* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download UTP
Wireless security wikipedia , lookup
Multiprotocol Label Switching wikipedia , lookup
Net neutrality law wikipedia , lookup
Computer network wikipedia , lookup
Recursive InterNetwork Architecture (RINA) wikipedia , lookup
Network tap wikipedia , lookup
Airborne Networking wikipedia , lookup
Distributed firewall wikipedia , lookup
Deep packet inspection wikipedia , lookup
Wake-on-LAN wikipedia , lookup
Zero-configuration networking wikipedia , lookup
Introduction Chapter 1 Panko’s Business Data Networks and Telecommunications, 5th edition Copyright 2005 Prentice-Hall Learning Objectives By the end of this session, you should be able to List the eight elements of networks. Explain the major types of networks in businesses: LANs, WANs, internets, intranets, and extranets. Discuss major concerns for network managers: staffing, network architecture, standards, security, wireless networking, efficiency, and quality of service (QoS). Explain the elements and operation of a small home PC network using a LAN 2 Definition A NETWORK is a system of hardware software and transmission components that allow applications to on different stations within the system communicate with each other 3 Figure 1-2: Elements of a Network Message (Frame) Application Application Client Station Switch Server Station Switch Access Line Switch Mobile Client Station Trunk Line Trunk Line Switch Outside World Router Mobile Client Station lines connect stations toThe switches Switches move frames to or closer to different the destination station Stations (and routers)Access usually communicate path a frame takes Networks connect applications on stations. Routers connect networks to the outside world. Treated just like stations Networks connect stations: clients (fixed and mobile) and servers lines connect switches to switches (and routers) Switches packet sequentially by sendingTrunk messages called handle frames is called its data link Applications are alla users care about 4 Figures 1-6 and 1-7: Workgroup and Core Switches 19 inches (48 cm) wide 19 inches (48 cm) wide Small Switches (Stacked): Workgroup Switches To Link Stations To Network Central Core Switch 5 Figure 1-3: Multiplexing in a Packet-Switched Network Trunk line multiplexes the messages of different conversations AC Client Station A AC AC BD BD Mobile Client Station B AC AC Trunk Line Access Line AC This reduces trunk line costs through cost sharing by users Server Station C BD BD Router D 6 Figure 1-2: Elements of a Network (Recap) Applications (the only element that users care about) Stations Clients Servers Switches Routers Transmission Lines Trunk lines Access Lines Messages (Frames) Never talk about an Innovation “reducing cost,” “increasing speed,” etc. without specifying which element is cheaper or faster. For example, multiplexing only reduces the cost of trunk lines; other costs are not decreased 7 LANs and WANs LANs transmit data within corporate sites WANs transmit data between corporate sites Each LAN or WAN is a single network WAN 8 Figure 1-5: Local Area Network (LAN) in a Large Building Multi-floor Office Building The bank has multiple LANs—one at each site 9 Figure 1-5: Local Area Network (LAN) in a Large Building, Continued Wall Jack Workgroup Switch Workgroup Switch To WAN Router Core Switch 10 Internets Most firms have multiple LANs and WANs. They must create internets An internet is a collection of networks connected by routers so that any application on any host on any single network can communicate with any application on any other host on any other network in the internet. Application Application LAN WAN Router LAN Router 11 Figure 1-8: Internet with Three Networks Host A R1 Packet Network X Network Z A packet goes all the way across the internet; It’s path is its route Network Y Route A-B R2 Host B 12 Figure 1-8: Internet with Three Networks, Continued Messages in single networks (LANs or WANs) are called frames Message in internets are called packets Travel from the source host to the destination host across the entire internet Within a single network, the packet is encapsulated in (carried in) the network’s frame Packet Package (Packet) Truck (frame) Frame 13 Figure 1-8: Internet with Three Networks, Continued Frame X Details in Network X Packet Data Link A-R1 Switch Host A Switch Server Host Switch X1 Mobile Client Host Switch X2 Route A-B Router R1 Network X 14 Figure 1-8: Internet with Three Networks, Continued Details in Network Y To Network X Route A-B Router R1 Data Link R1-R2 To Network Z Router R2 Frame Y Packet Network Y 15 Figure 1-8: Internet with Three Networks, Continued Data Link R2-B Details in Network Z Packet Frame Z Switch Z1 Host B Switch Router R2 Switch Z2 Mobile Client Hosts Switch Router Network Z 16 Figure 1-8: Internet with Three Networks, Continued In this internet with three networks, in a transmission, There is one packet There are three frames (one in each network) If a packet in an internet must pass through N networks, How many packets will be sent? How many frames must carry the packet? 17 Figure 1-8: Internet with Three Networks, Continued Lower-case internet is any internet Upper-case Internet is the global Internet 18 Figure 1-11: The Internet Webserver User PC Access Line The Internet Backbone (Multiple Carriers) Access Line Router NAP ISP 2 NAP NAP ISP 1 ISP 4 ISP 3 Internet Service Provider For User PC NAP = Network Access Point Internet Service Provider For Webserver 19 Figures 1-9 and 1-10: Routers 19 inches (48 cm) wide 19 inches (48 cm) wide Small Routers Stacked For Branch Offices Large Routers for Large Sites and ISPs 20 Figure 1-12: The Internet, internets, Intranets, and Extranets internets versus the Internet Intranets Internal internet for use within an organization Based on the TCP/IP standards created for the Internet Extranets Connect multiple firms Only some computers from each firm are on the extranet Use TCP/IP standards 21 Recap Switches versus Routers Switches move frames through single networks (LANs or WANs) Routers move packets through internets Messages Messages in single networks are called frames Messages in internets are called packets Packets are encapsulated within frames 22 End Day 1 23 Day 2 24 Review List the 8 common elements of a network Explain difference between a message and a packet Explain difference between switch and router Difference between trunk and access lines Given an internet, indicate number of frames, packets, networks traversed for message from A to B Different types of addresses 25 Figure 1-23: Logical Functions of the Access Router Cable Modem Access Router Router Function DHCP Server Function NAT Function Switch Function 26 Figure 1-24: Ethernet Switch Operation Switching Table Port Host 10 A1-44-D5-1F-AA-4C 13 B2-CD-13-5B-E4-65 15 C3-2D-55-3B-A9-4F 16 D4-47-55-C4-B6-9F Ethernet Switch UTP UTP Frame To C3… A1-44-D5-1F-AA-4C UTP UTP D4-47-55-C4-B6-9F Frame To C3… C3-2D-55-3B-A9-4F B2-CD-13-5B-E4-65 27 Figure 1-25: Frames and Packets Cable Modem Packet in DOCIS Frame Internal Router Access Router Packet is always carried (encapsulated) in a frame A1-BD-33-6E-C7-BB IP address = 192.168.0.3 PC in Emily’s Room Packet in Ethernet Frame B2-CD-13-5B-E4-65 IP address = 192.168.0.2 PC in Study 28 Figure 1-26: Dynamic Host Configuration Protocol (DHCP) Cable Modem ISP DHCP Server 1. IP Address = 60.47.112.6 Access Router A1-BD-33-6E-C7-BB PC in Emily’s Room The ISP only Gives each home a Single IP address B2-CD-13-5B-E4-65 PC in Study A DHCP Server provides User PCs with a temporary IP Address each time the user connects to the Internet 29 Figure 1-26: Dynamic Host Configuration Protocol (DHCP), Continued Cable Modem ISP DHCP Server 1. IP Address = 60.47.112.6 Internal DHCP Server Access Router A1-BD-33-6E-C7-BB IP address = 192.168.0.3 PC in Emily’s Room 2. IP Address = 192.168.0.3 2. IP Address = 192.168.0.2 The access router’s Internal DHCP server Gives private IP Addresses to each PC B2-CD-13-5B-E4-65 IP address = 192.168.0.2 PC in Study 30 Figure 1-27: Network Address Translation (NAT) 2. Packet from 60.47.112.6 Webserver IP address= 123.7.86.285 Cable Modem Internal NAT Module Access Router The access router’s NAT module translates between the private IP addresses and the single ISP-given IP address 1. Packet from 192.168.0.2 PC in Study 192.168.0.2 31 Figure 1-27: Network Address Translation (NAT), Continued 3. Packet to 60.47.112.6 Webserver IP address= 123.7.86.285 Cable Modem Internal NAT Module Access Router 4. Packet to 192.168.0.2 PC in Study 192.168.0.2 32 Figure 1-28: The Domain Name System (DNS), Continued DNS Table Originating Host’s DNS Resolver Host Name … … Voyager.cba.hawaii.edu … IP Address … … 128.171.17.13 … DNS Request Message “The host name is Voyager.cba.hawaii.edu” DNS Response Message “The IP address is 128.171.17.13” DNS Host 33 Figure 1-29: Converting Binary IP Addresses to Dotted Decimal Notation Binary IP Address 01111111101010110001000100001101 8-Bit Segments 01111111 10101011 00010001 00001101 Convert Segments to Decimal Dotted Decimal Notation 127 171 17 13 127.171.17.13 34 Elements of a Network Message (Frame) Application Application Client Station Switch Server Station Switch Access Line Switch Mobile Client Station Trunk Line Switch Trunk Line Outside World Router Mobile Client Station 35 Figure 1-22: Home Network Access Router About 4 inches (10 cm) Wide Power Jack for External Power Switch Ports UTP Cords Run to Stations WAN Port UTP Cord Runs to Cable Modem 36 Figure 1-19: Network Interface Cards (NICs) (Photo) Internal NIC. Installed inside systems unit. Plugged into expansion slot on the mother board. PC Card NIC. Installed in PC Card slot in notebook and some PDAs. 37 Internal NIC RJ-45 Jack PCI Connector Pins 38 Computer Mother Board Mother Board PCI Slots for Expansion Boards (NICs, etc.) Slots for RAM Slot for Microprocessor (Pentium 4) 39 Mother Board and Expansion Boards Expansion Board (NIC) Connector Expansion Slots Mother Board 40 Figure 1-20: Unshielded Twisted Pair (UTP) Cord With RJ-45 Connector (Photo) 4-Pair Unshielded Twisted Pair (UTP) Industry Standard Pen 8-Pin RJ-45 Connector UTP Cord 41 Figure 1-21: UTP Cord RJ-45 Connector and Jack UTP Cord --About as thick as a pencil --Rugged and Flexible RJ-45 Jack On a Wall On a Switch or On a NIC RJ-45 Connector 42 Figure 1-13: Major Network Technical Concerns Architecture Standards Security Efficiency Wireless Communication QoS 43 Figure 1-13: Major Network Technical Concerns Network Architecture A broad plan for how the firm will connect all of its computers within buildings (local area networks), between sites (wide area networks), and to the Internet New systems must fit the rules of the architecture Scalability – ability to accommodate growth efficiently Undisciplined growth in the past No overall plan Legacy networks Use obsolete technologies that do not fit the long-term architecture Too expensive to replace quickly; must live with many for awhile 44 Figure 1-13: Major Network Technical Concerns, Continued Standards Standards govern message interactions between pairs of entities (Figure 1-14) For example, HTTP request and response messages for WWW access Standards create competition This reduces costs It also stimulates the development of new features Protects the business if the main vendors go out of business 45 Figure 1-13: Major Network Technical Concerns, Continued Security A Major Problem Many attacks Growing trend toward criminal attackers 46 Figure 1-15: Firewalls Allowed Legitimate Border Packet Firewall Attacker Hardened Server Hardened Client PC Border firewall should pass legitimate packets Log File Legitimate Packet Legitimate Host Internal Corporate Network 47 Figure 1-15: Firewalls, Continued Border firewall should deny (drop) Hardened and log Server attack packets Hardened Client PC Border Firewall Attack Packet Denied Attack Packet Log File Network Management Console Attacker Legitimate Host Internal Corporate Network 48 Figure 1-13: Major Network Technical Concerns, Continued Security Virtual Private Networks (VPNs) (Figure 1-16) Provide communication over the Internet with added security Cryptographic protection for confidentiality (eavesdroppers cannot read) Cryptographic authentication (confirms sender’s identity) 49 Figure 1-16: Virtual Private Networks (VPNs) Site-to-Site VPN Using Gateway Client VPN Remote Access Gateway PC 1 VPN Using Corporate Gateway Site B VPN Gateway Internal Server Corporate Site A Internet Host-to-Host VPN Remote Client PC 2 Remote Client PC 3 50 Figure 1-13: Major Network Management Concerns, Continued Wireless Communication To improve mobility Drive-by hackers can eavesdrop on internal communication Drive-by hackers can break into the network bypassing firewalls Drive-By Hacker 51 Figure 1-13: Major Network Technical Concerns, Continued Quality of Service (QoS) QoS Numerical objectives for performance Transmission speed in bits per second (bps) A bit is a single one or zero NOT bytes per second Increase by factors of 1000, not 1024 kilobits per second (kbps)—lower-case k Megabits per second (Mbps) Gigabits per second (Gbps) Terabits per second (Tbps) 52 Figure 1-13: Major Network Technical Concerns, Continued Quality of Service For Transmission Speed, have 1 to 3 places BEFORE the decimal point. Example .5 Mbps is wrong 500 kbps is correct Example 2,300 Mbps is wrong 2.3 Gbps is correct Example 473.2 Mbps is correct 53 Figure 1-13: Major Network Technical Concerns, Continued Quality of Service Typical transmission speeds in most firms: LANs: 100 Mbps to each desktop WANs: most site-to-site links only are 56 kbps to a few megabits per second because long-distance transmission is very expensive and so must be used more sparingly LANs: 100 Mbps WANs: 56 kbps to a few Mbps 54 Figure 1-13: Major Network Technical Concerns, Continued Quality of Service Congestion, Throughput, Latency, and Response Time Congestion: when there is too much traffic for the network’s capacity Throughput: The speed users actually see (often much less than rated speed) Individual throughput is less than total throughput on shared-speed links 55 Figure 1-13: Major Network Technical Concerns, Continued Quality of Service Congestion, Throughput, Latency, and Response Time Latency: delay (usually measured in milliseconds or ms) Within corporations, latency is typically under 60 ms 90% of the time On the Internet, typically 30 ms to 150 ms 56 Figure 1-13: Major Network Technical Concerns, Continued Quality of Service Congestion, Throughput, Latency, and Response Time Response Time The time to get a response after a user issues a command A quarter second or less is good 57 Figure 1-13: Major Network Technical Concerns, Continued Availability Availability is the percentage of time a network can be used Downtime: when the user cannot use the network Want 24x7 availability Telephone network gives 99.999% availability Typical networks reach 98% today 58 Figure 1-13: Major Network Technical Concerns, Continued Error Rate Measured as the percentage of messages damaged or lost Substantial error rates can disrupt applications Substantial error rates generate more network traffic because of retransmissions 59