Professional Documents
Culture Documents
Networkspide
Networkspide
Overview
What is a network?
Types of network (LAN & WAN)
Advantages & Disadvantages.
Hardware
Fileserver, Workstation, NIC, Router
Software Operating Systems
Peer-to-Peer
Client/Server
Cabling
UTP, Coaxial, Fiber Optic
Wireless
Protocols
Ethernet
Token Ring
Topologies
What is a Network?
Fileserver
A file server stands at the heart of most
networks. It is a very fast computer with a
large amount of RAM and storage space,
along with a fast network interface card.
The network operating system software
resides on this computer, along with any
software applications and data files that
need to be shared.
HARDWARE
Workstations
All of the computers connected to the file
server on a network are called workstations. A
typical workstation is a computer that is
configured with a network interface card,
networking software, and the appropriate
cables. Workstations do not necessarily need
floppy disk drives or hard drives because files
can be saved on the file server. Almost any
computer can serve as a network workstation.
HARDWARE
Router
If a LAN connects to the Internet a network
will need router. The router serves as the
translator between the information on the
LAN and the Internet. It also determines
the best route to send the data over the
Internet.
SOFTWARE
Network Operating Systems
Peer-to-Peer
Peer-to-peer network operating systems
allow users to share resources and files
located on their computers and to access
shared resources found on other
computers. However, they do not have a
file server or a centralized management
source. In a peer-to-peer network, all
computers are considered equal; they all
have the same abilities to use the resources
available on the network. Peer-to-peer
networks are designed primarily for small
to medium local area networks
SOFTWARE
Client/Server
Client/server network operating systems allow
the network to centralize functions and
applications in one or more dedicated file
servers. The file servers become the heart of
the system, providing access to resources and
providing security. Individual workstations
(clients) have access to the resources available
on the file servers.
NETWORKS
Cabling
Cable is the medium through which
information usually moves from one
network device to another.
Unshielded Twisted Pair
(UTP) Cable
Twisted pair cabling comes in two varieties: shielded
and unshielded. Unshielded twisted pair (UTP) is the
most popular and is the type we use. The quality of
UTP may vary from telephone-grade wire to
extremely high-speed cable. The cable has four pairs
of wires inside the jacket. Each pair is twisted with a
different number of twists per inch to help eliminate
interference from adjacent pairs and other electrical
devices. There are 5 categories recognized.
UTP Connectors
Gigabit Ethernet
The Ethernet has a standard protocol of 1Gbps
transmission speed but used primarily for
backbones on a network.
LOCAL TALK
Apple Computer developed LocalTalk for
Macintosh computers. The method used by
LocalTalk is called CSMA/CA (Carrier Sense
Multiple Access with Collision Avoidance). It is
similar to CSMA/CD except that a computer
signals its intent to transmit before it actually
does so. LocalTalk adapters and special twisted
pair cable can be used to connect a series of
computers through the serial port.
Physical Topologies
The configuration of cables, computers,
and other peripherals.
NETWORK TOPOLOGY
The simplest network topology you can have is a single link (i.e.
cable, optical fibre, radio or any other means of transmitting
data) between two computers.
MESH
STAR
BUS
TREE
RING
BACKBONE
MESH TOPOLOGY
A randomly connected network is called a mesh topology.
Mesh topologies are most suited to networks that are built up
over time.
The Internet is a mesh
topology. It has been
added to over time with
no central control.
Mesh topologies are
easily extended.
Often there is more than one possible route for messages to
follow. If one path fails then another can be used.
There is no simple algorithm for routing messages. Messages
are often sent over sub-optimal paths.
Control and security can be difficult to enforce effectively.
STAR TOPOLOGY
If all the hosts are connected to a central hub (which can be a
switching device or a central server also acting as a router)
then we have a star topology.
Hosts communicate by sending their
messages to the hub. It then
forwards the messages to the
destination host.
Star topologies are popular with
financial institutions who keep their
latest records on a central server.
Any changes to the records are
updated centrally.
Host
Computers Bi-directional
medium
Network Terminator
Interface Units
This means that the Ring can be expanded to any size (although
more hops will be required to get the packets to their
destinations).