Chapter 2
Chapter 2
NETWORK CONFIGURATION
2
These includes:-
• Servers—Computers that provide shared resources to network
users.
• Clients/workstations—Computers that access shared network re-
sources provided by a server.
• Media—The wires that make the physical connections.
• Shared data—Files provided to clients by servers across the net-
work.
• Shared printers and other peripherals—Additional resources pro-
vided by servers.
• Resources—Any service or device, such as files, printers, or other
items, made available for use by members of the network.
3
The type of network you planed / choose
to implement will depend on some factors
such as:
– Size of the organization.
– Level of security required.
– Type of business.
– Level of administrative support available.
– Amount of network traffic.
– Needs of the network users.
4
Networks are divided into two broad categories, as
shown below:
• Peer-to-peer networks
• Server-based networks
– each type has different capabilities.
The difference between peer-to-peer and server-
based networks.
5
Peer-to-Peer Networks
In a peer-to-peer network:-
7
Size
10
2- Sharing Resources
• All users can share any of their resources in any
manner they choose.
3- Security
• All peer-to-peer network users set their own se-
curity, and shared resources can exist on any
computer rather than on a centralized server
only.
11
Peer-to-peer networks are a good choices than
a server-based for environments where:
– 10 users or fewer.
– Users share resources, such as files and
printers, but no specialized servers exist.
– Security is not an issue.
– The organization and the network will expe-
rience only limited growth within the near fu-
ture.
12
Server-Based Networks
• In an environment with more than 10 users, a peer-to-
peer will probably not be adequate.
• Therefore, most networks have/required dedicated
servers.
• A dedicated server is one that functions only as a
server and is not used as a client or workstation.
13
Specialized Servers
Some of the examples of different types of servers
included on many large networks.
1-File Servers
• File servers offer services that allow network users
to share files.
• File services are the network applications that
store, retrieve, and move data.
• With network file services, users can exchange,
read, write, and manage shared files and the data
contained in them.
• File serves are designed specially to support the file
14
2- Print Servers
The advent of networking represented a whole new level
of computer printing, because a network can:
• Allow users to share printers
• Allow us to place printers where convenient, not just
near individual computers
• Achieve better workstation performance by using high-
speed network data transfer, print, queues, and spooling
Print services :-
1. Sharing Resources
A server is designed to provide access to many files and
printers while maintaining performance and security for
the user.
Server-based data sharing can be centrally administered
and controlled.
20
2. Provide effective Security
• Security is the primary reason for choosing a server-
based approach network.
One administrator who sets the policy and applies it to
every user on the network can manage security.
• The following figure depicts security being centrally admin-
istered.
21
3- Backup
• Backups can be scheduled several times a day or once a
week depending on the importance and value of the
data.
• Server backups can be scheduled to occur automatically,
according to a predetermined schedule.
4- Redundancy
• Through the use of backup methods known as redun-
dancy systems, the data on any server can be dupli-
cated and kept online.
5- Number of Users
22
Comparisons of Network Types
Peer-to-Peer Server-Based
Consideration
Network Network
Size Good for 10 or fewer Limited only by server
computers and network hardware
23
NETWORK MEDIA
24
NETWORK MEDIA
Cable Types
25
Twisted-Pair Cable
Twisted-pair cable
consists of insulated strands of copper wire
twisted around each other.
There are two type of twisted pair cable:-
• Category 1 - refers to traditional UTP telephone cable that carry voice but not
data transmissions.
• Category 2 - certifies UTP cable for data transmissions up to 4 megabits per second
(Mbps). It consists of four twisted pairs of copper wire.
• Category 3 - certifies UTP cable for data transmissions up to 16 Mbps. It consists of
four twisted pairs of copper wire with three twists per foot.
• Category 4 - certifies UTP cable for data transmissions up to 20 Mbps. It consists of
four twisted pairs of copper wire.
• Category 5 - certifies UTP cable for data transmissions up to 100 Mbps. It consists
of four twisted pairs of copper wire.
• Category 5e - Improved version of cat 5 category. The bandwidth is 1000MBPS.
• Category 6 Similar to CAT5 wire, but contains a physical separator between the 4
pairs to further reduce electromagnetic interference.
28
• UTP is particularly susceptible to crosstalk.
Greater number of twists per foot of cable, the
more effective the protection against crosstalk.
– It is familiar technology.
– It is relatively inexpensive and easy to install.
– Most LAN systems are readily capable of
running over UTP.
UTP disadvantages
30
Shielded Twisted-Pair (STP) Cable
• STP cable uses a wounded copper-braid jacket that
is more protective and of a higher quality.
STP advantage
• Provides better performance than UTP in environments with:-
- high noise levels
- high levels of unwanted electrical signals.
STP disadvantage
– It is more labor-intensive than UTP to install.
– Not all LAN systems work readily over STP.
31
Twisted-Pair Cabling Components
• Connection hardware -Twisted-pair cabling uses
RJ-45 telephone connectors to connect to a com-
puter.
34
• The core of a coaxial cable carries the electronic
signals that make up the data.
• Surrounding the core is a dielectric insulating
layer that separates it from the wire mesh.
• The wire mesh acts as a ground and protects
the core from electrical noise and crosstalk.
• A non-conducting outer shield—usually made of
rubber, Teflon, or plastic—surrounds the entire
cable.
• Coaxial cable is more resistant to interference
and attenuation than twisted-pair cabling. 35
Types of Coaxial Cable
There are two types of coaxial cable:
37
• The BNC T connector: This connector joins the
network interface card (NIC) in the computer to
the network cable.
38
• The BNC barrel connector: This connector is
used to join two lengths of thinnet cable to make
one longer length.
39
Coaxial Cable Advantages
45
Wireless Networking
• What is a wireless network?
• wireless network:
– a technology that enables two or more entities to
communicate without network cabling
46
Wireless Networking
• Most wireless networks consist of wireless components which communicat-
ing with a network that uses the cabling. Such like network types which
used a mixed- network component called a hybrid network.
Wireless Network Capabilities
Wireless networks is one of a network which attracting attention because of
wireless components can be:-
• Provide temporary connections to an existing network i.e. cabled net-
work.
• provide backup to an existing network.
• Provide some degree of portability.
• Extend networks beyond the limits of physical connectivity.
47
Wireless connectivity can be useful specially for :-
• Network users who are constantly on the move.
• Isolated areas and buildings.
• Departments in which the physical setting changes frequently and un-
predictably.
• Structures, such as historic buildings, to installing cabling become chal-
lenges.
Types of Wireless Networks
• Wireless networks can be divided into three categories based on their tech-
nology it used:
- LANs
- Extended LANs
- Mobile computing
48
Wireless LANs and extended LANs
• Except for the it media used, a typical wireless network operates al-
most like a cabled network.
• For instance, since Wireless network interface card with a trans-
ceiver is installed in each computer, users communicate with the
49
Access Points
50
Transmission Techniques
I. Infrared transmission
II. Laser transmission
III. Narrowband (single-frequency) radio transmission
IV. Spread-spectrum radio transmission
Infrared Transmission - All infrared wireless networks oper-
ate by using an infrared light beam to carry the data between
devices.
• The following figure shows a laptop computer using an in-
frared light beam to send data to a printer. 51
• An infrared network can normally broadcast 10 Mbps.
52
There are three types of infrared networks:-
Line-of-sight networks:
– transmits only if the transmitter and receiver have a clear line of sight
b/n them.
Reflective networks:
• Any person or thing that breaks the laser beam will block
the transmission.
Narrowband (Single-Frequency) Radio Transmission
55
• Extended Wireless LANs
– uses wireless LAN bridge to connect networks up to 4.8 kilometers
apart.
• A wireless bridge
• is a wireless network component that offers an easy way to
link buildings without using cable. For more illustration look
the following:
56
Wireless mobile networks
Wireless mobile networks
Packet-radio communication.
signals
Satellite stations.
59
A microwave system consists :
61
advantage of Wireless network
62
UNDERSTANDING NETWORK ARCHITECTURE
Access Methods
• How a computer puts data onto the network cable and takes
data from the cable is called an access method.
• Once data is moving on the network, access methods help to
regulate the flow of network traffic.
• Multiple computers must share access to the cable that con-
nects them.
• If two computers put data in the cable at the same time, colli-
sion will be occurred.
63
•Collision occurs if two computers put data on
the cable at the same time
• By making sure that only one computer at a time
can put data on the network cable, access
methods ensure that the sending and receiving
of network data is an orderly process.
64
Major Access Methods
66
• Only when a computer "senses“ the cable is free i.e. there is
no traffic on the cable can it send data.
• Once the computer has transmitted data on the cable, no
other computer can transmit data until the original data has
reached its destination and the cable is free again.
• If two or more computers happen to send data at exactly the
same time, there will be a data collision.
• When that happens, the two computers stop transmitting for
a random period of time and then attempt to retransmit.
• Each computer determines its own waiting period.
67
(CSMA/CD) means:-
71
How Networks Send Data
• Data is broken down into small, manageable packets.
• Each wrapped with the essential information needed to
get it from its source to the correct destination.
• As you see below, a computer sending large amounts
of data causes other computers to wait while the data
is being moved.
72
There are two reasons why putting large chunks of
data on the cable at one time slows down the net-
work:-
• It monopolizes the network and make timely interac-
tion and communications impossible because one
computer is flooding the cable with data.
• The impact of retransmitting large units of data fur-
ther multiplies network traffic.
73
When the sending computer breaks the data
into packets, it adds special control informa-
tion to each frame. This makes it possible to:-
• Send the original, disassembled data in small
chunks.
• Reassemble the data in the proper order when
it reaches its destination.
• Check the data for errors after it has been re-
assembled.
74
Packet Structure
Packets can contain several types of data
including:
• Data to be sent.
• A source address that identifies the sending
computer.
• A destination address that identifies the recip-
ient.
• Flow, congestion control information.
• Error-checking information to ensure that the
data arrives correctly.
75
Packet components grouped into three sections:
header, data, and trailer.
The header includes:-
77
2 - In Figure-b, the computer next breaks the
large print job into packets.
• Each packet contains the destination address,
the source address, the data, and control in-
formation.
78
3- In Figure-c, the network interface card (NIC)
in each computer examines the receiver's ad-
dress on all packets sent on its segment of the
network.
79
4 - In Figure-d, the destination computer is the print
server.
• The packets enter through the cable into the NIC.
80
5 - The network software processes the frame
stored in the NIC's receive buffer.
6- In Figure-e, the network operating system in the
receiving computer reassembles the packets
back into the original text file and moves the file
into the computer's memory.
• From there the file is sent to the printer.
81