Beruflich Dokumente
Kultur Dokumente
Under
Ethiopian TVET-System
INFORMATION TECHNOLOGY
SUPPORT SERVICE
Level-II
What is a Network?
A network consists of two or more computers that are linked in order to share resources (such as
printers and CDs), exchange files, or allow electronic communications. The computers on a
network may be linked through cables, telephone lines, radio waves, satellites, or infrared light
beams.
However, with these advantages come a number of potential disadvantages. Making important
and sensitive information available to every user of the network is not normally desirable. For
example, information about employees’ salaries should not be freely available for anybody to
look at. Data security is therefore an important concern in a networked environment. Secondly,
the danger of computer viruses entering the network is greatly increased. A virus can infect the
any of the computers on the network, and can quickly spread throughout the network causing
significant damage.
Broadly speaking, there are two types of network configuration, peer-to-peer networks and
client/server networks.
Prepared by Tsehayou Sieley 2011 E.C
Maichew Poly Technical College Training, Teaching and Learning Materials Development Lo4
Peer-to-peer networks are more commonly implemented where less than ten computers are
involved and where strict security is not necessary. All computers have the same status, hence
the term 'peer', and they communicate with each other on an equal footing. Files, such as word
processing or spreadsheet documents, can be shared across the network and all the computers on
the network can share devices, such as printers or scanners, which are connected to any one
computer.
Peer to Peer
Network
Client/server networks are more suitable for larger networks. A central computer, or 'server',
acts as the storage location for files and applications shared on the network. Usually the server is
a higher than average performance computer. The server also controls the network access of the
other computers which are referred to as the 'client' computers. Typically, teachers and students
in a school will use the client computers for their work and only the network administrator
(usually a designated staff member) will have access rights to the server.
File Server
Other
equipment
You may also see references to a Metropolitan Area Networks (MAN), a Wireless LAN
(WLAN), or a Wireless WAN (WWAN).
What is a Topology?
The term topology, or more specifically, network topology, refers to the arrangement or physical
layout of computers, cables, and other components on the network. "Topology" is the standard
term that most network professionals use when they refer to the network's basic design. In
addition to the term "topology," you will find several other terms that are used to define a
network's design:
Physical layout
Design
Prepared by Tsehayou Sieley 2011 E.C
Maichew Poly Technical College Training, Teaching and Learning Materials Development Lo4
Diagram
Map
A network's topology affects its capabilities. The choice of one topology over another will have
an impact on the:
Type of equipment that the network needs
Capabilities of the network
Growth of the network
Way the network is managed
There are four basic types of computer topology: bus, star, ring and mesh.
Bus Topology
The bus topology is often referred to as a "linear bus" because the computers are connected in a
straight line. This is the simplest and most common method of networking computers. Figure 1
shows a typical bus topology. It consists of a single cable called a trunk (also called a backbone
or segment) that connects all of the computers in the network in a single line.
Star topology
In the star topology, cable segments from each computer are connected to a centralized
component called a hub. Figure 2 shows four computers and a hub connected in a star topology.
Signals are transmitted from the sending computer through the hub to all computers on the
network.
Ring topology
The ring topology connects computers on a single circle of cable. Unlike the bus topology, there
are no terminated ends. The signals travel around the loop in one direction and pass through each
computer, which can act as a repeater to boost the signal and send it on to the next computer.
Figure 3 shows a typical ring topology with one server and four workstations. The failure of one
computer can have an impact on the entire network.
Mesh topology
A mesh topology network offers superior redundancy and reliability. In a mesh topology, each
computer is connected to every other computer by separate cabling. (See Figure 4) This
configuration provides redundant paths throughout the network so that if one cable fails, another
will take over the traffic. While ease of troubleshooting and increased reliability is definite
benefits, these networks are expensive to install because they use a lot of cabling. Often, a mesh
topology will be used in conjunction with other topologies to form a hybrid topology.
Hybrid topologies
Many working topologies are hybrid combinations of the bus, star, ring, and mesh topologies.
Two of the more common are described below.
Star-Ring topology
The star ring (sometimes called a star-wired ring) appears similar to the star bus. Both the star
ring and the star bus are centered in a hub that contains the actual ring or bus. Figure 6 shows a
star-ring network. Linear-bus trunks connect the hubs in a star bus, while the hubs in a star ring
are connected in a star pattern by the main hub.
Network Media
Every network requires some hardware to make it work. Exactly what hardware is required
depends on what type of network is being constructed. The following is summary of some of the
more common networking hardware. Such network Medias are cables like fiber optics, twisted
pair, coaxial and other media are wireless.
The vast majority of networks today are connected by some sort of wiring or cabling that acts as
a network transmission medium that carries signals between computers. Although many cable
types are available to meet the varying needs and sizes of networks, from small to large, there are
3 primary cable types:
Coaxial
Twisted pair
Fiber-optic
Coaxial cable
At one time, coaxial cable was the most widely used network cabling. There were a couple of
reasons for coaxial cables wide usage: it was relatively inexpensive, and it was light, flexible,
and easy to work with.
In its simplest form, coaxial cable consists of a core of copper wire surrounded by insulation, a
braided metal shielding, and an outer cover. Figure 1 shows the various components that make
up a coaxial cable.
The shielding protects transmitted data by absorbing stray electronic signals, called noise, so that
they do not get onto the cable and distort the data. The core of a coaxial cable carries the
electronic signals that make up the data. This wire core can be either solid or stranded. If the core
is solid, it is usually copper. Surrounding the core is an insulating layer that separates it from the
wire mesh. The braided wire mesh acts as a ground and protects the core from electrical noise.
Coaxial cable uses the BNC connector to connect to computers and other devices.
Coaxial cable is more resistant to interference and attenuation than twisted-pair cabling. The
stranded, protective sleeve absorbs stray electronic signals so that they do not affect data being
sent over the inner copper cable. For this reason, coaxial cabling is a good choice for longer
distances.
BNC Cable
Connector
There are two types of coaxial cable: thinnet and thicknet. Thicknet cabling is thicker, and a
better choice for longer distances, but is more expensive and more difficult to work with. Thinnet
coaxial cable can carry a signal for a distance of up to approximately 185 meters before the
signal starts to suffer from attenuation. Thicknet cable can carry a signal for 500 meters.
Therefore, because of thicknet's ability to support data transfer over longer distances, it is
sometimes used as a backbone to connect several smaller thinnet-based networks.
Twisted pair
Data networks use two basic types of twisted-pair cabling: shielded twisted pair (STP) and
unshielded twisted pair (UTP). STP cable is similar to UTP cable with the exception that it
contains an additional foil shield that surrounds the four-pair wire bundle. The shield provides
extended protection from induced electrical noise and cross-talk by supplying a grounded path to
carry the induced electrical signals away from the conductors in the cable.
In its simplest form, twisted-pair cable consists of two insulated strands of copper wire twisted
around each other. Figure 2 shows the two types of twisted-pair cable: unshielded twisted-
pair(UTP) and shielded twisted-pair(STP) cable.
UTP is the most popular type of twisted-pair cable and is fast becoming the most popular LAN
cabling. It is cheap and easy to use. However, its performance over long distances is not as good
as coaxial cable. The maximum cable length segment of UTP is 100 meters. There are a number
of different types (or categories) of UTP cable, which differ in their specification and in the
number of pairs of wire contained within the cable. Most telephone systems use UTP cable (with
the RJ11 connector), and many LANs nowadays also use UTP (with the RJ45 connector). STP is
higher quality than UTP, but more expensive and less popular.
UTP have categorized different grades of cable along with connector, distance, and installation
specifications and UTP wiring "Category" (or CAT) ratings for the industry (that is, CAT 5,
CAT 5e, and CAT 6 cabling) and with connecter UTP is RJ-45 plug.
When more than two computers must be connected, the crossover trick won't work and devices
known as a Hubs and/or Switches must be used. In this situation, each of the computers is
plugged into a port on the Hub or Switch using a straight-thru cable.
Fiber-optic
In fiber-optic cable, optical fibers carry digital data signals in the form of modulated pulses of
light. This is a relatively safe way to send data because, unlike copper-based cables that carry
data in the form of electronic signals, no electrical impulses are carried over the fiber-optic cable.
This means that fiber-optic cable cannot be tapped, and its data cannot be stolen.
Fiber-optic cable is good for very high-speed, high-capacity data transmission because of the
purity of the signal and lack of signal attenuation.
An optical fiber consists of an extremely thin cylinder of glass, called the core, surrounded by a
concentric layer of glass, known as the cladding. The fibers are sometimes made of plastic.
Plastic is easier to install, but cannot carry the light pulses for as long a distance as glass.
Because each glass strand passes signals in only one direction, a cable includes two strands in
separate jackets. One strand transmits and one receives. A reinforcing layer of plastic surrounds
each glass strand, and Kevlar fibers provide strength. See Figure 3 for an illustration of fiber-
optic cable. The Kevlar fibers in the fiber-optic connector are placed between the two cables.
Just as their counterparts (twisted-pair and coaxial) are, fiber-optic cables are encased in a plastic
coating for protection.
Only NICs supporting a minimum of 100Mbps should be used in new installations schools.
Computers with a wireless connection to a network also use a network card (see Advice Sheet 20
for more information on wireless networking).
Switches and hubs are technologies or ‘boxes’ to which computers, printers, and other
networking devices are connected. Switches are the more recent technology and the accepted
way of building today's networks. With switching, each connection gets "dedicated bandwidth"
and can operate at full speed. In contrast, a hub shares bandwidth across multiple connections
such that activity from one PC or server can slow down the effective speed of other connections
on the hub.
Now more affordable than ever, Dual-speed 10/100 autosensing switches are recommended for
all school networks. Schools may want to consider upgrading any hub based networks with
switches to improve network performance – ie speed of data on the network.
Wireless connections
Wireless connection is becoming very popular in home and office technology. It eliminates the
‘spaghetti trap’, where cables entwine and it creates an uncluttered environment. However,
wireless network communication can be slower, and insecure, leaving data more easily open to
hackers.
Cordless peripherals are now available at affordable prices for most users. They include
keyboards, mice, game pads, joysticks and pointing devices to interact with host devices. Host
devices are not only computers but can be home appliances, game machines and televisions. The
peripheral requires battery power to operate, and are more easily accessible to potential thieves.
Cordless peripherals are usually controlled by a short-range communication method such as the
infrared standard IrDA (Infra-red Data Association) that sets the standards for both the physical
devices and the protocols they use to communicate. IrDA requires line-of-sight access between
devices for data transfer.
New developments in other short distance communication such as Bluetooth technology, which
use radio frequency to communicate, have proved to be more efficient and faster than IrDA.
IrDA and Bluetooth are not network technologies, but simply different methods of connecting.
LAN wireless communication requires a wireless router and a transmitter connected to each
device that is connected to the network. These are becoming more economical. The main
problem is their lack of security.
Wireless LANs use the standard 802.11. One type of wireless LAN can transfer data at 11Mbps
and another at 54 Mbps. But if interference is detected or the radio signal is weak, the transfer
rate is reduced.
Figure 5:Firewire
Figure 4: USB
Figure 6: SCSI