Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
IST 126 Computer Networks Day 2 Server Security • Only one password needed to access network • Associated with the account is permission to access certain files and not others • The access level you have for each file can be specified • This security applies even if you have access to the server machine itself Types of Servers • File Server – Allows network users to share files • Print Server – Manages printing in a network • Application Server – Holds application software and is available to clients. The way this works differs considerably • Message Server – Provides e-mail and work group applications. Example – Coordination of approval of a requisition from all necessary individuals and in the correct order • Database Server – Provides powerful database capabilities to network Classification of LANs • LANs are classified into broad categories according to the shape of the network cables • The primary topologies used in LANs are: bus, ring, star. • Each topology has advantages and disadvantages Physical Network Topologies for LANs • Bus topology • Star Topology • Ring Topology Bus Topology • Consists of a single cable with devices connected to it along its length • When one computer sends a signal, all computers on the cable receive the information but only one accepts it • Only one computer at a time can transmit • The end of the bus must be terminated so that the signal does not bounce back and travel back up the wire • Ethernet 10Base2 (thinnet Ethernet) is a network based on a physical bus topology Advantages of Bus Topology • Simple and easy to use • Requires the least amount of cable • Easy to extend a bus with an appropriate connector Disadvantages of a Bus Topology • Heavy network traffic can cause a bus to slow considerably • Each connector weakens the signal • Difficult to troubleshoot a bus • A cable break or a loose connector will cause reflections and bring down the whole network Star Topology • All cables run from the computers to a central location where a hub is located • The hub either resends the message to all the computers (broadcast star network) or only to the destination computer (switched star network) • We use a star topology here at Mercer in our labs Advantages of Star Topology • Easy to modify and add new computers • Single computer failure does not bring down whole network • Can use several cable types • Is the most flexible and the easiest to diagnose when there is a problem Disadvantages of the Star Topology • If the central hub fails, the whole network fails • It cost more to cable a star network Ring Topology • Each computer is connected to the next computer • The last computer is connected to the first • The IEEE 802.5 standard defines the token ring network Advantages of Ring • No one computer can monopolize the network if you are using a token ring • The network degrades gracefully as the load increases • The network will continue to function in a useful manner rather than fail all at one time Disadvantages of Ring • Failure of one computer on the ring can affect the whole network • Difficult to troublshoot a ring • Adding or removing computers disrupts the network Ethernet • Most popular LAN technology • Uses bus and star topologies • Several versions of Ethernet have been defined – thick Ethernet uses thick coaxial cable – Thin Ethernet uses thin coaxial cable – Gigabit Ethernet uses CAT 5 twisted pair Ethernet uses Manchester Encoding • All data is encoded using binary Manchester encoding – 0 – Represented by a transition in the middle of the bit time from high-to-low voltage – 1- Represented by a transition in the middle of the bit time from low-to-high voltage Ethernet Sharing • Ethernet requires multiple computers to share access to a single medium • A sender transmits a signal which propagates over the whole LAN • Only one frame of information can be sent at a time – other computers have to wait to send • After one frame is transmitted, the shared cable becomes available for another How are Transmissions Coordinated on Ethernet LAN? • There is not centralized controller telling each computer when it is their turn to trnamit • All computers use a scheme called Carrier Sense Multiple Access (CSMA) • Explain how CSMA works CSMA Operation • When no computer is sending a frame the network does not contain an electrical signal (called a carrier signal) • A computer wishing to transmit can check cable for a carrier signal • If no carrier is detected, the computer is allowed to transmit • If carrier is present, the computer must wait until transmission is completed. Collisions in Ethernet • Two computers can check for a carrier at the same time • Finding none they both can begin to transmit at the same time • This causes a collision between the two signals • This produces a garbled transmission Collision Detection • The two computers can detect the collision • Each sending station immediately stops transmitting • The computers must wait for the cable to become idle again before transmitting • Ethernet requires that the computers wait a random amount of time before trying to transmit again.