Professional Documents
Culture Documents
A computer network, often simply referred to as a network, is a collection of hardware components and computers interconnected by communication channels that allow sharing of resources and information.[1] Where at least one process in one device is able to send/receive data to/from at least one process residing in a remote device, then the two devices are said to be in a network. Networks can be categorized in several different ways. One approach defines the type of network according to the geographic area it spans. Local area networks (LANs), for example, typically reach across a single home, whereas wide area networks (WANs), reach across cities, states, or even across the world. The Internet is the world's largest public WAN.
In a networked environment, each computer on a network may access and use resources provided by devices on the network, such as printing a document on a shared network printer. Distributed computing uses computing resources across a network to accomplish tasks. May be insecure A computer network may be used by computer hackers to deploy computer viruses or computer worms on devices connected to the network, or to prevent these devices from normally accessing the network (denial of service). May interfere with other technologies Power line communication strongly disturbs certain forms of radio communication, e.g., amateur radio.[5] It may also interfere with last mile access technologies such as ADSL and VDSL.[6] May be difficult to set up A complex computer network may be difficult to set up. It may also be very costly to set up an effective computer network in a large organization or company.
File Sharing: The major advantage of a computer network is that is allows file sharing and remote file access. A person sitting at one workstation of a network can easily see the files present on the other workstation, provided he is authorized to do so. It saves the time which is wasted in copying a file from one system to another, by using a storage device. In addition to that, many people can access or update the information stored in a database, making it up-to-date and accurate. Resource Sharing: Resource sharing is also an important benefit of a computer network. For example, if there are four people in a family, each having their own computer, they will require four modems (for the Internet connection) and four printers, if they want to use the resources at the same time. A computer network, on the other hand, provides a cheaper alternative by the provision of resource sharing. In this way, all the four computers can be interconnected, using a network, and just one modem and printer can efficiently provide the services to all four members. The facility of shared folders can also be availed by family members. Increased Storage Capacity: As there is more than one computer on a network which can easily share files, the issue of storage capacity gets resolved to a great extent. A standalone computer might fall short of storage memory, but when many computers are on a network, memory of different computers can be used in such case. One can also design a storage server on the network in order to have a huge storage capacity. Increased Cost Efficiency: There are many software available in the market which are costly and take time for installation. Computer networks resolve this issue as the
software can be stored or installed on a system or a server and can be used by the different workstations. Disadvantages of Computer Networks
Security Issues: One of the major drawbacks of computer networks is the security issues involved. If a computer is a standalone, physical access becomes necessary for any kind of data theft. However, if a computer is on a network, a computer hacker can get unauthorized access by using different tools. In case of big organizations, various network security software are used to prevent the theft of any confidential and classified data. Rapid Spread of Computer Viruses: If any computer system in a network gets affected by computer virus, there is a possible threat of other systems getting affected too. Viruses get spread on a network easily because of the interconnectivity of workstations. Such spread can be dangerous if the computers have important database which can get corrupted by the virus. Expensive Set Up: The initial set up cost of a computer network can be high depending on the number of computers to be connected. Costly devices like routers, switches, hubs, etc., can add up to the bills of a person trying to install a computer network. He will also have to buy NICs (Network Interface Cards) for each of the workstations, in case they are not inbuilt. Dependency on the Main File Server: In case the main File Server of a computer network breaks down, the system becomes useless. In case of big networks, the File Server should be a powerful computer, which often makes it expensive.
Types of Network
A network consists of two or more computers that are linked in order to share resources (such as printers and CD-ROMs), exchange files, or allow electronic communications. The computers on a network may be linked through cables, telephone lines, radio waves, satellites, or infrared light beams. The three basic types of networks include: LAN, MAN and WAN.
LAN configuration consist of: o A file server - stores all of the software that controls the network, as well as the software that can be shared by the computers attached to the network. A workstation - computers connected to the file server (Mac or PCs). These are less powerful than the file server Cables - used to connect the network interface cards in each computer.
INTERNETWORKING
Internetwork is a collection of individual networks, connected by intermediate networking devices, that functions as a single large network.
Different Network Technologies Can Be Connected to Create an Internetwork Internetworking devices have many advantages and they are: Increases the number of nodes that can connect to the network thus limitations on the number of nodes that connect to a network relate to the cable lengths and traffic constraints. Extends the physical distance of the network. They localize traffic within a network. Merge existing networks. Isolate network faults.
Repeater. Operate at Layer 1 of the OSI Bridges. Passes data frames between net-works using the MAC address (Layer 2 address). Hubs. Allow the interconnection of nodes and create a physically attached network. Switches. Allow simultaneous communication between two or more nodes, at a time.
Routers. Passes data packets between connected networks, and operate on network addresses (Layer 3 address).
Network Topologies
The topology of a network describes the logical layout of the network, i.e. the way in which network devices are connected together via the transmission medium. The topology usually (though not always) describes the way the devices are connected together electronically. A network having a ring topology in terms of the way in which devices are connected electronically, for example, will usually be laid out physically using a star topology. A combination of different topologies of this kind is called a hybrid topology. The network topologies that are found in computer networks are:
Bus Ring
This is essentially a branching version of the bus topology. Each branch must be terminated to prevent signal reflection, and data frames are propagated to all devices attached to the network.
will be stored until the line becomes free. These switching elements are also known as intermediate systems, and more commonly as routers. If two routers are not directly connected but need to communicate, they must do so indirectly via other routers. The diagram below illustrates the relationship between the subnet and the individual LANs.
Establishment and termination of a connection to a communications medium. Participation in the process whereby the communication resources are effectively shared among multiple users. For example, contention resolution and flow control. Modulation, or conversion between the representation of digital data in user equipment and the corresponding signals transmitted over a communications channel. These are signals operating over the physical cabling (such as copper and optical fiber) or over a radio link.
Parallel SCSI buses operate in this layer, although it must be remembered that the logical SCSI protocol is a transport layer protocol that runs over this bus. Various physical-layer Ethernet standards are also in this layer; Ethernet incorporates both this layer and the data link layer. The same applies to other local-area networks, such as token ring, FDDI, ITU-T G.hn and IEEE 802.11, as well as personal area networks such as Bluetooth and IEEE 802.15.4.
Layer 2: data link layer The data link layer provides the functional and procedural means to transfer data between network entities and to detect and possibly correct errors that may occur in the physical layer. Originally, this layer was intended for point-to-point and point-to-multipoint media, characteristic of wide area media in the telephone system. Local area network architecture, which included broadcast-capable multiaccess media, was developed independently of the ISO work in IEEE Project 802. IEEE work assumed sublayering and management functions not required for WAN use. In modern practice, only error detection, not flow control using sliding window, is present in data link protocols such as Point-to-Point Protocol (PPP), and, on local area networks, the IEEE 802.2 LLC layer is not used for most protocols on the Ethernet, and on other local area networks, its flow control and acknowledgment mechanisms are rarely used. Sliding window flow control and acknowledgment is used at the transport layer by protocols such as TCP, but is still used in niches where X.25 offers performance advantages. The ITU-T G.hn standard, which provides high-speed local area networking over existing wires (power lines, phone lines and coaxial cables), includes a complete data link layer which provides both error correction and flow control by means of a selective repeat Sliding Window Protocol. Both WAN and LAN service arrange bits, from the physical layer, into logical sequences called frames. Not all physical layer bits necessarily go into frames, as some of these bits are purely intended for physical layer functions. For example, every fifth bit of the FDDI bit stream is not used by the layer. WAN protocol architecture Connection-oriented WAN data link protocols, in addition to framing, detect and may correct errors. They are also capable of controlling the rate of transmission. A WAN data link layer might implement a sliding window flow control and acknowledgment mechanism to provide reliable delivery of frames; that is the case for Synchronous Data Link Control (SDLC) and HDLC, and derivatives of HDLC such as LAPB and LAPD. IEEE 802 LAN architecture Practical, connectionless LANs began with the pre-IEEE Ethernet specification, which is the ancestor of IEEE 802.3. This layer manages the interaction of devices with a shared medium, which is the function of a media access control (MAC) sublayer. Above this MAC sublayer is the media-independent IEEE 802.2 Logical Link Control (LLC) sublayer, which deals with addressing and multiplexing on multiaccess media.
While IEEE 802.3 is the dominant wired LAN protocol and IEEE 802.11 the wireless LAN protocol, obsolescent MAC layers include Token Ring and FDDI. The MAC sublayer detects but does not correct errors. Layer 3: network layer The network layer provides the functional and procedural means of transferring variable length data sequences from a source host on one network to a destination host on a different network (in contrast to the data link layer which connects hosts within the same network), while maintaining the quality of service requested by the transport layer. The network layer performs network routing functions, and might also perform fragmentation and reassembly, and report delivery errors. Routers operate at this layer, sending data throughout the extended network and making the Internet possible. This is a logical addressing scheme values are chosen by the network engineer. The addressing scheme is not hierarchical. The network layer may be divided into three sublayers: 1. Subnetwork access that considers protocols that deal with the interface to networks, such as X.25; 2. Subnetwork-dependent convergence when it is necessary to bring the level of a transit network up to the level of networks on either side 3. Subnetwork-independent convergence handles transfer across multiple networks. An example of this latter case is CLNP, or IPv6 ISO 8473. It manages the connectionless transfer of data one hop at a time, from end system to ingress router, router to router, and from egress router to destination end system. It is not responsible for reliable delivery to a next hop, but only for the detection of erroneous packets so they may be discarded. In this scheme, IPv4 and IPv6 would have to be classed with X.25 as subnet access protocols because they carry interface addresses rather than node addresses. A number of layer-management protocols, a function defined in the Management Annex, ISO 7498/4, belong to the network layer. These include routing protocols, multicast group management, network-layer information and error, and network-layer address assignment. It is the function of the payload that makes these belong to the network layer, not the protocol that carries them. Layer 4: transport layer The transport layer provides transparent transfer of data between end users, providing reliable data transfer services to the upper layers. The transport layer controls the reliability of a given link through flow control, segmentation/desegmentation, and error control. Some protocols are
state- and connection-oriented. This means that the transport layer can keep track of the segments and retransmit those that fail. The transport layer also provides the acknowledgement of the successful data transmission and sends the next data if no errors occurred. OSI defines five classes of connection-mode transport protocols ranging from class 0 (which is also known as TP0 and provides the least features) to class 4 (TP4, designed for less reliable networks, similar to the Internet). Class 0 contains no error recovery, and was designed for use on network layers that provide error-free connections. Class 4 is closest to TCP, although TCP contains functions, such as the graceful close, which OSI assigns to the session layer. Also, all OSI TP connection-mode protocol classes provide expedited data and preservation of record boundaries. Detailed characteristics of TP0-4 classes are shown in the following table:[4] Feature Name Connection oriented network Connectionless network Concatenation and separation Segmentation and reassembly Error Recovery Reinitiate connection unacknowledged) (if an excessive number of PDUs are TP0 TP1 TP2 TP3 TP4 Yes Yes Yes Yes Yes No No No No Yes No Yes Yes Yes Yes Yes Yes Yes Yes Yes No Yes Yes Yes Yes No Yes No Yes No No No Yes Yes Yes No No Yes Yes Yes No No No No Yes No Yes No Yes Yes
Multiplexing and demultiplexing over a single virtual circuit Explicit flow control Retransmission on timeout Reliable Transport Service
Perhaps an easy way to visualize the transport layer is to compare it with a Post Office, which deals with the dispatch and classification of mail and parcels sent. Do remember, however, that a post office manages the outer envelope of mail. Higher layers may have the equivalent of double envelopes, such as cryptographic presentation services that can be read by the addressee only. Roughly speaking, tunneling protocols operate at the transport layer, such as carrying non-IP protocols such as IBM's SNA or Novell's IPX over an IP network, or end-to-end
encryption with IPsec. While Generic Routing Encapsulation (GRE) might seem to be a networklayer protocol, if the encapsulation of the payload takes place only at endpoint, GRE becomes closer to a transport protocol that uses IP headers but contains complete frames or packets to deliver to an endpoint. L2TP carries PPP frames inside transport packet. Although not developed under the OSI Reference Model and not strictly conforming to the OSI definition of the transport layer, the Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP) of the Internet Protocol Suite are commonly categorized as layer-4 protocols within OSI. Layer 5: session layer The session layer controls the dialogues (connections) between computers. It establishes, manages and terminates the connections between the local and remote application. It provides for full-duplex, half-duplex, or simplex operation, and establishes checkpointing, adjournment, termination, and restart procedures. The OSI model made this layer responsible for graceful close of sessions, which is a property of the Transmission Control Protocol, and also for session checkpointing and recovery, which is not usually used in the Internet Protocol Suite. The session layer is commonly implemented explicitly in application environments that use remote procedure calls. On this level, Inter-Process_(computing) communication happen (SIGHUP, SIGKILL, End Process, etc.). Layer 6: presentation layer The presentation layer establishes context between application-layer entities, in which the higher-layer entities may use different syntax and semantics if the presentation service provides a mapping between them. If a mapping is available, presentation service data units are encapsulated into session protocol data units, and passed down the stack. This layer provides independence from data representation (e.g., encryption) by translating between application and network formats. The presentation layer transforms data into the form that the application accepts. This layer formats and encrypts data to be sent across a network. It is sometimes called the syntax layer. The original presentation structure used the basic encoding rules of Abstract Syntax Notation One (ASN.1), with capabilities such as converting an EBCDIC-coded text file to an ASCII-coded file, or serialization of objects and other data structures from and to XML. Layer 7: application layer The application layer is the OSI layer closest to the end user, which means that both the OSI application layer and the user interact directly with the software application. This layer interacts with software applications that implement a communicating component. Such
application programs fall outside the scope of the OSI model. Application-layer functions typically include identifying communication partners, determining resource availability, and synchronizing communication. When identifying communication partners, the application layer determines the identity and availability of communication partners for an application with data to transmit. When determining resource availability, the application layer must decide whether sufficient network or the requested communication exist. In synchronizing communication, all communication between applications requires cooperation that is managed by the application layer. Some examples of application-layer implementations also include:
types of services performed and protocols used at each layer within the TCP/IP model are described in more detail in the following table.
Layer
Description
Protocols
HTTP, Telnet, FTP, Defines TCP/IP application protocols and how TFTP, SNMP, DNS, Application host programs interface with transport layer SMTP, X Windows, services to use the network. other application protocols Provides communication session management between host computers. Defines the level of Transport TCP, UDP, RTP service and status of the connection used when transporting data. Packages data into IP datagrams, which contain source and destination address Internet information that is used to forward the IP, ICMP, ARP, RARP datagrams between hosts and across networks. Performs routing of IP datagrams. Specifies details of how data is physically sent through the network, including how bits are Ethernet, Token Ring, electrically signaled by hardware devices that FDDI, X.25, Frame interface directly with a network medium, Relay, RS-232, v.35 such as coaxial cable, optical fiber, or twistedpair copper wire.
Network interface
Comparison between seven layer OSI and four layer TCP/IP Models
As we can see from the above figure, presentation and session layers are not there in OSI model. Also note that the Network Access Layer combines the functions of Datalink Layer and Physical Layer. Layer 4. Application Layer Application layer is the top most layer of four layer TCP/IP model. Application layer is present on the top of the Transport layer. Application layer defines TCP/IP application protocols and how host programs interface with transport layer services to use the network. Application layer includes all the higher-level protocols like DNS (Domain Naming System), HTTP (Hypertext Transfer Protocol), Telnet, FTP (File Transfer Protocol), TFTP (Trivial File Transfer Protocol), SNMP (Simple Network Management Protocol), SMTP (Simple Mail Transfer Protocol) , DHCP (Dynamic Host Configuration Protocol), X Windows, RDP (Remote Desktop Protocol) etc. Layer 3. Transport Layer Transport Layer is the third layer of the four layer TCP/IP model. The position of the Transport layer is between Application layer and Internet layer. The purpose of Transport layer is to permit devices on the source and destination hosts to carry on a conversation. Transport layer defines the level of service and status of the connection used when transporting data. The main protocols included at Transport layer are TCP (Transmission Control Protocol) and UDP (User Datagram Protocol).
Layer 2. Internet Layer Internet Layer is the second layer of the four layer TCP/IP model. The position of Internet layer is between Network Access Layer and Transport Layer. Internet layer pack data into data packets known as IP datagrams, which contain source and destination address (logical address or IP address) information that is used to forward the datagrams between hosts and across networks. The Internet layer is also responsible for routing of IP datagrams. Packet switching network depends upon a connectionless internetwork layer. This layer is known as internet layer, is the linchpin that holds the whole design together. Its job is to allow hosts to insert packets into any network and have them to deliver independently to the destination. At the destination side data packets may appear in a different order than they were sent. It is the job of the higher layers to rearrange them in order to deliver them to proper network applications operating at the Application layer. The main protocols included at Internet layer are IP (Internet Protocol), ICMP (Internet Control Message Protocol), ARP (Address Resolution Protocol), RARP (Reverse Address Resolution Protocol) and IGMP (Internet Group Management Protocol). Layer 1. Network Access Layer Network Access Layer is the first layer of the four layer TCP/IP model. Network Access layer defines details of how data is physically sent through the network, including how bits are electrically or optically signaled by hardware devices that interface directly with a network medium, such as coaxial cable, optical fiber, or twisted pair copper wire. The protocols included in Network Access layer are Ethernet, Token Ring, FDDI, X.25, Frame Relay etc. The most popular LAN architecture among those listed above is Ethernet. Ethernet uses an Access Method called CSMA/CD (Carrier Sense Multiple Access/Collision Detection) to access the media. An Access Method determines how a host will place data on the medium. IN CSMA/CD Access Method, every host has equal access to the medium and can place data on the wire when the wire is free from network traffic. When a host wants to place data on the wire, it will check the wire to find whether another host is already using the medium. If there is traffic already in the medium, the host will wait and if there is no traffic, it will place the data in the medium. But, if two systems place data on the medium at the same instance, they will collide with each other, destroying the data. If the data is destroyed during transmission, the data will need to be retransmitted. After collision, each host will wait for a small interval of time and again the data will be retransmitted.
In this lesson, you have learned about the four layers of TCP/IP model and the comparison between four layered TCP/IP model and seven layered OSI model
Repeater
As signals travel along a transmission medium there will be a loss of signal strength ( attenuation ). A repeater is a non-intelligent network device that receives a signal on one of its ports, regenerates the signal, and then retransmits the signal on all of its remaining ports. Repeaters can extend the length of a network (but not the capacity) by connecting two network segments. Repeaters cannot be used to extend a network beyond the limitations of its underlying architecture, or to connect network segments that use different network access methods. They can, however, connect different media types, and may be able to link bridge segments with different data rates.
A hub in a star network configuration Using a hub provides a degree of fault tolerance, because each network device has its own connection to the hub, and if a connection fails, only a single device is affected. Expanding the network is also easier, because many additional devices can be added to the network using a single hub, which is itself often connected to a network backbone. Hubs can be either active or passive. An active hub has its own power supply, and regenerates incoming frames before retransmitting them. Because signals are regenerated, each output port can connect a channel of up to 100 metres (the maximum allowed for twisted pair cables). Passive hubs simply relay
the signal without regenerating it. Managed hubs allow administrators to enable or disable individual ports remotely, while intelligent hubs can autonomously close ports down if the occurrence of errors in transmitted packets exceeds a certain threshold.
Bridge
Bridges can be used to connect two or more LAN segments of the same type (e.g. Ethernet to Ethernet, or Token-Ring to Token-Ring). Like repeaters, bridges can extend the length of a network, but unlike repeaters they can also extend the capacity of a network, since each port on a bridge has its own MAC address. When bridges are powered on in an Ethernet network, they start to learn the network's topology by analysing the source addresses of incoming frames from all attached network segments (a process called backward learning ). Over a period of time, they build up a routing table . Unless the source and the destination are on different network segments, there is no need for the bridge to transfer an incoming frame to another network segment. If the source and the destination are on different segments, the bridge needs to be able to determine which segment the destination device belongs to.
Bridges learn about the network segments they are connected to The bridge monitors all traffic on the segments it connects, and checks the source and destination address of each frame against its routing table. When the bridge first becomes operational, the routing table is blank, but as data is transmitted back and forth, the bridge adds the source MAC address of any incoming frame to the routing table and associates the address with the port on which the frame arrives. In this way, the bridge quickly builds up a complete picture of the network topology. If the bridge does not know the destination segment for an incoming frame, it will forward the frame to all attached segments except the segment on which the frame was transmitted. Bridges reduce the amount of traffic on individual
segments by acting as a filter, isolating intra-segment traffic. This can greatly improve response times. Because Ethernet bridges determine whether or not to forward frames on the basis of the desination MAC address, they are said to operate at the data link layer of the OSI Reference Model. Etherenet bridges are sometimes referred to as transparent , because their presence and operation are transparent to network users, although they successfully isolate intrasegment traffic, reducing network traffic overall and improving network response times.
Switch
The switch is a relatively new network device that has replaced both hubs and bridges in LANs. A switch uses an internal address table to route incoming data frames via the port associated with their destination MAC address. Switches can be used to connect together a number of end-user devices such as workstations, or to interconnect multiple network segments. A switch that interconnects end-user devices is often called a workgroup switch. Switches provide dedicated full-duplex links for every possible pairing of ports, effectively giving each attached device its own network segment This significantly reduces the number of intra-segment and inter-segment collisions.
A number of network segments on the same floor of a building (or on the same campus), each having thier own workgroup switch switch, may themselves be connected together by a higher level switch known as a floor switch. Much more powerful switches are often used to connect together a number of high-level network devices, such as floor switches, workgroup switches and routers. These devices are often called core switches, and they should have sufficient capacity to cope with the volume of traffic flowing around the network.
Router
A network environment that consists of several interconnected networks employing different network protocols and architectures requires a sophisticated device to manage the flow of traffic between these diverse networks. Such a device, sometimes referred to as an intermediate system, but more commonly called a router, must be able to determine how to get incoming packets (or datagrams) to the destination network by the most efficient route. Routers gather information about the networks to which they are connected, and can share this information with routers on other networks. The information gathered is stored in the router's internal routing table, and includes both the routing information itself and the current status of various network links. Routers exchange this routing information using special routing protocols.
Computers, and other end-user devices attached to networks that form part of an internetwork, are often called hosts or end-systems. A network host does not know how to forward a datagram to a host on another network, and so it will forward the datagram to its local router (or default gateway). A datagram may traverse a number of networks, and hence a number of routers, as it travels from an end-system on the source network to an end-system on the destination network. At each intermediate router, a decision is made as to what is the optimum next hop. The process undertaken by the router in transferring the incoming datagram to one of its output ports in this way is called switching, and routers are at the heart of packet-switching networks. Unlike bridges and switches, routers do not concern themselves with MAC addresses, and instead examine the IP address contained within a datagram to determine the address of the destination network.
Models of Networking
The type of network most widely implemented to day is based on the principle of having one or more file servers at the heart of the network. This kind of network is often referred to as a server-based or client-server network. There are however other models for implementing networks. The three principal ways of connecting computers together to share or use network resources are:
Centralised computing
Perhaps the oldest model of networking is based on the idea of having one very large and powerful central computer, to which a number of computer terminals are directly connected. In the early days of computing, this central computer would invariably have been a mainframe computer (often called the host computer). This arrangement allowed many users to access the resources of the "host" mainframe computer simultaneously. All processing is carried out on the mainframe, and each terminal device consisted of a keyboard and a display screen, allowing the user to input data via the keyboard and view the resulting output on the screen. In order for the arrangement to work, a number of special multi-user, multi-tasking operating systems were developed. The most enduring of these was the UNIX operating system, which is still in widespread use today. The very high cost of implementing and maintaining a mainframe computer system meant that only the largest organisations could afford to install and run them. Smaller organisations wishing to make use of such computing facilities could buy or lease access to computing facilities from larger organisations with mainframe capacity to spare.
Peer-to-peer networks
In a peer-to-peer network, all computers have equal status (i.e. they are peers). There is no centralised network management, and any computer can provide resources to any of the others. Typically, the workstations on such a network are PCs, and each computer is capable of functioning in stand-alone mode when disconnected from the rest of the network. Peer-to-peer networks are suitable for a small number of computers (typically ten or less) in the same physical location, such as a small office. They are easy to set up and administer, and are relatively inexpensive. Individual users are responsible for determining which resources on their computer will be shared with other users. The main requirement for setting up a peer-to-peer network is that each computer must be equipped with a network interface card, and have an operating system (e.g. Microsoft Windows or Linux) that will support basic networking. Computers are typically connected via a small hub or switch using category 5 or category 6 twisted pair network cables.
Client-server networks
Client-server networks can support a large number of clients (workstations) and link multiple computing hardware and software platforms. They rely on one or more specialised computers called servers, and are centrally administered. Processing is distributed in the sense that application software can be installed on both server and client machines. Workstations are often personal computers, suitable equipped, that can operate as stand-alone machines when the network is unavailable. Client-server networks are highly scaleable. As the number of users increases, additional servers can be added to cope with the additional workload. Network servers are usually either minicomputers or (more commonly) high-specification personal computers, with fast (oftem multi-core) processors and large amounts of working memory and secondary storage. A specialised network operating system (NOS) must be installed on the network?s file servers to provide the required network functionality. Current examples of proprietary network operating systems include Microsoft Windows Server, Novell Netware, Unix and proprietary versions of Linux. Open source solutions include Linux and open source versions of Unix.
A typical client-server network A server is a computer connected to a network that provides both local and remote client computers with access to network resources. There are many different kinds of server. A file server, for example, provides access to shared data storage areas on the network, and may also provide network authentication services. A print server provides access to network printing services, a mail server provides storage and forwarding services for incoming and outgoing electronic mail messages, and an application server provides access to networked application software. A number of different network services can be provided by the same physical server,
as long as the necessary software is installed on the server. Usually, however, each type of service is provided by a different physical server in order to evenly distribute the workload, and in some cases several servers may act as alternative providers of the same service (network logon authentication services, for example), if demand for that service is likely to be high at a certain time of day.
Wireless Networks
wireless communication is invaluable in situations where the use of guided media may pose problems, and the huge demand for wireless connectivity (for mobile phones, portable computers and personal data assistants for example) is fuelling the proliferation of wireless technology. Microwave frequencies in the range 2.400 - 2.484 GHz do not require a licence, and are therefore popular for short range applications, and line-of-sight wireless links can be established between two local area networks using microwave or laser links where a cable connection would be difficult or prohibitively expensive to implement. A wireless LAN (WLAN) is a local area network based on wireless technology. Most modern local area networks now employ some wireless network infrastructure because it allows existing networks to be extended without the expense of additional cabling, and allows users of portable network devices to maintain connectivity with the network as they move around. Wireless networks can be set up quickly and can be configured in either ad hoc or infrastructure mode. In ad hoc mode, two or more portable computers can communicate with each other in the wireless equivalent of a peer-to-peer network. There is no connection to a wired network and a wireless access point is not required.
1. BOUNDED MEDIA: Bounded media are the physical links through which signals are confined to narrow path. These are also called guide media. Bounded media are made up o a external conductor (Usually Copper) bounded by jacket material. Bounded media are great for LABS because they offer high speed, good security and low cast. However, some time they cannot be used due distance communication. Three common types of bounded media are used of the data transmission. These are
COAXIAL CABLE: Coaxial cable is very common & widely used commutation media. For example TV wire is usually coaxial. Coaxial cable gets its name because it contains two conductors that are parallel to each other. The center conductor in the cable is usually copper. The copper can be either a solid wire or stranded martial. Outside this central Conductor is a non-conductive material. It is usually white, plastic material used to separate the inner Conductor form the outer Conductor. The other Conductor is a fine mesh made from Copper. It is used to help shield the cable form EMI. Outside the copper mesh is the final protective cover. (as shown in Fig) The actual data travels through the center conductor in the cable. EMI interference is caught by outer copper mesh. There are different types of coaxial cable vary by gauge & impedance.
Gauge is the measure of the cable thickness. It is measured by the Radio grade measurement, or RG number. The high the RG number, the thinner the central conductor core, the lower the number the thicker the core. Here the most common coaxial standards.
50-Ohm RG-7 or RG-11 : used with thick Ethernet. 50-Ohm RG-58 : used with thin Ethernet 75-Ohm RG-59 : used with cable television 93-Ohm RG-62 : used with ARCNET.
Low cost Easy to install Up to 10Mbps capacity Medium immunity form EMI Medium of attenuation
UTP is more common. It can be either voice grade or data grade depending on the condition. UTP cable normally has an impedance of 100 ohm. UTP cost less than STP and easily available due to its many use. There are five levels of data cabling Category 1 These are used in telephone lines and low speed data cable. Category 2 These cables can support up to 4 mps implementation. Category 3 These cable supports up to 16 mps and are mostly used in 10 mps. Category 4 These are used for large distance and high speed. It can support 20mps. Category 5 This is the highest rating for UTP cable and can support up to 100mps. UTP cables consist of 2 or 4 pairs of twisted cable. Cable with 2 pair use RJ-11 connector and 4 pair cable use RJ-45 connector. Characteristics of UTP
low cost easy to install High speed capacity High attenuation Effective to EMI 100 meter limit
Advantages of UTP
Disadvantages of UTP
2. Shielded twisted pair (STP) It is similar to UTP but has a mesh shielding thats protects it from EMI which allows for higher transmission rate. IBM has defined category for STP cable. Type 1 STP features two pairs of 22-AWG Type 2 This type include type 1 with 4 telephone pairs Type 6 This type feature two pairs of standard shielded 26-AWG
Type 7 This type of STP consist of 1 pair of standard shielded 26-AWG Type 9 This type consist of shielded 26-AWG wire
Characteristics of STP
Medium cost Easy to install Higher capacity than UTP Higher attenuation, but same as UTP Medium immunity from EMI 100 meter limit
Disadvantages of STP:
More expensive than UTP and coaxial More difficult installation High attenuation rate
Fiber Optics
Fiber optic cable uses electrical signals to transmit data. It uses light. In fiber optic cable light only moves in one direction for two way communication to take place a second connection must be made between the two devices. It is actually two stands of cable. Each stand is responsible for one direction of communication. A laser at one device sends pulse of light through this cable to other device. These pulses translated into 1s and 0s at the other end. In the center of fiber cable is a glass stand or core. The light from the laser moves through this glass to the other device around the internal core is a reflective material known as CLADDING. No light escapes the glass core because of this reflective cladding. Fiber optic cable has bandwidth more than 2 gbps (Gigabytes per Second)
Characteristics Of Fiber Optic Cable: Expensive Very hard to install Capable of extremely high speed Extremely low attenuation No EMI interference Advantages Of Fiber Optic Cable: Fast Low attenuation
Best of luck