Cit722 Summary From
Cit722 Summary From
Cit722 Summary From
COM
NETWORKING CONCEPT
computers.
scanners.
The following are the major key issues to be trashed out very
NETWORKING HARDWARE
File Servers
Ethernet Cards
pair cables (or both) (See fig. 1.3.2). If it is designed for coaxial
to the workstation.
Bridges
A bridge is a device that allows you to segment a large network
sides of the bridge. The bridge can inspect each message and, if
Routers
1. Peer-to-Peer
2. Client/Server
Client/server network operating systems allow the network to
servers (See fig. 1.4.2). The file servers become the heart of the
NETWORK TOPOLOGIES
The term topology refers to the way a network is laid out, either
the links and linking devices (usually called nodes) to each other.
There are five basic topologies possible: mesh, star, tree, bus,
and ring.
message to all the devices attached with the shared cable but
message.
B. Star Topology
C. Tree Topology
Tree topologies are comprised of the multiple star topologies on a
onto a bus. Only the hub devices can connect directly with the tree
star.
Rule
requires that a signal sent out on the network cable reach every
amount of time. This leads to the rule that between any two nodes
Mesh topology
In the topologies shown above, there is only one possible path
Mesh topology uses lots of cables to connect every node with every
other node. It is very expensive to wire up, but if any cable fails,
there are many other ways for two nodes to communicate. Some
IP ADDRESSING
1. Hierarchical IP addressing
An IP address consists of 32 bits of information. These bits are
of three methods:
Dotted-decimal, as in 172.16.30.56
Binary, as in 10101100.00010000.00011110.00111000
Hexadecimal, as in AC.10.1E.38
2. Private IP Addresses
These addresses can be used on a private network, but they are not
ISDN
error detection and correction. ISDN relies on the PSTN for its
transmission medium.
PSTN
entire telephone system, from the lines that connect homes and
and stays connected for a finite period of time. Most of the time,
Mesh
can travel directly from its origin to its destination. The type of
mesh topology in which every WAN site is directly connected to
PROTOCOLS
buildings.
A MAN (like a WAN) is not generally owned by a single
the users.
The Local Area Network (LAN) is by far the most common type of
LAN.
as it chooses.
the media.
SYSTEM(NOS)
In order for computers to be able to communicate with each other,
they must first have the networking software that tells them how to
must also have a network interface card. These cards today are also
which are generally very weak within the computer system itself.
referred to as cables.
Cable prices range from inexpensive to very costly and can
Network Access Layer is the first layer of the four layer TCP/IP
Internet Layer is the second layer of the four layer TCP/IP model.
and Transport Layer. Internet layer pack data into data packets
datagrams.
data.
Protoco).
Protocol) etc.
OSI MODEL
sure that when one side sends a 1 bit, it is received by the other side
as a 1 bit, not as a 0 bit. Typical questions here are how many volts
established and how it is torn down when both sides are finished,
and how many pins the network connector has and what each pin
is used for.
The main task of the data link layer is to take a raw transmission
by having the sender break the input data up into data frames
tables that are "wired into" the network and rarely changed. They
can also be determined at the start of each conversation, for
The basic function of the transport layer is to accept data from the
session layer, split it up into smaller units if need be, pass these to
the network layer, and ensure that the pieces all arrive correctly at
the other end. Furthermore, all this must be done efficiently, and
in a way that isolates the upper layers from the inevitable changes
Protoco).
NETWORK PROTOCOL
data transfer.
Syntax
the receiver, and the rest of the stream to be the message itself.
Semantics
the message?
Timing
Timing refers to two characteristics: when data should be sent
and how fast they can be sent. For example, if a sender produces
data at 100 Mbps but the receiver can process data at only 1
Mbps, the transmission will overload the receiver and data will
be largely lost.