2. Network Definition
▣ Set of technologies that connects computers
▣ Allows communication and collaboration
between users
3. The Uses of a Network
▣ Simultaneous access to data
◼Data files are shared
🢭 Access can be limited
◼Shared files stored on a server
◼Software can be shared
🢭 Site licenses
🢭 Network versions
🢭 Application servers
4. The Uses of a Network
▣ Shared peripheral device
◼Printers and faxes are common shares
◼Reduces the cost per user
◼Devices can be connected to the network
◼Print servers control network printing
🢭 Manage the print queue
6. The Uses of a Network
▣ Personal communication
◼Email
🢭 Instantaneous communication
◼Conferencing
🢭 Tele conferencing
🢭 Videoconferencing
🢭 Audio-conferencing
🢭 Data-conferencing
◼Voice over IP
🢭 Phone communication over network wires
8. The Uses of a Network
▣ Easier data backup
◼Backup copies data to removable media
◼Server data backed up in one step
9. Common Network Types
▣ Local Area Network (LAN)
◼Contains printers, servers and computers
◼Systems are close to each other
◼Contained in one office or building
◼Organizations often have several LANS
10. Common Network Types
▣ Wide Area Networks (WAN)
◼Two or more LANs connected
◼Over a large geographic area
◼Typically use public or leased lines
🢭 Phone lines
🢭 Satellite
◼The Internet is a WAN
11. Hybrid Network Types
▣ Campus Area Networks (CAN)
◼A LAN in one large geographic area
◼Resources related to the same organization
◼Each department shares the LAN
12. Hybrid Network Types
▣ Metropolitan Area Network (MAN)
◼Large network that connects different organizations
◼Shares regional resources
◼A network provider sells time
13. Hybrid Network Types
▣ Home Area Network (HAN)
◼Small scale network
◼Connects computers and entertainment appliances
◼Found mainly in the home
14. Hybrid Network Types
▣ Personal Area Network (PAN)
◼Very small scale network
◼Range is less than 2 meters
◼Cell phones, PDAs, MP3 players
15. How Networks Are Structured
▣ Server based network
◼Node is any network device
◼Servers control what the node accesses
◼Users gain access by logging in
◼Server is the most important computer
16. How Networks Are Structured
▣ Client/Server network
◼Nodes and servers share data roles
◼Nodes are called clients
◼Servers are used to control access
◼Database software
🢭 Access to data controlled by server
◼Server is the most important computer
17. How Networks Are Structured
▣ Peer to peer networks (P2PN)
◼All nodes are equal
◼Nodes access resources on other nodes
◼Each node controls its own resources
◼Most modern OS allow P2PN
◼Distributing computing is a form
◼Kazaa
18. Network Topologies
▣ Topology
◼Logical layout of wires and equipment
◼Choice affects
🢭 Network performance
🢭 Network size
🢭 Network collision detection
◼Several different types
19. Network Topologies
▣ Packets
◼Pieces of data transmitted over a network
🢭 Packets are created by sending node
🢭 Data is reassembled by receiving node
◼Packet header
🢭 Sending and receiving address
◼Packet payload
🢭 Number and size of data
🢭 Actual data
◼Packet error control
20. Network Topologies
▣ Bus topology
◼Also called linear bus
◼One wire connects all nodes
◼Terminator ends the wires
◼Advantages
🢭 Easy to setup
🢭 Small amount of wire
◼Disadvantages
🢭 Slow
🢭 Easy to crash
21. Network Topologies
▣ Star topology
◼All nodes connect to a hub
🢭 Packets sent to hub
🢭 Hub sends packet to destination
◼Advantages
🢭 Easy to setup
🢭 One cable can not crash network
◼Disadvantages
🢭 One hub crashing downs entire network
🢭 Uses lots of cable
◼Most common topology
23. Network Topologies
▣ Ring topology
◼Nodes connected in a circle
◼Tokens used to transmit data
🢭 Nodes must wait for token to send
◼Advantages
🢭 Time to send data is known
🢭 No data collisions
◼Disadvantages
🢭 Slow
🢭 Lots of cable
24. Network Topologies
▣ Mesh topology
◼All computers connected together
◼Internet is a mesh network
◼Advantage
🢭 Data will always be delivered
◼Disadvantages
🢭 Lots of cable
🢭 Hard to setup
27. Wire Based Media
▣ Twisted-pair cabling
◼Most common LAN
cable
◼Called Cat5 or
100BaseT
◼Four pairs of copper
cable twisted
◼May be shielded
from interference
◼Speeds range from
1 Mbps to 1,000
Mbps
28. Wire Based Media
▣ Coaxial cable
◼Similar to cable TV wire
◼One wire runs through cable
◼Shielded from interference
◼Speeds up to 10 Mbps
◼Nearly obsolete
29. Wire Based Media
▣ Fiber-optic cable
◼Data is transmitted
with light pulses
◼Glass strand instead
of cable
◼Immune to
interference
◼Very secure
◼Hard to work with
◼Speeds up to
100 Gbps
30. Wireless Media
▣ Data transmitted through the air
▣ LANs use radio waves
▣ WANs use microwave signals
▣ Easy to setup
▣ Difficult to secure
31. Network Hardware
▣ Network interface cards
◼Network adapter
◼Connects node to the media
◼Unique Machine Access Code (MAC)
32. Network Hardware
▣ Network linking devices
◼Connect nodes in the network
◼Cable runs from node to device
◼Crossover cable connects two computers
35. Network Hardware
▣ Bridge
◼Connects two or more LANs together
◼Packets sent to remote LAN cross
🢭 Other packets do not cross
◼Segments the network on MAC addresses
36. Network Hardware
▣ Router
◼Connects two or more LANs together
◼Packets sent to remote LAN cross
◼Network is segmented by IP address
◼Connect internal networks to the Internet
◼Need configured before installation
38. Network Cabling
▣ Cabling specifications
◼Bandwidth measures cable speed
🢭 Typically measured in Mbps
◼Maximum cable length
◼Connector describes the type of plug
39. Network Cabling
▣ Ethernet
◼Very popular cabling technology
◼10 Base T, 10Base2, 10Base5
◼Maximum bandwidth 10 Mbps
◼Maximum distances100 to 500 meters
40. Network Cabling
▣ Fast Ethernet
◼Newer version of Ethernet
◼Bandwidth is 100 Mbps
◼Uses Cat5 or greater cable
🢭 Sometimes called 100Base T
◼Requires a switch
41. Network Cabling
▣ Gigabit Ethernet
◼High bandwidth version of Ethernet
◼1 to 10 Gbps
◼Cat 5 or fiber optic cable
◼Video applications
42. Network Cabling
▣ Token ring
◼Uses shielded twisted pair cabling
◼Bandwidth between 10 and 25 Mbps
◼Uses a multiple access unit (MAU)
◼Popular in manufacturing and finance
43. Network Protocols
▣ Language of the network
◼Rules of communication
◼Error resolution
◼Defines collision and collision recovery
◼Size of packet
◼Naming rules for computers
44. Network Protocols
▣ TCP/IP
◼Transmission Control Protocol/Internet Protocol
◼Most popular protocol
◼Machines assigned a name of 4 numbers
🢭 IP address
🢭 209.8.166.179 is the White House’s web site
◼Dynamic Host Configuration Protocol
🢭 Simplifies assignment of IP addresses
◼Required for Internet access
49. Organizing Your Files and Directories
Searching & finding
Sharing
Security
Clarity
Preservation
Improves
50. Organizing Files & Directories
▣ Folders named for major
functions/activities
▣ Structure by date or event
(especially subfolders)
▣ Names should be self-
explanatory
▣ Avoid duplication
▣ Make it simple &
consistent
51. File Names
▣ Use descriptive names
▣ Not too long; CamelCase
▣ Try to include time
◼Date using YYYYMMDD
◼Use version numbers
▣ Don’t use spaces
◼May use “-” or “_”
▣ Don’t change default
extensions
52. File Naming and Directory Organizing
Astronomy Observatory Runs
Directory: source + date
Ex. September 2012 = sep12
Source: c40 = Las Campanas 40-inch
1
1
Sub-Directory: one directory for each night; n# (# for the number of the
night). Additional directories for “special” data, and log files that apply to
entire run.
2
2
Files: for each nightly directory, number sequentially starting
w/1001 (for night 1, first data frame), then for night two start with
2001, etc. The original raw data files are kept in a separate, read-
only directory.
3
3
54. Network Definition
▣ Set of technologies that connects computers
▣ Allows communication and collaboration
between users
55. The Uses of a Network
▣ Simultaneous access to data
◼Data files are shared
🢭 Access can be limited
◼Shared files stored on a server
◼Software can be shared
🢭 Site licenses
🢭 Network versions
🢭 Application servers
56. The Uses of a Network
▣ Shared peripheral device
◼Printers and faxes are common shares
◼Reduces the cost per user
◼Devices can be connected to the network
◼Print servers control network printing
🢭 Manage the print queue
58. The Uses of a Network
▣ Personal communication
◼Email
🢭 Instantaneous communication
◼Conferencing
🢭 Tele conferencing
🢭 Videoconferencing
🢭 Audio-conferencing
🢭 Data-conferencing
◼Voice over IP
🢭 Phone communication over network wires
60. The Uses of a Network
▣ Easier data backup
◼Backup copies data to removable media
◼Server data backed up in one step
61. Common Network Types
▣ Local Area Network (LAN)
◼Contains printers, servers and computers
◼Systems are close to each other
◼Contained in one office or building
◼Organizations often have several LANS
62. Common Network Types
▣ Wide Area Networks (WAN)
◼Two or more LANs connected
◼Over a large geographic area
◼Typically use public or leased lines
🢭 Phone lines
🢭 Satellite
◼The Internet is a WAN
63. Hybrid Network Types
▣ Campus Area Networks (CAN)
◼A LAN in one large geographic area
◼Resources related to the same organization
◼Each department shares the LAN
64. Hybrid Network Types
▣ Metropolitan Area Network (MAN)
◼Large network that connects different organizations
◼Shares regional resources
◼A network provider sells time
65. Hybrid Network Types
▣ Home Area Network (HAN)
◼Small scale network
◼Connects computers and entertainment appliances
◼Found mainly in the home
66. Hybrid Network Types
▣ Personal Area Network (PAN)
◼Very small scale network
◼Range is less than 2 meters
◼Cell phones, PDAs, MP3 players
67. How Networks Are Structured
▣ Server based network
◼Node is any network device
◼Servers control what the node accesses
◼Users gain access by logging in
◼Server is the most important computer
68. How Networks Are Structured
▣ Client/Server network
◼Nodes and servers share data roles
◼Nodes are called clients
◼Servers are used to control access
◼Database software
🢭 Access to data controlled by server
◼Server is the most important computer
69. How Networks Are Structured
▣ Peer to peer networks (P2PN)
◼All nodes are equal
◼Nodes access resources on other nodes
◼Each node controls its own resources
◼Most modern OS allow P2PN
◼Distributing computing is a form
◼Kazaa
70. Network Topologies
▣ Topology
◼Logical layout of wires and equipment
◼Choice affects
🢭 Network performance
🢭 Network size
🢭 Network collision detection
◼Several different types
71. Network Topologies
▣ Packets
◼Pieces of data transmitted over a network
🢭 Packets are created by sending node
🢭 Data is reassembled by receiving node
◼Packet header
🢭 Sending and receiving address
◼Packet payload
🢭 Number and size of data
🢭 Actual data
◼Packet error control
72. Network Topologies
▣ Bus topology
◼Also called linear bus
◼One wire connects all nodes
◼Terminator ends the wires
◼Advantages
🢭 Easy to setup
🢭 Small amount of wire
◼Disadvantages
🢭 Slow
🢭 Easy to crash
73. Network Topologies
▣ Star topology
◼All nodes connect to a hub
🢭 Packets sent to hub
🢭 Hub sends packet to destination
◼Advantages
🢭 Easy to setup
🢭 One cable can not crash network
◼Disadvantages
🢭 One hub crashing downs entire network
🢭 Uses lots of cable
◼Most common topology
75. Network Topologies
▣ Ring topology
◼Nodes connected in a circle
◼Tokens used to transmit data
🢭 Nodes must wait for token to send
◼Advantages
🢭 Time to send data is known
🢭 No data collisions
◼Disadvantages
🢭 Slow
🢭 Lots of cable
76. Network Topologies
▣ Mesh topology
◼All computers connected together
◼Internet is a mesh network
◼Advantage
🢭 Data will always be delivered
◼Disadvantages
🢭 Lots of cable
🢭 Hard to setup
79. Wire Based Media
▣ Twisted-pair cabling
◼Most common LAN
cable
◼Called Cat5 or
100BaseT
◼Four pairs of copper
cable twisted
◼May be shielded
from interference
◼Speeds range from
1 Mbps to 1,000
Mbps
80. Wire Based Media
▣ Coaxial cable
◼Similar to cable TV wire
◼One wire runs through cable
◼Shielded from interference
◼Speeds up to 10 Mbps
◼Nearly obsolete
81. Wire Based Media
▣ Fiber-optic cable
◼Data is transmitted
with light pulses
◼Glass strand instead
of cable
◼Immune to
interference
◼Very secure
◼Hard to work with
◼Speeds up to
100 Gbps
82. Wireless Media
▣ Data transmitted through the air
▣ LANs use radio waves
▣ WANs use microwave signals
▣ Easy to setup
▣ Difficult to secure
83. Network Hardware
▣ Network interface cards
◼Network adapter
◼Connects node to the media
◼Unique Machine Access Code (MAC)
84. Network Hardware
▣ Network linking devices
◼Connect nodes in the network
◼Cable runs from node to device
◼Crossover cable connects two computers
87. Network Hardware
▣ Bridge
◼Connects two or more LANs together
◼Packets sent to remote LAN cross
🢭 Other packets do not cross
◼Segments the network on MAC addresses
88. Network Hardware
▣ Router
◼Connects two or more LANs together
◼Packets sent to remote LAN cross
◼Network is segmented by IP address
◼Connect internal networks to the Internet
◼Need configured before installation
90. Network Cabling
▣ Cabling specifications
◼Bandwidth measures cable speed
🢭 Typically measured in Mbps
◼Maximum cable length
◼Connector describes the type of plug
91. Network Cabling
▣ Ethernet
◼Very popular cabling technology
◼10 Base T, 10Base2, 10Base5
◼Maximum bandwidth 10 Mbps
◼Maximum distances100 to 500 meters
92. Network Cabling
▣ Fast Ethernet
◼Newer version of Ethernet
◼Bandwidth is 100 Mbps
◼Uses Cat5 or greater cable
🢭 Sometimes called 100Base T
◼Requires a switch
93. Network Cabling
▣ Gigabit Ethernet
◼High bandwidth version of Ethernet
◼1 to 10 Gbps
◼Cat 5 or fiber optic cable
◼Video applications
94. Network Cabling
▣ Token ring
◼Uses shielded twisted pair cabling
◼Bandwidth between 10 and 25 Mbps
◼Uses a multiple access unit (MAU)
◼Popular in manufacturing and finance
95. Network Protocols
▣ Language of the network
◼Rules of communication
◼Error resolution
◼Defines collision and collision recovery
◼Size of packet
◼Naming rules for computers
96. Network Protocols
▣ TCP/IP
◼Transmission Control Protocol/Internet Protocol
◼Most popular protocol
◼Machines assigned a name of 4 numbers
🢭 IP address
🢭 209.8.166.179 is the White House’s web site
◼Dynamic Host Configuration Protocol
🢭 Simplifies assignment of IP addresses
◼Required for Internet access
99. Network Protocols
▣ Token ring
◼Popular in manufacturing and finance
◼Nodes communicate when they have the token
Editor's Notes
#3: Teaching Tip
Figure 9A.2 on page 342 visually describes the sharing process. It can be helpful to have students open a shared file that you control. Make a change then have the students open it again. Alternatively, share a document and allow your students to write in it. Then demonstrate how the shared document changes.
Spend time discussing why application servers need to be so powerful.
#4: Teaching tip
Figure 9A.4 on page 344 shows a print queue. It can be helpful to demonstrate your classroom queue.
#6: Teaching tip
It is fun if you can setup a teleconference in your classroom. Students get to learn how to join or create the conference. Additionally, they learn how to participate. Finally, students have fun, especially with shared whiteboards.
#8: Insider information
The text describes needing special software to back up data from user drives. However, the backup utility that comes with Windows 2000 and XP is capable of performing this chore.
#9: Teaching tip
Use a real world example to describe an organization with interconnected LANs.
#10: Teaching tip
Blockbuster Video uses a WAN to connect it’s stores nationwide. Customers from Pittsburgh may rent videos in Hilton Head. Late fees will even be displayed!
#12: Teaching tip
An example of a regional resource is a supercomputer. For example, Pittsburgh has the Pittsburgh Super Computing center (www.psc.edu). The various colleges in Pittsburgh connect to the center through a MAN in Pittsburgh.
#14: Insider information
PAN is very new. Few devices support PAN. High end cell phones include Bluetooth technology. Once the technology matures, Bluetooth will allow the creation of a PAN.
#15: Teaching tip
Spend a few minutes here discussing password policies. Describe why it is important not to give out a password. Also describe why longer, more complicated passwords are important.
#17: Teaching tip
Discuss how users managing their own security settings can be bad.
#18: Teaching tip
Discuss how your network topology handles collisions. If your students are technical, contrast this with an inferior topology.
#19: Teaching tip
For technical students take the time to draw the packet structure on the board. The typical structure is destination address | sending address | packet number | total packets | data size | payload | error control.
#20: Teaching tip
Pages 352 and 353 have diagrams of each network topology
#27: Insider information
Interference is usually electrical. Magnets, solar flares or electronic devices generate interference.
#29: Teaching tip
Remind students that bps is bits per second. Gbps then is billion bits per second.
#30: Teaching tip
Now is the time to briefly discuss 802.11 standards. A full discussion of 802.11 is covered in the next section.
#31: Insider Information
The Xerox Corporation controls the assignment of Ethernet addresses to NIC manufacturers.
#34: Insider information
Twisted pair networks cannot achieve higher than 10 Mbps using a hub. Switches are necessary to achieve 100 Mbps or higher.
#36: Discussion point
Ask who in the class has high speed Internet. Then determine if anyone is sharing this to the rest of the house or dorm. If they are, see if they can describe the setup. Most likely, the sharing is done with a router.
#40: Teaching tip
Point out that the speed of the cable is the number before the word Base.
#44: Teaching tip
Have students determine IP addresses for the computer. On 2000/XP enter ipconfig /all. Windows 98 and back enter winipcfg.
#46: Discussion Point
Have students tell you what BIOS stands for.
#49: How you organized your files depends on use.
File names are the easiest way to indicate the contents of the file. Use terse names but indicative of their content. Want to uniquely id the data file.
Be unique but reflect the file content. Think about the organizing principle, don’t just make up a system as you go along.
Maybe you are not required to keep “all” your data, if “filed” correctly, know what to preserve and know what to delete.
#50: Having trouble finding files, telling the most recent one?
File names should reflect the contents of the file and uniquely identify the data file. File names may contain information such as project acronym, study title, location, investigator, year(s) of study, data type, version number, and file type.
Think about how the name will look in a directory with lots of other files, want to be able to “pick it out”.
#51: File names are the easiest way to indicate the contents of the file. Use terse names but indicative of their content. Want to uniquely id the data file.
Be unique but reflect the file content. Think about the organizing principle, don’t just make up a system as you go along.
Don’t’ make them too long, some scripting programs have a filename limit for file importing (reading)
Don’t use blanks/spaces in file names, some software may not be able to read file names with blanks.
Think about how the name will look in a directory with lots of other files, want to be able to “pick it out”.
#52: organizing your data – here’s one possible “cookbook” approach.
NOTE: this is not THE way to organize, just one way that worked for this lab. Key here is tat the organization had been carefully thought out and well documented so all the lab knew the naming convention and did it that way.
Directory (folder) names which indicate the date the data were gathered, and the source:
c40sep12/
c40 is the 40-inch telescope at Las Campanas Observatory
sep12 would indicate the observing run was in September 2012.
kept the names fairly short, but descriptive enough to quickly locate data.
Next, inside each observing run directory, there are subdirectories for each night of the observing run, labeled "n1" though "n9" if it was 9 nights long. If some nights had now data, those directories are empty (or don't even exist), but the numbering scheme should be followed: if the first night was cloudy, then the first directory with data in it is n2/
Within each nightly directory, you have the actual data files, number sequentially. For night one, the first data frame is numbered 1001, and for night two, 2001.
Within each nightly directory, there is a raw/ subdirectory, containing pristine versions of all of the raw data. If you ever need to start from the raw data, you copy it up to the nightly directory. It would make sense to make the raw data "read-only”
Raw data in folder. Create copy up level from “raw”
#55: Teaching Tip
Figure 9A.2 on page 342 visually describes the sharing process. It can be helpful to have students open a shared file that you control. Make a change then have the students open it again. Alternatively, share a document and allow your students to write in it. Then demonstrate how the shared document changes.
Spend time discussing why application servers need to be so powerful.
#56: Teaching tip
Figure 9A.4 on page 344 shows a print queue. It can be helpful to demonstrate your classroom queue.
#58: Teaching tip
It is fun if you can setup a teleconference in your classroom. Students get to learn how to join or create the conference. Additionally, they learn how to participate. Finally, students have fun, especially with shared whiteboards.
#60: Insider information
The text describes needing special software to back up data from user drives. However, the backup utility that comes with Windows 2000 and XP is capable of performing this chore.
#61: Teaching tip
Use a real world example to describe an organization with interconnected LANs.
#62: Teaching tip
Blockbuster Video uses a WAN to connect it’s stores nationwide. Customers from Pittsburgh may rent videos in Hilton Head. Late fees will even be displayed!
#64: Teaching tip
An example of a regional resource is a supercomputer. For example, Pittsburgh has the Pittsburgh Super Computing center (www.psc.edu). The various colleges in Pittsburgh connect to the center through a MAN in Pittsburgh.
#66: Insider information
PAN is very new. Few devices support PAN. High end cell phones include Bluetooth technology. Once the technology matures, Bluetooth will allow the creation of a PAN.
#67: Teaching tip
Spend a few minutes here discussing password policies. Describe why it is important not to give out a password. Also describe why longer, more complicated passwords are important.
#69: Teaching tip
Discuss how users managing their own security settings can be bad.
#70: Teaching tip
Discuss how your network topology handles collisions. If your students are technical, contrast this with an inferior topology.
#71: Teaching tip
For technical students take the time to draw the packet structure on the board. The typical structure is destination address | sending address | packet number | total packets | data size | payload | error control.
#72: Teaching tip
Pages 352 and 353 have diagrams of each network topology
#79: Insider information
Interference is usually electrical. Magnets, solar flares or electronic devices generate interference.
#81: Teaching tip
Remind students that bps is bits per second. Gbps then is billion bits per second.
#82: Teaching tip
Now is the time to briefly discuss 802.11 standards. A full discussion of 802.11 is covered in the next section.
#83: Insider Information
The Xerox Corporation controls the assignment of Ethernet addresses to NIC manufacturers.
#86: Insider information
Twisted pair networks cannot achieve higher than 10 Mbps using a hub. Switches are necessary to achieve 100 Mbps or higher.
#88: Discussion point
Ask who in the class has high speed Internet. Then determine if anyone is sharing this to the rest of the house or dorm. If they are, see if they can describe the setup. Most likely, the sharing is done with a router.
#92: Teaching tip
Point out that the speed of the cable is the number before the word Base.
#96: Teaching tip
Have students determine IP addresses for the computer. On 2000/XP enter ipconfig /all. Windows 98 and back enter winipcfg.
#98: Discussion Point
Have students tell you what BIOS stands for.