Professional Documents
Culture Documents
Teaching Computer Networking
Teaching Computer Networking
In this chapter, you’ll begin by relating networks to situations and concepts you already
know. Once you have a basic understanding of what networks are and what they can
do, it helps if you can actually begin working with them. In fact, it is so helpful to learn
the ropes of networking through hands-on guided practice that that’s what is planned for
you here. You will play the role of an employee in a fictional company, and you’ll have to
learn on the job. The more you become the person, the more you will learn about the
need for and operation of computer networks.
UNDERSTANDING NETWORKS
Human Networks
In its broadest sense, a network consists of two or more entities, or objects, sharing
resources and information. Although this book is about computer networks, there are
networks that don’t involve computers, and those networks are everywhere. You have
grown accustomed to working with them, possibly without even knowing it.
It may not matter to you that, in a basic sense, sharing (giving or getting) is a
fundamental aspect of networking. You just know that you do it.
Family Network
Most people belong to a family network in which related people share their resources
and information. This sharing is bi-directional because even the youngest family
members share information of some sort. As the family grows, so does the network.
Peer Network
Outside the family, there is a community that offers a wider array of re- sources than the
typical family can provide. Naturally, it makes sense to connect the family to this
community to take advantage of the wealth of re- sources available around town. This
type of information/resource sharing can be as simple as loaning a hammer to a
neighbor, car-pooling with work associates, or helping a friend with his or her
homework. All of these activi- ties involve sharing, or trading, resources. This kind of
network is represented by a two-way relationship, a give and take among equals or
peers.
The family network connects with the greater community.
Contact Network
Anyone who has looked for a job knows that one of the best ways to find a job is to
network. That is, create a list of friends and associates who will help you find the perfect
job. The more people you meet and get to know, the better your chances of obtaining
work. As you
develop and nurture your ca- reer, this contact network will serve you best because your
role in it will change as you gain more experience. Soon, you may be able to help the
people who helped you. And as your personal and professional networks grow, so do
your opportunities.
These examples of human networks should help you under- stand that networking is
common between people and is not just an activity restricted to computers. However,
this book will focus on computer networks—connecting computers and having them
communicate with each other.
The more people in your network, the better your chances of finding that perfect job.
Computer Networks
A computer network consists of two or more computing devices that are connected
in order to share the components of your network (its resources) and the information
you store there, as shown in Figure 1.1. The most basic computer network (which
consists of just two connected computers) can expand and become more usable when
additional computers join and add their resources to those being shared.
The real power of networking computers becomes apparent if you envi- sion your own
network growing and then connecting it with other distinct networks, enabling
communication and resource sharing across both net- works. That is, one network can
be connected to another network and be- come a more powerful tool because of the
greater resources. For example, you could connect the network you and your
classmates develop for this course to similarly con- structed networks from other intro-
ductory networking classes if you wanted them to share your infor- mation and
networked resources. Those classes could be within your own school, or they could be
anywhere in the world. Wherever that newly joined network is, the communication and
resource shar- ing activities in that new network could then be shared with anyone
connected to your network. All you have to do is join that new network’s community or
allow its members to join yours.
Network Plan
Networking computers first and tracking the connections later can quickly become
confusing and unmanageable as you try to find which computer communicates with and
shares resources with which other computers. In your human network, do you share
everything with your friends? In your family network, would you want your parents or
guardians to know your every thought? You have your information-sharing plan in your
head, and it is important to keep track of it so you don’t make a mistake and share
something where it was not intended.
Similar concerns must be considered while designing a computer network. Before you
even connect your first computers together, you should have a plan. A network plan,
therefore, is a formally created product that shows all the network’s components and the
planned connections between them. Such a plan is also used to manage the various
types of information. Your plan should show what types of information are stored where,
and who is allowed to use each type.
Information Management
Your network plan should help you manage the information gathered, stored, and
shared between your users. If you were given an empty three-drawer filing cabinet and
told to use it to organize your company’s in- formation, you would have an excellent
(although manual) example of a fil- ing system that needs a plan. Having an overall
guide that tells you who will be allowed access to the three drawers will help determine
what you store in each one. Once you have that part of the plan, you could put the
least-used information in the bottom drawer, the more-used in the middle drawer, and
the most-used in the top drawer so that it is easier for your users to access their
information. Knowing who needs to know what, and its corollary— who does not need to
know what—lets you determine whether to lock a par- ticular drawer, too.
Even when we discuss implementing a three-drawer manual filing sys- tem, the
importance of having a network plan ahead of time becomes evi- dent. If you put the
limited-access material in a drawer open to all employees, how do you keep it secure?
Additional security measures (like adding a lock to a drawer, or moving the secure
information somewhere else) may be required later.
A networking plan could tell you that as specific types of sensitive data (like medical,
personal, or payroll information) are gathered or grouped, they should be stored higher
in the hierarchical structure (ranked from most sensitive to least sensitive), and this can
save you time in the end. That plan should specify that the access requirements are
stricter for sensitive data and reduce the number of people able to use specific types of
information.
The distribution side of the networking plan, as opposed to the accumu- lation side of
the plan discussed above, should spell out that the more an in- dividual has access to
the data in storage, the less they should be able to share groups of information
entrusted to them. For example, you may not mind sharing your first name, but you
would probably object to an instruc- tor openly distributing all information in your school
records to anyone re- questing it.
Information’s Importance
If you think about the manual filing system we discussed using a filing cabi- net, an
important computing concept is easy to recognize. Some informa- tion is more important
or more sensitive than the rest. It is usually obvious in real filing cabinet systems,
because the top drawer is usually where the most sensitive information is stored, and it
is locked. Few people in an organization have access to that information. For example,
credit card or Social Security numbers are information that should be given the highest
level of security—access to that information is given only to a limited number of people
in a company. On the other hand, some information, such as Webpages, newsletters,
and product information, is created for everyone to see, even outside a company.
Figure 1.2 shows how this kind of information is organized into a hierarchy of
information, where the most detailed infor- mation is found at the top and the more
general, less secure information is located at the bottom. How much information would
you be willing to pro- vide about yourself to a perfect stranger? Coun- try of birth? Sure.
State of residence? Why not? But you might have second thoughts about advertising
your street address or phone number to a stranger.
Figure 1.3
Stand-alone computers are operated independently.
The printout or the storage device was then physically carried to another computer
where the information was reentered or copied from the portable media into the next
computer. This process was referred to as a sneakernet because users actually had to
walk from computer to computer. It was probably the cheapest type of network—unless
the computers were large distances apart or the information needed to be shared
among many com- puters. Other drawbacks to sneakernets were that printouts were
often bulky, and the storage devices could hold a relatively small amount of data
compared to the large amount of output users produced.
The initial reason for developing most computer networks was to assist users with
sharing their increased output, especially between computers in the same general
vicinity, as shown in Figure 1.4. However, users wanted not only to share information
with others, they wanted to communicate about that information after someone else had
it, too. In addition to trans- mitting the user’s original information, computer networks
enabled those users to discuss what was being transmitted, and this resulted in even
more communication. Additional network communications techniques thus came into
being, such as e-mail and video conferencing. Furthermore, with the increases in the
sizes of networks, sharing no longer had to be concerned with proximity. The use of
networks has effectively erased distance and time constraints. You can communicate
almost instantly to anywhere in the world that is connected to your network.
Figure 1.4
Computer communication—
Two computers in the same general vicinity should be able to communicate.
Networks are an effective way to communicate. Using networks, companies can send
the same information to large numbers of employees or customers quickly and
efficiently. Examples include company newsletters and announcements for employees,
as well as advertisements and purchase in- formation for customers. Also, individual
employees are more likely to communicate with larger numbers of individuals both
inside and outside the company using e-mail, an electronic means of communicating
that is similar to mail but done on computers, usually over the Internet, over net- works.
E-mail is the most commonly used feature of the Internet, and its use is growing
dramatically. In fact, e-mail is fast becoming the primary choice for much of our daily
communication.
Sharing Resources
In the sneakernet era, users spent huge amounts of time attempting to share their
resources. They had to physically distribute files that others needed. Expenditures for
printers and other attached computer components rose apidly while the individual
components themselves were not being used to their full capacity. On top of that, the
hard disk storage on each local computer began filling up, partly because everyone had
a copy of every document. One copy of that data, and even the applications that
produced it, could more efficiently be stored in a single location and shared over a
network.
The ability to share resources was another reason networks were created, and it is still
one of the main purposes for using networks. The inevitable technology creep (the
continuing need for additional investment in technology that is required to stay current)
extends the computer user’s involvement in technology because companies expect
employees to learn new systems as they are installed. Companies also look for ways to
make the best use of their investments by sharing the purchased resources among
multiple de- partments. Let’s look at some of the resources that are commonly shared
over computer networks.
Peripherals
Many companies start with multiple stand-alone computers. Not too long after the initial
computer purchase, however, additional components that attach to a computer, called
peripherals, like printers, scanners, and speak- ers, are purchased and are connected
to that computer to expand its use (see Figure 1.5). When there are multiple users and
computers, it soon becomes ap- parent that the peripheral devices are seldom fully
utilized. Money can be saved if some of these peripherals are shared, instead of having
to purchase a separate set for each computer. Networking enables the sharing of
peripherals.
The ability to share printers was very often enough of a cost savings for companies to
invest in implementing and supporting a simple network. The company could then also
realize additional cost savings as it shared additional peripheral devices, such as faxes,
modems, scanners, plotters, and virtually any other device that connects to computers.
Sharing peripherals often ends up producing significant cost savings and more than
justifies the expense of adding a network.
Figure 1.5 Common network peripherals
Storage
Data was being loaded on the computers of every fledgling network user as they
expanded their network use. Users quickly ran out of space on their own local
computers, so the people in charge of the networks began devis- ing ways to store data
centrally so that it was accessible to any user who needed it. Large amounts of storage
capacity, usually in fast, very powerful computers, were set up to act as storage
locations for this data where access to it could be controlled by the person storing the
data.
Applications
Cost and space savings are achieved when computer users can centrally store their
software applications—the computer programs (organized sets of computer
instructions) that make a user’s computer do what needs to be done. Applications, such
as those used for preparing taxes, creating text documents, or playing computer games,
have grown in complexity and size and often take up considerable local storage.
Installing an application once on a network and then sharing it cuts down on the storage
space required when multiple users need the same application.
Unfortunately, there are still several problems with this type of arrange- ment. Some
applications work fine with different setups for each user (dif- ferent choices for screen
settings and other custom features), but normally all such settings must be the same for
all users. Sometimes, applications still function better when installed on a user’s local
computer.
Assisting Collaboration
Once you have digital information and the ability to share it instantly with oth- ers over
networks, you can have multiple people working on the same process collectively. Much
of the initial communication about computer-produced products that occurred during
and immediately after the sneakernet era dealt with coworker collaboration, with
coworkers discussing each other’s work or possibly even exchanging opinions about
what other users had created. Those early computer users found that once they created
something and sent it out for review, the comments returned often led to important
adjust- ments that would improve the original product. Such collaboration assisted the
widespread use of computers because it provided a tangible benefit that businesses
could associate with the increased costs of installing computers in the first place.
Many software makers took this early form of collaboration into consid- eration and
added that feature to the capabilities of their software. The new- est versions of the
applications included in Microsoft’s Office suite (such as Word, Access, Excel, and
PowerPoint) allow multiple users to access and make changes to the same document at
the same time. That way, all users can work together on the original document, and
changes made by any col- laborating member are immediately posted within the
document. A more powerful implementation of this concept can be found in an
application designed to facilitate collaboration, such as Microsoft’s Terminal Server
(see http://www.microsoft.com/windows2000/technologies/ terminal/default.asp for more information).
Managing Software
Using the network helped reduce software costs. Savings occurred when all users on a
network used the same software and when software was bought in bulk quantities for a
discount. Centralizing the installation of that soft- ware also reduced operation costs
because the installations could be accom- plished remotely—over the network. The
computer programs that were needed to perform the installations were stored on
servers and made accessible over the network. The maintenance personnel would then
simply log on to the network from a client computer and install the needed applications
us- ing the installation software stored on the server.
Within the past few years, even more savings have been achieved by having the
centralized server initiate the software installations or updates on the client computers
without the need for maintenance personnel to actually visit any of the clients.
Backing Up Data
Along those same lines, a network minimizes the time spent backing up (saving extra
copies, called backups) of necessary files. In the event of a hardware or software failure
that causes information or applications to be lost, vital information and necessary
applications can be restored if sufficient backups exist. The backup process is normally
a regular activity in a company, and all transactions between scheduled backups are
recorded so that the files can be restored as completely as possible. Technicians can
access the backup files and recorded transactions from a central location without having
to physically visit the source computers.
information travel.
TEXT MESSAGING A mobile device with text messaging, also called SMS (short message service),
capability allows users to send and receive short text messages on a phone or other mobile device. Te
mes- saging services typically provide users with several options for sending and receiving messages
Mobile to Mobile: send a message from your mobile device to another mobile device
Mobile to E-Mail: send a message from your mobile device to an e-mail address anywhere in t
world
Web to Mobile: send a message from a text messaging Web site to a mobile device, or request
a Web site alert a mobile device with breaking news and other updates, such as sports scores,
stock prices, and weather forecasts
Mobile to Mobile: use a wireless instant messenger to communicate between two mobile
devices
Mobile to Personal Computer: use a wireless instant messenger to communicate between
mobile device and a personal computer
Web to Mobile: send or forward messages from a personal computer’s instant messenger
a mobile device
At home, work, school, and in many public locations, people connect wirelessly to the
Internet through a wireless Internet access point using mobile computers, smart
phones, handheld game consoles, or other devices. Users access wireless Internet access
points with computers or devices that have the necessary built-in wireless capability or
the appropriate wireless network card, PC Card, ExpressCard module, or USB network
adapter (Figure 8-4). Two types of wireless Internet access points are hot spots and
mobile wireless networks.
Cybercafés
When mobile users travel without their notebook computer or Internet-enabled mobile
device, they can visit a cybercafé to access e-mail, the Web, and other Internet services.
A cybercafé, or Internet cafe, is a coffeehouse, restaurant, or other location that provides
personal computers with Internet access to its customers. Cybercafés exist in cities
around the world. Although some provide free Internet access, most charge a per-hour
or per-minute fee. Some cybercafés also are hot spots.
Many mobile devices such as smart phones have GPS capability built into the device or
as an add-on feature. Some users carry a handheld GPS receiver; others mount a
receiver to an object such as an automobile, boat, airplane, farm and construction
equipment, or computer.
The first and most used application of GPS technology is to assist people with
determining where they are located. The data obtained from a GPS, however, can be
applied to a variety of other uses: creating a map, ascertaining the best route between
two points, locating a lost person or stolen object, monitoring the movement of a person
or object, determining altitude, and calculating speed. Many vehicles use GPSs to
provide drivers with directions or other information.
Collaboration
Many software products provide a means to collaborate, or work online, with other
users connected to a server. Two methods of collaboration include collaborative
software and document management systems. Collaborative software includes tools
that enable users to share documents via online meetings and communicate with other
connected users. An online meeting allows users to share documents with others in real
time (Figure 8-6). When the online meeting takes place on the Web, it is called a Web
conference. In an online meeting, all participants see a document(s) at the
same time. As someone changes the document, everyone in the meeting sees the
changes being made. Collaborative software often has chat, white- board, and
video/audio conferencing capabilities.
store additional information such as the docu- ment’s creation date, the user who
created the document, a summary of the document, and any keywords associated with
the document. Google Docs is a Web-based document management system that
provides basic services to its subscribers at no cost.
Groupware
Groupware is software that helps groups of people work together on projects and share
information over a network. Groupware is a component of a broad concept called
workgroup computing, which includes network hardware and software that enables
group members to communicate, manage projects, schedule meetings, and make group
decisions. To assist with these activities, most groupware provides personal information
manager (PIM) functions, such as an elec- tronic appointment calendar, an address
book, and a notepad. A major feature of groupware is group scheduling, in which a
group calendar can track the schedules of multiple users and help coordinate
appointments and meeting times.
Voice Mail
Voice mail, which functions much like an answering machine, allows someone to leave
a voice message for one or more people. Unlike answering machines, however, a
computer in the voice mail system converts an analog voice message into digital form.
Once digitized, the message is stored in a voice mailbox. A voice mailbox is a storage
location on a hard disk in the voice mail system. Some voice mail systems can send
digital voice mail files to e-mail addresses. Others can convert a voice mail message to a
text message for display on a computer or mobile device.
Web Services
DEFINITION OF TERMS
Internet — Worldwide collection of networks that links millions of businesses, government agencies, educational institutions, and individuals
Web — Worldwide collection of electronic documents on the Internet that users access through a Web browser
Instant Messaging — Real-time one-on-one communications service on the Internet that notifies you when one or more people are online and
then allows you to exchange messages, pictures, files, audio, and video
Chat Rooms — Real-time typed conversation among two or more people that takes place on a computer connected to a network that also
may allow the exchange of messages, pictures, files, audio, and video
Newsgroups — Online areas in which users have written discussions about a particular subject
Blogs — Time-stamped articles on a network that reflect the author’s interests, opinions, and personality
Wikis — Collaborative Web sites that allow users to create, add to, modify, or delete Web site content
VoIP — Conversation that takes place over the Internet using a telephone connected to a computer or mobile device or telephone adapter
FTP — Internet standard that permits users to upload and download files to and from FTP servers on the Internet
Web Folders — Location on a Web server (also known as an HTTP server) to which users publish documents and other files
Video Conferencing — Real-time meeting between two or more geographically separated people who use a network to transmit audio and
video data
Fax Machine or Computer Fax/Modem — Transmits and receives documents over telephone lines
Lesson 4 - NETWORKS
A network is a collection of computers and devices connected together via communications devices a
transmission media. Many businesses network their computers together to facilitate communications
share hardware, share data and information, share software, and transfer funds.
A network can be internal to an organization or span the world by connecting to the Internet. Instea
using the Internet or an internal network, some companies hire a value-added network provider for
network functions. A value-added network (VAN) is a third-party business that provides networki
services for a fee.
Networks facilitate communications among users and allow users to share resources with other use
Some examples of resources are data, information, hardware, and software.
Networks usually are classified as a local area network, metropolitan area network, or wide area
network. The main differentiation among these classifications is their area of coverage, as described
the following paragraphs.
LAN A local area network (LAN) is a network that connects computers and devices in a limited
geographical area such as a home, school computer labora- tory, office building, or closely positione
group of buildings. Each computer or device on the network, called a node, often shares resources s
as printers, large hard disks, and programs. Often, the nodes are connected via cables. A wireless
LAN (WLAN) is a LAN that uses no physical wires. Very often, a WLAN com- municates with a wi
LAN for access to its resources.
MAN A metropolitan area network (MAN) is a high-speed network that connects local area networ
a metropolitan area such as a city or town and handles the bulk of communications activity across t
region. A MAN typically includes one or more LANs, but covers a smaller geographic area than a
WAN.
A MAN usually is managed by a consortium of users or by a single network provider that sells the
service to the users. Local and state governments, for example, regulate some MANs. Telephone
companies, cable television operators, and other organizations provide users with connections to th
MAN.
WAN A wide area network (WAN) is a network that covers a large geographic area (such as a city,
country, or the world) using a communications channel that combines many types of media such as
telephone lines, cables, and radio waves (Figure 8-8). A WAN can be one large network or can cons
two or more LANs connected together. The Internet is the world’s largest WAN.
Network Architectures
The design of computers, devices, and media in a network, sometimes called the network architectu
is categorized as either client/server or peer-to-peer.
CLIENT/SERVER On a client/server network, one or more computers act as a server; the other
computers on the network request services from the server (Figure 8-9). A server controls access to
hardware, software, and other resources on the net- work and provides a centralized storage area fo
programs, data, and information. The clients are other computers and mobile devices on the netwo
that rely on the server for its resources. For example, a server might store a database of customers.
Clients on the network (company employ- ees) access the customer database on the server.
Some servers, called dedicated servers, perform a specific task and can be placed with other dedicat
servers to perform multiple tasks. For example, a file server stores and manages files. A print server
manages printers and documents being printed. A database server stores and provides access to a
database. A network server manages network traffic (activity).
A client/server network typically provides an efficient means to connect 10 or more com- puters. Mo
client/server networks require a person to serve as a network administrator because of the large size
the network.
PEER-TO-PEER One type of peer-to-peer network is a simple, inexpensive network that typically
connects fewer than 10 com- puters. Each computer, called a peer, has equal responsibilities and
capabilities, shar- ing hardware (such as a printer), data, or information with other computers on th
peer-to-peer network. Each computer stores files on its own storage devices. Thus, each computer o
network contains both the network operating system and application software. All computers on th
network share any peripheral device(s) attached to any computer. For example, one computer may
a laser printer and a scanner, while another has an ink-jet printer and an external hard disk. Peer-to
net- works are ideal for very small businesses and home users.
Examples of networking software that support P2P are BitTorrent, Gnutella, Kazaa, and LimeWire
which allow users to swap music and other files via the Web.
Network Topologies
A network topology refers to the layout of the computers and devices in a communica- tions netwo
Three commonly used network topologies are bus, ring, and star. Networks usually use combinatio
these topologies.
BUS NETWORK A bus network consists of a single central cable, to which all computers and other
devices connect. The bus is the physical cable that connects the computers and other devices. The bu
a bus network transmits data, instructions, and information in both directions. When a sending dev
trans- mits data, the address of the receiving device is included with the transmission so that the da
routed to the appropriate receiving device.
Bus networks are popular on LANs because they are inexpensive and easy to install. One advantag
the bus network is that comput- ers and other devices can be attached and detached at any point on
bus without dis- turbing the rest of the network. Another advantage is that failure of one device usu
does not affect the rest of the bus network. The greatest risk to a bus network is that the bus itself m
become inoperable. If that hap- pens, the network remains inoperative until the bus is back in work
order.
RING NETWORK On a ring network, a cable forms a closed loop (ring) with all computers and dev
arranged along the ring. Data transmitted on a ring net- work travels from device to device around
entire ring, in one direction. When a computer or device sends data, the data travels to each compu
on the ring until it reaches its destination.
If a computer or device on a ring network fails, all devices before the failed device are unaffected, b
those after the failed device cannot function. A ring network can span a larger distance than a bus
network, but it is more difficult to install. The ring topology primarily is used for LANs, but also is
in WANs.
STAR NETWORK On a star network, all of the computers and devices (nodes) on the network
connect to a central device, thus forming a star. Two types of devices that provide a common centra
connection point for nodes on the network are a hub and a switch. All data that transfers from one n
to another passes through the hub/switch.
Star networks are fairly easy to install and maintain. Nodes can be added to and removed from the
network with little or no disruption to the network.
On a star network, if one node fails, only that node is affected. The other nodes continue to operate
normally. If the hub/switch fails, however, the entire network is inoperable until the device is repair
Intranets
Recognizing the efficiency and power of the Internet, many organizations apply Internet and Web
technologies to their own internal networks. An intranet (intra means within) is an internal network
that uses Internet technolo- gies. Intranets generally make company information accessible to emplo
and facilitate working in groups.
Simple intranet applications include electronic publishing of organizational materials such as teleph
directories, event calendars, procedure manuals, employee benefits information, and job postings.
Additionally, an intranet typically includes a connection to the Internet. More sophis- ticated uses o
intranets include groupware applications such as project management, chat rooms, newsgroups, gr
scheduling, and video conferencing.
An intranet essentially is a small version of the Internet that exists within an organization. Users up
informa- tion on the intranet by creating and posting a Web page, using a method similar to that us
on the Internet.
Sometimes a company uses an extranet, which allows customers or suppliers to access part of its
intranet. Package shipping companies, for example, allow customers to access their intranet to print
bills, schedule pickups, and even track shipped packages as the packages travel to their destination
Today’s networks connect terminals, devices, and computers from many different manufacturers ac
many types of networks, such as wide area, local area, and wireless. For the different devices on var
types of networks to be able to communicate, the network must use similar techniques of moving d
through the network from one application to another.
To alleviate the problems of incompatibility and ensure that hardware and software components ca
integrated into any network, various organizations such as ANSI and IEEE (pronounced I triple E)
propose, develop, and approve network standards. A network standard defines guidelines that spe
the way computers access the medium to which they are attached, the type(s) of medium used, the
speeds used on different types of networks, and the type(s) of physical cable and/or the wireless tec
nology used. A standard that outlines characteristics of how two network devices communicate is c
a protocol. Hardware and software manufacturers design their products to meet the guidelines spec
in a particular standard, so that their devices can communicate with the network.
The following sections discuss some of the more widely used network communications standards f
both wired and wireless networks including Ethernet, token ring, TCP/IP, 802.11 (Wi-Fi), Bluetooth
UWB, IrDA, RFID, WiMAX, and WAP.
ETHERNET Ethernet is a network standard that specifies no central computer or device on the netw
(nodes) should control when data can be transmitted; that is, each node attempts to trans- mit data w
it determines the network is able to receive communications. If two computers on an Ethernet netw
attempt to send data at the same time, a collision occurs, and the computers must attempt to send th
messages again.
Ethernet is based on a bus topology, but Ethernet networks can be wired in a star pattern. The Ether
standard defines guidelines for the physical configuration of the network, e.g., cabling, network car
and nodes. Today, Ethernet is the most popular LAN standard because it is relatively inexpensive a
easy to install and maintain. Ethernet networks often use cables to transmit data.
TOKEN RING The token ring standard specifies that computers and devices on the network share o
pass a special signal, called a token, in a unidirectional manner and in a preset order. A token is a
special series of bits that function like a ticket. The device with the token can transmit data over the
network. Only one token exists per network. This ensures that only one computer transmits data at
time. Token ring is based on a ring topology (although it can use a star topology). The token ring
standard defines guidelines for the physical configuration of a network. Some token ring networks
connect up to 72 devices. Others use a special type of wiring that allows up to 260 connections.
TCP/IP has been adopted as a network standard for Internet communications. Thus, all hosts on the
Internet follow the rules defined in this standard. Internet communications also use other standards
such as the Ethernet standard, as data is routed to its destination.
When a computer sends data over the Internet, the data is divided into packets. Each packet contain
the data, as well as the recipient (destination), the origin (sender), and the sequence information use
reassemble the data at the destination. Each packet travels along the fastest individual available pat
the recipient’s computer via communications devices called routers.
One popular use of the Wi-Fi standard is in hot spots that offer mobile users the ability to connect to
Internet with their Wi-Fi enabled wireless computers and devices. Many homes and small businesse
also use Wi-Fi to network computers and devices together wirelessly.
BLUETOOTH Bluetooth is a standard, specifically a protocol, that defines how two Bluetooth devic
use short-range radio waves to transmit data. To communicate with each other, Bluetooth devices o
must be within about 10 meters (about 33 feet) but can be extended to 100 meters with additional eq
ment. Examples of Bluetooth devices can include desktop computers, notebook computers, handhe
computers, smart phones, PDAs, headsets, microphones, digital cameras, and printers.
UWB UWB, which stands for ultra-wideband, is a network standard that specifies how two UWB
devices use short-range radio waves to communicate at high speeds with each other. For optimal co
munications, the devices should be within 2 to 10 meters (about 6.5 to 33 feet) of each other. Examp
UWB uses include wirelessly transferring video from a digital video camera, printing pictures from
digital camera, downloading media to a portable media player, or displaying a slide show on a
projector.
IRDA Some computers and devices use the IrDA specification to transmit data wirelessly to each ot
via infrared (IR) light waves. Infrared requires a line-of-sight transmission; that is, the sending devi
and the receiving device must be in line with each other so that nothing obstructs the path of the
infrared light wave.
Two types of WiMAX specifications are fixed wireless and mobile wireless. With fixed wire- less
WiMAX, a customer accesses the Internet from a desktop computer at home or other permanent
location. Mobile wireless WiMAX, by contrast, enables users to access the WiMAX network with m
computers and mobile devices such as smart phones.
The WiMAX standard provides wireless broadband Internet access at a reasonable cost over long
distances to business and home users. The WiMAX standard, similar to the Wi-Fi stan- dard, conne
mobile users to the Internet via hot spots. The next generation of game consoles also plans to suppo
the WiMAX standard.
The first two are system software and the third is application software. Examples of application
software for communications: e-mail, FTP, Web browser, newsgroup/message boards, chat rooms,
instant messaging, video conferencing, and VoIP.
Often, a computer has various types of communications software, each serving a different purpose
One type of communications software helps users establish a connection to the Internet using
wizards, dialog boxes, and other on-screen messages. Communications software also allows home
and small office users to configure wired and wireless networks and connect devices to an existing
network.
The public switched telephone network (PSTN) is the worldwide telephone system that handles
voice-oriented telephone calls (Figure 8-15). Nearly the entire telephone network today uses digita
technology, with the exception of the final link from the local telephone company to a home, whic
often is analog.
The telephone network is an integral part of computer communications. Data, instructions, and
information are transmitted over the telephone network using dial-up lines or dedicated lines. Th
following sections discuss dial-up lines and the various types of dedicated lines that use the
telephone network for data communications.
Dial-Up Lines
A dial-up line is a temporary connection that uses one or more analog telephone lines for
communications. A dial-up connection is not permanent. Using a dial-up line to transmit data is
similar to using the telephone to make a call. A modem at the sending end dials the telephone
number of a modem at the receiving end. When the modem at the receiving end answers the call, a
connection is established and data can be transmitted. When either modem hangs up, the
communications end.
Using a dial-up line to connect computers costs no more than making a regular telephone call.
Computers at any two locations establish an Internet or network connection using modems and th
telephone network.
Dedicated Lines
A dedicated line is a type of always-on connection that is established between two communication
devices (unlike a dial-up line where the connection is reestablished each time it is used). The qual
and consistency of the connection on a dedicated line are better than a dial-up line because dedica
lines provide a constant connection.
Businesses often use dedicated lines to connect geographically distant offices. Dedicated lines can
either analog or digital. Digital lines increasingly are connecting home and business users to
networks around the globe because they transmit data and information at faster rates than analog
lines.
Five types of digital dedicated lines are ISDN lines, DSL, FTTP, T-carrier lines, and ATM. Althou
cable television (CATV) lines and fixed wireless are not a type of standard telephone line, they are
very popular ways for the home user to connect to the Internet. Fixed wireless Internet connection
use an antenna on your house or business to communicate with a tower location via radio signals.
Later sections in this chapter discuss the use of CATV lines and radio signals to connect to the
Internet.
The table in Figure 8-16 lists the approximate monthly costs of various types of Internet connectio
and transfer rates (speeds), as compared with dial-up lines. The following sections discuss ISDN
lines, DSL, FTTP, T-carrier lines, and ATM.
ISDN LINES For the small business and home user, an ISDN line provides faster transfer rates th
dial-up telephone lines. Not as widely used today as in the past, ISDN (Integrated Services Digita
Network) is a set of standards for digital transmission of data over standard copper telephone line
ISDN requires that both ends of the connection have an ISDN modem. The ISDN modem at your
loca- tion must be within about 3.5 miles of the telephone company’s ISDN modem. Thus, ISDN
may not be an option for rural residents.
DSL DSL is a popular digital line alternative for the small business or home user. DSL (Digital
Subscriber Line) transmits at fast speeds on existing standard copper telephone wiring. Some DSL
installa- tions include a dial tone, providing users with both voice and data communications.
To connect to DSL, a customer must have a special network card and a DSL modem. Not all areas
offer DSL service because the local telephone company or the lines in the area may not be capable
supporting DSL technology. As with ISDN, DSL may not be an option for rural residents because
user’s location (and DSL modem) and the telephone company’s DSL modem must be located with
about 3.5 miles of each other.
ADSL is one of the more popular types of DSLs. ADSL (asymmetric digital subscriber line) is a ty
of DSL that supports faster transfer rates when receiving data (the downstream rate) than when
sending data (the upstream rate). ADSL is ideal for Internet access because most users download
more information from the Internet than they upload.
FTTP FTTP, which stands for Fiber to the Premises, uses fiber-optic cable to provide extremely hig
speed Internet access to a user's physical permanent location. Two specific types of FTTP are FTTH
(Fiber to the Home) and FTTB (Fiber to the Building). With FTTP service, an optical terminal at yo
premises receives the signals and transfers them to a router connected to your computer. As the co
of installing fiber decreases, increasingly more homes and businesses will opt for this high-speed
Internet access.
The most popular T-carrier line is the T1 line. Businesses often use T1 lines to connect to the
Internet. Many Internet access providers use T1 lines to connect to the Internet backbone. Home a
small business users purchase fractional T1, in which they share a connection to the T1 line with
other users. Fractional T1 is slower than a dedicated T1 line, but it also is less expensive.
A T3 line is equal in speed to 28 T1 lines. T3 lines are quite expensive. Main users of T3 lines inclu
large companies, telephone companies, and Internet access providers connecting to the Internet
backbone. The Internet backbone itself also uses T3 lines.
ATM ATM (Asynchronous Transfer Mode) is a service that carries voice, data, video, and multime
at extremely high speeds. Telephone networks, the Internet, and other networks with large amoun
of traffic use ATM. Some experts predict that ATM eventually will become the Internet standard f
data transmission, replacing T3 lines.
For communications channels that use digital signals (such as cable television lines), the
modem transfers the digital signals between the computer and the communications
channel. If a communications channel uses analog signals (such as some telephone
lines), however, the modem first converts between analog and digital signals.
The following pages describe the following types of communications devices: dial-up
modems, ISDN and DSL modems, cable modems, wireless modems, network cards,
wireless access points, and routers.
Dial-Up Modems
A modem usually is in the form of an adapter card that you insert in an expansion slot
on a com- puter’s motherboard. One end of a standard telephone cord attaches to a port
on the modem card and the other end plugs into a telephone outlet.
Cable Modems
A cable modem is a digital modem that sends and receives digital data over the cable
television (CATV) network (Figure 8-18). With more than 110 million homes wired for
cable television, cable modems provide a faster Internet access alternative to dial-up for
the home user and have speeds similar to DSL. Cable modems currently can transmit
data at speeds that are much faster than either a dial-up modem or ISDN.
Wireless Modems
Some mobile users have a wireless modem that uses the cell phone network to
connect to the Internet wirelessly from a notebook computer, a smart phone, or other
mobile device (Figure 8-19). Wireless modems, which have an external or built-in
antenna, are available as PC Cards, ExpressCard modules, and flash cards.
Network Cards
A wireless access point is a central communications device that allows com- puters and
devices to transfer data wirelessly among themselves or to transfer data wire- lessly to a
wired network (Figure 8-7 on page 303). Wireless access points have high-quality
antennas for optimal signals.
Routers
To prevent unauthorized users from accessing files and computers, many routers are
protected by a built-in firewall, called a hardware firewall. Some also have built-in
antivirus protection. Today’s routers or combination wireless access point/routers are
easy to configure and secure against unauthorized access.
Many home users are connecting multiple computers and devices together in a home network. Each
networked computer in the house has the following capabilities:
Many vendors offer home networking packages that include all the necessary hardware
and software to network your home using wired or wireless techniques. Some of these
packages also offer intelligent networking capabilities. An intelligent home network
extends the basic home network to include features such as lighting control, thermostat
adjustment, and a security system.
As with other networks, a home network can use wires, be wireless, or use a
combination of wired and wireless. Three types of wired home networks are Ethernet,
powerline cable, and phoneline.
To network computers and devices that span multiple rooms or floors in a home, it may
be more convenient to use a wireless strategy. One advantage of wireless networks is
that you can take a mobile computer outside, for example in the backyard, and connect
to the Internet through the home network as long as you are in the network’s range.
Most home networks use a Wi-Fi network, which sends signals through the air at
distances of up to 1,500 feet in some configurations. Home users set up Wi-Fi networks
in their homes because Wi-Fi networks are fairly easy to configure. Each computer that
accesses the network must have the appro- priate built-in wireless networking
capabilities or a wireless network card, which communicates with a wireless access
point or a combination router/wireless access point (Figure 8-22).
COMMUNICATIONS CHANNEL
Figure 8-23 illustrates a typical communications channel and shows the variety of
transmission media used to complete the connection.
Transmission media are one of two types: physical or wireless. Physical transmission
media use wire, cable, and other tangible materials to send communications signals.
Wireless transmission media send communications signals through the air or space
using radio, microwave, and infrared signals. The following sections discuss these types
of media.
LESSON 8 - PHYSICAL TRANSMISSION MEDIA
PHYSICAL TRANSMISSION MEDIA
Physical transmission media used in communications include twisted-pair cable, coaxial cable, and
fiber-optic cable. These cables typically are used within or underground between buildings. Ethernet
and token ring LANs often use physical transmission media.
Twisted-Pair Cable
One of the more commonly used transmission media for network cabling and telephone
systems is twisted-pair cable. Twisted-pair cable consists of one or more twisted-pair
wires bundled together (Figure 8-24). Each twisted-pair wire consists of two separate
insulated copper wires that are twisted together. The wires are twisted together to
reduce noise. Noise is an electri- cal disturbance that can degrade communications.
Coaxial Cable
Coaxial cable, often referred to as coax (pronounced KO-ax), consists of a single copper
wire surrounded by at least three layers: (1) an insulating material, (2) a woven or
braided metal, and (3) a plastic outer coating (Figure 8-25).
Cable television (CATV) network wiring often uses coaxial cable because it can be
cabled over longer distances than twisted-pair cable. Most of today’s computer
networks, however, do not use coaxial cable because other transmission media such as
fiber-optic cable transmit signals at faster
rates.
Fiber-Optic Cable
Fiber-optic cables have the following advantages over cables that use wire, such as
twisted-pair and coaxial cables:
Disadvantages of fiber-optic cable are it costs more than twisted-pair or coaxial cable
and can be difficult to install and modify. Despite these limitations, many local and
long- distance telephone companies are replacing existing telephone lines with fiber-
optic cables, enabling them to offer fiber Internet access to home and business users.
Infrared
As discussed earlier in the chapter, infrared (IR) is a wireless transmission medium that
sends signals using infrared light waves. Mobile computers and devices, such as a
mouse, printer, and smart phone, often have an IrDA port that enables the transfer of
data from one device to another using infrared light waves.
Broadcast Radio
Cellular Radio
Cellular radio is a form of broadcast radio that is used widely for mobile
communications, specifically wireless modems and cell phones. A cell phone is a
telephone device that uses high-frequency radio waves to transmit voice and digital
data messages.
Some mobile users connect their notebook computer or other mobile computer to a cell
phone to access the Web, send and receive e-mail, enter a chat room, or connect to an
office or school network while away from a standard telephone line. Read Looking
Ahead 8-2 for a look at the next generation of cellular communications.
Personal Communications Services (PCS) is the term used by the United States Federal
Communications Commission (FCC) to identify all wireless digital communications.
Devices that use PCS include cell phones, PDAs, pagers, and fax machines.
Microwaves
Communications Satellite
These earth-based stations often are microwave stations. Other devices, such as smart
phones and GPS receivers, also can function as earth-based stations. Transmission from
an earth-based station to a satellite is an uplink. Transmission from a satellite to an
earth-based station is a downlink.
IP Addressing
Two most important functions in a data network are:
An IP address and Subnet Mask are very basic entities of data network.
What is an IP Address?
An IP address is a 32 bit number like 11000000101010000000000100000001 in binary or 3232235
in decimal. So it is written in 4 parts like 11000000.10101000.00000001.00000001 in binary form
192.168.1.1 in decimal form. This way it is easier to understand.
Now, a unique number is sufficient to identify each host in a network but that alone cannot help
reaching from one host to another. Imagine if every house in world had a unique number or some na
but no state, city and country info. Would it be possible to reach a particular house even if its numbe
known?
So logically, addresses are made up of parts, like state, city, street and finally house number. Most of
parts of an address are common to many people, like people living at same street or city. Generally o
the house number and name finally differentiates between any two similar addresses.
Similarly in case of IP address, we logically partition an IP address in parts so that we can reac
computer from anywhere (yes, obviously if the route exists). Also not that logically partitioning an
address is different than writing an IP address in 4 parts, that’s just a notation.
So to keep things simple we generally divide an IP address in two logical parts. One is network part
the other is host part. Network part is like street, city, state which is shared by multiple IP address
Host part is like house number and name of the person. Both parts together uniquely identifies a hos
computer. We can also partition an IP address in more than two parts.
Subnet mask is a 32 bit number just like an IP address and is written just like it. But subnet mask is
used as a 32 bit number. It cannot hold just any value like IP address. Subnet mask is something wh
draws a line somewhere is an IP address to help logically partition an IP address into logical parts. N
again, from logical parts I don’t mean writing an IP address as four 8 bit numbers, that’s the notatio
mean logical parts like Network, Sub-network and host, just like state, city and house number.
A subnet mask should only have continuous 1s starting from MSB (Most Significant Bit).
11111111.11111111.00000000.00000000. Which means first 16 bits of an IP address belongs to netw
part and rest is host part. A subnet mask can also have non-contiguous 1s, but that is str
discouraged and not recommended by RFC 950.
“Subnet” means sub-network. So the purpose of subnet mask was to create another partition (3rd p
in an IP Address after network part. But then how we defined and identified the network part of an
address? Why we required another logical partition of sub-networks when we already had network p
Now, to understand all this we need to know a little history of how networks worked in its starting day
History of Subnet Mask
In 1969:
THERE WAS NO SUBNET MASK!!!
Standard reserved first 8 bits for network part. That meant we could only have 254 distinct networks
each network can have 16,777,214 IP addresses.
In 1981:
24-bits for host address can hold 16,777,214 IP addresses. Not every organization in world require
network of thousands of computers. Rather we required more networks of smaller size. Also it was c
that different organization have different requirement of network size. This meant that we will hav
partition IP addresses in a way so that we can have different sizes of network. The different size
network bits created different classes of network, which we called Class A, Class B and Class C.
But as there was nothing other than IP address, not even subnet mask, we needed a way to iden
what is the network class of a given IP address. Take 12.1.2.3 for an example. We cannot identify w
part of it belongs to network and to host without any other information given.
In 1981, numbers of networks being used were very less and were limited to 6 LSB (Least Signific
Bits) of Network bits (First 8 bits). You can say if 50 networks existed at that time then 50 will tak
value of 00110010. So by standard we fixed the values of MSBs of first octet to identify class of an
address which automatically divided the decimal value of first octet in ranges. Also we wanted that n
scheme should not cause to change existing IP addresses in use.
For example Class A’s IP address will always have MSB always 0. Which means any class A addr
will always be between 0-127 in its first octet.
Class
Network Bits Host Bits Range First Octet Leading Bits
Class A
8 24 0-127 0XXXXXXX
Class B
16 16 128-191 10XXXXXX
Class C
24 8 192-224 110XXXXX
Class D
Not Defined Not Defined 225-239 1110XXXX
Class E
Not Defined Not Defined 240-255 1111XXXX
In 1985:
Enough, we require a Subnet Mask now!
Finally in RFC 950 Subnetting was introduced. Soon after classes were introduced, as numbe
organizations grew at a very past pace, we realized that we needed some way to further partitio
network into Sub-networks of smaller sizes. Here was the subnet mask introduced. That is why
called a “subnet” mask, but not network mask. Use of a subnet mask along with an IP Address a
gave the flexibility to define subnets of various sizes to network administrators.
Network Devices, Operating systems and protocols were updated to accommodate for subnet ma
Classes still existed. Still we used the MSBs to identify Class of an IP address. Subnet mask alw
took value greater than 255.0.0.0 like 255.240.0.0. We used it to further subnet a Classful netw
Subnet mask logically partitioned an IP address into three parts. This methodology of allocating
addresses is called Classful Networking.
Why do we need to divide an IP address in three parts, why not just two? You can just merge sub
part with network part using a subnet mask or call it a Network Prefix. Why do we need clas
anymore? Nowadays when we enter an IP address 192.168.1.1 in network card properties, subnet m
255.255.255.0 will be automatically populated in subnet mask field. This does not mean that we can
set subnet mask 255.0.0.0 for an IP address 192.168.1.1 in case of classless networking. It is just
we are being compatible with Classful network and respecting private IP range. But technically it
work with any network prefix. Network devices, operating systems and protocols do not care ab
classes anymore.
IP ADDRESS FORMAT
Exclusions
Some address ranges are excluded from the above classes. All addresses of the form 127.xx.yy.xx are used for diagnostic
The following address ranges are designated as "private": meaning thay can only be used on networks which are not
connected to the global Internet:
10.0.0.0 - 10.255.255.255
172.16.0.0.0 - 172.31.255.255
192.168.0.0 - 192.168.255.255
Examples
Find the class, network and host addresses for:
4.23.145.90
227.34.78.7
246.7.3.8
129.6.8.4
198.76.9.23
Subnetting, Supernetting and Network Address Translation
The classfull addressing scheme has proved to be too inflexible to accommodate the demand for IP addresses; specifica
the convention that the part of the address which identifies a physical network must come on an 8-bit boundary meant
the address space could not be allocated efficiently and a significant proportion of addresses would be wasted. For
instance, a Class A network can in theory have 16 million host IDs, which is way more than would be possible for a single
physical network (subnet). Many enterprises have been allocated Class B addresses, giving them a theoretical maximum
65,535 hosts, and may have no more than a few hundred hosts or less: under the classfull scheme the remaining host ID
for that network ID would be unused.
The lack of inflexibility in the addressing scheme is particulalrly undesirable because according to many authorities there
a real danger of the Internet running out of addresses, as a result of several factors which were not envisaged when the
Internet protocols were originally designed, such as :
Subnetting
The basic idea behind subnetting is that we take away some bits from the host portion of the address and use them to
identify the subnet. This will only be visible to hosts and routers on the local network; from the point of view of the Inte
at large only the network ID portion will have any particular meaning. The way this works is that the network administra
defines a subnet mask, a string of 32 binary digits indicating the boundary between the subnet and host sections of the
"local" portion of an IP address. Some examples should help make this clear:
Take the Class A address 9.67.38.1, where 9 is the network address and 67.38.1 identifies a particular host on that netw
Suppose the network administrator wants to use bits 8 to 25 to identify the subnet, leaving 26 to 31 for host addresses.
is done by means of a mask which is all 1's from bits 0 to 25 with the remainder set to 0's:
11111111 11111111 11111111 11000000The subnet can then be indentified by ANDing the complete IP address with th
mask giving the result shown below:
11111111 11111111 11111111 11100000This means that the first three bits from the host ID are used to identify the
subnet, and the remaining 5 bits indicate the host itself. Take a host with the IP address
255.0.0.0
255.255.0.0
255.255.255.0
N/A
N/A
As a consequence of the address exhaustion problem, Class B addresses are only assigned to organisations that
show a clear need for them: organisations which do not meet the requirements are instead given a contiguous
block of Class C addresses.
Having a series fo router table entries for networks which all map onto the same route is wasteful of space and
degrades routing algorithms.
CIDR uses a supernet mask along with the lowest network address in the assigned block to identify the range of assigned
network addresses.
Network Address Translation is a technique which allows for the composition of a network to be completely hidden from
the outside world, with the entire network identified by a single IP address. Within the network, hosts and routers have
addresses which are unique to that network, typically taked from the ranges designated as "private" (see above). In ord
to make sure that responses get back to the right hosts when packets are sent out into the Internet, the router will
construct a table associating outgoing packets with private IP addresses; the address of the relevant table entry will be
stored in the packet itself. This technique is controversial however; for one thing the field in the packet where the index
into the table is stored is part of the TCP header, which violates the principles of modularity and encapsulation on which
"protocol stack" models are based.
A longer term solution to the address exhaustion problem is offered by IP version 6 (IPv6) which among other innovatio
will support 128-bit addresses.
Sign in|Recent Site Activity|Report Abuse|Print Page|Powered
Making Ethernet Cables