Download MODULE NAME: INFORMATION TECHNOLOGY 2

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

AppleTalk wikipedia , lookup

Security-focused operating system wikipedia , lookup

Spring (operating system) wikipedia , lookup

Unix security wikipedia , lookup

Transcript
MODULE NAME: FUNDAMENTALS OF INFORMATION TECHNOLOGY
TOPIC: Telecommunication and Computer Networks
LECTURE 11
NETWORK COMPONENTS
Network components can be placed into two categories: Hardware and software.
The hardware components of a network include the Network Interface card (NIC), Hub,
Client, server while the software focuses on the different network operating systems
(NOS).
NETWORK INTERFACE CARD
(NIC)
A (NIC) is a computer circuit board or
card that is installed in a computer so
that it can be connected to a network.
Personal computers and workstations on
a local area network (LAN) typically
contain a network interface card
specifically designed for the LAN
transmission technology, such as
Ethernet or Token Ring. Network
interface cards provide a dedicated, fulltime connection to a network. Most
home and portable computers connect to
the Internet through as-needed dial-up
connection. The modem provides the
connection interface to the Internet
service provider.
MODEM – Short for modulatordemodulator. This device enables a
computer to transmit data over telephone or
cable lines. It converts digital signals to
analog signals and vice versa.
(modulation/de-modulation). Computer
information is stored digitally whereas
information transmitted over telephone lines
is transmitted in the form of analog waves.
The device converts between the two forms.
These devices can be internal or external.
The internal ones come as an expansion
board that you can insert into a vacant
expansion slot.
REPEATERS
A repeater is a simple device that is used
to expand LANs over larger distances by
connecting segments. They
regenerate/amplify the signal.
HUBS
Hubs, also known as concentrators or
multiport repeaters, are used in
star/hierarchical networks to connect
multiple stations. A hub takes the
incoming signal from one port and
forwards it to all other ports. There are
two main types of hubs: passive and
active. A passive hub simply splits the
signal and forwards it. An active hub
takes the incoming frames, amplifies the
signal, and forwards it. Some hubs can
be managed allowing individual port
configuration and traffic monitoring,
these are known as intelligent or
managed hubs.
1
Switches were developed to improve
network performance even more. Some
of the main differences between
switches and bridges are:
The following is a picture of a Fast Ethernet hub.
- Switches have more ports than bridges.
Switches are meant to replace hubs and
improve network performance by
creating a separate collision domain per
port.
- Bridges switch in software whereas
switches switch in hardware (integrated
circuits).
- Switches offer more variance in speed.
BRIDGES
Bridges are more intelligent than hubs.
They are used to increase network
performance by segmenting networks in
separate collision domains.
SWITCHES
GATEWAY – a) A combination of
hardware and software that connects
networks that use different protocols. b) A
node on a network that serves as an entrance
to another network. c) An earlier term for
router. The gateway node often acts as a
proxy server and firewall. The proxy server
sits between the client application and the
real server and intercepts all messages
entering and leaving the network and checks
if it can fulfil the requests itself, if not, then
it forwards the request to the real server. It
also hides the true network addresses. The
purpose of the proxy server is to improve
performance and to filter requests (e.g.
prevent users from accessing a specific set
of websites.
_________________________________
_________________________________
Architecture
of most networks. It is a very fast
computer with a large amount of RAM
and storage space, along with a fast
network interface card. The network
operating system software resides on this
computer, along with any software
applications and data files that need to
be shared.
As illustrated below, bridges control collision
domains; they do not control broadcast domains:
Networks can be broadly classified as
using either a peer-to-peer or
client/server architecture.
File Servers
Computers and devices that allocate
resources for a network are called
servers. A file server stands at the heart
The file server controls the
communication of information between
2
the nodes on a network. For example, it
may be asked to send a word processor
program to one workstation, receive a
database file from another workstation,
and store an e-mail message during the
same time period. This requires a
computer that can store a lot of
information and share it very quickly.



system allows only one user to run
one or more programs at a time.
An NOS has more security control
features. It also controls a network,
establish internet connection and
allows more than one computers to
talk to each other.
An NOS allows for the management
of files on other computers.
NOS typically resides on a server.
What is a Network Operating System?
Unlike operating systems, such as DOS
and Windows, which are designed for
single users to control one computer,
network operating systems (NOS)
coordinate the activities of multiple
computers across a network. The
network operating system acts as a
director to keep the network running
smoothly.
Similarities and Differences between a
Single-User Operating system and a
Network Operating System
Similarities
 Controls/manages the computer
hardware (e.g. memory)
 Provides a user interface
 Allows more than one program to
run at the same time.
 Schedules jobs and configures
devices
 Manages programs
 Provides file management and other
utilities
 Starts the computer
The two major types of network
operating systems are:

Peer-to-Peer

Client/Server
Peer-to-Peer
Peer-to-peer network operating systems
allow users to share resources and files
located on their computers and to access
shared resources found on other
computers. However, they do not have a
file server or a centralized management
source (See fig. 1). In a peer-to-peer
network, all computers are considered
equal; they all have the same abilities to
use the resources available on the
network. Peer-to-peer networks are
designed primarily for small to medium
local area networks. AppleShare and
Windows for Workgroups are
examples of programs that can function
as peer-to-peer network operating
systems.
Differences
 A network operating system (NOS)
is an operating system that organizes
and coordinates how multiple users
access and share resources on a
network. A single user operating
3
the same resources irrespective of
physical location. Novell Netware and
Windows 2000 Server are examples of
client/server network operating systems.
Advantages of Client – ServerNetwork
Fig. 1. Peer-to-peer network

Centralized - Resources and data
security are controlled through
the server.

Scalability - Any or all elements
can be replaced individually as
needs increase.

Flexibility - New technology can
be easily integrated into system.

Interoperability - All components
(client/network/server) work
together.

Accessibility - Server can be
accessed remotely and across
multiple platforms.
Advantages of Peer-to-Peer Network


Less initial expense - No need for
a dedicated server.
Setup - An operating system
(such as Windows XP) already in
place may only need to be
reconfigured for peer-to-peer
operations.
Disadvantages of Peer-to-Peer
Network


Decentralized - No central
repository for files and
applications.
Security - Does not provide the
security available on a
client/server network.
Disadvantages of a Client/Server
Network

Expense - Requires initial
investment in dedicated server.

Maintenance - Large networks
will require a staff to ensure
efficient operation.

Dependence - When server goes
down, operations will cease
across the network.
Client/Server
Client/server network operating systems
allow the network to centralize
functions and applications in one or
more dedicated file servers (See fig. 2).
The file servers become the heart of the
system, providing access to resources
and providing security. Individual
workstations (clients) have access to the
resources available on the file servers.
The network operating system provides
the mechanism to integrate all the
components of the network and allow
multiple users to simultaneously share
Examples of Network Operating
Systems
The following list includes some of the
more popular peer-to-peer and
client/server network operating systems.
4

AppleShare

Microsoft Windows Server

Novell Netware

UNIX

Windows

Microsoft Windows .NET Server
2003

IBM’s OS/2 Warp Server
3. Give two examples of a network
operating system.
4. Explain the concept of the client/
server architecture.
5. Why would the administration of
a school be more inclined to set
up a client/server architecture?
What is a Protocol?
A protocol is a set of rules that governs
the communications between computers
on a network. These rules include
guidelines that regulate the following
characteristics of a network: access
method, allowed physical topologies,
types of cabling, and speed of data
transfer.
The most common protocols are:

Ethernet

LocalTalk

Token Ring

Fiber Distributed Data
Interface (FDDI)

Asynchronous Transfer
Mode (ATM)
Tutorial Questions
1. Identify and explain the use of
three hardware components that
is required to set up a network.
2. What is a network operating
system?
5