Professional Documents
Culture Documents
Networking
Networking
INTRODUCTION
The first networks were timesharing networks that use mainframes and
Attached terminals. LAN evolved around PC evaluation. LAN enabled
Multiple users in a limited geographical area. Lack of management and
Duplication of resources resulted in evolution of LAN.
Challenges were connecting various systems together having various
Technologies. Making standards was again a big challenge.
Challenges were face in mostly these areas such as connectivity,
reliability, network management & flexibility. The final concern was
related to network expansion & new technologies.
TYPES OF NETWORKS
INTRODUCTION:
A local area network is a group of computers and associated devices
that share a common Communications line or wireless link and typically
share the resources of a single processor or server within a small
geographic area. Usually, the server has applications and data storage
that are shared in common by multiple computer users. A local area
network may serve as few as two or three users or as many as thousands
of users.
A non-public data Communications network Confined to a limited
geographic area (usually within a few miles), used to provide
communication between computers and peripherals. The area served may
consist of a single building, a cluster of buildings, or a campus-type
arrangement.
In a typical LAN configuration, one computer is designated as the file
server. It stores all of the software that controls the network, as well as
the software that can be shared by the computers attached to the
network. Computers Connected to the file server are called work stations.
The workstations can be less powerful than the file server, and they may
have additional software on their hard drives. cables are used to connect
the network interface cards in each computer.
OPEN SYSTEM INTERCONNECTION
MODEL (OSI)
1. Application Layer
2. Presentation Layer
3. Session Layer
4. Transport Layer
5. Network Layer
6. Data-link Layer
7. Physical Layer
Layer P protocol N/W
Function Device
Application used for applications specifically written DNS; FTP; Gateway
to run over the network TFTP;
User Interface allows access to network services that TELNET;
support applications; NCP;
directly represents the services that
directly support user applications
handles network access, flow control
and error recovery
Example apps are file transfer-mail.
Data Link Turns packets into raw bits at the Logical Link Bridge
receiving end turn bits into packets. Control
data frames to handles data frames between the Switch
bits Network and Physical layers error
the receiving end packages raw data correction Hub
from the Physical layer into data and flow
frames for delivery to the Network control NIC
layer
802.1 OSI
responsible for error-free transfer of
Model
frames to other computer via the
Physical Layer 802.2 Logical
This layer defines the methods used to Link Control
transmit and receive data on the Media Access
network. It consists of the wiring; the Control
devices use to connect the NIC to the
wiring, the signaling involved
transmitting / receiving data.
Physical transmits raw bit stream over physical IEEE 802 Repeater
cable
hardware; raw defines cables, cards, and physical IEEE 802.2 Multiple--
bit stream aspects xer
defines NIC attachments to hardware, ISO 2110
how cable is attached to NIC Hubs
defines techniques to transfer bit ISDN
stream to cable .
WORKING OF OSI MODEL
COMMUNICATION
SYSTEM -1 SYSTEM -2
Components of LAN
a. Network Cabling
b. Network Devices
c. Network Topology
d. Protocols
What is Network Cabling?
Cable is the medium through which information usually moves from one
network device to another. There are several types of cable which are
commonly used with LANs. In some cases, a network will utilize only one
type of cable, other networks will use a variety of cable types. The type of
cable chosen for a network is related to the network's topology, protocol,
and size. Understanding the characteristics of different types of cable and
how they relate to other aspects of a network is necessary for the
development of a successful network.
The following sections discuss the types of cables used in networks and
other related topics.
Φ Coaxial Cable
Type Use
Coaxial Cable
Coaxial cabling has a single copper conductor at its center. A plastic layer
provides insulation between the center conductor and a braided metal
shield .The metal shield helps to block any outside interference from
fluorescent lights, motors, and other computers.
The most common type of connector used with coaxial cables is the
Bayone-Neill-Concelman (BNC) connector.
To help avoid problems with were network; always use the BNC
connectors that crimp, rather than screw, onto the cable.
Fiber Optics
This is the basic building block for a fiber optic based network. A model of
this simple link is shown
SINGLE-MODE FIBER: has a narrow core (eight microns or less), and the
index of refraction between the core and the cladding changes less than it
does for multimode fibers. Light thus travels parallel to the axis, creating
little pulse dispersion. Telephone and cable television networks install
millions of kilometers of this fiber every year.
Total internal refection confines light within optical fibers (similar to
looking down a mirror made in the shape of a long paper towel tube).
Because the cladding has a lower refractive index, light rays reflect back
into the core if they encounter the cladding at a shallow angle (red lines).
A ray that exceeds a certain "critical" angle escapes from the fiber (yellow
line).
The The fiber is mounted in a long, thin cylinder, the ferrule, which acts as a
Ferrule fiber alignment mechanism. The ferrule is bored through the center at
: a diameter that is slightly larger than the diameter of the fiber
cladding. The end of the fiber is located at the end of the ferrule.
Ferrules are typically made of metal or ceramic, but they may also be
constructed of plastic.
Coupling Most fiber optic connectors do not use the male-female configuration
common to electronic connectors. Instead, a coupling device such as an
Device: alignment sleeve is used to mate the connectors. Similar devices may
be installed in fiber optic transmitters and receivers to allow these
devices to be mated via a connector. These devices are also known as
feed-through bulkhead adapters.
The Also called the connector housing, the connector body holds the ferrule.
Cable: It is usually constructed of metal or plastic and includes one or more
assembled pieces which hold the fiber in place. The details of these
connector body assemblies vary among connectors, but bonding and/or
crimping is commonly used to attach strength members and cable
jackets to the connector body. The ferrule extends past the connector
body to slip into the coupling device.
1. Cut the cable one inch longer than the required finished length.
2. Carefully strip the outer jacket of the fiber with “no nick” fiber
strippers. Cut the exposed strength members, and remove the fiber
coating. The fiber coating can be removed by carefully stripping the fiber
with a fiber stripper. Be sure to use strippers made specifically for use
with fiber rather than metal wire strippers as damage can occur,
weakening the fiber.
3. Thoroughly clean the bared fiber with isopropyl alcohol poured onto a
soft, lint-free cloth NEVER clean the fiber with a dry tissue. Note: Use
only industrial grade 99% pure isopropyl alcohol. Commercially available
isopropyl alcohol is for medicinal use and is diluted with water and a light
mineral oil. Industrial grade isopropyl alcohol should be used exclusively.
Disadvantages :─
High Cost
Connectors have high loss & installation time
General installations are different
Electrical-to-optical conversions
Repairs are not easily made
STRUCTUCTURED CABLING
NETWORK DEVICES
INTRODUCTION:
Network Devices is a machine or component that is attached to a
computer. Examples of devices include disk drives, printers, mice, and
DSL modems. These particular devices fall into the category of peripheral
devices because they are separate from the main computer.
1. Hub
2. Switch
3. Router
4. Repeater
5. Network card
6. Bridge
7. Gateways
HUB:
As its name implies, a hub is a center of activity. In more specific network
terms, a hub, or concentrator, is a common wiring point for networks that
are based around a star topology. Arcnet, 10base-T, and 10base-F, as
well as many other proprietary network topologies, all rely on the use of
hubs to connect different cable runs and to distribute data across the
various segments of a network. Hubs basically act as a signal splitter.
They take all of the signals they receive in through one port and
redistribute it out through all ports.
Hub works on Physical Layer of OSI model.
Types of Hubs
Types of Hub: ─
1. Passive Hub
2. Active Hub
PASSIVE HUB: ─
Passive hubs, as the name suggests simply take all of the packets they
receive on a single port and rebroadcast them across all ports--the
simplest thing that a hub can do.
Passive hubs commonly have one 10base-2 port in addition to the RJ-45
connectors that connect each LAN device. Most passive hubs are excellent
entry-level devices that you can use as your starting points in the world
of star topology Ethernet. Most eight-port passive hubs Passive hubs act
as connection points and do not amplify or regenerate the signal; the
signal passes through the hub. It hubs do not require electricity to run.
ACTIVE HUB: ─
Most hubs are Active in that they regenerate and retransmit the signals
the same way a repeater does. In fact, because hubs usually have eight
to twelve ports for computers to connect to, they are often called
multiport repeaters.
This ensures the integrity of our data; it does nothing to increase overall
network speed. Switches help to ensure additional network access
opportunities for attached devices (increasing speed and reducing traffic)
by restricting data flows to local segments unless frames are destined for
a host located on another segment. The switch examine the destination
address and forward the requisite frames only across the destination
segment, leaving all additional segments attached to that switch free
from that particular broadcast and (theoretically) able to facilitate local-
segment traffic. Rather than being a passive connection between multiple
segments, the switch works to ensure that network traffic burdens the
fewest number of segments possible.
Types of switch
There are different types of Switch, each offering specific features that
allow varying levels of services.
Switch is divided according to there functions: ─
1. According to managing
2. According to layers
According to Managing: ─
According to Layers: ─
Layer Two Switches: -Layer two switches often make their forwarding
decisions based on the Media Access Control (MAC) address of an
Ethernet node.
Layer Three Switches: -The switch then uses this information to off-
load all IP packets forwarding from the legacy router. This scenario
requires very little network re-configuration, and offers a cheap boost in
IP forwarding speeds Even though layer three switches are cheap, users
don't need all their functionality at the desktop.
Difference between a hub and a switch
Hubs and switches are different types of network equipment that connect
devices. They differ in the way that they pass on the network traffic that
they receive. Switches differ in some ways. They can be of the store-and-
forward type, storing each incoming packet in an internal buffer before
forwarding it, or cut-through, beginning to forward packets already after
their header is in and before the rest of the packet has been received.
Hubs repeat everything they receive and can be used to extend the
network. However, this can result in a lot of unnecessary traffic being
sent to all devices on the network. Hubs pass on traffic to the network
regardless of the intended destination.
In a small network (less than 30 users), a hub (or collection of hubs) can
easily cope with the network traffic generated and is the ideal piece of
equipment to use for connecting the users.
When the network gets larger (about 50 users), you may need to use a
switch to divide the groups of hubs, to cut down the amount of
unnecessary traffic being generated.
ROUTER: ─
Types of Router:─
routes.
Fig: routing of data through routing table
REPEATER: ─
A network device that repeats signals from one cable onto one or
more other cables, while restoring signal timing and waveforms.
Repeaters are the most common way to connect local networks
together, and can provide either Thin wire or Thick wire connections.
They are commonly used to create larger local networks up to a certain
limit based on the number of repeaters and the length of the cables.
Network interface cards are a major factor in determining the speed and
performance of a network. It is a good idea to use the fastest network
card available for the type of workstation you are using.
Features of NIC: ─
• Wake up LAN
• It can be used for server connection.
• Auto sensing of speed.
• Reliable data transfer.
• Alert monitor for physical removal
• Alert monitor for power failure.
• Load balancing.
• Plug and play operation.
BRIDGE: ─
Bridges, which operate at the data link layer, connect two LANs (local
area networks) together, and forward frames according to their MAC
(media access control) address. Often the concept of a router is more
familiar than that of a bridge; it may help to think of a bridge as a "low-
level router" (routers operate at the network layer, forwarding by
addresses such as an IP address).
GATEWAYS: ─
• Gateways communicate architectures and environments.
• They repackage and convert data going from one environment to
another so that each can understand the other environment's data.
• A Gateway connects two dissimilar networks.
• Gateways use in all layers of OSI model.
PATCH PANEL:─
A panel of network ports contained together, usually within a
telecommunications closet, that connects incoming and outgoing lines of
a LAN or other communication, electronic or electrical system. In a LAN,
the patch panel connects the network's computers to each other and to
the outside lines that enable the LAN to connect to the Internet or
another WAN. Connections are made with patch cords. The patch panel
allows circuits to be arranged and rearranged by plugging and unplugging
the patch cords.
It is a mounted hardware unit containing an assembly of port locations in
a communications or other electronic or electrical system. In a network, a
patch panel serves as a sort of static switchboard, using cables to
interconnect computers within the area of a local area network (LAN) and
to the outside for connection to the Internet or other wide area network
(WAN). A patch panel uses a sort of jumper cable called a patch cord to
create each interconnection.
TOPOLOGY
Linear Bus
Star
Star-Wired Ring
Tree
Considerations When Choosing a Topology
Summary Chart
Linear Bus
Star topology
Summary Chart:
Physical Topology Common Cable Common Protocol
Twisted Pair
Ethernet
Linear Bus Coaxial
Local Talk
Fiber
Twisted Pair
Tree Coaxial Ethernet
Fiber
PROTOCOLS
The Ethernet protocol is by far the most widely used. Ethernet uses an
access method called CSMA/CD (Carrier Sense Multiple Access / Collision
Detection). This is a system where each computer listens to the cable
before sending anything through the network. If the network is clear, the
computer will transmit. If some other node is already transmitting on the
cable, the computer will wait and try again when the line is clear.
The Ethernet protocol allows for linear bus, star, or tree topologies. Data
can be transmitted over twisted pair, coaxial, or fiber optic cable at a
speed of 10 Mbps up to 1000 Mbps.
Fast Ethernet
Token Ring
The Token Ring protocol was developed by IBM in the mid-1980s. The
access method used involves token-passing. In Token Ring, the
computers are connected so that the signal travels around the network
from one computer to another in a logical ring. A single electronic token
moves around the ring from one computer to the next. If a computer
does not have information to transmit, it simply passes the token on to
the next workstation. If a computer wishes to transmit and receives an
empty token, it attaches data to the token. The token then proceeds
around the ring until it comes to the computer for which the data is
meant. At this point, the data is captured by the receiving computer.
The Token Ring protocol requires a star-wired ring using twisted pair or
fiber optic cable. It can operate at transmission speeds of 4 Mbps or 16
Mbps. Due to the increasing popularity of Ethernet, the use of Token Ring
in school environments has decreased.
ATM is a network protocol that transmits data at a high speed. ATM works
by transmitting all data in small packets of a fixed size; whereas, other
protocols transfer variable length packets. ATM supports a variety of
media such as video, CD-quality audio, and imaging. ATM employs a star
topology, which can work with fiber optic as well as twisted pair
cable.ATM is most often used to interconnect two or more local area
networks. It is also frequently used by Internet Service Providers to
utilize high-speed access to the Internet for their clients. As ATM
technology becomes more cost-effective.
LAYERS OF ATM
IP Packet Format
Version (4)- The version number of the IP.Set to 4 right now, 6 for Pv6.
Fragment Offset Pointer that shows how far from the original datagram this
(10)- one is if it has been fragmented.
Time to Live (8)- A number representing how long until this information is
killed. Every time a router receives it, this entry is
decreased by one. At zero, the datagram is discarded. This
prevents infinite loops.
Protocol (8)- Which upper level protocol is present? (TCP, UDP, etc.)
IP Address Format
(224 - 2)
NOTE: 1
N = Network number, H = Host number.
2
One address is reserved for the broadcast address, and one address is
reserved for the network.
The class of address can be determined easily by examining the first octet
of the address and mapping that value to a class range in the following
table. In an IP address of 172.31.1.2, for example, the first octet is 172.
Because 172 falls between 128 and 191, 172.31.1.2 is a Class B address.
IP Subnet Addressing
A subnet address is created by "borrowing" bits from the host field and
designating them as the subnet field. The number of borrowed bits varies
and is specified by the subnet mask.
The default subnet mask for a Class B address that has no subnetting is
255.255.0.0, while the subnet mask for a Class B address 171.16.0.0 that
specifies eight bits of subnetting is 255.255.255.0. The reason for this is
that eight bits of subnetting or 28 - 2 (1 for the network address and 1 for
the broadcast address) = 254 subnets possible, with 28 - 2 = 254 hosts
per subnet.
The subnet mask for a Class C address 192.168.2.0 that specifies five bits
of subnetting is 255.255.255.248.With five bits available for subnetting,
25 - 2 = 30 subnets possible, with 23 - 2 = 6 hosts per subnet. The
reference charts shown in table 30-2 and table 30-3 can be used when
planning Class B and C networks to determine the required number of
subnets and hosts, and the appropriate subnet mask.
2 255.255.192.0 2 16382
3 255.255.224.0 6 8190
4 255.255.240.0 14 4094
5 255.255.248.0 30 2046
6 255.255.252.0 62 1022
10 255.255.255.192 1022 62
11 255.255.255.224 2046 30
12 255.255.255.240 4094 14
13 255.255.255.248 8190 6
14 255.255.255.252 16382 2
2 255.255.255.192 2 62
3 255.255.255.224 6 30
4 255.255.255.240 14 14
5 255.255.255.248 30 6
6 255.255.255.252 62 2
The router performs a set process to determine the network (or more
specifically, the subnetwork) address. First, the router extracts the IP
destination address from the incoming packet and retrieves the internal
subnet mask.
The router then looks up the destination network number and matches it
with an outgoing interface. Finally, it forwards the frame to the
destination IP address. Specifics regarding the logical AND operation are
discussed in the following section.
IP Routing
TCP PROTOCOL
Second, data packets traveling the Internet are transported in clear text.
Consequently, anyone who can see Internet traffic can also read the data
contained in the packets. This is clearly a problem if companies want to
use the Internet to pass important, confidential business information.
The primary protocol used with traditional NetWare is IPX. So, to use a
generic layer-2 VPN model, IPX packets bound for the remote network
reach a tunnel initiating device - perhaps a remote access device, a
router, or even a desktop PC, in the case of remote-client-to-server
connections - which prepares them for transmission over the Internet.
The VPN tunnel initiator on the source network communicates with a VPN
tunnel terminator on the destination network. The two agree upon an
encryption scheme, and the tunnel initiator encrypts the packet for
security. (For better security, there should be an authentication process
to ensure that the connecting user has the proper rights to enter the
destination network. Most currently available VPN products support
multiple forms of authentication.)
On the destination end, the VPN tunnel terminator receives the packet
and removes the IP information. It then decrypts the packet according to
the agreed upon encryption scheme, and sends the resulting packet to
the remote access server or local router, which passes the hidden IPX
packet to the network for delivery to the appropriate destination.
DSL services target home and small business customers. However, the
service only works over a limited physical distance and remains
unavailable in many residential areas. The term "xDSL" generally refers
to the complete family of related DSL technologies -- ADSL, SDSL, VDSL,
and so on -- rather than any one specific implementation.
DSL Crib Sheet
DSL runs about 18,000 feet (3.5 miles or 5.5 kilometers) from a
telephone exchange. Without going into to all the details of public
exchanges, suffice it to say that companies in the United States
historically did not install them this close to homes in some suburban and
many rural areas. Technology constrain these physical cable distances
even further -- down to as low as 1,000 feet (0.2 miles or 0.35
kilometers). They do this in order to offer even faster network speeds.
WIRELESS NETWORKING
Typical indoor ranges are 150-300 feet, but can be shorter if the
building construction interferes with radio transmissions. Longer
ranges are possible, but performance will degrade with distance.
Outdoor ranges are quoted up to 1000 feet, but again this depends
upon the environment.
Extension Point.
Wireless connected computers using an Access Point with an
Extension Point.
Roaming