients to keep their own
processing even when not connected to data secure)
server.
Clients have more control (they can store Each client needs to update data and software
their own programs and data/files) individually
Data integrity issues, As many clients access
same data which can lead to inconsistencies.
Requires very few local resources (SSD, RAM Relies heavily on local resources.
memory or CPU processing time).
Relies on a good, stable and fast network More tolerant of a slow network connection
connection for it to work.
Data is stored on remote server or computer. Can store data on local resources such as
HDD or SSD.
ESQ: Network runs as thick-client model. Describe what is meant by a thick-client model.
Networked Computers
Networked computers form an infrastructure which enables internal and external
communications to take place. The infrastructure includes the following:
Hardware Software Services
• LAN cards •Operation and management of • DSL
• routers the network • Satellite communication
• switches • operation of firewalls channels
• wireless routers • security applications /utilities • Wireless protocols
• cabling • IP addressing.
Five requirements for a data communications system are a sender, a receiver,
a transmission medium, a message and a protocol.
❖ Bus Topology:
A bus topology has only one link but it is shared by number of end-
systems and is described as a multi-point connection. There is no direct connection
between any pair of end systems. A message must be broadcast even though it might only
be intended for one end-system.
Bus topology is resilient because a fault in an end-system or in the link to it does not affect
the use of the network by the other end-systems.
Advantages Disadvantages
• Even if one node fails, the remainder •If main cable fails, whole network goes down.
of the network continues to function. • Performance of network declines under heavy
loading.
• It is easy to increase the size of the • Network is not secure since each packet passes
network by adding additional nodes. through every node.
Bus Topology is most suitable for situations with a small number of devices with light traffic
occurring. For example, a small company or an office environment.
❖ Mesh Topology:
In this configuration, each end-system has a point-to-point connection
to each of the other end systems. Transmission is duplex; messages might be unicast,
multicast or broadcast.
Mesh topology can be used when individual LAN switches are connected in a network. The
topology is essential for the connection of routers within the infrastructure of the Internet.
Disadvantages of A Mesh Network Advantages of A Mesh Network
Large amount of cabling is needed, which is It is easy to identify where faults on the
expensive and time consuming. network have occurred.
Set-up and maintenance is difficult and Any broken links in the network do not affect
complex. the other nodes.
The network is relatively easy to expand.
❖ Star Networks:
In star topology, each end system has point-
to-point connection to central device. Transmission is duplex
and messages from central device might be unicast, multicast
or broadcast. Failure of an end-system, or its link, leaves other
end-systems unaffected. However, central device must not fail. Central Device is
specialized device (server etc) with purpose of connecting other devices in network.
Currently, star topology is usual way to configure a network.
Advantages of A Star Network Disadvantages of star network
Data collisions are greatly reduced due to the If central hub/switch fails, then whole
topology. network goes down.
More secure network since security methods Initial installation costs are high.
can be applied to central node and packets
only travel to nodes with correct address.
ESQ: How packets are handled in Star topology?
How packets are handled depends on whether the central node is a switch or a hub. If it is a
hub, all the packets will be sent to every device/node on the star network – if the address in
the packet matches that of the node, it will be accepted; otherwise, it is ignored. If the central
node is a switch, packets will only be sent to nodes where the address matches the recipient
address in the packet.
Star Networks are useful for evolving networks where devices are frequently added or
removed. They are well suited to applications where there is heavy data traffic.
Hybrid Networks:
Hybrid network is mixture of two or more different topologies (bus
and star, bus and mesh, and so on). Main advantages and disadvantages depend on which
types of network are used to make up hybrid network, but main disadvantage is that they
can be very complex to install, configure and maintain.
Transmission Media
Twisted pair Cable:
Twisted pair cables are most common cable type used in LANs. It has
lowest data transfer rate and suffers most from external interference (such as
electromagnetic radiation). However, it is cheapest option. Twisted pair use copper for
transmission medium.
Types of twisted pair cable:
➢ Unshielded is used by residential users.
➢ Shielded is used commercially (Cable contains thin metal foil jacket which cancel out
some of external interference).
Coaxial Cables:
Coaxial cables are most commonly used cables in MANs and by cable
television companies. Cost of coaxial cables is higher than twisted pair cables but they offer
better data transfer rate and are affected less by external interference. Coaxial cables also
have about 80 time transmission capacity of twisted pair. It is not usually used for long-
distance telephone cabling.
Wireless Transmission
It is transmission using electromagnetic radiation (radio, microwave or infrared).
➢ Permission from authorities and land owners is required before laying cables
underground.
Wireless Networking:
➢ It is easier to expand networks and is not necessary to connect devices using cables.
➢ Devices have increased mobility, provided they are within range of the WAPs.
➢ Increased chance of interference from external sources.
➢ Data is less secure than with wired systems; it is easier to intercept radio waves and
microwaves than cables.
➢ Data transmission rate is slower than wired networks.
➢ Signals can be stopped by thick walls.
Wi-Fi and Bluetooth
Wi-Fi and Bluetooth offer wireless communication between devices. They both use
electromagnetic radiation as carrier of data transmission.
Bluetooth sends and receives radio waves in band of 79 different frequencies (channels).
Devices using Bluetooth automatically detect and connect to each other, but they do not
interfere with other devices since each communicating pair uses different channel. When a
device wants to communicate, it picks one of 79 channels at random. If channel is already
being used, it randomly picks another channel. This is known as Spread Spectrum
Frequency hopping.
Wi-Fi uses spread spectrum technology. Wi-Fi is best suited to operating full-scale
networks, since it offers much faster data transfer rates, better range and better security
than Bluetooth. Wi-Fi-enabled device (computer or smart phone) can access, internet
Wirelessly at any wireless access point (WAP) or ‘hot spot’ up to 100 metres away.
Satellites
Satellites are components of modern communication systems. Van Allen belts are areas
containing high levels of electrically charged particles, which interfere with satellites.
GEO Satellites: Highest altitude satellites are in geostationary Earth orbit (GEO) over
equator and these are used to provide long-distance telephone and computer network
communication. ‘Geostationary’ means that satellite orbits at same speed as Earth
spins,. Only three GEO satellites are needed for full global coverage.
MEO Satellite: Closer to Earth are a group of medium Earth-orbit (MEO) satellites some
of which provide the global positioning system (GPS). Ten MEO satellites are needed for
global coverage.
LEO Satellites: Low-Earth-orbit (LEO) satellites work in ‘constellations’ to supplement
the mobile phone networks. Fifty LEO satellites are needed for full global coverage but
currently there are several hundred LEO satellites in orbit.
Satellite can act as a component in a network and can directly connect with ground-based
components.
Disadvantage of satellites is that the greater transmission distance causes transmission
delays, which can cause technical problems for the network.
Hardware Requirements of LAN Networks
Hub: Hubs are hardware devices that can have a number of devices or computers
connected to them.
Its main task is to take any data packet received at one of its ports and then send the data
to every computer in the network. Using hubs is not a very secure method of data
distribution and is also wasteful of bandwidth. Hubs can be wired or wireless devices.
Switch:
Switch connect a number of computers together to form a LAN. Unlike a hub,
the switch checks the data packet received and works out its destination address and sends
the data to the appropriate computer only. This makes using a switch a more secure and
efficient way of distributing data.
Each device on a network has a MAC address which identifies it uniquely. Data packets sent
to switches will have a MAC address identifying the source of the data and additional
addresses identifying each device which should receive the data. Switches can be wired or
wireless devices.
Repeater:
When signals are sent over long distances, they suffer attenuation or signal
loss. Repeaters are devices which are added to transmission systems to boost the signal so
it can travel greater distances. They amplify signals on both analogue (copper cable) and
digital (fibre optic cable) communication links.
Repeaters can also be used on wireless systems. These are used to boost signals to prevent
any ‘dead spots’ in the Wi-Fi zone.
Sometimes, hubs contain repeaters and are known as repeating hubs. All signals fed to the
hub are boosted before being sent to all devices in the network, thus increasing the
operational range.
Bridge
Bridges are devices that connect one LAN to another LAN that uses same
protocol. They are often used to connect together different parts of a LAN so that they can
function as a single LAN.
Bridges can be wired or wireless devices. Bridge stores network addresses for end-systems
in two segments it connects.
Router Routers enable data packets to be routed between different networks for
example, to join a LAN to a WAN. Router takes data transmitted in one format from a
network and converts data to a protocol and format understood by another network,
thereby allowing them to communicate via router.
Role of routers as follows;
Ans:
*************
Exam Style Questions
ESQ#1 One of company's offices one server and four computers connected in a star
topology. Draw a diagram to show layout of office's star topology. M/J/23 P12
Ans: