Upload
2begenius
View
244
Download
0
Embed Size (px)
Citation preview
7/27/2019 CT101_IntroductionToNetworking.ppt
1/39
Introduction to Networking
CT101Computing Systems
7/27/2019 CT101_IntroductionToNetworking.ppt
2/39
Contents
Network topologies Bus, star and ring
Cabling
Coaxial, UTP, Fiber Optic Cable
Media Access Methods CSMA/CD, CSMA/CA, Token Passing
LAN Architectures
Ethernet, Token Ring
Networking Devices
OSI Model. OSI layer functions. OSI versus TCP/IP
7/27/2019 CT101_IntroductionToNetworking.ppt
3/39
What is a network
A networkas a "group of computers and associated devices that areconnected by communications facilities."
A network provides two principle benefits: the ability to communicateand the ability to share. A network supports communicationamong users in ways that other media
cannot. E-mail, the most popular form of network communication, provides low-
cost, printable correspondence with the capability for forwarding,acknowledgment, storage, retrieval, and attachments.
Sharinginvolves not only information (database records, e-mail, graphics, etc.),but also resources (applications, printers, modems, disk space, scanners, etc.)Through its ability to share, a network promotes collaboration
A network can consist of two computers connected together on a desk
or it can consist of many Local Area Networks (LANs) connectedtogether to form a Wide Area Network (WAN) across a continent.
7/27/2019 CT101_IntroductionToNetworking.ppt
4/39
Network Classifications
Scope
Local area network (LAN)
Metropolitan area (MAN)
Wide area network (WAN)
OwnershipClosed versus open
Topology (configuration)
Bus (Ethernet)
Star (Wireless networks with central Access Point)Ring
7/27/2019 CT101_IntroductionToNetworking.ppt
5/39
Network Topologies
A topologyrefers to the manner in which the cable is run toindividual workstations on the network.
the configurations formed by the connections between devices on alocal area network (LAN) or between two or more LANs
There are three basic network topologies (not countingvariations thereon): the bus, the star, and the ring.
It is important to make a distinction between a topology andan architecture.
A topologyis concerned with the physical arrangement of thenetwork components.
In contrast, an architectureaddresses the components themselvesand how a system is structured (cable access methods, lower level
protocols, topology, etc.). An example of an architecture is
10baseT Ethernet which typically uses the star topology.
7/27/2019 CT101_IntroductionToNetworking.ppt
6/39
Bus Topology
A bus topologyconnects each computer (node) to a single
segment trunk. A trunk is a communication line, typically coax cable, that is
referred to as the bus. The signal travels from one end of thebus to the other.
A terminatoris required at each end to absorb the signal so itdoes not reflect back across the bus.
In a bus topology, signals are broadcast to all stations. Eachcomputer checks the address on the signal (data frame) as itpasses along the bus. If the signals address matches that of thecomputer, the computer processes the signal. If the addressdoesnt match, the computer takes no action and the signaltravels on down the bus.
Only one computer can talk on a network at a time. A mediaaccess method (protocol) called CSMA/CDis used to handlethe collisions that occur when two signals are placed on thewire at the same time.
The bus topology is passive. In other words, the computers onthe bus simply listen for a signal; they are not responsible formoving the signal along.
A bus topology is normally implemented with coaxial cable.
7/27/2019 CT101_IntroductionToNetworking.ppt
7/39
Bus Topology
Advantagesof bus topology: Easy to implement and extend
Well suited for temporary networks that must be set up in a hurry
Typically the cheapest topology to implement
Failure of one station does not affect others
Disadvantagesof bus topology:
Difficult to administer/troubleshoot
Limited cable length and number of stations A cable break can disable the entire network; no redundancy
Maintenance costs may be higher in the long run
Performance degrades as additional computers are added
7/27/2019 CT101_IntroductionToNetworking.ppt
8/39
Star Topology
All of the stations in a star topologyare connected to a central unit called a hub. The hub offers a common connection for all stations on the network. Each station has its
own direct cable connection to the hub. In most cases, this means more cable is requiredthan for a bus topology. However, this makes adding or moving computers a relativelyeasy task; simply plug them into a cable outlet on the wall.
If a cable is cut, it only affects the computer that was attached to it. This eliminatesthe single point of failure problem associated with the bus topology. (Unless, ofcourse, the hub itself goes down.)
Star topologies are normally implemented using twisted pair cable, specificallyunshielded twisted pair (UTP). The star topology is probably the most common formof network topology currently in use.
7/27/2019 CT101_IntroductionToNetworking.ppt
9/39
Star Topology
Advantagesof star topology:Easy to add new stations
Easy to monitor and troubleshoot
Can accommodate different wiring Disadvantagesof star topology:
Failure of hub cripples attached stations
More cable required (more expensive to wire a buildingfor networking)
7/27/2019 CT101_IntroductionToNetworking.ppt
10/39
Ring Topology
A r ing topologyconsists of a set of stations connected serially by cable. In other words, its a circle orring of computers. There are no terminated ends to the cable; the signal travels around the circle in aclockwise (or anticlockwise) direction.
Note that while this topology functions logically as ring, it is physically wired as a star. The centralconnector is not called a hub but aMul tistation Access UnitorMAU. (Dont confuse a Token Ring
MAU with a Media Adapter Unit which is actually a transceiver.) Under the ring concept, a signal is transferred sequentially via a "token" from one station to the next.
When a station wants to transmit, it "grabs" the token, attaches data and an address to it, and then sends itaround the ring. The token travels along the ring until it reaches the destination address. The receivingcomputer acknowledges receipt with a return message to the sender. The sender then releases the tokenfor use by another computer.
Each station on the ring has equal access but only one station can talk at a time.
7/27/2019 CT101_IntroductionToNetworking.ppt
11/39
Ring Topology
In contrast to the passive topology of the bus, the ring employs anactivetopology. Each station repeats or boosts the signal before
passing it on to the next station.
Rings are normally implemented using twisted pair or fiber-opticcable
Advantagesof ring topology: Growth of system has minimal impact on performance
All stations have equal access
Disadvantagesof ring topology:
Most expensive topology
Failure of one computer may impact others
Complex
7/27/2019 CT101_IntroductionToNetworking.ppt
12/39
Choosing a Topology The following factors should be considered when choosing a topology:
Installation Maintenance and troubleshooting
Expected growth
Distances
Infrastructure
Existing network
As a general rule, a bus topology is the cheapest to install, but may be moreexpensive to maintain because it does not provide for redundancy.
Various topologies can be mixed on the same network.
One very common example is a large Ethernet network with multiple hubs. Usuallythe hubs are located on different floors in a building or perhaps outside in another
building. Each hub is wired in the typical star configuration. However, the hubs are
connected together along a bus, typically referred to as a backbone. The backbone between hubs might consist of fiber optic cable while the
workstations are wired to each individual hub with UTP (unshielded twisted pair)cable.
7/27/2019 CT101_IntroductionToNetworking.ppt
13/39
Cabling
Coaxial Cable
Thinnetlooks like regular TV cable. It is about 1/4 inch in diameter and is veryflexible and easy to work with.
Thicknetis about 1/2 inch in diameter and not very flexible. Thicknet is olderand not very common anymore except as a backbone within and between
buildings. Coax transmits at 10 Mbps..
Twisted Pair . Twisted pair looks like telephone wire and consists ofinsulated strands of copper wire twisted together. There are twoversions of twisted pair cable:
Shielded Twisted Pair (STP). STPis commonly used in Token Ring networks
Unshielded Twisted Pair (UTP). UTPis used in Ethernetnetworks. Transmission rates vary between 10-100-1000-10000 Mbps.
F iber-Optic Cable. Fiber-optic cable consists of a thin cylinder ofglass surrounded by glass cladding, encased in protective outersheath. Fiber-optic cable is very fast (over 1Gbps). It can transmit
over long distances (2 km +) but is expensive.
7/27/2019 CT101_IntroductionToNetworking.ppt
14/39
Cabling
Top: Unshielded Twisted Pair and Shielded Twisted Pair Cable
Bottom: Coaxial and Optical Fiber Cable
7/27/2019 CT101_IntroductionToNetworking.ppt
15/39
Media Access Methods
A media access methodrefers to the manner in which a computergains and controls access to the networks physical medium (e.g.,cable).
Common media access methods include the following:
CSMA/CD
CSMA/CA Token Passing
One of the primary concerns with media access is how to preventpackets from colliding when two or more computers try to transmitsimultaneously. Each of the methods listed above takes a different
approach to this problem. Data transmitted over a network is sent one bit at a time. A bit is
either a 1 or a 0 represented by a voltage change (on or off) or a lightpulse. If two stations are transmitting at the same time, it is possiblethat the signals may overlap, resulting in garbled data. Suchoverlapping is referred to as a "collision."
7/27/2019 CT101_IntroductionToNetworking.ppt
16/39
CSMA/CD
CSMA/CDstands forCarr ier-Sense Mul tiple Access with Coll ision Detection. It is
a media access method which means it defines how the network places data on thecable and how it takes it off.
CSMA/CD specifies how bus topologies such as Ethernet handle transmissioncollisions. A collisionoccurs when two or more computers transmit signals at thesame time. "Carrier Sense"means that each station on the LAN continually listens to (tests) the
cable for the presence of a signal prior to transmitting. " Mul tiple Access"means that there are many computers attempting to transmit and
compete for the opportunity to send data (i.e., they are in contention).
" Coll ision Detection"means that when a collision is detected, the stations will stoptransmitting and wait a random length of time before retransmitting.
CSMA/CD works best in an environment where relatively fewer, longer data framesare transmitted. This is in contrast to token passing which works best with arelatively large amount of short data frames.
Because CSMA/CD works to controlor manage collisions rather than preventthem,network performance can be degraded with heavy traffic. The greater the traffic, thegreater the number of collisions and retransmissions.
CSMA/CD is used on Ethernet networks.
7/27/2019 CT101_IntroductionToNetworking.ppt
17/39
CSMA/CD Operation
In its most simple form it operates as follows:A station that wishes to transmit on the network checks
to see if the cable is free.
If the cable is free, the station starts transmitting.
However, another station may have detected a free cableat the same instant and also start transmitting. The resultis a "collision."
Once the collision is detected, all stations immediately
stop transmitting.
Stations then wait a random length of time beforechecking the cable and then retransmit
7/27/2019 CT101_IntroductionToNetworking.ppt
18/39
CSMA/CA
CSMA/CA stands forCarr ier-Sense Mul tiple Access with Coll isionAvoidanceand is a media access method very similar to CSMA/CD.
The difference is that the CD (collision detection) is changed to CA(collision avoidance). Instead of detecting and reacting to collisions,CSMA/CA tries to avoid them by having each computer signal its
intention to transmit before actually transmitting. In effect, thetransmitting computer gives a 'heads up' prior to transmitting.
Although CSMA/CA can prevent collisions, it comes with a cost inthe form of the additional overhead incurred by having eachworkstation broadcast it's intention prior to transmitting. Thus,
CSMA/CA is slower than CSMA/CD. CSMA/CA is used on Apple networks and on WiFi (IEEE 802.11)
networks.
7/27/2019 CT101_IntroductionToNetworking.ppt
19/39
The hidden terminal problem
7/27/2019 CT101_IntroductionToNetworking.ppt
20/39
Token Passing
Token passingis a media access method by which collisions areprevented.
Collisions are eliminated under token passing because only acomputer that possesses a f ree token(a small data frame) is allowedto transmit. The token passing method also allows different priorities
to be assigned to different stations on the ring. Transmissions from astations with higher priority take precedence over stations with lowerpriority.
Token passing works best in an environment where a relatively largenumber of shorter data frames are being transmitted. (As opposed to
CSMA/CD which works best in an environment where relativelyfewer, longer data frames are being transmitted.)
Token passing is used on Token Ring networks
7/27/2019 CT101_IntroductionToNetworking.ppt
21/39
Token Passing Operation
In its most simple form it operates as follows: A station that wishes to transmit on the network waits until it will
receive a free token.
The sending station transmits its data with the token.
The data travels to the recipient without stopping at other stations(it is just relayed).
The receiving station receives the data and returns the token to the
sender as an acknowledgment.
The sender receives acknowledgment and releases the token tonext station.
The token continues being passed along the ring until it is seized"
by the next station that wants to transmit.
7/27/2019 CT101_IntroductionToNetworking.ppt
22/39
LAN Architectures
Network archi tecturerefers to the manner in whichthe hardware and software is structured. Thearchitecture includes the cable access method(transmission), topology, and lower level protocols.
The most common types ofLAN archi tecturesareEthernet and Token Ring
These architectures are sometimes referred to as
" lower-level protocols"because they represent thespecifications for the IEEE802 model whichencompasses the physical (1st) and data link (2nd)layers of the OSI model (to be discussed latter)
7/27/2019 CT101_IntroductionToNetworking.ppt
23/39
Ethernet
Ethernetis a popular, relatively inexpensive, easy-to-install LAN architecture with
the following characteristics: Uses the CSMA/CDmedia access control.
Data transmission normally occurs at 100 Mbps (10Mbps in the early forms and 10Gbpsin the most recent forms).
Typically implemented in a star topology (early versions used bus topology as well).
Ethernet LANs are normally distinguished by the type of cable they use Twisted Pair
(Thinnet or Thicknet were also used in the past). The Ethernet architecture conforms to most but not all of the I EEE 802.3
specification (the physical layers are identical but the MAC layers are somewhatdifferent).
An Ethernet LAN is often described in terms of three parameters: transmission rate,transmission type, and segment distance or cable type.
" 100baseT"means: 100 - transmission rateor through put of 100Mbps base - transmission typeis baseband rather than broadband network (i.e., the signal is placed
directly on the cable, one signal at a time)
Tthe cable type (e.g. Twisted pair)
Few types of Ethernet: 10Base2, 10Base5, 10BaseT and 10BaseF, 100BaseT,100BaseF, etc..
7/27/2019 CT101_IntroductionToNetworking.ppt
24/39
Token Ring
Token ringis a relatively expensive LAN architecture that is strongly
influenced by IBM. It is very stable and can be expanded without asignificant degradation in network performance.
Token ring uses the token passingmedia access control. Datatransmission normally occurs at 4 or 16 Mbps depending on the cable.
Token ring is normally implemented in a logical ring/physical star
topology with a MAU (Multistation Access Unit) as the hub. Themaximum number of stations on one ring is 260 for shielded twisted
pair and 72 for unshielded twisted pair (UTP). There can be up to 33MAUs per ring.
Token Ring LANs normally use shielded twisted pair (STP) but may
also use unshielded twisted pair (UTP) or fiber-optic cable. Themaximum distance to the MAU from the workstation depends on thecable and varies from 45 meters for UTP to 100 meters for STP.
The Token Ring architecture conforms generally to theIEEEs 802.5specification
7/27/2019 CT101_IntroductionToNetworking.ppt
25/39
Ethernet vs. Token Ring
Ethernetis generally less expensive and easier to installthan Token Ring.
Token Ringis generally more secure and more stable thanEthernet, but not used anymore in typical LANconfigurations.
It is usually more difficult to add more computers on aToken RingLAN than it is to an EthernetLAN. However,as additional computers are added, performance degradationwill be less pronounced on the Token RingLAN than it will
be on the EthernetLAN.
Ethernetuses CSMA/CD media access control and TokenRinguses token passing. This makes Ethernetbetter suitedin a situation where there are a large number of computerssending fewer, larger data frames. Token Ringis better
suited for small to medium size LANs sending many,
7/27/2019 CT101_IntroductionToNetworking.ppt
26/39
4-26
Connecting Networks
Repeater: Extends a network Bridge:Connects two compatible networks, doesnt
necessarily pass all the messages across the connection
Switch: Connect several compatible networks, allowing it
to connect several busses rather than two.
7/27/2019 CT101_IntroductionToNetworking.ppt
27/39
Building a large bus network from
smaller ones
7/27/2019 CT101_IntroductionToNetworking.ppt
28/39
Connecting Networks
When networks are connected via repeaters, bridges or switches, the
result is a single large network.
The entire system operates in the same way as the original smaller
networks
Sometimes the networks to be connected have incompatible
characteristics (e.g. WiFi network to be connected with Ethernet
network, etc..).
When building networks of networks, the system is known as internet
(note the small i, term that is distinct from the Internetwhich
refers to a particular world wide internet).
Router: Connects two incompatible networks resulting in a network
of networks - internet
i i i k
7/27/2019 CT101_IntroductionToNetworking.ppt
29/39
Routers connecting two WiFi networks
and an Ethernet network to form an
internet
7/27/2019 CT101_IntroductionToNetworking.ppt
30/39
Routers and internet addressing
Routers purpose is to route(forward messages) in their proper
directions.
The forwarding process is based on an internet wide addressing
system which all the machines in the internet (including the machines
in the original networks as well as the routers) are assigned unique
addresses.
Thus each machine in an internet has two addresses: its original local address
within its own network and the internet address
A machine wanting to send a message to a machine in a distant
network, it will attach the internet address of the destination and willdirect the message to its local router. From there it is forwarded to the
proper direction (based on a forwarding table maintainedby the
router).
7/27/2019 CT101_IntroductionToNetworking.ppt
31/39
Client and Server
The terms "client" and "server" are used to describe individual
computers that are part of a network where computing resources andworkload are shared.
A serveris a computer that makes its resources available to thenetwork and responds to the commands of a client. The serversshared resources can be files (a file server); printers (a print server);
processing power (an application server); etc A clientis a computer that uses the resources made available by a
server. The client must have sufficient processing power on its own torun applications that interact with the resources on the server.
It is possible, and quite common, for an individual computer to
function as both a client and a server. For example, if Bill queries a SQL Server database from his workstation for the
data he needs to create an Excel spreadsheet, then his workstation is functioningas a client. However, if Sue then connects to Bills workstation from hercomputer and copies the spreadsheet, then Bills workstation is functioning as aserver.
7/27/2019 CT101_IntroductionToNetworking.ppt
32/39
ISO/OSI Model
The International Standards Organization (ISO) Open Systems Interconnect (OSI) is
a standard set of rules describing the transfer of data between each layer in anetwork operating system. Each layer has a specific function (i.e. the physical layerdeals with the electrical and cable specifications)
The OSI Model clearly defines the interfaces between each layer. This allowsdifferent network operating systems and protocols to work together by having eachmanufacturer adhere to the standard interfaces. The application of the ISO OSI
model has allowed the modern networks that exist today. There are seven layers inthe OSI model.
7/27/2019 CT101_IntroductionToNetworking.ppt
33/39
OSI Model
The Physical Layer
Establishes the physical characteristics of the network (e.g., the type of cable,connectors, length of cable, etc.)
Defines the electrical characteristics of the signals used to transmit the data (e.g.signal voltage swing, duration of voltages, etc.)
Transmits the binary data (bits) as electrical or optical signals depending on themedium.
The Data L ink Layer Defines how the signal will be placed on or taken off the NIC. The data frames
are broken down into individual bits that can be translated into electric signalsand sent over the network. On the receiving side, the bits are reassembled intoframes for processing by upper levels.
Error detection and correction is also performed at the data link layer. If anacknowledgement is expected and not received, the frame will be resent.Corrupt data is also identified at the data link layer.
Because the Data-Link Layer is very complex, it is sometimes divided intosublayers (as defined by the IEEE 802 model). The lower sublayer providesnetwork access. The upper sublayer is concerned with sending and receiving
packets and error checking.
7/27/2019 CT101_IntroductionToNetworking.ppt
34/39
OSI Model
The Network Layer
Primarily concerned with addressing and routing. Logical addresses (e.g., an IPaddress) are translated into physical addresses (i.e., the MAC address) fortransmission at the network layer. On the receiving side, the translation processis reversed.
It is at the network layer where the route from the source to destination
computer is determined. Routes are determined based on packet addresses andnetwork conditions. Traffic control measures are also implemented at thenetwork layer.
The Transport Layer
On the sending side, messages are packaged for efficient transmission and
assigned a tracking number so they can be reassembled in proper order. On thereceiving side, the packets are reassembled, checked for errors andacknowledged.
Performs error handling in that it ensures all data is received in the propersequence and without errors. If there are errors, the data is retransmitted.
7/27/2019 CT101_IntroductionToNetworking.ppt
35/39
OSI Model
The Session Layer
Is responsible for establishing, maintaining, and terminating a connection called a'session'.
A session is an exchange of messages between computers (a dialog). Managing thesession involves synchronization of user tasks and dialog control (e.g., who transmits andfor how long). Synchronization involves the use of checkpoints in the data stream. Inthe event of a failure, only the data from the last checkpoint has to be resent.
Logon, name recognition and security functions take place at the Session Layer.
The Presentation Layer It is responsible for data translation (formatting), compression, and encryption.
The Presentation Layer is primarily concerned with translation; interpreting andconverting the data from various formats. For example, EBCIDIC characters might beconverted into ASCII. It is also where data is compressed for transmission anduncompressed on receipt. Encryption techniques are implemented at the Presentation
Layer. The redirector operates at the presentation layer by redirecting I/O operations across the
network.
The Application L ayer Provides the operating system with direct access to network services.
It serves as the interface between the user and the network by providing services that
directly support user applications.
7/27/2019 CT101_IntroductionToNetworking.ppt
36/39
OSI Model
7/27/2019 CT101_IntroductionToNetworking.ppt
37/39
OSI Model
Each layer may add a Header and a Trailer to its Data (which consists of the nexthigher layer's Header, Trailer and Data as it moves through the layers). The Headerscontain information that specifically addresses layer-to-layer communication. Forexample, the Transport Header (TH) contains information that only the Transportlayer sees. All other layers below the Transport layer pass the Transport Header as
part of their Data.
7/27/2019 CT101_IntroductionToNetworking.ppt
38/39
OSI vs. TCP/IP
7/27/2019 CT101_IntroductionToNetworking.ppt
39/39
References
Andrew S. TanenbaumComputer Networks,ISBN: 0-13066102-3
J Glenn Brookshear Computer Science An
Overview, ISBN: 0-321-54428-5 Eugene Blanchard Introduction to Networking and
Data Communications