Download Network

Document related concepts

Zigbee wikipedia , lookup

Net bias wikipedia , lookup

IEEE 802.1aq wikipedia , lookup

CAN bus wikipedia , lookup

Wireless security wikipedia , lookup

AppleTalk wikipedia , lookup

Distributed firewall wikipedia , lookup

Asynchronous Transfer Mode wikipedia , lookup

Deep packet inspection wikipedia , lookup

Wake-on-LAN wikipedia , lookup

Internet protocol suite wikipedia , lookup

Piggybacking (Internet access) wikipedia , lookup

Zero-configuration networking wikipedia , lookup

Computer network wikipedia , lookup

IEEE 1355 wikipedia , lookup

Recursive InterNetwork Architecture (RINA) wikipedia , lookup

Network tap wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Airborne Networking wikipedia , lookup

UniPro protocol stack wikipedia , lookup

Transcript
Introduction to
Networking
Chapter 10
Learn how to…
• Define the term networking and list three
critical components.
• Describe the five basic topologies.
• Define the seven layers of the OSI model
and the protocols that use it.
• Describe the differences among LAN,
MAN, and WAN.
• Describe the physical network
components.
Understanding
Networks
Networks
• A network is the connection of two or
more digital devices for communicating,
transferring, or obtaining data.
• The act of communicating over a network
is called networking.
Networking
Characteristics of a Network
• All networks require:
– A physical connection (or wireless connection).
– A set of communication rules called protocols.
– One or more network services that will receive
the communication.
Mainframe/Terminal Model
• The mainframe/terminal model
– A mainframe is a centralized computer to
which users connect to obtain network
services.
– The terminal is a
device with a
keyboard, which you
use to type
commands or enter
data to communicate
with the mainframe
computer.
Client-Server Model
• Client-server refers to the manner in
which computers exchange information
by sending it (as servers) and receiving
it (as clients).
– Computers can serve dual roles as both
servers and clients.
Multi-Tier
• Large organizations may subdivide complex
applications into multiple stages called tiers.
• Multi-tier computing typically includes three tiers
consisting of the user interface tier, the business
tier, and the database tier.
Peer-to-Peer Model
• Peer-to-peer (P2P) is a network
architecture in which each workstation
has equal responsibilities.
Enterprise Model
• Enterprise model refers to networking
within large organizations that dedicate
entire servers to handling important tasks.
– Serving mail
– Hosting databases
– Managing security
– Routing network traffic
Push-Pull Technology
• The push-pull metaphor
– Pull means that you ask for the information.
• When you click a hyperlink.
– Push means that the information is being
provided to you.
• When stock quotes are automatically updated on
your desktop or when weather is automated
updated on your desktop.
– See www.weatherbug.com
Complex Network
Network Operating Systems
• A network operating system is the
software that adds to a computer the
functions required for connecting
computers together for networking.
– Microsoft Windows
– UNIX and Linux
– Mac OS
– Novel NetWare
Microsoft Windows
• Microsoft Windows is the most wide
spread network operating system.
– Every version of Windows contains
networking capability, but some versions
do not support all network services.
– For a history of Windows server products,
visit
www.microsoft.com/windows/winhistoryserver.
mspx
UNIX and Linux
• The UNIX and Linux operating systems
support the full range of networking
services, including both client- and serverside components.
– The Open Group holds the trademark and
defines the official version of UNIX at
www.unix-systems.org
– Linux is an open source version of UNIX
• To learn more, go to www.linux.org
Mac OS
• The Macintosh OS X operating system
has networking built in.
– Behind the Macintosh user interface is
a UNIX-based operating system.
• To learn more, go to
www.apple.com/macosx/features/unix
Novell NetWare
• NetWare is a PC-based local area networking
product that was one of the most dominant
network operating systems during the decade
following its invention in 1983.
– However, when Microsoft marketed Windows NT
in 1993, Novell NetWare’s market share dropped.
– For more information, go to
www.novell.com/products/netware
Classifying Network Topologies
Network Topologies
• A network’s geographical shape is referred
to as the network’s topology.
• The five kinds of network topologies are:
– Bus topology
– Ring topology
– Star topology
– Hybrid topology
– Mesh topology
Bus Topology
• The bus topology has a single cable, called the
bus or the trunk, to which every device on the
network connects.
– All of the messages on the bus pass by each device, or
node, on the bus.
– It uses inexpensive coaxial cable that is easy to install.
– A break anywhere along the cable causes all network
traffic to stop.
Ring Topology
• A ring topology forms when you connect
a network’s nodes in a circle.
– Messages flow in a single direction.
– A small packet called a token circulates the
ring – a device must have the token to use
the network.
Star Topology
• In a star topology,
each device in the
network connects to
a central hub, which
distributes messages
from one node to
another.
– Provides centralized
control
– Easy expansion
– Fault tolerance
Hybrid Topology
• A hybrid topology in a network employs
more than one topology to connect
devices.
Star Bus topology
Star Ring topology
Mesh Topology
• In a mesh topology,
multiple connections
are made.
– In mission-critical
operations, you want
as much redundancy
as possible so that
if one part of the
network goes down,
the packets can find
an alternate path to
their destination.
Adopting Network Protocols
Protocol
• A protocol is a set of rules that define how
computers communicate with each other.
• The International Standards Organization
(ISO) developed an international standard
called the Open System Interconnection
(OSI) Reference Model (OSI/RM).
OSI Reference Model
• This model comprises of seven layers that
describe the way data is shared on a
network.
• Suppose you just clicked on a link on a
Web page. The following slides describe
the process from one layer to another.
– Data is passed down from Layer 7 to Layer 1,
is then transmitted over the medium, and then
goes back up from Layer 1 to Layer 7 in the
receiving device.
– Headers are added at each layer.
Layer 7: Application
• Through an Application Programming
Interface (API), the browser informs the
Application Layer of your request.
• The Application Layer begins to form the
packet that will eventually travel across
the network.
Layer 6: Presentation
• The Presentation Layer translates the
data into a standard network data format.
• It can use data compression to streamline
the packet so it does not consume
unnecessary bandwidth on the network.
• It can also encrypt the data for sensitive
data transmissions.
Layer 5: Session
• The Session Layer negotiates the
connection that will be made between the
two computers exchanging data.
• It inserts a checkpoint, which is a marker
used to signal that a certain amount of the
data has arrived all right.
Layer 4: Transport
• The Transport Layer works to ensure that
the data arrives reliably at its destination.
• If the amount of data is large, the data is
split into fragments that are numbered
sequentially.
Layer 3: Network
• The Network Layer organizes data into
datagrams consisting of the data
from the Transport Layer and routing
information such as the source and
destination addresses.
Layer 2: Datalink
• The Data Link Layer transforms the data
into data frames.
• It consists of two sublayers:
– Logical Link Control (LLC)
• Performs error checking and regulates the flow
of data.
– Media Access Control (MAC)
• Handles the actual placement of the packets
onto the Physical Layer.
CRC
• The Data Link layer also calculates a
cyclic redundancy check (CRC) based
on the information in the frame.
– The receiving machine calculates its own
CRC and compares it to the value in the
frame. If they do not match, the frame is
corrupt and discarded.
Layer 1: Physical
• The Physical Layer transforms the 0’s
and 1’s into signals that flow over the
transmission media.
• At the receiving end, the Physical Layer
converts these signals back into 0’s and
1’s and passes them up to the Data Link
Layer.
Communication
To help you remember…
Protocol Suites
• The term protocol suite refers to a collection of
protocols that work together to conform to a
multilayered protocol standard, such as the
OSI/RM.
• Six major protocol suites follow the OSI/RM:
–
–
–
–
–
–
TCP/IP
NetBEUI
IPX/SPX
AppleTalk
DLC
SNA
TCP/IP
• TCP/IP is the Internet’s protocol suite.
– Transport Control Protocol (TCP)
• Manages the Transport Layer
– Internet Protocol (IP)
• Handles the routing on the Network Layer
NetBEUI
• NetBEUI stands for NetBIOS Extended
User Interface
– NetBIOS stands for Network Basic
Input/Output System
– Not routable
IPX/SPX
• IPX/SPX stands for Internetwork Packet
Exchange (IPX) and Sequenced Packet
Exchange (SPX).
– Developed by Novell for use with the NetWare
network operating system.
AppleTalk
• AppleTalk is the legacy protocol suite for
peer-to-peer networking on local networks
of Macintosh computers.
DLC
• IBM invented Data Link Control (DLC)
to enable microcomputers to connect as
clients to legacy mainframes.
– Still used by Hewlett-Packard printers that
have Network Interface Cards (NICs).
SNA
• Systems Network Architecture (SNA)
is a protocol suite for connecting different
kinds of networks.
Combining Protocols
• Most computers run more than one
networking protocol.
• The process of assigning a protocol to a
Network Interface Card (NIC) is called
protocol binding.
– The binding order is the order in which your
computer tries protocols when attempting
to communicate over the network.
Creating LANs, MANs, and
WANs
LAN
• A local area network (LAN) is the
connection of two or more computer
devices for networking within a relatively
small area.
MAN
• A metropolitan area network (MAN)
connects local networks across a larger
geographical region.
– The term metropolitan implies that MANs
cover an area the size of a city.
WAN
• A wide area network (WAN) uses highspeed transmission lines to connect MANs
and LANs over large geographical areas.
Project 802
• The Institute of Electrical and Electronic
Engineers (IEEE, pronounced “I triple-E”)
is in charge of defining the networking
standards that connect devices to form
different kinds of local and metropolitan
area networks.
– Called Project 802.
Project 802
IEEE 802.2
• The IEEE 802.2 standard is the Logical
Link Control (LLC) sublayer of the OSI/RM
Data Link Layer.
IEEE 802.3
• The IEEE 802.3 standard defines
Ethernet, which is the most popular
method of local area networking.
– Defines CSMA/CD, which stands for Carrier
Sense Multiple Access with Collision
Detection.
– Ethernet works by detecting the data
collisions that can occur when two or more
devices use a data channel simultaneously.
Ethernet
• The maximum speed of an ordinary 802.3
Ethernet is 10 Mbps.
• Fast Ethernet runs at 100 Mbps.
• Gigabit Ethernet runs at 1000 Mpbs.
IEEE 802.5
• The IEEE 802.5 standard defines token
ring, which derives from IBM’s local area
network design in which a token travels
continually around the cable ring to which
the network devices are attached.
– A device can send data only when it has the
token.
– Each device attaches to a central connecting
point called a Multi-Station Access Unit
(MAU).
IEEE 802.12
• The IEEE 802.12 standard defines a
Demand Priority Access LAN that is
known in the marketplace as 100VGAnyLAN.
– 100VG means that the network is designed to
transmit at a speed of 100 Mbps over voice
grade (VG) telephone wiring.
– AnyLAN refers to the fact that this network
can handle packets framed for transmission
on either Ethernet or token-ring networks.
FDDI
• Fiber Distributed Data Interface (FDDI)
uses fiber optics to create a very fast
network.
– Uses two counter-rotating token rings.
– Due to its high reliability, FDDI is often used
for backbones (network cables that act as the
primary pathways for traffic).
FDDI
WANs
• A wide area network (WAN) is the connection
of two or more LANs that can be located in
different buildings, cities, countries, or
continents.
• The local networks can be connected by:
–
–
–
–
–
Telephone lines
ISDN
Broadband
Frame Relay
Asynchronous Transfer Mode (ATM)
X.25
• X.25 enables data to be transmitted over
the packet-switched networks (PSNs) of
the telephone companies.
– Legacy WAN protocol with extensive error
checking.
– Used by some for credit-card swiping and
automated bank machines.
Frame Relay
• Frame Relay is a streamlined version of
X.25.
– No error checking.
– Connections can be:
• Switched virtual circuit (SVC) created for each data
transfer and terminated when the data transfer is
complete.
• Permanent virtual circuit (PVC) that is constantly
on.
– Bandwidth on demand allows customers to
choose their connection speed.
ATM
• Asynchronous Transfer Mode (ATM) is
an ITU standard for cell relay that can
transmit voice, video, or data in small,
fixed-size 53-byte chunks called cells.
– Asynchronous means that the cells do not
have to line up and wait to be transmitted
sequentially over a single connection.
ATM
NAP
• A network access point (NAP) is a
junction that provides direct access to the
traffic on a network.
– The three major NAPs used by the ISPs are
located in New York, Chicago, and
San Francisco.
T-Carriers
• NAPs often use the T-carrier system to
connect a LAN to a WAN.
– Organizations that cannot afford the cost of
a full T1 can lease a fractional T1.
E-Carriers
• E-carriers are used in Europe.
WAP
• Wireless access point (WAP) refers to
wireless network junctions that enable
workstations to communicate without
cables.
NAT
• Network address translation (NAT)
transforms the IP addresses used for
internal traffic into a second set of
addresses for external traffic.
– NAT hides internal addresses, acting as a
firewall against attacks.
– Multiple internal addresses can be translated
into fewer external addresses.
Network Cards
• Each workstation must
have a Network
Interface Card (NIC).
• On FDDI equipment, the
network interface is called
a MIC, which stands for
Media Interface Card.
• On wide area networking
equipment, the network
interface is called a WIC,
for WAN interface card.
Network Components
• Users perform work on clients called
workstations.
• A concentrator is an Ethernet multiport
repeater used to connect multiple Ethernet
devices to a single Ethernet cable.
• A hub serves as the center of a star
network topology (Ethernet multiport
repeater).
Network Components
• A repeater interconnects two network
cables so they can be treated as a single
cable.
– Allows one to extend the length of the cable.
• A switch filters, forwards, and floods
frames based on the destination MAC
address of each frame.
– To flood is to pass traffic out all of the switch’s
connections except for the incoming interface
through which the traffic was received.
Network Components
• A bridge is used to connect two network
segments and pass packets between them
based on the destination MAC address of
each frame.
– A switch is a multiport bridge.
• A router forwards network traffic along the
optimal path based on information in the
packet’s Network Layer header.
Network Components
• A bridge router (brouter) is a relay that
functions as both a router and a bridge.
• A gateway is a computer that routes traffic
from a workstation on an internal network
to an external network such as the
Internet.
Coaxial Cabling
• Coaxial cable, also known as coax,
consists of a cylindrically braided outer
conductor that surrounds and shields a
single solid inner copper wire conductor.
Coaxial Cabling
• Coaxial cable comes in two forms:
• Thinnet
– Thin coaxial cable
– Used in 10Base2
Ethernet networks
– Cable segments up to
185 meters in length
• Thicknet
– Thick coaxial cable
– Used in 10Base5
Ethernet networks
– Cable segments up to
500 meters in length
Coaxial Cabling
• Coaxial cables use the British Naval
Connector (BNC) to plug the cables into
workstations, hubs, and other kinds of
network devices.
Twisted Pair Cabling
• Twisted pair is a transmission medium
consisting of two insulated wires that are
twisted together to create a double helix
that reduces noise levels and eliminates
crosstalk between the wires.
• Unshielded twisted
pair (UTP)
• Shielded twisted
pair (STP) has an
extra layer of
insulation
Twisted Pair Cabling
• Twisted-pair cabling is broken into
categories.
– CAT 5 means category 5.
– The wires terminate in an RJ-45 connector.
Twisted Pair Cabling
Twisted Pair Cabling
• Twisted pair cables consist of four pairs of
wires with RJ-45 connectors at the end.
Fiber Optic Cabling
• Fiber optics is a transmission method that
transmits light-modulated video, voice, or
data signals through hair-thin strands of
glass called fibers.
– These strands are encased by a layer of
Kevlar-reinforced reflective material called
cladding, which keeps the light inside the
fiber.
Wireless Media
• Includes cellular, radio, microwave,
satellite, and infrared signals.
• Network nodes that use wireless
connections must have a wireless NIC,
which connects to a transceiver known as
a wireless access point (WAP).
• Defined by the 802.11 standards.
– For more information, go to
www.microsoft.com/windowsxp/mediacenter