Cit722 Summary From

Download as pdf or txt
Download as pdf or txt
You are on page 1of 26

CIT722 SUMMARY FROM NOUNGEEKS.

COM

DEFINITION OF COMPUTER NETWORK

A computer network may be defined as the coordination or

interconnection of a number of individual computers. A

computer network is basically established by the network layer

in the Open Systems Infrastructure model, popularly known as

the OSI model.

Computer networks exist on various scales, from links between

machines in the same room up through wiring connecting the

machines in a building or campus to regional, national and

global networks. Various media are used to carry the

communications signals: copper wire, fibre-optic cables and

wireless or radio transmissions etc.

NETWORKING CONCEPT

Networking is the concept of sharing resources and services. A

network of computers is a group of interconnected systems

sharing resources and interacting using a shared


communications link. A network, therefore, is a set of

interconnected systems with something to share. The shared

resource can be data, a printer, a fax modem, or a service such as

a database or an email system. The individual systems must be

connected through a pathway (called the transmission medium)

that is used to transmit the resource or service between the

computers.

All systems on the pathway must follow a set of common

communication rules for data to arrive at its intended

destination and for the sending and receiving systems to

understand each other. The rules governing computer

communication are called protocols. In summary, all networks

must have the following:

 A resource to share (resource)

 A pathway to transfer data (transmission medium)

 A set of rules governing how to communicate (protocols)

BENEFITS OF COMPUTER NETWORK


File Sharing: Networks offer a quick and easy way to share

files directly. Instead of using a disk or USB key to carry files

from one computer or office to another, you can share files

directly using a network.

Security: Specific directories can be password protected to

limit access to authorized users. Also, files and programs on a

network can be designated as "copy inhibit" so you don’t have to

worry about the illegal copying of programs.

Resource Sharing: All computers in the network can share

resources such as printers, fax machines, modems, and

scanners.

Communication: Even outside of the internet, those on the

network can communicate with each other via electronic mail

over the network system. When connected to the internet,

network users can communicate with people around the world

via the network.

Flexible Access: Networks allow their users to access files

from computers throughout the network. This means that a user


can begin work on a project on one computer and finish up on

another. Multiple users can also collaborate on the same project

through the network.

Workgroup Computing: Workgroup software like Microsoft

BackOffice enables many users to contribute to a document

concurrently. This allows for interactive teamwork.

KEY ISSUES TO COMPUTER NETWORK

The following are the major key issues to be trashed out very

carefully before we go for a computer network:

 Nature of Nodes -Whether participating nodes are

homogeneous or heterogeneous in nature?

 Topology - Which of the computer topology has to be

followed? Computer topology accounts for the physical

arrangement of participating computers in the network.

 Interconnection Type - Whether interconnection type is

point-to-point, multi-point, or broadcast type.


 Reliability - How reliable our network is? Reliability aspect

includes error rate, redundancy and recovery procedures.

 Channel Capacity Allocation - Whether allocation of channel

capacity is time-division or frequency division?

NETWORKING HARDWARE

Networking hardware includes all computers, peripherals,

interface cards and other equipment needed to perform

data-processing and communications within the network.

File Servers

A file server stands at the heart of most networks. It is a very fast

computer with a large amount of RAM and storage space, along

with a fast network interface card. The network operating

system software resides on this computer, along with any

software applications and data files that need to be shared.


The file server controls the communication of information between

the nodes on a network. For example, it may be asked to send a

word processor program to one workstation, receive a database file

from another workstation, and store an e-mail message during the

same time period.

Ethernet Cards

Ethernet cards are usually purchased separately from a

computer, although many computers (such as the Macintosh)

now include an option for a pre-installed Ethernet card.

Ethernet cards contain connections for either coaxial or twisted

pair cables (or both) (See fig. 1.3.2). If it is designed for coaxial

cable, the connection will be BNC. If it is designed for twisted

pair, it will have a RJ- 45 connection. Some Ethernet cards also

contain an AUI connector. This can be used to attach coaxial,

twisted pair, or fiber optics cable to an Ethernet card. When this

method is used there is always an external transceiver attached

to the workstation.

Bridges
A bridge is a device that allows you to segment a large network

into two smaller, more efficient networks. If you are adding to an

older wiring scheme and want the new network to be up-to-date,

a bridge can connect the two.

A bridge monitors the information traffic on both sides of the

network so that it can pass packets of information to the correct

location. Most bridges can "listen" to the network and

automatically figure out the address of each computer on both

sides of the bridge. The bridge can inspect each message and, if

necessary, broadcast it on the other side of the network.

Routers

A router translates information from one network to another; it

is similar to a super-intelligent bridge. Routers select the best

path to route a message, based on the destination address and

origin. The router can direct traffic to prevent head-on collisions,

and is smart enough to know when to direct traffic along back

roads and shortcuts.


NETWORK OPERATING SYSTEM

A network operating system (NOS) is a computer operating system

that is designed primarily to support workstation, personal

computer, and, in some instances, older terminal that are

connected on a local area network (LAN). Artisoft's LANtastic,

Banyan VINES, Novell's Netware, and Microsoft's LAN Manager

are examples of network operating systems. In addition, some

multi-purpose operating systems, such as Windows NT and

Digital's OpenVMS come with capabilities that enable them to be

described as a network operating system.

The two major types of network operating systems are:

1. Peer-to-Peer

Peer-to- peer network operating systems allow users to share

resources and files located on their computers and to access shared

resources found on other computers. However, they do not have a

file server or a centralized management source.

2. Client/Server
Client/server network operating systems allow the network to

centralize functions and applications in one or more dedicated file

servers (See fig. 1.4.2). The file servers become the heart of the

system, providing access to resources and providing security.

Individual workstations (clients) have access to the resources

available on the file servers.

NETWORK TOPOLOGIES

The term topology refers to the way a network is laid out, either

physically or logically. The physical topology of a network refers

to the configuration of cables, computers, and other peripherals

while the logical topology is the method used to pass

information between workstations. Two or more devices connect

to a link; two or more links form a topology. The topology of a

network is the geometric representation of the relationship of all

the links and linking devices (usually called nodes) to each other.

There are five basic topologies possible: mesh, star, tree, bus,

and ring.

Main Types of Physical Topologies


A. Bus Topology

Bus topology uses a common backbone to connect all the

network devices in a network in a linear shape. A single cable

functions as the shared communication medium for all the

devices attached with this cable with an interface connector. The

device, which wants to communicate send the broadcast

message to all the devices attached with the shared cable but

only the intended recipient actually accepts and process that

message.

B. Star Topology

In the computer networking world the most commonly used

topology in LAN is the star topology. Star topologies can be

implemented in home, offices or even in a building. All the

computers in the star topologies are connected to central devices

like hub, switch or router. The functionality of all these devices is

different. As compared to the bus topology, a star network requires

more devices & cables to complete a network.

C. Tree Topology
Tree topologies are comprised of the multiple star topologies on a

bus. Tree topologies integrate multiple star topologies together

onto a bus. Only the hub devices can connect directly with the tree

bus and each Hub functions as a root of a tree of the network

devices. This bus/star/hybrid combination supports future

expandability of the computer networks, much better than a bus or

star.

Rule

A consideration in setting up a tree topology using Ethernet

protocol is the 5-4-3 rule. One aspect of the Ethernet protocol

requires that a signal sent out on the network cable reach every

part of the network within a specified length of time. Each

concentrator or repeater that a signal goes through adds a small

amount of time. This leads to the rule that between any two nodes

on the network there can only be a maximum of 5 segments,

connected through repeaters/concentrators

Mesh topology
In the topologies shown above, there is only one possible path

from one node to another node. If any cable in that path is

broken, the nodes cannot communicate.

Mesh topology uses lots of cables to connect every node with every

other node. It is very expensive to wire up, but if any cable fails,

there are many other ways for two nodes to communicate. Some

WANs, like the Internet, employ mesh routing.

IP ADDRESSING

An IP address is a numeric identifier assigned to each machine on

an IP network. It designates the specific location of a device on the

network. An IP address is a software address, not a hardware

address- the latter is hard- coded on a Network Interface Card

(NIC) and used for finding hosts on a local network.

There are two IP addressing schemes:

1. Hierarchical IP addressing
An IP address consists of 32 bits of information. These bits are

divided into four sections, referred to as octets or bytes, each

containing 1 byte (8 bits).You can depict an IP address using one

of three methods:

 Dotted-decimal, as in 172.16.30.56

 Binary, as in 10101100.00010000.00011110.00111000

 Hexadecimal, as in AC.10.1E.38

2. Private IP Addresses

These addresses can be used on a private network, but they are not

routable through the Internet. This is designed for the purpose of

creating a measure of well-needed security, but it also conveniently

saves valuable IP address space.

ISDN

ISDN (Integrated Services Digital Network) is an international

standard, originally established by the ITU in 1984, for

transmitting digital data over the PSTN. ISDN specifies

protocols at the Physical, Data Link and Transport layers of the

OSI Model. These protocols handle signaling, framing,


connection setup and termination, routing, flow control, and

error detection and correction. ISDN relies on the PSTN for its

transmission medium.

PSTN

PSTN, which standard for Public Switched Telephone Network,

refers to the network of typical telephone lines and carrier

equipment that service most homes. PSTN may also be called

plain old telephone service (POTS). The PSTN comprises the

entire telephone system, from the lines that connect homes and

businesses to the network centers that connect different regions

of a country. A dial-up connection is one in which a user

connects, via a modem, to a distant network from a computer

and stays connected for a finite period of time. Most of the time,

the term dial-up refers to a connection that uses a PSTN line.

Mesh

A mesh topology WAN incorporates many directly

interconnected sites. Because every site is interconnected, data

can travel directly from its origin to its destination. The type of
mesh topology in which every WAN site is directly connected to

every other site is called a full mesh WAN. One drawback to a

full mesh WAN is the cost. To reduce costs, a network

administrator might choose to implement a partial mesh WAN,

in which only critical WAN sites are directly interconnected and

secondary sites are connected through star or ring topologies.

METROPOLITAN AREA NETWORK AND MAN

PROTOCOLS

Metropolitan Area Network(MAN) is a computer networks

usually spanning a campus or a city, which typically connect a

few local area networks using high speed backbone technologies.

A MAN often provides efficient connections to a wide area

network (WAN) . There are three important features which

discriminate MANs from LANs or WANs:

 The network size falls intermediate between LANs and

WANs. A MAN typically covers an area of between 5 and 50

km range. Many MANs cover an area the size of a city,

although in some cases MANs may be as small as a group of

buildings.
 A MAN (like a WAN) is not generally owned by a single

organisation. The MAN, its communications links and

equipment are generally owned by either a consortium of

users or by a network service provider who sells the service to

the users.

 A MAN often acts as a high speed network to allow sharing

of regional resources. It is also frequently used to provide a

shared connection to other networks using a link to a WAN.

LOCAL AREA NETWORK

The Local Area Network (LAN) is by far the most common type of

data network. As the name suggests, a LAN serves a local area

(typically the area of a floor of a building, but in some cases

spanning a distance of several kilometers).

MAJOR CHARACTERISTICS OF LANs

Major characteristics of LANs are:


 The network operates within a building or floor of a building.

The geographic scope for ever more powerful LAN desktop

devices running more powerful applications is for less area per

LAN.

 LANs provide multiple connected desktop devices (usually

PCs) with access to high-bandwidth media.

 An enterprise purchases the media and connections used

in the LAN; the enterprise can privately control the LAN

as it chooses.

 LANs rarely shut down or restrict access to connected

workstations; local services are usually always available.

 By definition, the LAN connects physically adjacent devices on

the media.

COMPONENTS OF LAN - NETWORK OPERATING

SYSTEM(NOS)
In order for computers to be able to communicate with each other,

they must first have the networking software that tells them how to

do so. Without the software, the system will function simply as a

“standalone,” unable to utilize any of the resources on the network.

Network operating software may by installed by the factory,

eliminating the need for you to purchase it, (for example

AppleTalk), or you may install it yourself.

Network interface card(NIC)

In addition to network operating software, each network device

must also have a network interface card. These cards today are also

referred to as adapters, as in “Ethernet adapter card” or “Token

Ring adapter card.” The NIC card amplifies electronic signals

which are generally very weak within the computer system itself.

The NIC is also responsible for packaging data for transmission,

and for controlling access to the network cable.

Cables or Transmission Media

The wires connecting thevarious devices together are

referred to as cables.
 Cable prices range from inexpensive to very costly and can

comprise of a significant cost of the network itself.

 Cables are one example of transmission media. Media are

various physical environments through which transmission

signals pass. Common network media include twisted-pair,

coaxial cable, fiber-optic cable, and the atmosphere

(throughwhich microwave, laser, and infrared transmission

occurs). Another term for this is “physical media.” *Note that

not all wiring hubs support all medium types.

Four layer TCP/IP Models

1. Layer 1. Network Access Layer

Network Access Layer is the first layer of the four layer TCP/IP

model. Network Access layer defines details of how data is

physically sent through the network, including how bits are

electrically or optically signaled by hardware devices that


interface directly with a network medium, such as coaxial cable,

optical fiber, or twisted pair copper wire.

The protocols included in Network Access layer are Ethernet,

Token Ring, FDDI, X.25, Frame Relay etc.

2. Layer 2. Internet Layer

Internet Layer is the second layer of the four layer TCP/IP model.

The position of Internet layer is between Network Access Layer

and Transport Layer. Internet layer pack data into data packets

known as IP datagrams, which contain source and destination

address (logical address or IP address) information that is used

to forward the datagrams between hosts and across networks.

The Internet layer is also responsible for routing of IP

datagrams.

3. Layer 3. Transport Layer

Transport Layer is the third layer of the four layer TCP/IP

model.The position of the Transport layer is between


Application layer and Internet layer. The purpose of Transport

layer is to permit devices on the source and destination hosts to

carry on a conversation. Transport layer defines the level of

service and status of the connection used when transporting

data.

The main protocols included at Transport layer are TCP

(Transmission Control Protocol) and UDP (User Datagram

Protoco).

4. Layer 4. Application Layer

Application layer is the top most layer of four layer TCP/IP

model. Application layer is present on the top of the Transport

layer. Application layer defines TCP/IP application protocols

and how host programs interface with transport layer services to

use the network.

Application layer includes all the higher-level protocols like DNS

(Domain Naming System), HTTP (Hypertext Transfer Protocol),

Telnet, FTP (File Transfer Protocol), TFTP (Trivial File Transfer

Protocol), SNMP (Simple Network Management Protocol),


SMTP (Simple Mail Transfer Protocol) , DHCP (Dynamic Host

Configuration Protocol), X Windows, RDP (Remote Desktop

Protocol) etc.

OSI MODEL

This model is based on a proposal developed by the

International Standards Organization (ISO) as a first step

toward international standardization of the protocols used in the

various layers. The model is called the ISO-OSI (Open Systems

Interconnection) Reference Model because it deals with

connecting open systems—that is, systems that are open for

communication with other systems. We will usually just call it

the OSI model for short.

The Physical Layer

The physical layer is concerned with transmitting raw bits over a

communication channel. The design issues have to do with making

sure that when one side sends a 1 bit, it is received by the other side

as a 1 bit, not as a 0 bit. Typical questions here are how many volts

should be used to represent a 1 and how many for a 0, how many


microseconds a bit lasts, whether transmission may proceed

simultaneously in both directions, how the initial connection is

established and how it is torn down when both sides are finished,

and how many pins the network connector has and what each pin

is used for.

The Data Link Layer

The main task of the data link layer is to take a raw transmission

facility and transform it into a line that appears free of undetected

transmission errors to the network layer. It accomplishes this task

by having the sender break the input data up into data frames

(typically a few hundred or a few thousand bytes), transmit the

frames sequentially, and process the acknowledgement frames sent

back by the receiver.

The Network Layer

The network layer is concerned with controlling the operation of

the subnet. A key design issue is determining how packets are

routed from source to destination. Routes can be based on static

tables that are "wired into" the network and rarely changed. They
can also be determined at the start of each conversation, for

example a terminal session.

The Transport Layer

The basic function of the transport layer is to accept data from the

session layer, split it up into smaller units if need be, pass these to

the network layer, and ensure that the pieces all arrive correctly at

the other end. Furthermore, all this must be done efficiently, and

in a way that isolates the upper layers from the inevitable changes

in the hardware technology.

Transport layer defines the level of service and status of the

connection used when transporting data.

The main protocols included at Transport layer are TCP

(Transmission Control Protocol) and UDP (User Datagram

Protoco).

NETWORK PROTOCOL

A protocol is a set of rules that governs the communications

between computers on a network. These rules include guidelines


that regulate the following characteristics of a network: access

method, allowed physical topologies, types of cabling, and speed of

data transfer.

Syntax

Syntax refers to the structure or format of the data, meaning the

order in which they are presented. For example, a simple

protocol might expect the first eight bits of data to be the

address of the sender, the second eight bits to be the address of

the receiver, and the rest of the stream to be the message itself.

Semantics

Semantics refers to the meaning of each section of bits. How is a

particular pattern to be interpreted, and what action is to be

taken based on that interpretation. For example, does an

address identify the route to be taken or the final destination of

the message?

Timing
Timing refers to two characteristics: when data should be sent

and how fast they can be sent. For example, if a sender produces

data at 100 Mbps but the receiver can process data at only 1

Mbps, the transmission will overload the receiver and data will

be largely lost.

You might also like