IT 2004 Data Communication & Networking

Similar documents
Data Communication. Introduction of Communication. Data Communication. Elements of Data Communication (Communication Model)

What is a Network? A connection of two or more computers so that they can share resources.

Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS

Prepared by Agha Mohammad Haidari Network Manager ICT Directorate Ministry of Communication & IT

UNIT 5 MANAGING COMPUTER NETWORKS LEVEL 3 NETWORK TOPOLOGIES AND LAYOUT

Dr./ Ahmed Mohamed Rabie Sayed

IT 4504 Section 4.0. Network Architectures. 2008, University of Colombo School of Computing 1

TYPES OF COMPUTER NETWORKS

INTRODUCTION TO ICT.

Different network topologies

Local Area Network(LAN)

Introduction to LAN Protocols

COMPUTER NETWORKING. By: Dr. Noor Dayana Abd Halim

Lecture #25: Networks and Communications. Communication and Networks. What will we learn?

VISUAL SUMMARY COMMUNICATION CHANNELS COMMUNICATIONS. Communications and Networks

Chapter 9 Introduction to Networks

Computer Network : Lecture Notes Nepal Engineering College Compiled by: Junior Professor: Daya Ram Budhathoki Nepal Engineering college, Changunarayan

Second Semester Examination Higher National Diploma in Information Technology First Year

Introduction to LAN Protocols

Computer Communication Networks Lecture No. 1

Gigabit Networks, VLANs & Wireless LANs

CHAPTER 2 - NETWORK DEVICES

Types of Computer Networks and their Topologies Three important groups of computer networks: LAN, MAN, WAN

Integrating Information Systems: Technology, Strategy, and Organizational Factors

Chapter 16 Networking

Chapter Seven. Local Area Networks: Part 1. Data Communications and Computer Networks: A Business User s Approach Seventh Edition

It is the process of sharing data, programs, and information between two or more computers.

2. LAN Topologies Gilbert Ndjatou Page 1

Network Definition A network can be defined as two or more computers connected together in such a way that they can share resources.

Chapter 12. Network Organization and Architecture

Data Communication. Chapter # 1: Introduction. By: William Stalling

Chapter 6: Network Communications and Protocols

KIBABII UNIVERSITY COLLEGE DEPARTMENT COMPUTER SCIENCE & IT ANSWER ALL QUESTIONS IN SECTION A AND ANY TWO QUESTIONS IN SECTION B

CHAPTER 8 NETWORKS: COMMUNICATING AND SHARING RESOURCES

Discovering Computers Chapter 9 Communications and Networks

CH : 15 LOCAL AREA NETWORK OVERVIEW

The Internet software layers

Computers Are Your Future

Lesson 1: Network Communications

Full file at

COMPUTER SKILLS COMP101

Unit 10. Networks. Copyright 2005 Heathkit Company, Inc. All rights reserved.

Computers: Tools for an Information Age. Chapter 7 Networking: Computer Connections

Types of Computer Networks. ICS 614: Computer Networks Concepts and Principles 11

A LAN is a high-speed data network that covers a relatively small geographic area. It typically connects workstations, personal computers, printers,

Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

Chapter Topics Part 1. Network Definitions. Behind the Scenes: Networking and Security

Data Communication and Network. Introducing Networks

Chapter 5 Local Area Networks. Computer Concepts 2013

Computer Networks and Internet

Communicating over the Network


CARRIER SENSE MULTIPLE ACCESS (CSMA):

Outline: Connecting Many Computers

Chapter 4 NETWORK HARDWARE

LAN, MAN and WAN. Basics and Comparison. University of Damascus. Computer Engineering Dept. Digital Communications. By Abdulrahman Idlbi

Introduction to Computer Science (I1100) Networks. Chapter 6

Data Link Layer -2- Network Access

Computer Networks Question Bank

E-Commerce. Infrastructure I: Computer Networks

ITEC 3800 Data Communication and Network. Introducing Networks

Chapter 3. Underlying Technology. TCP/IP Protocol Suite 1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Introduction to Networking Devices

COMPONENTS OF DATA COMMUNICATION

Networks: Communicating and Sharing Resources

Navpreet Singh INTRODUCTION TO COMPUTER NETWORKS. Computer Centre Indian Institute of Technology Kanpur Kanpur INDIA

Chapter 4: Network Access

Objectives Overview. Chapter 9 Networks and Communications. Discovering Computers Instructor: Imran Khalil MSc-IT 1 st semester Fall 2016

Area Covered is small Area covered is large. Data transfer rate is high Data transfer rate is low

DATA SECURITY MANAGEMENT. Chris Hare INSIDE. What is a Network? Network Devices; Hubs; Repeaters; Bridges; Routers; Switches; Network

CS610- Computer Network Solved Subjective From Midterm Papers

Guide to Networking Essentials, 6 th Edition. Chapter 6: Network Reference Models and Standards

Computer science..pharmacy college

Networking interview questions

Network Topologies & LAN,MAN and WAN. By: Mr. Binesh Kr. Singh. What is Topology

Typical Network Uses

ET4254 Communications and Networking 1

TCOM 370 NOTES 99-1 NETWORKING AND COMMUNICATIONS

Computers Are Your Future Eleventh Edition Chapter 7: Networks: Communicating & Sharing Resources

Local Area Network Overview

COMPUTER TECHNIQUE. ( Vocational Stream ) Paper : V. ( Computer Network ) ( Theory )

Data Link Layer -2- Network Access

SAMPLE PAGES. Unit 12.1 Information and Communication Systems Topic 2: Networking. What is a network? Network node

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst

NETWORK TOPOLOGIES. Application Notes. Keywords Topology, P2P, Bus, Ring, Star, Mesh, Tree, PON, Ethernet. Author John Peter & Timo Perttunen

Chapter 15 Networks. Chapter Goals. Networking. Chapter Goals. Networking. Networking. Computer network. Node (host) Any device on a network

More on LANS. LAN Wiring, Interface

networks List various types of networks and their

Introduction. High Speed LANs. Emergence of High-Speed LANs. Characteristics of High Speed LANS. Text ch. 6, High-Speed Networks and

Objectives. Learn how computers are connected. Become familiar with different types of transmission media

Comparison Of Network Topologies For Optical Fiber Communication

TCP/IP and OSI Model Ethernet LAN Network Cables Network Devices Network Topologies Redundant Internet Connections VLANs Wireless LANs Upcoming

Lecture 05 Chapter 16 High Speed LANs

Lecture 6: Example LAN: Ethernet

Computer Network Architecture

Chapter 2. Network Classifications (Cont.)

10/100/1000 Mbps Ethernet 100 Mbps FDDI 155/620 Mbps ATM 4/10/45 Mbps Wireless

Part I: Hardware and communication

1. Data Link Layer Protocols

M242 COMPUTER NETWORS AND SECURITY

Transcription:

IT 2004 Data Communication & Networking Week 4 Network Topology, Architecture & Access Methods P.G.R Nayomi Gamlath MSc(Pdn), BSc (Rajarata) ATI -Kurunegala

Why networks? To share resources (such as printer, scanner etc) & exchange files.

Network Architecture Is the logical and structural layout of the network consisting of transmission equipment, software and communication protocols and infrastructure (wired or wireless) transmission of data and connectivity between components.

Networks Types 1. Peer to Peer 2. client/server (sometimes called serverbased).

Peer-to-Peer This is a simple network configuration that requires some basic knowledge-how to set up. Each of the interconnected machines share dual capability and responsibility on the network

Peer to Peer Advantages Easy to install and configure. No dedicated server required. Users control their own resources. Inexpensive to purchase and operate. No specialist software required. No dedicated administrator to run the network required.

Peer to peer Disadvantages Difficult to employ security. Too many passwords for shared resources. Backups difficult to manage. No centralization. Limited users.

Client/server (server-based). Server based networks, has a machine at the heart of its operations called the server. A server is a machine that provides services over a network by responding to client requests. install, configure or manage its capabilities. The server's essential role on the network is to be continuously available to handle the many requests generated by its clients.

Client/server (server-based). Advantages Centralized user accounts, security and access controls simplify network administration. More powerful equipment means more efficient access network resources. Single password login, means access to all resources. Supports greater numbers of users, or networks where resources are heavily used

Client/server (server-based). Disadvantages More costly to install and maintain. Single point of failure, server goes down, the network goes down. Complex special-purpose software requires appointment of expert staff, increasing costs. Dedicated hardware and software increases costs.

Types of Network LAN - Local Area Network WAN - Wide Area Network MAN - Metropolitan Area Network SAN - Small Area Network CAN - Campus Area Network, PAN - Personal Area Network WLAN - Wireless Local Area Network

LAN Local Are Network Is implemented within a single building or campuses of up to few Km s in size. They are widely used to connect personal computers and workstations in a company, office, factory to locally share computer files & resources efficiently and make internal communications possible.

LAN Local Are Network Operate within a limited geographic area Allow multi-access to high bandwidth media Control the network privately under local administration Provide full time connectivity to local services Connect physically adjacent devices

LAN Local Are Network LANs consist of the following components Computers Network interface cards Peripheral devices Networking media Network devices

WAN Wide Area Network WANs interconnect LANs, which then provide access to computers or file servers in other locations. WANs connect user networks over a large geographical area; they make it possible for businesses to communicate across great distances. WANs allow computers, printers, and other devices on a LAN to be shared with distant locations. WANs provide instant communications across large geographic areas.

WAN Wide Area Network

WAN Wide Area Network WANs are designed to do the following: Operate over a large and geographically separated area Allow users to have real-time communication capabilities with other users Provide full-time remote resources connected to local services Provide e-mail, Internet, file transfer, and e- commerce services

MAN metropolitan Area Network A MAN usually consists of two or more LANs in a common geographic area. For example, a bank with multiple branches may utilize a MAN Typically, a service provider is used to connect two or more LAN sites using private communication lines or optical services. A MAN can also be created using wireless bridge technology by beaming signals across public areas.

MAN metropolitan Area Network

SAN Storage area network is used for data storage and it has no use for most of the organization but data oriented organizations. Storage area network connects servers to data storage devices by using Fiber channel technology.

CAN - Campus are Network Networking spanning with multiple LANs but smaller than a Metropolitan area network This kind of network mostly used in relatively large universities or local business offices and buildings.

PAN personal Are network is a computer network organized around an individual person. Personal area networks typically involve a mobile computer, a cell phone and/or a handheld computing device such as a PDA. You can use these networks to transfer files including email and calendar appointments, digital photos and music. is typically a few meters. Personal area networks may be wired with computer buses such as USB and FireWire. A wireless personal area network (WPAN) can also be made possible with wireless network technologies such as IrDA, Bluetooth, Wireless USB

WLAN Wireless Local Area Network A LAN, local area network based on wireless network technology mostly referred as Wi-Fi. Unlike LAN, in WLAN no wires are used, but radio signals are the medium for communication. Wireless network cards are required to be installed in the systems for accessing any wireless network around. Mostly wireless cards connect to wireless routers for communication among computers or accessing WAN, internet.

VPN Virtual Private Network A virtual private network (VPN) is a private network that is constructed within a public network infrastructure such as the global Internet. Using VPN, a telecommuter can remotely access the network of the company headquarters. Through the Internet, a secure tunnel can be built between the PC of the telecommuter and a VPN router at the company headquarters.

VPN Virtual Private Network

Network Topology is the logical and structural layout of computer network. BUS RING STAR TREE MESH

Bus Topology (Linear) A bus topology uses one cable as a main trunk to connect all of the system together. A bus topology is very easy to setup & requires no additional hardware such as switch, hub. The cable is also called a trunk, a backbone. With a bus topology, when a computer sends out a single the signal travels the cable link in both direction from the sending computer. When the signal reach the end of the cable length it bounces back & return in the direction it come

Bus Topology

Bus Topology(Linear) Advantages Low cost Easy to connect a computer or peripheral to bus. Requires less cable length than a star topology. No need to purchase any additional devices such as switch and hub. Disadvantages Entire network shuts down if there is a break in the main cable. Terminators are required at both ends of the backbone cable. Difficult to identify the problem if the entire network shuts down. (Difficult to troubleshooting).

Ring Topology In a ring topology all computer are connected via a cable that loops in a ring or a circle. It is a circle that has no start & no end. terminators are not necessary, because there are no ends

Ring Topology Advantages It is less expensive than star topology. Nodes can be easily added or removed. Disadvantages It is more difficult to install and maintain. If a node fails, it affects the entire network.

Star Topology In star topology all computers are connected through one central device known as a switch or hub. Each workstation has a cable goes from the network card to the hub device. One of the major benefits of a star topology is that if there is a break down in a cable it causes only the work station not entire network.

Star Topology

Star Topology Advantages It is easy to install and to maintain. Can easily add and remove nodes to and from the network without affecting the network.(scalability) If need to add another workstation with a star topology we can simply connect that system an unused part of the hub. If any node fails, other nodes are not affected. Disadvantages This type of network depends upon the central Hub. If Hub fails the entire network is failed.(but hub troubleshooting is easier than bus topology) Each computer is directly connected to the Hub through a cable, so it becomes more costly.

Tree Topology A tree topology combines characteristics of bus and star topologies. It consists of groups of star-configured workstations connected to a bus backbone cable. Tree topologies allow for the expansion of an existing network

Tree Topology

Tree Topology Advantages Point-to-point wiring for individual segments. Supported by several hardware and software venders. Disadvantages Overall length of each segment is limited by the type of cabling used. If the backbone line breaks, the entire segment goes down. More difficult to configure and wire than other topologies.

Mesh Topology In a mesh topology, each computer is connected to every other computer by a separate cable. This configuration provides redundant paths, so if one computer encounters a problem, the entire network still works. On a large scale, multiple LANs can be connected using mesh topology with the help of telephone lines, coaxial cable or fiber optic cable.

Mesh Topology Number of cables =n(n-1)/2 =6(6-1)/2 =15

Mesh Topology Advantages Provides redundant paths between devices The network can be expanded without disruption to current users. Disadvantages Requires more cables than the other LAN topologies. Complicated implementation

Access Method In networking, to access a resource is to be able to use that resource the role of access methods in putting data on a network cable The set of rules that defines how a computer puts data onto the network cable and takes data from the cable is called an access method. Once data is moving on the network, access methods help to regulate the flow of network traffic.

Access Method A network is in some ways like a railway track, along which several trains run. When a train is on the track, all other trains must abide by a procedure that governs how and when they enter the flow of traffic. Without such a procedure, entering trains would collide with the one already on the track.

Access Method Multiple computers must share access to the cable that connects them. if two computers were to put data onto the cable at the same time, the data packets from one computer would collide with the packets from the other computer, and both sets of data packets would be destroyed.

Access Method If data is to be sent over the network from one user to another, or accessed from a server, there must be some way for the data to access the cable without running into other data. And the receiving computer must have reasonable assurance that the data has not been destroyed in a data collision during transmission. Access methods need to be consistent in the way they handle data.

Access Method If different computers were to use different access methods, the network would fail because some methods would dominate the cable. Access methods prevent computers from gaining simultaneous access to the cable. By making sure that only one computer at a time can put data on the network cable, access methods ensure that the sending and receiving of network data is an orderly process.

Access Method Major Access Methods 1. Carrier-sense multiple access methods CSMA/CD CSMA/CA 2. Token-passing 3. Demand-priority

CSMA/CD Carrier-Sense Multiple Access with Collision Detection (CSMA/CD) Only when a computer "senses" that the cable is free and that there is no traffic on the cable can it send data. Once the computer has transmitted data on the cable, no other computer can transmit data until the original data has reached its destination and the cable is free again. if two or more computers happen to send data at exactly the same time, there will be a data collision.

CSMA/CD Carrier-Sense Multiple Access with Collision Detection (CSMA/CD) When that happens, the two computers involved stop transmitting for a random period of time and then attempt to retransmit. Each computer determines its own waiting period; this reduces the chance that the computers will once again transmit simultaneously.

CSMA/CD

CSMA/CD The collision-detection capability is the parameter that imposes a distance limitation on CSMA/CD. Due to attenuation, the weakening of a transmitted signal as it travels farther from its source the collision detection mechanism is not effective beyond 2500 meters (1.5 miles). The more computers there are on the network, the more network traffic there will be. With more traffic, collisions tend to increase, which slows the network down, so CSMA/CD can be a slow-access method.

CSMA/CD After each collision, both computers will have to try to retransmit their data. If the network is very busy, there is a chance that the attempts by both computers will result in collisions with packets from other computers on the network. The occurrence of this problem depends on the number of users attempting to use the network and which applications they are using. Database applications tend to put more traffic on the network than wordprocessing applications do.

CSMA/CD Depending on the hardware components, the cabling, and the networking software, using a CSMA/CD network with many users running several database applications can be very frustrating because of heavy network traffic.

CSMA/CA Carrier-Sense Multiple Access with Collision Avoidance Is the least popular of the three major access methods Each computer signals its intent to transmit before it actually transmits data Before a host sends real data on the wire it will sense the wire to check if the wire is free. If the wire is free, it will send a piece of dummy data on the wire to see whether it collides with any other data. If it does not collide, the host will assume that the real data also will not collide.

CSMA/CA broadcasting the intent to transmit data increases the amount of traffic on the cable and slows down network performance.

Token Passing A special type of packet, called a token, circulates around a cable ring from computer to computer. When any computer on the ring needs to send data across the network, it must wait for a free token. When a free token is detected, the computer will take control of it if the computer has data to send. The computer can now transmit data. Data is transmitted in frames, and additional information, such as addressing, is attached to the frame in the form of headers and trailers,

Token Passing control of the free token on the ring and sends data to the computer with the address 400080865402.

Token Passing In CSMA/CD and CSMA/CA the chances of collisions are there. As the number of hosts in the network increases, the chances of collisions also will become more. In token passing, when a host want to transmit data, it should hold the token, which is an empty packet. The token is circling the network in a very high speed. If any workstation wants to send data, it should wait for the token. When the token has reached the workstation, the workstation can take the token from the network, fill it with data, mark the token as being used and place the token back to the network.

Token Passing While the token is in use by one computer, other computers cannot transmit data. Because only one computer at a time can use the token, no contention and no collision take place, and no time is spent waiting for computers to resend tokens due to network traffic on the cable.

Demand-priority Is a relatively new access method designed for the 100-Mbps Ethernet. It has standardized by the Institute of Electrical and Electronic Engineers (IEEE) is based on the fact that repeaters and end nodes The repeater, or hub, is responsible for noting all addresses, links, and end nodes and verifying that they are all functioning End node can be a computer, bridge, router, or switch

Demand-priority As in CSMA/CD, two computers using the demand-priority access method can cause contention by transmitting at exactly the same time. However, with demand priority, it is possible to implement a scheme in which certain types of data will be given priority if there is contention. If the hub or repeater receives two requests at the same time, the highest priority request is serviced first.

Demand-priority If the two requests are of the same priority, both requests are serviced by alternating between the two. In a demand-priority network, computers can receive and transmit at the same time because of the cabling scheme defined for this access method. In this method, four pairs of wires are used

Demand-priority

Demand-priority In a demand-priority network, there is communication only between the sending computer, the hub, and the destination computer. The hub then controls the flow of data. This is more efficient than CSMA/CD, which broadcasts transmissions to the entire network. In demand priority, each hub knows only about the end nodes and repeaters directly connected to it, whereas in a CSMA/CD environment, each hub knows the address of every node in the network.

Demand-priority Demand priority offers several advantages over CSMA/CD The use of four pairs of wires. By using four pairs of wires, computers can transmit and receive at the same time Transmissions through the hub. Transmissions are not broadcast to all the other computers on the network. The computers do not contend on their own for access to the cable, but operate under the centralized control of the hub

Access Methods summery Feature or function Type of Communication Type of access method CSMA/CD CSMA/CA Token passing Demand priority Token-based Hub-based Contention Contention Noncontention Contention Type of network Ethernet LocalTalk Token Ring ArcNet Broadcastbased Broadcastbased 100VG- AnyLan

What is a protocol? Protocol An agreement about how to do something This enables computers and software built by different people to be able to communicate in the same language

Human Protocols Sending a letter via the postal service Contents! Shayne Evans 5501 Sennott Sq. Pittsburgh, PA. 15260 Kim Morrison 123 Somewhere St. Someplace, PA. 15555

Computer Protocols Sending a packet via the network To: 192.168.1.1 on port 23 From: 192.168.1.110 on port 6710 Payload: The contents of the message belong here.

Visual Comparison To: 192.168.1.1 on port 23 From: 192.168.1.110 on port 6710 Payload: The contents of the message belong here. Contents!!! Shayne Evans 5501 Sennott Sq. Pittsburgh, PA. 15260 Kim Contents! Morrison 123 Somewhere St. Someplace, PA. 15555

Textual Comparison The address of the letter is the destination of the packet The return address of the letter is the source of the packet The content of the envelope is the payload of the packet In both protocols, if you disobey the rules your message will not be received

Protocol A protocol is a set of rules that governs the communications between computers on a network. In order for two computers to talk to each other, they must be speaking the same language. Many different types of network protocols and standards are required to ensure that your computer (no matter which operating system, network card, or application you are using) can communicate with another computer located on the next desk or half-way around the world

Protocol Examples Transmission control protocol (TCP/IP) Hyper Text Transfer Protocol (HTTP) Web Browser File Transfer Protocol (FTP) File transfer Simple Mail Transfer Protocol (SMTP) Email Internet Protocol (IP) Packets across the Internet

Exercise Prepare an individual presentation about LAN Technologies (Maximum -15 minutes & 10 slides)(20 Marks) Network Technologies Ethernet Token Ring FDDI

LAN Technologies Ethernet (Fast Ethernet, Gigabit Ethernet etc.) Token Ring FDDI - -Fiber Distributed Data Interconnect http://www.codemiles.com/networks/lan-technologies-t277.html