Why Use a Computer Network? Sharing information (or data) Sharing hardware and software Centralizing administration and support
The sneakernet
Sharing Hardware and Software
Network Configuration Overview Servers—Computers that provide shared resources to network users. Clients—Computers that access shared network resources provided by a server. Media—The wires that make the physical connections. Shared data—Files provided to clients by servers across the network.
Network Topology A network's topology affects its capabilities Type of equipment the network needs. Capabilities of the equipment. Growth of the network. Way the network is managed.
Standard Topologies Bus Star Ring Mesh All network designs stem from four basic topologies: Bus Star Ring Mesh
Bus topology network
Communication on the Bus Sending the signal Signal bounce Terminator
The following are affect the network performance Number of computer in the network Hardware capabilities of computers on the network Total number of queued commands waiting to be executed Types of applications (client-server or file system sharing, for example) being run on the network Types of cable used on the network Distances between computers on the network
Terminator
Star
Ring
Token Passing One method of transmitting data around a ring is called token passing
Mesh
Variations on the Standard Topologies Many working topologies are hybrid combinations of the bus, star, ring, and mesh topologies
Star Bus
Star Ring
Network interface card Protocols – Ethernet, Token Ring, or FDDI Types of media – Twisted-pair, coaxial, wireless, or fiber-optic Type of system bus – PCI or ISA
Situations that require NIC installation include the following Installation of a NIC on a PC that does not already have one Replacement of a malfunctioning or damaged NIC Upgrade from a 10-Mbps NIC to a 10/100/1000-Mbps NIC Change to a different type of NIC, such as wireless Installation of a secondary, or backup, NIC for network security reasons
The following are some of the factors that determine throughput: Internetworking devices Type of data being transferred Network topology Number of users on the network User computer Server computer Power conditions Using the formula transfer time = size of file / bandwidth (T=S/BW)
Network Cabling Coaxial cable Twisted-pair (unshielded and shielded) cable Fiber-optic cable Wireless
Cable specification
Coaxial Cable
There are two types of coaxial cable: Thin (thinnet) cable Thick (thicknet) cable The thicker the copper core, the farther the cable can carry signals
Coaxial-Cable Connection Hardware
Twisted-Pair Cable Types of twisted-pair cable Unshielded Twisted-Pair (UTP) Cable Shielded Twisted-Pair (STP) Cable
RJ-45 connector
UTP cabling wire colors are two types
UTP cable
Straight through
Use straight-through cables for the following connections: Switch to router Switch to PC or server Hub to PC or server
Straight through
Straight through
Cross over
Use crossover cables for the following connections Switch to switch Switch to hub Hub to hub Router to router PC to PC Router to PC
Cross over
Cross over
Roll over
Roll over
Roll over
Fiber-optic cable
Wireless
Wireless
Single wire punch
PART TWO
Types of Networking Peer-to-peer Server based
Peer to peer versus client-server
OSI MODELS
Networking Models
Dividing the network into seven layers provides the following advantages: It breaks network communication into smaller, more manageable parts. It standardizes network components to allow multiple vendor development and support. It allows different types of network hardware and software to communicate with each other. It prevents changes in one layer from affecting other layers. It divides network communication into smaller parts to make learning it easier to understand.
Peer-to-peer communications
Cabling LAN Materials used in networking LAN REPEATERS HUBS BRIDGE SWITCH ROUTERS
REPEATERS Is two port (for signal i/o) It simply give strength for signal
HUBS Hubs are actually multiport repeaters Passive: used only to share the physical media (It does not boost or clean the signal ) Active: it needs power to amplify Intelligent: microprocessor chips and diagnostic capabilities
Hub
Five segments of network media Four repeaters or hubs The 5-4-3-2-1 rule requires that the following guidelines should not be exceeded: Five segments of network media Four repeaters or hubs Three host segments of the network Two link sections with no hosts One large collision domain
BRIDGE Used to segment a large LAN to smaller. decreases the amount of traffic on a single LAN bridges operate at the data link layer of the OSI model The function of the bridge is to make intelligent decisions about whether or not to pass signals on to the next segment of a network.
BRIDGE When a bridge receives a frame on the network, the destination MAC address is looked up in the bridge table to determine whether to:- Filter Flood Copy the frame onto another segment
Filter If the destination device is on the same segment as the frame, the bridge will not send the frame onto other segments. This process is known as filtering
Flood If the destination address is unknown to the bridge, the bridge forwards the frame to all segments except the one on which it was received. This process is known as flooding.
Copy the frame onto another segment If the destination device is on a different segment, the bridge forwards the frame to the appropriate segment.
SWITCH A switch is sometimes described as a multiport bridge Switches reduce traffic and increase bandwidth Switches operate at much higher speeds than bridges and can support new functionality, such as virtual LANs.
ROUTERS Routers are responsible for routing data packets from source to destination within the LAN, and for providing connectivity to the WAN. The DTE is the endpoint of the user’s device on the WAN link. The DCE is typically the point where responsibility for delivering data passes into the hands of the service provider.
DTE & DCE
TCP-IP
TCP/IP MODEL
TCP/IP MODEL
TCP/IP MODEL
TCP/IP MODEL
TCP/IP MODEL
The OSI and TCP/IP models have many similarities: Both have layers. Both have application layers, though they include different services. Both have comparable transport and network layers. Both use packet-switched instead of circuit-switched technology. Networking professionals need to know both models.
Some differences of the OSI and TCP/IP models: TCP/IP combines the OSI application, presentation, and session layers into its application layer. TCP/IP combines the OSI data link and physical layers into its network access layer. TCP/IP appears simpler because it has fewer layers. When the TCP/IP transport layer uses UDP it does not provide reliable delivery of packets. The transport layer in the OSI model always does. The Internet was developed based on the standards of the TCP/IP protocols. The OSI model is not generally used to build networks. The OSI model is used as a guide to help students understand the communication process.
NETWORK ADDRESSING
IP Addressing The Hierarchical IP Addressing Scheme There are three types of IP addressing Dotted-decimal, as in 172.16.30.56 Binary, as in 10101100.00010000.00011110.00111000 Hexadecimal, as in AC.10.1E.38
Network Addressing called the network number uniquely identifies each network
Network Address Range: Class A 00000000 = 0 01111111 = 127 Network Address Range: Class B 10000000 = 128 10111111 = 191 Network Address Range: Class C 11000000 = 192 11011111 = 223 Network Address Ranges: Classes D and E Class D (224–239) Class E (240–255
Class A network.node.node.node In a Class A network address, the first byte is assigned to the network address, and the three remaining bytes are used for the node addresses: All host bits off is the network address: 10.0.0.0. All host bits on is the broadcast address: 10.255.255.255
Private IP Addresses (they’re not routable through the Internet) Reserved IP Address Space Address Class Reserved address space Class A 10.0.0.0 through 10.255.255.255 Class B 172.16.0.0 through 172.31.255.255 Class C 192.168.0.0 through 192.168.255.255
Introduction to Network Address Translation (NAT) to translate your private inside addresses to a global outside address by using NAT There are different flavors of NAT Static NAT Dynamic NAT Overloading
Classless Inter-Domain Routing (CIDR) It’s basically the method that ISPs (Internet Service Providers) use to allocate an amount of addresses to a company, a home—a customer When you receive a block of addresses from an ISP, what you get will look something like this: 192.168.10.32/28.(The slash notation (/) means how many bits are turned on (1s))
Broadcast Addresses Layer 2 broadcasts These are sent to all nodes on a LAN. Broadcasts (layer 3) These are sent to all nodes on the network. Unicast These are sent to a single destination host. Multicast These are packets sent from a single source, and transmitted to many devices on different networks
Subnetting Basics Reduced network traffic Optimized network performance Simplified management Facilitated spanning of large geographical distances
How to Create Subnets Follow these steps: 1.Determine the number of required network IDs: One for each subnet One for each wide area network connection 2.Determine the number of required host IDs per subnet: One for each TCP/IP host One for each router interface 3.Based on the above requirements, create the following: One subnet mask for your entire network A unique subnet ID for each physical segment A range of host IDs for each subnet
Subnetting
Subnetting a Class C Address Answer five simple questions: How many subnets does the chosen subnet mask produce? How many valid hosts per subnet are available? What are the valid subnets? What’s the broadcast address of each subnet? What are the valid hosts in each subnet?
Subnetting a Class C Address
How many subnets. 2^x = number of subnets How many subnets? 2^x = number of subnets. x is the number of masked bits, or the 1s How many hosts per subnet? 2^y – 2 = number of hosts per subnet. y is the number of unmasked bits, or the 0s. For example, in 11000000, the number of zeros gives us 26 – 2 hosts. In this example, there are 62 hosts per subnet What are the valid subnets? 256 – subnet mask = block size, or increment number. An example would be 256 – 192 = 64. The block size of a 192 mask is always 64. Start counting at zero in blocks of 64 until you reach the subnet mask value and these are your subnets. 0, 64, 128, 192. What’s the broadcast address for each subnet? the broadcast address is always the number right before the next subnet. What are the valid hosts? Valid hosts are the numbers between the subnets, omitting all the 0s and all 1s.
Practice Example #1: 255.255.255.192 (/26) Let’s use the Class C subnet mask from the preceding example, 255.255.255.192, to see how much simpler this method is than writing out the binary numbers. We’re going to subnet the network address 192.168.10.0 and subnet mask 255.255.255.192.
How many subnets? Since 192 is 2 bits on (11000000), the answer would be 22. How many hosts per subnet? We have 6 host bits off (11000000), so the equation would be 26 – 2 = 62 hosts. What are the valid subnets? 256 – 192 = 64. Remember, we start at zero and count in our block size, so our subnets are 0, 64, 128, and 192.
Practice Example #2: 255.255.255.224 (/27) This time, we’ll subnet the network address 192.168.10.0 and subnet mask 255.255.255.224.
How many subnets? 224 is 11100000, so our equation would be 23 = 8. How many hosts? 25 – 2 = 30. What are the valid subnets? 256 – 224 = 32. We just start at zero and count to the subnet mask value in blocks (increments) of 32: 0, 32, 64, 96, 128, 160, 192, 224.