0% found this document useful (0 votes)
4 views

Chapter 2

Uploaded by

mayalencho13
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views

Chapter 2

Uploaded by

mayalencho13
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 81

CHAPTER TWO

NETWORK CONFIGURATION

Data Communication and computer network


1
Ambo University
NETWORK CONFIGURATION
• In general, all networks have certain components,
functions, and features in common, as shown be-
low.

2
 These includes:-
• Servers—Computers that provide shared resources to network
users.
• Clients/workstations—Computers that access shared network re-
sources provided by a server.
• Media—The wires that make the physical connections.
• Shared data—Files provided to clients by servers across the net-
work.
• Shared printers and other peripherals—Additional resources pro-
vided by servers.
• Resources—Any service or device, such as files, printers, or other
items, made available for use by members of the network.
3
 The type of network you planed / choose
to implement will depend on some factors
such as:
– Size of the organization.
– Level of security required.
– Type of business.
– Level of administrative support available.
– Amount of network traffic.
– Needs of the network users.

4
 Networks are divided into two broad categories, as
shown below:
• Peer-to-peer networks
• Server-based networks
– each type has different capabilities.
 The difference between peer-to-peer and server-
based networks.

5
Peer-to-Peer Networks
 In a peer-to-peer network:-

• There are no dedicated servers.


• There is no hierarchy among the computers.
• All the computers are equal and therefore are
known as peers.
• Each computer functions as both a client and a
server.
• There is no administrator responsible for the en-
tire network.
• The user at each computer determines what data
on that computer is shared on the network. 6
• Peer-to-peer network computers act as both clients
and servers.

7
 Size

• Peer-to-peer networks are also called work-


groups.
• The term "workgroup" implies a small group of
people.
• In a peer-to-peer network there are 10 or fewer
computers
 Cost

• Peer-to-peer networks are relatively simple.


 no need for a powerful central server.

• So, it can be less expensive than server-based8


 Operating Systems
• In a peer-to-peer network:
 networking software does not require, so it has
the same standard of performance and
level of security
• Peer-to-peer networking is built into many operating systems.
 Implementation
• Implementation of a peer-to-peer network offers the follow-
ing advantages:-
• Computers are located at users' desks.
• Users act as their own administrators and plan their own
security.
• Computers in the network are connected by a simple, eas-
ily visible cabling system.
9
Where a Peer-to-Peer Network Is Appropri-
ate
 A network planner needs to address /consider before choosing which type of
network is appropriate to implement.
1- Administration

– Network administration tasks include:-


 Managing users and security.
 Making resources available.
 Maintaining applications and data.
 Installing and upgrading application and operating system software.

In a typical peer-to-peer network, no system manager oversees administration for


the entire network. Instead, individual users administer their own computers.

10
2- Sharing Resources
• All users can share any of their resources in any
manner they choose.
3- Security
• All peer-to-peer network users set their own se-
curity, and shared resources can exist on any
computer rather than on a centralized server
only.

11
 Peer-to-peer networks are a good choices than
a server-based for environments where:
– 10 users or fewer.
– Users share resources, such as files and
printers, but no specialized servers exist.
– Security is not an issue.
– The organization and the network will expe-
rience only limited growth within the near fu-
ture.

12
Server-Based Networks
• In an environment with more than 10 users, a peer-to-
peer will probably not be adequate.
• Therefore, most networks have/required dedicated
servers.
• A dedicated server is one that functions only as a
server and is not used as a client or workstation.

13
Specialized Servers
 Some of the examples of different types of servers
included on many large networks.
1-File Servers
• File servers offer services that allow network users
to share files.
• File services are the network applications that
store, retrieve, and move data.
• With network file services, users can exchange,
read, write, and manage shared files and the data
contained in them.
• File serves are designed specially to support the file
14
2- Print Servers
 The advent of networking represented a whole new level
of computer printing, because a network can:
• Allow users to share printers
• Allow us to place printers where convenient, not just
near individual computers
• Achieve better workstation performance by using high-
speed network data transfer, print, queues, and spooling
 Print services :-

• Manage and control printing on a network,


• Allowing multiple and simultaneous access to printing
15
facilities.
3- Database Servers
 Database server can provide a network with powerful
database services.
 Most database systems are client-server based.
 This means that the database applications run on two
separate components:
• The client -side of the application runs on the client,
providing an interface and handling less intensive func-
tions, such as data requests.
• The server-side of the application handles the inten-
sive performance of database operations.
• Server side application - runs on database servers,
managing the database, processing queries, and reply-
ing to clients. 16
4 - Application Servers
• Servers store vast amounts of data that is organized
to make it easy to retrieve.
• An application server differs from a file server.
• With a file server, the data or file is downloaded to
the computer which making the request.
• With an application server, the database /file stays
on the server and only the results of a request are
downloaded to the computer which making the re-
quest.
• A client application running locally accesses the data
on the application server. 17
5- Mail Servers
 Mail servers - separate server and client applications.
 Data selectively downloaded from the server to the
client.
6- Web Servers
 Stores different web pages.
7- Proxy Server
 A Proxy Server implements Internet connectivity and
network security for an entire organization.
 It is required to implement Internet connectivity to all
clients on a network.
• It is used as web cache server that improves network
response time and efficiency. 18
19
Advantages of Server-Based Net-
work
 Even if it is more complex to install, configure, and manage, a
server-based network has many advantages over a simple peer-
to-peer network.
 some of the advantages:

1. Sharing Resources
A server is designed to provide access to many files and
printers while maintaining performance and security for
the user.
Server-based data sharing can be centrally administered
and controlled.
20
2. Provide effective Security
• Security is the primary reason for choosing a server-
based approach network.
 One administrator who sets the policy and applies it to
every user on the network can manage security.
• The following figure depicts security being centrally admin-
istered.

21
3- Backup
• Backups can be scheduled several times a day or once a
week depending on the importance and value of the
data.
• Server backups can be scheduled to occur automatically,
according to a predetermined schedule.
4- Redundancy
• Through the use of backup methods known as redun-
dancy systems, the data on any server can be dupli-
cated and kept online.
5- Number of Users
22
Comparisons of Network Types

Peer-to-Peer Server-Based
Consideration
Network Network
Size Good for 10 or fewer Limited only by server
computers and network hardware

Security Security established by Extensive and consistent


the user of each com- resource and user secu-
puter rity

Administration Individual users respon- Centrally located for


sible for their own ad- network control; requires
ministration; no full-time at least one knowledge-
administrator necessary able administrator

23
NETWORK MEDIA

24
NETWORK MEDIA
 Cable Types

• Many cable types are available to meet the


varying needs and sizes of networks.
• Generally, there are three major groups of
cabling connect the majority of networks:-
1. Twisted-pair cable
2. Coaxial cable
3. Fiber-optic cable

25
Twisted-Pair Cable
 Twisted-pair cable
 consists of insulated strands of copper wire
twisted around each other.
 There are two type of twisted pair cable:-

• Unshielded twisted-pair cables (UTP cables)


• Shielded twisted-pair cables (STP cables)
 The total number of pairs in a cable varies.
 Twisting of the cables cancels out electrical
noise from adjacent pairs.
26
 Unshielded Twisted-Pair (UTP) Cable

• UTP is the most popular type of twisted-pair


cable.
• It is the most popular LAN cabling.
• The maximum cable length segment is 100 me-
ters.
• UTP specifications govern how many twists are
permitted per foot of cable.
• the number of twists allowed depends on the
purpose to which the cable will be put.
27
 There are 7 standards categories of UTP:-

• Category 1 - refers to traditional UTP telephone cable that carry voice but not
data transmissions.
• Category 2 - certifies UTP cable for data transmissions up to 4 megabits per second
(Mbps). It consists of four twisted pairs of copper wire.
• Category 3 - certifies UTP cable for data transmissions up to 16 Mbps. It consists of
four twisted pairs of copper wire with three twists per foot.
• Category 4 - certifies UTP cable for data transmissions up to 20 Mbps. It consists of
four twisted pairs of copper wire.
• Category 5 - certifies UTP cable for data transmissions up to 100 Mbps. It consists
of four twisted pairs of copper wire.
• Category 5e - Improved version of cat 5 category. The bandwidth is 1000MBPS.

• Category 6 Similar to CAT5 wire, but contains a physical separator between the 4
pairs to further reduce electromagnetic interference.
28
• UTP is particularly susceptible to crosstalk.
 Greater number of twists per foot of cable, the
more effective the protection against crosstalk.

• Crosstalk occurs when signals from one line


bleed into another line
29
 UTP advantages

– It is familiar technology.
– It is relatively inexpensive and easy to install.
– Most LAN systems are readily capable of
running over UTP.
 UTP disadvantages

– UTP is potentially more sensitive to external


electromagnetic interference, crosstalk, and
attenuation than other media.

30
Shielded Twisted-Pair (STP) Cable
• STP cable uses a wounded copper-braid jacket that
is more protective and of a higher quality.

STP advantage
• Provides better performance than UTP in environments with:-
- high noise levels
- high levels of unwanted electrical signals.
STP disadvantage
– It is more labor-intensive than UTP to install.
– Not all LAN systems work readily over STP.
31
 Twisted-Pair Cabling Components
• Connection hardware -Twisted-pair cabling uses
RJ-45 telephone connectors to connect to a com-
puter.

• Distribution racks and rack shelves –


•Using it is a good way to organize a network that
has a lot of connections.
•Expandable patch panels -transmission speeds of
up to 100 Mbps. 32
33
Coaxial Cable
• It consists of a core of copper wire surrounded by
insulation, a braided metal shielding, and an outer
cover.

34
• The core of a coaxial cable carries the electronic
signals that make up the data.
• Surrounding the core is a dielectric insulating
layer that separates it from the wire mesh.
• The wire mesh acts as a ground and protects
the core from electrical noise and crosstalk.
• A non-conducting outer shield—usually made of
rubber, Teflon, or plastic—surrounds the entire
cable.
• Coaxial cable is more resistant to interference
and attenuation than twisted-pair cabling. 35
Types of Coaxial Cable
 There are two types of coaxial cable:

• Thin (thinnet) cable


• Thick (thicknet) cable
 Thinnet Cable: is a flexible coaxial cable about 0.64
centimeters thick.
• Thinnet coaxial cable can carry a signal for a distance of
up to approximately 185 meters before the signal starts
to suffer from attenuation.
 Thicknet Cable: is a relatively rigid coaxial cable
about 1.27 centimeters in diameter.
• Thicknet cable can carry a signal for 500 meters.
36
 Coaxial-Cable Connection Hardware

• The BNC cable connector: The BNC cable con-


nector is either soldered or crimped to the end of a
cable.

37
• The BNC T connector: This connector joins the
network interface card (NIC) in the computer to
the network cable.

38
• The BNC barrel connector: This connector is
used to join two lengths of thinnet cable to make
one longer length.

•The BNC terminator: it closes each end of the


bus cable to absorb stray signals. Otherwise, the
signal will bounce and all network activity will
stop.

39
 Coaxial Cable Advantages

• It is less susceptible to interference than twisted-


pair cable.
• It can transmit data for greater distances .
• It can transmit voice, video, and data.
• Offer a familiar technology with reasonable data
security.
 Coaxial Cable Disadvantages

• There are many types of coaxial cables, each suited


for one, or at most, a small number of LAN systems.
• Due to its high metallic content, coaxial cable 40is
Fiber-Optic Cable
• It contains glass (or in some cases, plastic) fibers
rather than copper wire.
• Signals are transmitted across these fibers in the
form of light pulses rather than electrical pulses.
• Optical fiber strands are thin filaments of glass con-
sisting of an inner core and an outer cladding.
• The diameter of the core varies with the type of op-
tical fiber.
• Single-mode optical fiber has a core diameter of
approximately 8.5 µm.
41
Fibber optic (outdoor)
42
Fibber optic indoor
43
 Optical fiber advantages

• The bandwidth of optical fiber is greater than that of


twisted-pair or coaxial cable.
• Optical signals through glass encounter less loss than elec-
trical signals through copper.
• It has lower attenuation and higher bandwidth than cop-
per.
• Resist to electromagnetic interference since signal is sent as
light and not as electricity.
 Optical fiber disadvantage

• Conversions of light to electricity, more expensive electronics


are required .
• Requires specialized installation procedures. 44
WIRELESS NETWORK-
ING

45
Wireless Networking
• What is a wireless network?
• wireless network:
– a technology that enables two or more entities to
communicate without network cabling

46
Wireless Networking
• Most wireless networks consist of wireless components which communicat-
ing with a network that uses the cabling. Such like network types which
used a mixed- network component called a hybrid network.
 Wireless Network Capabilities
 Wireless networks is one of a network which attracting attention because of
wireless components can be:-
• Provide temporary connections to an existing network i.e. cabled net-
work.
• provide backup to an existing network.
• Provide some degree of portability.
• Extend networks beyond the limits of physical connectivity.

47
 Wireless connectivity can be useful specially for :-
• Network users who are constantly on the move.
• Isolated areas and buildings.
• Departments in which the physical setting changes frequently and un-
predictably.
• Structures, such as historic buildings, to installing cabling become chal-
lenges.
 Types of Wireless Networks
• Wireless networks can be divided into three categories based on their tech-
nology it used:
- LANs
- Extended LANs
- Mobile computing

48
 Wireless LANs and extended LANs

• use transmitters and receivers transmit signals .


• Mobile computing
• uses public carriers, such as long distance telephone companies,
along with local telephone companies and their public services, to
transmit and receive signals.
 Wireless LANs

• Except for the it media used, a typical wireless network operates al-
most like a cabled network.
• For instance, since Wireless network interface card with a trans-
ceiver is installed in each computer, users communicate with the
49
 Access Points

• Is the transceiver, which sometimes called an access point.


• broadcasts and receives signals to and from the surrounding
computers.
• wireless LANs use small wall-mounted transceivers/access
point to connect to the wired network.

50
 Transmission Techniques

• Wireless LANs use four techniques for transmitting data:-

I. Infrared transmission
II. Laser transmission
III. Narrowband (single-frequency) radio transmission
IV. Spread-spectrum radio transmission
Infrared Transmission - All infrared wireless networks oper-
ate by using an infrared light beam to carry the data between
devices.
• The following figure shows a laptop computer using an in-
frared light beam to send data to a printer. 51
• An infrared network can normally broadcast 10 Mbps.

52
 There are three types of infrared networks:-
 Line-of-sight networks:
– transmits only if the transmitter and receiver have a clear line of sight
b/n them.

 Scatter infrared networks:


– broadcast transmissions are bounced off walls and ceilings and hit the
receiver.
– They are effective within an area limited to about 30.5 meters (100
feet).

 Reflective networks:

– Optical transceivers are placed near the computers to redirects the

transmissions to the appropriate computer. 53


 Laser Transmission –

• is similar to infrared technology


 It requires a direct line of sight.

• Any person or thing that breaks the laser beam will block
the transmission.
 Narrowband (Single-Frequency) Radio Transmission

• is similar to broadcasting from a radio station.


 the user tunes both the transmitter and the receiver to a cer-
tain frequency.
• it broadcast at 3000 meters range.
• Transmission data is in the 4.8 Mbps range. 54
Spread-Spectrum Radio Transmission
– broadcasts signals over a range of frequencies.
– Is used to avoid narrowband communication problems.

• IN Spread-Spectrum Radio Transmission


– the available frequencies are divided into channels,
known as hops.

55
• Extended Wireless LANs
– uses wireless LAN bridge to connect networks up to 4.8 kilometers
apart.

• A wireless bridge
• is a wireless network component that offers an easy way to
link buildings without using cable. For more illustration look
the following:

56
Wireless mobile networks
 Wireless mobile networks

– use telephone carriers and public services such as:

Packet-radio communication.

Cellular networks. to transmit and receive

signals
Satellite stations.

– Its transmission rates range from 8 Kbps to 19.2 Kbps.

– It uses wireless adapters that use cellular-telephone technology to


connect portable computers with the cabled network.
57
• Portable computers use small antennas to communicate with radio
• Satellites in the earth orbit pick up low-powered signals
from portable and mobile networked devices.
• This system breaks a transmission into packets .
• A packet is a unit of information transmitted as a whole from
one device to another on a network.
• The packets are similar to other network packets. They in-
clude:-
- source address.
- destination address.
- Error-correction information
58
• Microwave systems
• are a good choice for interconnecting buildings in small,
short-distance systems like a campus or in an industrial park.
Satellite Stations

59
 A microwave system consists :

– Two radio transceivers:


• one to generate (transmitting station) and one to re-
ceive (receiving station) the broadcast.
– Two directional antennas:
• pointed at each other to implement communication of
the signals broadcast by the transceivers.
• These antennas are often installed on towers to give
them more range and to raise them above anything
that might block their signals.
60
• Physical appearance of Satellite and Satellite Dish

61
 advantage of Wireless network

• It can be used in situations where it is difficult or impossible


to install cable.
 Disadvantages of Wireless network

• Is typically systems which are not able to meet the perfor-


mance demands of large or busy networks.
 Transmission can only occur over limited distances and at
limited bit rates.

62
UNDERSTANDING NETWORK ARCHITECTURE

 Access Methods

• How a computer puts data onto the network cable and takes
data from the cable is called an access method.
• Once data is moving on the network, access methods help to
regulate the flow of network traffic.
• Multiple computers must share access to the cable that con-
nects them.
• If two computers put data in the cable at the same time, colli-
sion will be occurred.

63
•Collision occurs if two computers put data on
the cable at the same time
• By making sure that only one computer at a time
can put data on the network cable, access
methods ensure that the sending and receiving
of network data is an orderly process.

64
Major Access Methods

 There is three methods designed to prevent simul-


taneous use of the network media. Such as:-
1. Carrier-sense multiple access methods with colli-
sion detection.
2. Carrier-sense multiple access methods with colli-
sion avoidance.
3. Token-passing methods that allow only a single op-
portunity to send data.
65
1 - Carrier-Sense Multiple Access with Collision Detection
(CSMA/CD).
• Using the method known as (CSMA/CD), each computer on
the network, checks the cable for network traffic.
• The following fig. illustrates when a computer can and can-
not transmit data.

66
• Only when a computer "senses“ the cable is free i.e. there is
no traffic on the cable can it send data.
• Once the computer has transmitted data on the cable, no
other computer can transmit data until the original data has
reached its destination and the cable is free again.
• If two or more computers happen to send data at exactly the
same time, there will be a data collision.
• When that happens, the two computers stop transmitting for
a random period of time and then attempt to retransmit.
• Each computer determines its own waiting period.
67
 (CSMA/CD) means:-

• Computers listen to or "sense" the cable (car-


rier-sense).
• Commonly, many computers on the network at-
tempt to transmit data (multiple access).
• Each one first listens to detect any possible colli-
sions.
• If a computer detects a possible collision, it waits
for a random period of time before retransmitting
(collision detection).
• The collision-detection capability is the parame-
68
 CSMA/CD Considerations

• The more computers there are on the network,


the more network traffic there will be.
• With more traffic, collision avoidance and colli-
sions tend to increase, which slows the network
down, so CSMA/CD can be a slow-access
method.
 The occurrence of this problem depends on:-

• The number of users attempting to use the


network.
• applications they are using. 69
2 - Carrier-Sense Multiple Access with Colli-
sion Avoidance (CSMA/CA).
• In CSMA/CA, each computer signals its intent to
transmit before it actually transmits data.
• In this way, computers sense when a collision
might occur; this allows them to avoid transmis-
sion collisions.
• Unfortunately, broadcasting the intent to trans-
mit data increases the amount of traffic on the
cable and slows down network performance.
3 - Token-Passing Access Method
• A special type of packet, called a token, circu-
70
• Here the server takes control of the free token
on the ring and sends data to the computer with
the address 400080865402.

71
How Networks Send Data
• Data is broken down into small, manageable packets.
• Each wrapped with the essential information needed to
get it from its source to the correct destination.
• As you see below, a computer sending large amounts
of data causes other computers to wait while the data
is being moved.

72
 There are two reasons why putting large chunks of
data on the cable at one time slows down the net-
work:-
• It monopolizes the network and make timely interac-
tion and communications impossible because one
computer is flooding the cable with data.
• The impact of retransmitting large units of data fur-
ther multiplies network traffic.

73
 When the sending computer breaks the data
into packets, it adds special control informa-
tion to each frame. This makes it possible to:-
• Send the original, disassembled data in small
chunks.
• Reassemble the data in the proper order when
it reaches its destination.
• Check the data for errors after it has been re-
assembled.

74
Packet Structure
 Packets can contain several types of data
including:
• Data to be sent.
• A source address that identifies the sending
computer.
• A destination address that identifies the recip-
ient.
• Flow, congestion control information.
• Error-checking information to ensure that the
data arrives correctly.
75
 Packet components grouped into three sections:
header, data, and trailer.
 The header includes:-

• An alert signal to indicate that the packet is be-


ing transmitted.
• The source address.
• The destination address.
• Clock information to synchronize transmission.
 The actual data being sent.

• It varies in size (from 0.5 kilobytes (KB)—to 4


KB). 76
 Example: Packets in Printing

• The following example illustrates, step-by-step,


how packets are used in network communica-
tions.
• A large print job must be sent from a computer
to a print server.
1 - In Figure-a, the sending computer establishes
a connection with the print server.

77
2 - In Figure-b, the computer next breaks the
large print job into packets.
• Each packet contains the destination address,
the source address, the data, and control in-
formation.

78
3- In Figure-c, the network interface card (NIC)
in each computer examines the receiver's ad-
dress on all packets sent on its segment of the
network.

79
4 - In Figure-d, the destination computer is the print
server.
• The packets enter through the cable into the NIC.

80
5 - The network software processes the frame
stored in the NIC's receive buffer.
6- In Figure-e, the network operating system in the
receiving computer reassembles the packets
back into the original text file and moves the file
into the computer's memory.
• From there the file is sent to the printer.

81

You might also like