0% found this document useful (0 votes)
10 views81 pages

Chapter 2

Uploaded by

mayalencho13
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views81 pages

Chapter 2

Uploaded by

mayalencho13
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 81

CHAPTER TWO

NETWORK CONFIGURATION

Data Communication and computer network


1
Ambo University
NETWORK CONFIGURATION
• In general, all networks have certain components,
functions, and features in common, as shown be-
low.

2
 These includes:-
• Servers—Computers that provide shared resources to network
users.
• Clients/workstations—Computers that access shared network re-
sources provided by a server.
• Media—The wires that make the physical connections.
• Shared data—Files provided to clients by servers across the net-
work.
• Shared printers and other peripherals—Additional resources pro-
vided by servers.
• Resources—Any service or device, such as files, printers, or other
items, made available for use by members of the network.
3
 The type of network you planed / choose
to implement will depend on some factors
such as:
– Size of the organization.
– Level of security required.
– Type of business.
– Level of administrative support available.
– Amount of network traffic.
– Needs of the network users.

4
 Networks are divided into two broad categories, as
shown below:
• Peer-to-peer networks
• Server-based networks
– each type has different capabilities.
 The difference between peer-to-peer and server-
based networks.

5
Peer-to-Peer Networks
 In a peer-to-peer network:-

• There are no dedicated servers.


• There is no hierarchy among the computers.
• All the computers are equal and therefore are
known as peers.
• Each computer functions as both a client and a
server.
• There is no administrator responsible for the en-
tire network.
• The user at each computer determines what data
on that computer is shared on the network. 6
• Peer-to-peer network computers act as both clients
and servers.

7
 Size

• Peer-to-peer networks are also called work-


groups.
• The term "workgroup" implies a small group of
people.
• In a peer-to-peer network there are 10 or fewer
computers
 Cost

• Peer-to-peer networks are relatively simple.


 no need for a powerful central server.

• So, it can be less expensive than server-based8


 Operating Systems
• In a peer-to-peer network:
 networking software does not require, so it has
the same standard of performance and
level of security
• Peer-to-peer networking is built into many operating systems.
 Implementation
• Implementation of a peer-to-peer network offers the follow-
ing advantages:-
• Computers are located at users' desks.
• Users act as their own administrators and plan their own
security.
• Computers in the network are connected by a simple, eas-
ily visible cabling system.
9
Where a Peer-to-Peer Network Is Appropri-
ate
 A network planner needs to address /consider before choosing which type of
network is appropriate to implement.
1- Administration

– Network administration tasks include:-


 Managing users and security.
 Making resources available.
 Maintaining applications and data.
 Installing and upgrading application and operating system software.

In a typical peer-to-peer network, no system manager oversees administration for


the entire network. Instead, individual users administer their own computers.

10
2- Sharing Resources
• All users can share any of their resources in any
manner they choose.
3- Security
• All peer-to-peer network users set their own se-
curity, and shared resources can exist on any
computer rather than on a centralized server
only.

11
 Peer-to-peer networks are a good choices than
a server-based for environments where:
– 10 users or fewer.
– Users share resources, such as files and
printers, but no specialized servers exist.
– Security is not an issue.
– The organization and the network will expe-
rience only limited growth within the near fu-
ture.

12
Server-Based Networks
• In an environment with more than 10 users, a peer-to-
peer will probably not be adequate.
• Therefore, most networks have/required dedicated
servers.
• A dedicated server is one that functions only as a
server and is not used as a client or workstation.

13
Specialized Servers
 Some of the examples of different types of servers
included on many large networks.
1-File Servers
• File servers offer services that allow network users
to share files.
• File services are the network applications that
store, retrieve, and move data.
• With network file services, users can exchange,
read, write, and manage shared files and the data
contained in them.
• File serves are designed specially to support the file
14
2- Print Servers
 The advent of networking represented a whole new level
of computer printing, because a network can:
• Allow users to share printers
• Allow us to place printers where convenient, not just
near individual computers
• Achieve better workstation performance by using high-
speed network data transfer, print, queues, and spooling
 Print services :-

• Manage and control printing on a network,


• Allowing multiple and simultaneous access to printing
15
facilities.
3- Database Servers
 Database server can provide a network with powerful
database services.
 Most database systems are client-server based.
 This means that the database applications run on two
separate components:
• The client -side of the application runs on the client,
providing an interface and handling less intensive func-
tions, such as data requests.
• The server-side of the application handles the inten-
sive performance of database operations.
• Server side application - runs on database servers,
managing the database, processing queries, and reply-
ing to clients. 16
4 - Application Servers
• Servers store vast amounts of data that is organized
to make it easy to retrieve.
• An application server differs from a file server.
• With a file server, the data or file is downloaded to
the computer which making the request.
• With an application server, the database /file stays
on the server and only the results of a request are
downloaded to the computer which making the re-
quest.
• A client application running locally accesses the data
on the application server. 17
5- Mail Servers
 Mail servers - separate server and client applications.
 Data selectively downloaded from the server to the
client.
6- Web Servers
 Stores different web pages.
7- Proxy Server
 A Proxy Server implements Internet connectivity and
network security for an entire organization.
 It is required to implement Internet connectivity to all
clients on a network.
• It is used as web cache server that improves network
response time and efficiency. 18
19
Advantages of Server-Based Net-
work
 Even if it is more complex to install, configure, and manage, a
server-based network has many advantages over a simple peer-
to-peer network.
 some of the advantages:

1. Sharing Resources
A server is designed to provide access to many files and
printers while maintaining performance and security for
the user.
Server-based data sharing can be centrally administered
and controlled.
20
2. Provide effective Security
• Security is the primary reason for choosing a server-
based approach network.
 One administrator who sets the policy and applies it to
every user on the network can manage security.
• The following figure depicts security being centrally admin-
istered.

21
3- Backup
• Backups can be scheduled several times a day or once a
week depending on the importance and value of the
data.
• Server backups can be scheduled to occur automatically,
according to a predetermined schedule.
4- Redundancy
• Through the use of backup methods known as redun-
dancy systems, the data on any server can be dupli-
cated and kept online.
5- Number of Users
22
Comparisons of Network Types

Peer-to-Peer Server-Based
Consideration
Network Network
Size Good for 10 or fewer Limited only by server
computers and network hardware

Security Security established by Extensive and consistent


the user of each com- resource and user secu-
puter rity

Administration Individual users respon- Centrally located for


sible for their own ad- network control; requires
ministration; no full-time at least one knowledge-
administrator necessary able administrator

23
NETWORK MEDIA

24
NETWORK MEDIA
 Cable Types

• Many cable types are available to meet the


varying needs and sizes of networks.
• Generally, there are three major groups of
cabling connect the majority of networks:-
1. Twisted-pair cable
2. Coaxial cable
3. Fiber-optic cable

25
Twisted-Pair Cable
 Twisted-pair cable
 consists of insulated strands of copper wire
twisted around each other.
 There are two type of twisted pair cable:-

• Unshielded twisted-pair cables (UTP cables)


• Shielded twisted-pair cables (STP cables)
 The total number of pairs in a cable varies.
 Twisting of the cables cancels out electrical
noise from adjacent pairs.
26
 Unshielded Twisted-Pair (UTP) Cable

• UTP is the most popular type of twisted-pair


cable.
• It is the most popular LAN cabling.
• The maximum cable length segment is 100 me-
ters.
• UTP specifications govern how many twists are
permitted per foot of cable.
• the number of twists allowed depends on the
purpose to which the cable will be put.
27
 There are 7 standards categories of UTP:-

• Category 1 - refers to traditional UTP telephone cable that carry voice but not
data transmissions.
• Category 2 - certifies UTP cable for data transmissions up to 4 megabits per second
(Mbps). It consists of four twisted pairs of copper wire.
• Category 3 - certifies UTP cable for data transmissions up to 16 Mbps. It consists of
four twisted pairs of copper wire with three twists per foot.
• Category 4 - certifies UTP cable for data transmissions up to 20 Mbps. It consists of
four twisted pairs of copper wire.
• Category 5 - certifies UTP cable for data transmissions up to 100 Mbps. It consists
of four twisted pairs of copper wire.
• Category 5e - Improved version of cat 5 category. The bandwidth is 1000MBPS.

• Category 6 Similar to CAT5 wire, but contains a physical separator between the 4
pairs to further reduce electromagnetic interference.
28
• UTP is particularly susceptible to crosstalk.
 Greater number of twists per foot of cable, the
more effective the protection against crosstalk.

• Crosstalk occurs when signals from one line


bleed into another line
29
 UTP advantages

– It is familiar technology.
– It is relatively inexpensive and easy to install.
– Most LAN systems are readily capable of
running over UTP.
 UTP disadvantages

– UTP is potentially more sensitive to external


electromagnetic interference, crosstalk, and
attenuation than other media.

30
Shielded Twisted-Pair (STP) Cable
• STP cable uses a wounded copper-braid jacket that
is more protective and of a higher quality.

STP advantage
• Provides better performance than UTP in environments with:-
- high noise levels
- high levels of unwanted electrical signals.
STP disadvantage
– It is more labor-intensive than UTP to install.
– Not all LAN systems work readily over STP.
31
 Twisted-Pair Cabling Components
• Connection hardware -Twisted-pair cabling uses
RJ-45 telephone connectors to connect to a com-
puter.

• Distribution racks and rack shelves –


•Using it is a good way to organize a network that
has a lot of connections.
•Expandable patch panels -transmission speeds of
up to 100 Mbps. 32
33
Coaxial Cable
• It consists of a core of copper wire surrounded by
insulation, a braided metal shielding, and an outer
cover.

34
• The core of a coaxial cable carries the electronic
signals that make up the data.
• Surrounding the core is a dielectric insulating
layer that separates it from the wire mesh.
• The wire mesh acts as a ground and protects
the core from electrical noise and crosstalk.
• A non-conducting outer shield—usually made of
rubber, Teflon, or plastic—surrounds the entire
cable.
• Coaxial cable is more resistant to interference
and attenuation than twisted-pair cabling. 35
Types of Coaxial Cable
 There are two types of coaxial cable:

• Thin (thinnet) cable


• Thick (thicknet) cable
 Thinnet Cable: is a flexible coaxial cable about 0.64
centimeters thick.
• Thinnet coaxial cable can carry a signal for a distance of
up to approximately 185 meters before the signal starts
to suffer from attenuation.
 Thicknet Cable: is a relatively rigid coaxial cable
about 1.27 centimeters in diameter.
• Thicknet cable can carry a signal for 500 meters.
36
 Coaxial-Cable Connection Hardware

• The BNC cable connector: The BNC cable con-


nector is either soldered or crimped to the end of a
cable.

37
• The BNC T connector: This connector joins the
network interface card (NIC) in the computer to
the network cable.

38
• The BNC barrel connector: This connector is
used to join two lengths of thinnet cable to make
one longer length.

•The BNC terminator: it closes each end of the


bus cable to absorb stray signals. Otherwise, the
signal will bounce and all network activity will
stop.

39
 Coaxial Cable Advantages

• It is less susceptible to interference than twisted-


pair cable.
• It can transmit data for greater distances .
• It can transmit voice, video, and data.
• Offer a familiar technology with reasonable data
security.
 Coaxial Cable Disadvantages

• There are many types of coaxial cables, each suited


for one, or at most, a small number of LAN systems.
• Due to its high metallic content, coaxial cable 40is
Fiber-Optic Cable
• It contains glass (or in some cases, plastic) fibers
rather than copper wire.
• Signals are transmitted across these fibers in the
form of light pulses rather than electrical pulses.
• Optical fiber strands are thin filaments of glass con-
sisting of an inner core and an outer cladding.
• The diameter of the core varies with the type of op-
tical fiber.
• Single-mode optical fiber has a core diameter of
approximately 8.5 µm.
41
Fibber optic (outdoor)
42
Fibber optic indoor
43
 Optical fiber advantages

• The bandwidth of optical fiber is greater than that of


twisted-pair or coaxial cable.
• Optical signals through glass encounter less loss than elec-
trical signals through copper.
• It has lower attenuation and higher bandwidth than cop-
per.
• Resist to electromagnetic interference since signal is sent as
light and not as electricity.
 Optical fiber disadvantage

• Conversions of light to electricity, more expensive electronics


are required .
• Requires specialized installation procedures. 44
WIRELESS NETWORK-
ING

45
Wireless Networking
• What is a wireless network?
• wireless network:
– a technology that enables two or more entities to
communicate without network cabling

46
Wireless Networking
• Most wireless networks consist of wireless components which communicat-
ing with a network that uses the cabling. Such like network types which
used a mixed- network component called a hybrid network.
 Wireless Network Capabilities
 Wireless networks is one of a network which attracting attention because of
wireless components can be:-
• Provide temporary connections to an existing network i.e. cabled net-
work.
• provide backup to an existing network.
• Provide some degree of portability.
• Extend networks beyond the limits of physical connectivity.

47
 Wireless connectivity can be useful specially for :-
• Network users who are constantly on the move.
• Isolated areas and buildings.
• Departments in which the physical setting changes frequently and un-
predictably.
• Structures, such as historic buildings, to installing cabling become chal-
lenges.
 Types of Wireless Networks
• Wireless networks can be divided into three categories based on their tech-
nology it used:
- LANs
- Extended LANs
- Mobile computing

48
 Wireless LANs and extended LANs

• use transmitters and receivers transmit signals .


• Mobile computing
• uses public carriers, such as long distance telephone companies,
along with local telephone companies and their public services, to
transmit and receive signals.
 Wireless LANs

• Except for the it media used, a typical wireless network operates al-
most like a cabled network.
• For instance, since Wireless network interface card with a trans-
ceiver is installed in each computer, users communicate with the
49
 Access Points

• Is the transceiver, which sometimes called an access point.


• broadcasts and receives signals to and from the surrounding
computers.
• wireless LANs use small wall-mounted transceivers/access
point to connect to the wired network.

50
 Transmission Techniques

• Wireless LANs use four techniques for transmitting data:-

I. Infrared transmission
II. Laser transmission
III. Narrowband (single-frequency) radio transmission
IV. Spread-spectrum radio transmission
Infrared Transmission - All infrared wireless networks oper-
ate by using an infrared light beam to carry the data between
devices.
• The following figure shows a laptop computer using an in-
frared light beam to send data to a printer. 51
• An infrared network can normally broadcast 10 Mbps.

52
 There are three types of infrared networks:-
 Line-of-sight networks:
– transmits only if the transmitter and receiver have a clear line of sight
b/n them.

 Scatter infrared networks:


– broadcast transmissions are bounced off walls and ceilings and hit the
receiver.
– They are effective within an area limited to about 30.5 meters (100
feet).

 Reflective networks:

– Optical transceivers are placed near the computers to redirects the

transmissions to the appropriate computer. 53


 Laser Transmission –

• is similar to infrared technology


 It requires a direct line of sight.

• Any person or thing that breaks the laser beam will block
the transmission.
 Narrowband (Single-Frequency) Radio Transmission

• is similar to broadcasting from a radio station.


 the user tunes both the transmitter and the receiver to a cer-
tain frequency.
• it broadcast at 3000 meters range.
• Transmission data is in the 4.8 Mbps range. 54
Spread-Spectrum Radio Transmission
– broadcasts signals over a range of frequencies.
– Is used to avoid narrowband communication problems.

• IN Spread-Spectrum Radio Transmission


– the available frequencies are divided into channels,
known as hops.

55
• Extended Wireless LANs
– uses wireless LAN bridge to connect networks up to 4.8 kilometers
apart.

• A wireless bridge
• is a wireless network component that offers an easy way to
link buildings without using cable. For more illustration look
the following:

56
Wireless mobile networks
 Wireless mobile networks

– use telephone carriers and public services such as:

Packet-radio communication.

Cellular networks. to transmit and receive

signals
Satellite stations.

– Its transmission rates range from 8 Kbps to 19.2 Kbps.

– It uses wireless adapters that use cellular-telephone technology to


connect portable computers with the cabled network.
57
• Portable computers use small antennas to communicate with radio
• Satellites in the earth orbit pick up low-powered signals
from portable and mobile networked devices.
• This system breaks a transmission into packets .
• A packet is a unit of information transmitted as a whole from
one device to another on a network.
• The packets are similar to other network packets. They in-
clude:-
- source address.
- destination address.
- Error-correction information
58
• Microwave systems
• are a good choice for interconnecting buildings in small,
short-distance systems like a campus or in an industrial park.
Satellite Stations

59
 A microwave system consists :

– Two radio transceivers:


• one to generate (transmitting station) and one to re-
ceive (receiving station) the broadcast.
– Two directional antennas:
• pointed at each other to implement communication of
the signals broadcast by the transceivers.
• These antennas are often installed on towers to give
them more range and to raise them above anything
that might block their signals.
60
• Physical appearance of Satellite and Satellite Dish

61
 advantage of Wireless network

• It can be used in situations where it is difficult or impossible


to install cable.
 Disadvantages of Wireless network

• Is typically systems which are not able to meet the perfor-


mance demands of large or busy networks.
 Transmission can only occur over limited distances and at
limited bit rates.

62
UNDERSTANDING NETWORK ARCHITECTURE

 Access Methods

• How a computer puts data onto the network cable and takes
data from the cable is called an access method.
• Once data is moving on the network, access methods help to
regulate the flow of network traffic.
• Multiple computers must share access to the cable that con-
nects them.
• If two computers put data in the cable at the same time, colli-
sion will be occurred.

63
•Collision occurs if two computers put data on
the cable at the same time
• By making sure that only one computer at a time
can put data on the network cable, access
methods ensure that the sending and receiving
of network data is an orderly process.

64
Major Access Methods

 There is three methods designed to prevent simul-


taneous use of the network media. Such as:-
1. Carrier-sense multiple access methods with colli-
sion detection.
2. Carrier-sense multiple access methods with colli-
sion avoidance.
3. Token-passing methods that allow only a single op-
portunity to send data.
65
1 - Carrier-Sense Multiple Access with Collision Detection
(CSMA/CD).
• Using the method known as (CSMA/CD), each computer on
the network, checks the cable for network traffic.
• The following fig. illustrates when a computer can and can-
not transmit data.

66
• Only when a computer "senses“ the cable is free i.e. there is
no traffic on the cable can it send data.
• Once the computer has transmitted data on the cable, no
other computer can transmit data until the original data has
reached its destination and the cable is free again.
• If two or more computers happen to send data at exactly the
same time, there will be a data collision.
• When that happens, the two computers stop transmitting for
a random period of time and then attempt to retransmit.
• Each computer determines its own waiting period.
67
 (CSMA/CD) means:-

• Computers listen to or "sense" the cable (car-


rier-sense).
• Commonly, many computers on the network at-
tempt to transmit data (multiple access).
• Each one first listens to detect any possible colli-
sions.
• If a computer detects a possible collision, it waits
for a random period of time before retransmitting
(collision detection).
• The collision-detection capability is the parame-
68
 CSMA/CD Considerations

• The more computers there are on the network,


the more network traffic there will be.
• With more traffic, collision avoidance and colli-
sions tend to increase, which slows the network
down, so CSMA/CD can be a slow-access
method.
 The occurrence of this problem depends on:-

• The number of users attempting to use the


network.
• applications they are using. 69
2 - Carrier-Sense Multiple Access with Colli-
sion Avoidance (CSMA/CA).
• In CSMA/CA, each computer signals its intent to
transmit before it actually transmits data.
• In this way, computers sense when a collision
might occur; this allows them to avoid transmis-
sion collisions.
• Unfortunately, broadcasting the intent to trans-
mit data increases the amount of traffic on the
cable and slows down network performance.
3 - Token-Passing Access Method
• A special type of packet, called a token, circu-
70
• Here the server takes control of the free token
on the ring and sends data to the computer with
the address 400080865402.

71
How Networks Send Data
• Data is broken down into small, manageable packets.
• Each wrapped with the essential information needed to
get it from its source to the correct destination.
• As you see below, a computer sending large amounts
of data causes other computers to wait while the data
is being moved.

72
 There are two reasons why putting large chunks of
data on the cable at one time slows down the net-
work:-
• It monopolizes the network and make timely interac-
tion and communications impossible because one
computer is flooding the cable with data.
• The impact of retransmitting large units of data fur-
ther multiplies network traffic.

73
 When the sending computer breaks the data
into packets, it adds special control informa-
tion to each frame. This makes it possible to:-
• Send the original, disassembled data in small
chunks.
• Reassemble the data in the proper order when
it reaches its destination.
• Check the data for errors after it has been re-
assembled.

74
Packet Structure
 Packets can contain several types of data
including:
• Data to be sent.
• A source address that identifies the sending
computer.
• A destination address that identifies the recip-
ient.
• Flow, congestion control information.
• Error-checking information to ensure that the
data arrives correctly.
75
 Packet components grouped into three sections:
header, data, and trailer.
 The header includes:-

• An alert signal to indicate that the packet is be-


ing transmitted.
• The source address.
• The destination address.
• Clock information to synchronize transmission.
 The actual data being sent.

• It varies in size (from 0.5 kilobytes (KB)—to 4


KB). 76
 Example: Packets in Printing

• The following example illustrates, step-by-step,


how packets are used in network communica-
tions.
• A large print job must be sent from a computer
to a print server.
1 - In Figure-a, the sending computer establishes
a connection with the print server.

77
2 - In Figure-b, the computer next breaks the
large print job into packets.
• Each packet contains the destination address,
the source address, the data, and control in-
formation.

78
3- In Figure-c, the network interface card (NIC)
in each computer examines the receiver's ad-
dress on all packets sent on its segment of the
network.

79
4 - In Figure-d, the destination computer is the print
server.
• The packets enter through the cable into the NIC.

80
5 - The network software processes the frame
stored in the NIC's receive buffer.
6- In Figure-e, the network operating system in the
receiving computer reassembles the packets
back into the original text file and moves the file
into the computer's memory.
• From there the file is sent to the printer.

81

You might also like