You are on page 1of 36

Introduction to

Networking

What is a Network ?

A Network is formed by
connecting computers
together.

Forming a Network
Basic Equipment Needed
Network Card
Network Cable
Cable Connector

Network Topologies

Bus
Token
Ring
Star
FDDI

Bus Topology

Backbone Cable

132.147.160.101 132.147.160.102

132.147.160.103

132.147.160.104

132.147.160.105

Server
132.147.160.106

PCs connected together by


a cable form a Network

Token Ring Topology

Low Speed 4
MBPs
Cable-break Tolerant
Single Token
IEEE802.5

Star Topology

Hub
12.47.213.6
Windows NT

Fiber Distributed Data Interface Topology

500 PCs max


100 KMs max
Fiber-optic Cable

High Speed 100 MBPs

Cable-break Tolerant
Multiple Tokens
Second Fail-safe ring

Access Methods

CSMA/CD
CSMA/CA
Token Passing
Demand Priority

Access Methods -- CSMA/CD

Carrier Sense Multiple Access / Collision Detection

Each computer on the network senses whether the cable is free before
transmitting data
No other computer can transmit till the data has reached the destination,and
the cable is free again.
If two computers transmit at the same time, a collision occurs and both wait
for a random time before re-transmitting.
Collision Detection capability imposes a distance restriction. If the sender is
too far away, then the others cannot make out its signal, an may transmit
their data, leading to a collision.
With more computers, the traffic and the collisions increase, slowing down
the network.
Re-transmissions may collide with other transmissions complicating the
matter.
Thus it is a slow access method.

Access Methods -- CSMA/CA

Carrier Sense Multiple Access / Collision Avoidance


Each computer on the network signals its intention to transmit
before transmitting data.
In this way computers sense collisions before they actually
happen, and wait before transmitting.
Unfortunately, the data on the network increases sharply,
bringing down the speed
Thus it is the least preferred method.

Access Methods -- Token Passing

Uses a Token
A special type of packet, or token is generated.
This token is circulated from computer to computer in a given
direction.Only one token can exist at one time.
When any computer needs to send data to another, it must wait for a free
token
Once token is captured, Data is transmitted in frames.
Frame travels around the network, the destination computer reads it and
marks the status field. When it reaches the sender, the status field serves as
an acknowledgement for data.
The sending computer then removes the frame and transmits a new token
back onto the ring.
When a token is being used by a computer, others cannot transmit data.
Thus there is no contention..
Speeds are 4MBPs and 16 MBPs only

Access Methods -- Demand Priority

Designed for 100 MBPS Ethernet standard 100VG AnyLAN


A special type of packet, or token is generated.
This token is circulated from computer to computer
When any computer needs to send data to another, it must wait
for a free token
Data is transmitted in frames.
When a token is being used by a computer, others cannot
transmit data.
Thus there is no contention.
Thus it is the least preferred method.

Ethernet Networks
Non-proprietary Industry Standard
Conform to IEEE 802.3 specification
Use CSMA/CD Access method to regulate traffic
Can use Star and Bus Topologies
Supports transfer speeds of 10 and 100 MBPs
Can use Thicknet, Thinnet and UTP Cables
Cabling Standards
10BaseT standard for UTP networks
10Base2 standard for Thinnet networks
10Base5 standard for Thick Ethernet
Networks
100BaseVG-AnyLAN
100BaseX

Ethernet Components

Ethernet Port

RJ-45 Jack

Ethernet IEEE802.3 specs


10Base2

10Base5

10BaseT

Topology

Bus

Bus

Star, Bus

Cable Type

Thick Ethernet Cable Cat3, Cat 5 Cable

Connection

RG-58 (Thin CoAx)


BNC T-Connector

AUI connector

RJ-45 Connector

Terminator

50 OHM

50 OHM

NA

Impedance

50 Ohms

50 Ohms

85-115 for UTP

500 metres

100 metres

2.5 metres

NA

100

Max Cable segment 185 metres


Length
Min length between 0.5 metres
PCs
Max computers per 30
segment

10Base2 Standard
10Base2

10Base5

10BaseT

Topology

Bus

Bus

Star, Bus

Cable Type

Thick Ethernet Cable Cat3, Cat 5 Cable

Connection

RG-58 (Thin CoAx)


BNC T-Connector

AUI connector

RJ-45 Connector

Terminator

50 OHM

50 OHM

NA

Impedance

50 Ohms

50 Ohms

85-115 for UTP

500 metres

100 metres

2.5 metres

NA

100

Max Cable segment 185 metres


Length
Min length between 0.5 metres
PCs
Max computers per 30
segment

Protocols

TCP / IP
Netware
Peer to Peer

Networking Components

Hubs
Switches
Bridges
Routers
Gateways

Hub

Broadcasts data to all nodes

Switch

Directs data to the concerned nodes

Bridge
Hub

Bridge
Sends packets between dissimilar
networks

12.47.213.6
Windows NT

Reads all packets, adds network card


addresses to a routing table in its
memory
Sends packet across if the address is
found in its routing table
Otherwise broadcasts the packet to
different segments

132.147.160.106
UNIX

Router

Routerr

Hub

Routerr

Can talk to Router only


Builds Routing Table on
startup
Connects Long Distances
Collects information on
routers connected to it
No. of Hops
Line Speed
Cost of Transmission

Hub

The Router selects the most efficient Network


Satellite 2MBPs

Digital Microwave
2MBPs
Mumbai

Router

Router
OFC Cable 15MBPs
Phone 64KBPs
Baroda

Routers
Have Input ports for receiving IP Packets
Have Output ports for sending IP Packets
Have a routing Table (database of IP addresses)
Route packets dynamically depending on amount
of network traffic on the different routes
Have Internal routing protocols for Intranet routing
Have External routing protocols for Internet routing
Based on routing info the packet is sent to the
specific output port, which then sends information to
the next closest router

Language of the Internet - TCP-IP

TCP = Transmission Control Protocol


IP

= Internet Protocol

Language of the Internet - TCP-IP

It is a software which is provided free with Windows and UNIX


operating systems.
TCPIP is the common name for a collection of 100 odd
protocols used to connect computers and networks.
It is loaded onto computers as a TCP/IP stack.
All Computers on the Internet must have TCPIP loaded

Important Protocols of TCP-IP


Internet Protocol

IP has an addressing scheme used to identify the


host in which it resides.

Address Resolution
Protocol

ARP dynamically translates IP addresses into


physical (interface card level) addresses.

Open Shortest Path First OSPF is a routing protocol. It utilises knowledge


of the Internet topology to route packets on the
quickest route.
TCP

It is a transport layer protocol and is considered


reliable. Performs retransmissions if required..

User Datagram Protocol It is a transport layer protocol and is considered


UN-reliable. Does not performs retransmissions.
File Transfer Protocol

Provides File Transfer capabilities among


heterogenous systems

Important Protocols of TCP-IP (2)


SMTP

Simple Mail Transfer Protocol provides


electronic mail services for TCP/IP based users.

Trivial File Transfer Pr.

This is a UDP application, used in initialisation


of network devices where software must be
downloaded.
NFS is a protocol that makes remote file systems
appear as if they were part of the directory of the
local host

Network File System

Simple Network
Management Protocol

SNMP is the way most TCP/IP networks are


managed. SNMP is an agent and manager
arrangement. The agent collects info about a host
and the manager maintains status information by
polling agents and accepting info from agents.

Transmission Control Protocol


TCP breaks up data into small packets, which are sent through different
routes by the router

Message

TCP

Senders Computer

Router

Transmission Control Protocol


TCP re-assembles the received packets into the original message

Router

TCP

Message

Receivers Computer

The TCP Packet


Packet
has

Receivers IP
Senders IP address
address
Serial Number
Checksum

has

Users message

HEADER

BODY

Packet size varies from 512 to 1512 bytes

IP Addresses
Each Computer on the Internet has an IP address like the one below...

10 . 3 . 215 . 230
Network

Node

There are 4 blocks (octets) in an IP address,


for the network and for the node name
Each octet has a number from 0 to 255
There can be 4295 million IP addresses
Hosts are given a static IP addresses
IP Addresses are given by InterNIC

How is RSC connected

RAILNET

INTERNET
INTERNET
Baroda

Router

Router
Proxy
Server

Router
WR HQ
Mumbai

Thank You

You might also like