Download Module 1 - Home - KSU Faculty Member websites

Document related concepts

Asynchronous Transfer Mode wikipedia , lookup

Wake-on-LAN wikipedia , lookup

Net bias wikipedia , lookup

IEEE 1355 wikipedia , lookup

Distributed firewall wikipedia , lookup

Deep packet inspection wikipedia , lookup

Piggybacking (Internet access) wikipedia , lookup

Zero-configuration networking wikipedia , lookup

Internet protocol suite wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Computer network wikipedia , lookup

Recursive InterNetwork Architecture (RINA) wikipedia , lookup

List of wireless community networks by region wikipedia , lookup

Peer-to-peer wikipedia , lookup

Network tap wikipedia , lookup

UniPro protocol stack wikipedia , lookup

Airborne Networking wikipedia , lookup

Transcript
Module 2
Networking
Fundamentals
Version 3
1
Data Networks
• Data networks developed as a result of business applications
that were written for microcomputers.
• Businesses needed a solution that would successfully address
the following three problems:
– How to avoid duplication of equipment and resources
– How to communicate efficiently / reduce duplicate copies of files
– How to set up and manage a network
• Businesses realized that networking technology could increase
productivity while saving money.
Version 3
2
Data Networks
• In the mid-1980s, the network technologies that had emerged
had been created with a variety of different hardware and
software implementations.
• Each company that created network hardware and software
used its own company standards.
• These individual standards were developed because of
competition with other companies.
• Consequently, many of the new network technologies were
incompatible with each other.
• This often required the old network equipment to be removed to
implement the new equipment.
Version 3
3
Data Networks
• One early solution was the creation of local-area network (LAN)
standards.
• Because LAN standards provided an open set of guidelines for
creating network hardware and software, the equipment from
different companies could then become compatible.
Version 3
4
Networking Devices
• Network devices include all the devices that connect the enduser devices together to allow them to communicate.
• End-user devices include computers, printers, scanners, and
other devices that provide services directly to the user.
• End-user devices that provide users with a connection to the
network are also referred to as hosts.
• The host devices can exist without a network, but without the
network the host capabilities are greatly reduced.
• Host devices are physically connected to the network media
using a network interface card (NIC).
Version 3
5
Networking Devices
• Network devices provide transport for the data that needs to be
transferred between end-user devices.
• Network devices provide extension of cable connections,
concentration of connections, conversion of data formats, and
management of data transfers.
• Examples of devices that perform these functions are
repeaters, hubs, bridges, switches, and routers.
Version 3
6
Networking Devices
Version 3
7
Networking Devices
Repeaters
• A repeater is a network device used to regenerate a signal.
• Repeaters regenerate analog or digital signals distorted by
transmission loss due to attenuation.
• A repeater does not perform intelligent routing.
Version 3
8
Networking Devices
Hubs
• Hubs concentrate connections.
• In other words, they take a group of hosts and allow the
network to see them as a single unit.
• This is done passively, without any other effect on the data
transmission.
• Active hubs not only concentrate hosts, but they also
regenerate signals.
Version 3
9
Networking Devices
Bridges
• Bridges convert network transmission data formats as well as
perform basic data transmission management.
• Bridges provide connections between LANs.
• Bridges also perform a check on the data to determine whether
it should cross the bridge or not.
Version 3
10
Networking Devices
Workgroup Switches
• Workgroup switches add more intelligence to data transfer
management.
• Not only can they determine whether data should remain on a
LAN or not, but they can transfer the data only to the
connection that needs that data.
• Another difference between a bridge and switch is that a switch
does not convert data transmission formats.
Version 3
11
Networking Devices
Routers
• Routers can regenerate signals, concentrate multiple
connections, convert data transmission formats, and manage
data transfers.
• They can also connect to a WAN, which allows them to connect
LANs that are separated by great distances.
Version 3
12
Network Topologies
• Network topology defines the structure of the network.
• One part of the topology definition is the physical topology,
which is the actual layout of the wire or media.
• The other part is the logical topology, which defines how the
media is accessed by the hosts for sending data.
Version 3
13
Physical Topologies
• Commonly used physical topologies
Version 3
14
Physical Topologies
Bus
• A bus topology uses a single backbone cable that is terminated
at both ends.
• All the hosts connect directly to this backbone.
Version 3
15
Physical Topologies
Ring
• A ring topology connects one host to the next and the last host
to the first.
• This creates a physical ring of cable.
Version 3
16
Physical Topologies
Star
• A star topology connects all cables to a central point of
concentration.
Version 3
17
Physical Topologies
Extended Star
• An extended star topology links individual stars together by
connecting the hubs and/or switches.
• This topology can extend the scope and coverage of the
network.
Version 3
18
Physical Topologies
Hierarchical
• A hierarchical topology is similar to an extended star.
• However, instead of linking the hubs and/or switches together,
the system is linked to a computer that controls the traffic on
the topology.
Version 3
19
Physical Topologies
Mesh
• A mesh topology is implemented to provide as much protection
as possible from interruption of service.
• Each host has its own connections to all other hosts.
Version 3
20
Logical Topologies
• The logical topology of a network is how the hosts
communicate across the medium.
• The two most common types of logical topologies are broadcast
and token passing.
Version 3
21
Logical Topologies
Broadcast
• Broadcast topology simply means that each host sends its data
to all other hosts on the network medium.
• There is no order that the stations must follow to use the
network.
• It is first come, first serve.
• Ethernet works this way.
Version 3
22
Logical Topologies
Token Passing
• Token passing controls network access by passing an
electronic token sequentially to each host.
• When a host receives the token, that host can send data on the
network.
• If the host has no data to send, it passes the token to the next
host and the process repeats itself.
• Two examples of networks that use token passing are Token
Ring and Fiber Distributed Data Interface (FDDI).
Version 3
23
Network Protocols
• Protocol suites are collections of protocols that enable network
communication from one host through the network to another
host.
• A protocol is a formal description of a set of rules and
conventions that govern a particular aspect of how devices on a
network communicate.
• Protocols determine the format, timing, sequencing, and error
control in data communication.
Version 3
24
Local-area Networks (LANs)
• LANs are designed to:
– Operate within a limited geographic area
– All multi-access to high-bandwidth media
– Control the network privately under local administration
– Provide full-time connectivity to local services
– Connect physically adjacent devices
• LANs make it possible for businesses that use computer
technology to locally share files and printers efficiently, and
make internal communications possible.
Version 3
25
Local-area Networks (LANs)
• LANs consist of the following components:
– Computers
– Network interface cards
– Peripheral devices
– Networking media
– Network devices
• Some common LAN technologies are:
– Ethernet
– Token Ring
– FDDI
Version 3
26
Wide-area Networks (WANs)
• WANs interconnect LANs, which then provide access to
computers or file servers in other locations.
• WANs are designed to:
– Operate over a large geographical area
– Allow access over serial interfaces operating at lower speeds
– Provide full-time and part-time connectivity
– Connect devices separated over wide, even global areas
Version 3
27
Wide-area Networks (WANs)
• Some common WAN technologies are:
– Modems
– Integrated Services Digital Network (ISDN)
– Digital Subscriber Line (DSL)
– Frame Relay
– US (T) and Europe (E) Carrier Series – T1, E1, T3, E3
– Synchronous Optical Network (SONET)
Version 3
28
Metropolitan-area Networks (MANs)
• A MAN is a network that spans a metropolitan area such as a
city or suburban area.
• A MAN usually consists of two or more LANs in a common
geographic area.
• For example, a bank with multiple branches may utilize a MAN.
Version 3
29
Storage-area Networks (SANs)
• A SAN is a dedicated, high-performance network used to move
data between servers and storage resources.
• Because it is a separate, dedicated network, it avoids any traffic
conflict between clients and servers.
• SANs offer the following features:
– Performance
– Availability
– Scalability
Version 3
30
Virtual Private Network (VPN)
• A VPN is a service that offers secure, reliable connectivity over
a shared public network infrastructure such as the Internet.
•
VPNs maintain the same security and management policies as
a private network.
• They are the most cost-effective method of establishing a pointto-point connection between remote users and an enterprise
customer's network.
• The three main types of VPNs are:
– Access VPNs
– Intranet VPNs
– Extranet VPNs
Version 3
31
Access VPNs
• Access VPNs provide remote access to a mobile worker and
small office/home office (SOHO) to the headquarters of the
Intranet or Extranet over a shared infrastructure.
• Access VPNs use analog, dialup, ISDN, digital subscriber line
(DSL), mobile IP, and cable technologies to securely connect
mobile users
Version 3
32
Intranet VPNs
• Intranet VPNs link regional and remote offices to the
headquarters of the internal network over a shared
infrastructure using dedicated connections.
• Intranet VPNs differ from Extranet VPNs in that they allow
access only to the employees of the enterprise.
Version 3
33
Extranet VPNs
• Extranet VPNs link business partners to the headquarters of the
network over a shared infrastructure using dedicated
connections.
• Extranet VPNs differ from Intranet VPNs in that they allow
access to users outside the enterprise.
Version 3
34
Intranet and Extranets
• Intranets are designed to permit access by users who have
access privileges to the internal LAN of the organization.
•
Intranet Web servers differ from public Web servers in that the
public must have the proper permissions and passwords to
access the Intranet of an organization.
• Extranets refer to applications and services that are Intranet
based, and use extended, secure access to external users or
enterprises.
Version 3
35
Bandwidth
• Bandwidth is defined as the amount of information that can flow
through a network connection in a given period of time.
• Why bandwidth is important:
– Bandwidth is limited by physics and technology (it is finite)
– Bandwidth is not free
– Bandwidth requirement are growing at a rapid rate
– Bandwidth is critical to network performance
Version 3
36
Bandwidth Analogy
Version 3
37
Bandwidth Measurements
• In digital systems, the basic unit of bandwidth is bits per second
(bps).
• Bandwidth is the measure of how much information, or bits, can
flow from one place to another in a given amount of time, or
seconds.
Most common measurements
Version 3
38
Bandwidth Limitations
• Bandwidth varies depending upon the type of media as well as
the LAN and WAN technologies used.
• The actual bandwidth of a network is determined by a
combination of the physical media and the technologies chosen
for signaling and detecting network signals.
• In other words, the actual bandwidth is determined by the
signaling methods, network interface cards (NICs), and other
items of network equipment that are chosen.
Version 3
39
Throughput
• Throughput refers to actual measured bandwidth, at a specific
time of day, using specific Internet routes, and while a specific
set of data is transmitted on the network.
• Throughput is often far less than the maximum possible digital
bandwidth of the medium that is being used.
• Factors that determine throughput:
–
–
–
–
–
–
–
Internetworking devices
Type of data being transferred
Network topology
Number of users on the network
User computer
Server computer
Power conditions
Version 3
40
Data Transfer Calculation
• Using the formula transfer time = size of file / bandwidth
(T=S/BW) allows a network administrator to estimate several of
the important components of network performance.
• If the typical file size for a given application is known, dividing
the file size by the network bandwidth yields an estimate of the
fastest time that the file can be transferred.
• Two important points should be considered when doing this
calculation.
1. The result is an estimate only, because the file size does not
include any overhead added by encapsulation.
2. The result is likely to be a best-case transfer time, because
available bandwidth is almost never at the theoretical maximum for
the network type. A more accurate estimate can be attained if
throughput is substituted for bandwidth in the equation.
Version 3
41
Data Transfer Calculation
• Although the data transfer calculation is quite simple, one must
be careful to use the same units throughout the equation.
• In other words, if the bandwidth is measured in megabits per
second (Mbps), the file size must be in megabits (Mb), not
megabytes (MB).
• Since file sizes are typically given in megabytes, it may be
necessary to multiply the number of megabytes by eight to
convert to megabits.
Version 3
42
Data Transfer Calculation
• Formula
T=
S
BW
transfer time = size of file / bandwidth
• Example – Approximately how long would it take to transfer a
10 Mb file over a T1 line?
10 Mb = 10,000,000 bits
T1 = 1.544 Mbps or 1,544,000 bits per second
10,000,000 / 1,544,000 = 6.477 Mbps
OR
10 / 1.544 = 6.477 seconds
Version 3
43
Data Transfer Calculation
• Formula
T=
S
BW
transfer time = size of file / bandwidth
• Example – Approximately how long would it take to transfer a
10 MB file over a T1 line?
10 MB = 10,000,000 bytes
T1 = 1.544 Mbps or 1,544,000 bits per second
Convert the bytes to bits  10,000,000 X 8 = 80,000,000 bits
80,000,000 / 1,544,000 = 51.81 Mbps
OR
80 / 1.544 = 51.81 seconds
Version 3
44
Data Transfer Calculation
• Formula
T=
S
BW
transfer time = size of file / bandwidth
• Problem – Approximately how long would it take to transfer a
18.9 MB file over a T1 line?
Version 3
45
Layered Communication Model
• The information that travels on a network is generally referred
to as data or a packet.
• A packet is a logically grouped unit of information that moves
between computer systems.
• In order for data packets to travel from a source to a destination
on a network, it is important that all the devices on the network
speak the same language or protocol.
• A protocol is a set of rules that make communication on a
network more efficient.
• A data communications protocol is a set of rules or an
agreement that determines the format and transmission of data.
Version 3
46
Layered Communication Model
• Layer 4 on the source computer communicates with Layer 4 on
the destination computer.
• The rules and conventions used for this layer are known as
Layer 4 protocols.
• It is important to remember that protocols prepare data in a
linear fashion.
Version 3
47
OSI Model
• To address the problem of network incompatibility, the
International Organization for Standardization (ISO) researched
networking models in order to find a generally applicable set of
rules for all networks.
• Using this research, the ISO created a network model that
helps vendors create networks that are compatible with other
networks.
• The Open System Interconnection (OSI) reference model
released in 1984 was the descriptive network model that the
ISO created.
• It provided vendors with a set of standards that ensured greater
compatibility and interoperability among various network
technologies.
Version 3
48
OSI Model
• The OSI reference model has become the primary model for
network communications.
• Although there are other models in existence, most network
vendors relate their products to the OSI reference model.
• Benefits of the OSI Model:
– Reduces complexity
– Standardizes interfaces
– Facilitates modular engineering
– Ensures interoperable technology
– Accelerates evolution
– Simplifies teaching and learning
Version 3
49
OSI Model
• The OSI reference model is a framework that is used to
understand how information travels throughout a network.
• The OSI reference model explains how packets travel through
the various layers to another device on a network, even if the
sender and destination have different types of network media.
Version 3
50
OSI Model
• Dividing the network into seven layers provides the following
advantages:
– It breaks network communication into smaller, more manageable
parts.
– It standardizes network components to allow multiple vendor
development and support.
– It allows different types of network hardware and software to
communicate with each other.
– It prevents changes in one layer from affecting other layers.
– It divides network communication into smaller parts to make
learning it easier to understand.
Version 3
51
OSI Model
Version 3
52
OSI Model
Version 3
53
OSI Model
Version 3
54
OSI Model
Version 3
55
OSI Model
Version 3
56
OSI Model
Version 3
57
OSI Model
Version 3
58
OSI Model
• In order for data to travel from the source to the destination,
each layer of the OSI model at the source must communicate
with its peer layer at the destination.
• This form of communication is referred to as peer-to-peer.
• During this process, the protocols of each layer exchange
information, called protocol data units (PDUs).
Version 3
59
OSI Model
• Data packets on a network originate at a source and then travel
to a destination.
• Each layer depends on the service function of the OSI layer
below it.
• To provide this service, the lower layer uses encapsulation to
put the PDU from the upper layer into its data field; then it adds
whatever headers and trailers the layer needs to perform its
function.
Version 3
60
OSI Model
Version 3
61
TCP/IP Model
• The U.S. Department of Defense (DoD) created the TCP/IP
reference model, because it wanted to design a network that
could survive any conditions, including a nuclear war.
• TCP/IP was developed as an open standard.
• This meant that anyone was free to use TCP/IP.
Version 3
62
TCP/IP Model
• The TCP/IP model has the following four layers:
Version 3
63
TCP/IP Model
• Although some of the layers in the TCP/IP model have the
same name as layers in the OSI model, the layers of the two
models do not correspond exactly.
Version 3
64
TCP/IP Model
• The figure illustrates some of the common protocols specified
by the TCP/IP reference model layers.
Version 3
65
Encapsulation
• All communications on a network originate at a source, and are
sent to a destination.
• The information sent on a network is referred to as data or data
packets.
• If one computer (host A) wants to send data to another
computer (host B), the data must first be packaged through a
process called encapsulation.
• Encapsulation wraps data with the necessary protocol
information before network transit.
Version 3
66
Encapsulation
•
Five conversion steps in order to encapsulate data:
1. Build the data – Layers 7 - 5
2. Package the data for end-to-end transport – Layer 4
3. Add the network IP address to the header – Layer 3
4. Add the data link layer header and trailer – Layer 2
5. Convert to bits for transmission – Layer 1
Version 3
67
Encapsulation
Source
Destination
Segments
Packets
IP Aderess
Frames
MAC Address
Bits
Version 3
68