Sie sind auf Seite 1von 28

chapter

6 Networking systems
Computer networks have existed
almost as long as electronic
computers themselves. Originally,
these networks consisted of a
central mainframe computer with
a number of terminals (or
workstations). Usually, these
terminals did none of the
processing or storing of data and
information. Processing and
storage were handled by the
mainframe. This was known as
centralised processing. Today,
computer networks consist of a
mixture of centralised processing
and distributed processing, where
the terminals can process and store
data and information.

This chapter will teach you about


the nature of networking systems
and also about file management,
users and groups for any operating
system. It will also give you hands-
on experience in setting up servers
and protocols in a networked
environment.

6.1 Communications
networks
6.2 Networking
6.3 Protocols
6.4 Network topologies
6.5 Data transmission —
modes and rates
6.6 Data transmission media
6.7 Security of information
6.8 Network operating
systems
6.9 Project — Creating a
peer-to-peer network
A student:
5.2.1 describes and applies
problem-solving processes
when creating solutions
5.2.2 designs, produces and
evaluates appropriate
solutions to a range of
challenging problems
5.2.3 critically analyses
decision-making processes
in a range of information
and software solutions.

AppleTalk data transmission network interface card router


bandwidth decryption (NIC) server
baseband encryption network operating simplex
baud rate file server system (NOS) star topology
bits per second (bps) firewall node switch
bridge full duplex optical fibre system backup
broadband gateway peer-to-peer network topology
bus topology half duplex peripheral twisted pair cable
client hub print server virtual private
client–server network local area network protocol network (VPN)
coaxial cable (LAN) proxy server web server
communications mail server repeater wide area network
network NetBEUI ring topology (WAN)
workstation
6.1 Communications networks

Before you start, have you completed the


following unit?
11.1 What hardware does

Nature and role


A communications network is a set of products,
concepts and services that enable the connection of
computer systems. Their purpose is to transmit data
in a variety of forms (for example, voice and video)
between the systems. The Internet is arguably the
world’s largest communications network.
In its simplest form, a network is two computers
linked together, usually with cables. As they become
larger and more complicated, networks consist of
computers and their peripheral devices. Each device
on a network is called a node.
Networks allow many users, usually within a Connecting computers in a communications network allows
company or organisation, to share limited or sharing of resources such as printers, software and data.
expensive resources such as printers and scanners.
Computer networks also allow users to share allows many workstations to share a single
software and data, and to communicate quickly and Internet connection.
efficiently over vast distances. • access to shared files. Users can share files such as
photographs, MP3s, spreadsheets and documents
Advantages and disadvantages on any computer on the network.
Some of the advantages of communications • access to databases. Many companies have on-line
networks include: databases. These can be shared by many users in a
number of locations.
• ability to share peripheral devices. Peripheral
devices such as printers and photocopiers can be • ability to play networked games. Networked games
extremely expensive. A network allows one allow several users at different computers to
printer to be shared by several users, thus challenge each other in the same game.
reducing costs. Despite these advantages, there are also a number
• central administration of application programs and of disadvantages to establishing a network over using
other software. A network allows central unconnected, individual workstations.
administration of common software. For • cost of installation. A complex network can cost
example, a network administrator can download hundreds of thousands of dollars to install. This
the latest version of Microsoft Office from a initial outlay must be weighed against the
central server to end users’ workstations, rather potential long-term savings of using a network.
than visiting each workstation to install the • administration and maintenance. A network
software. Updating and patching of software can administrator (or several in the case of large
also be achieved remotely. networks) is required to administer the network,
• sharing a single Internet connection. With the including updating and installing software and
appropriate software and hardware, a network creating and deleting user accounts.

152 Information and Software Technology


• equipment failure. When file servers crash, users
lose access to network resources, data and the • describe the nature and role of a
communications network?
Internet and this can have a substantial effect on
productivity. • discuss the advantages and
disadvantages of networks?
• security. It is critical to secure both the network
• compare a client–server network with a
and the data it contains. Networks are targets for peer-to-peer network?
hackers and viruses so appropriate measures are
needed to prevent inappropriate use and loss of
data. Such measures include firewalls, passwords,
secure tape backups and uninterruptible power
supplies, which give the server enough time to
shut down correctly in the event of power failure. Remember
1. Explain the purpose of a communications
network.
Client–server and peer-to-peer networks 2. Define the term ‘node’.
Networks can be classified as either client–server or
peer-to-peer networks. A client–server network is 3. Discuss three advantages of setting up a
network.
based on a central server or servers with many
clients. Usually, the server stores user files and data, 4. Discuss two disadvantages of setting up a
network.
authenticates users and provides other services such
as printing and data backup. Users need to log in to 5. Describe the two classifications of networks.
gain access to shared resources. This also ensures that Think
only registered users have access to files and 6. Explain why the Internet could be called the
resources. world’s largest communications network.
Networks that operate without a central server are Investigate
peer-to-peer networks. All nodes on the network 7. Find out if your school has a network. Make a
have equal status. Essentially, the computers are diagram of it. In your diagram, show the main
connection points (hubs/switches) and how
connected either directly to each other or through a these are joined by either fibre optic cable or
hub or switch. Users then set up shared folders on copper wire. Show any wireless access points.
their hard drives to enable file sharing. Peer-to-peer Your diagram can be a physical layout, showing
networking has become very popular for local area the buildings, or a logical layout, showing just
the hub/switch, workstations, nodes and
network (LAN) parties, where a group of friends can connections.
play network games.

Requests

Peer 1 Peer 2

Server Hub

Responses
Client

Peer 3 Peer 4
(a) A client–server network is a set of computers connected to a ‘master’ computer, called the server, that controls what happens on the
network. (b) In peer-to-peer networks, there is no central server among the connected computers.

Networking systems 153


6.2 Networking

Before you start, have you completed the


following unit?
6.1 Communications networks

We have described a computer network as a


number of connected computers and peripheral
devices. In this unit we look at:
• types of networks
• components that make up networks.

Types of networks
There are three types of networks: local area
networks (LAN), wide area networks (WAN) and
virtual private networks (VPN).

Local area network


A local area network (LAN) is one that services a
work group or department within an organisation.
A LAN is usually limited to a single geographical
location such a building or a group of buildings on
a single site, such as a school. The network in this school is probably a local area network (LAN).

Wide area network


A wide area network (WAN) can be thought of as a
collection of LANs. A WAN is usually used to
connect computers which are hundreds or thousands
of kilometres apart. A business with offices in Printer

different cities can connect the LANs in each office to


create a WAN, allowing all of its staff to
communicate easily.
A WAN may use a private, leased line, the public
telephone network or a combination of both. A
private, leased line is dedicated to the network. It
offers higher transmission speeds and more accurate
and secure transfer of data than is available through
the public telephone network.

Virtual private network Server


A virtual private network (VPN) is one which uses
the public telephone network and the Internet to Library Administration
carry encrypted data. VPNs created by businesses building
and educational institutions allow their employees
and students to gain remote access to their LANs, so
they can work or study at home. An example of a local area network (LAN)

154 Information and Software Technology


Canberra

Melbourne Sydney
LAN
LAN LAN

Public/private
telephone
network

A wide area network (WAN) allows computers to communicate over long distances: for
example, between offices in different cities.

A VPN provides an • File servers are used to store


organisation with the same files and data that are to be
capabilities as a WAN but at a shared by users of the
much lower cost. It uses data network. File servers may also
encryption and other security authenticate users to ensure
measures to ensure that only that only registered users have
authorised users can access the access to certain files and
VPN. data.
• Web servers host (store)
websites for retrieval by users
on the Internet.
More information on VPNs • Proxy servers act as an
intermediary between an end
user and the Internet. They
Printer temporarily store frequently
Components of a network accessed web pages. When a
The simplest network is two user requests a web page, the
computers connected directly to proxy server checks whether it
each other. More complex has stored the page before
networks, however, require forwarding the request to the
additional components. Internet. This can make access
to frequently visited pages
Servers much faster than retrieving
Servers are purpose-built the pages from the Internet
computers that store data, control each time they are required.
access to data, authenticate users
and, in some cases, perform any • Print servers are dedicated to
required processing. A single processing printing requests
Classroom
server may perform all of these from users on a LAN.
tasks but, in most cases, the • Mail servers store and process
following purpose-built servers email and manage email
are used to handle specific tasks: accounts.

Networking systems 155


Packet switching
Most networks, including the Internet, use packet switching to exchange data. Packet switching divides
messages into small data packets, transmits the packets and, later, joins the packets to form the original
message. It allows many users to use the same transmission line by interspersing the data packets from
different users. Data packets from one message do not necessarily take the same path, and could arrive at their
destination in a different order from the original, before being reassembled.
Each data packet contains an address and control instructions to reassemble the message in the correct order.
If a packet is lost along the way, the receiving computer will request that the packet be resent.

Receiver

>
<1
> <3
<3 >
<1
>
<4> <2>
<4
> 1>
<4 <2 432
Sender > > <
<2
>
<3 Packet Assembler/Disassembler
>
<1
>

<4321>
Packet Assembler/Disassembler Nodes/routers/switches etc.
Original
message Communication lines/pathways
<3> Packet of data

In packet switching, the data packets do not necessarily take the same path.

Workstations bandwidth of the switch) and they can be managed


Workstations are the computers, which may be (each port on the switch can be configured
connected to a network, that allow users to do their individually).
work. They range from dumb terminals with no
hard-drive memory or processor (all processing and
data storage is done by the server) to high-end,
graphics workstations that have more processing
power than some of the supercomputers of about
five years ago.

Hubs and switches


A hub is a device used as a central connection point
when adding workstations to a network, or to
strengthen signals when longer cable segments are
added between workstations.
A switch is similar to a hub. Their main
differences are that switches have per-port switching A type of network hub showing the CAT 5 cable used for data
(each port or outlet on the switch gets the full transmission to the networked devices

156 Information and Software Technology


Repeaters
Repeaters are the simplest form of signal booster.
They are physical devices designed to tie two long
network cable segments together. Repeaters accept
data in the form of packets sent by the nodes on the
network and rejuvenate (or amplify) the packet
signal so that it can travel a long distance without
data loss.

Gateways
A gateway is a combination of hardware and
software which links two different types of networks.
This usually involves converting different protocols An example of an internal network card (top) and a laptop network
card (bottom)
(see 6.3 Protocols).
Some of the more widely used network operating
Bridges systems include Novell®, Microsoft Server 2003®,
A bridge is a physical device that allows two or more Unix® and Linux®.
networks to exchange data regardless of their specific Network operating systems are covered in more
topologies. For example, a bridge can connect a bus detail in 6.8 Network operating systems.
network to a ring network. (see 6.4 Network can you?
topologies). • design a small network of at least two
workstations to allow file sharing?
Routers
• represent a LAN or WAN using ICT such as
Routers are more sophisticated than bridges; they graphics software?
are not tied to any one topology or protocol. They
• describe your school’s communication link
pay attention only to the destination addresses (a set with the outside world?
of four integers separated by full stops) attached to
• describe and compare servers for a
data packets. These addresses identify the interfaces particular network?
as nodes within the network. Routers may be a
• download and upload files to a host?
physical device or a piece of routing software.
• describe the purpose of various network
connection devices?
Network interface card
A network interface card (NIC) is the card installed
in a computer or peripheral device that allows it to
connect to the network. The NIC must be matched
to the topology of cables of the network. NICs
package data according to the rules of the network Remember
operating system (NOS) and transmit data along the 1. Describe the three types of networks.
connecting network cable. An exception to this, of 2. Distinguish between a LAN and a WAN.
course, is the wireless network card which does not 3. Explain the term ‘data packet’.
use a cable.
4. Explain what a server is. Describe three different
types of servers.
Network operating system (NOS)
Networks require specialised software called the Think
5. Define the term ‘hub’. How is it different from a
network operating system (NOS). The NOS is like switch?
the operating system on a personal computer; it
Investigate
provides an interface between the users, and the 6. Find out more about proxy servers. Explain how
network and its attached peripheral devices. The they make web pages load more quickly. What
NOS handles such tasks as user authentication, file other functions do proxy servers perform?
storage and management of printing jobs.

Networking systems 157


6.3 Protocols

Before you start, have you completed the


following unit?
6.2 Networking

Humans need language to communicate so that we


can share and transfer ideas. The language’s rules
assist in this communication. The rules are the
grammar and the vocabulary, which are the words
that we use. In any language, words have meaning
only because the speakers of that language agree that
When computers establish communication, it is called ‘handshaking’.
a certain word will have a certain meaning.
TCP/IP
TCP/IP stands for Transmission Control Protocol/
Internet Protocol. It was developed in the 1960s by
the United States Department of Defence to link
computers across the world to maintain connectivity
in the case of another world war. TCP/IP can

TCP/IP IPX/SPX
Transmission Control Protocol/ Internet Packet eXchange/
Internet Protocol is the protocol Sequenced Packet eXchange
suite used by the Internet and is a protocol developed by
is widely used in commercial Novell for its network
We can communicate with other people who speak our language and private networks. operating systems.
because we understand the rules — the grammar and vocabulary —
of our language. In the same way, computers require protocols, or
agreed rules, to communicate with each other.

For any data communication to occur across /Figure 6.3.3 – protocols summary diagram, no
networks and between computers, we require caption/
protocols. A protocol is a set of agreed rules that
control and enable communication between
Network
computers in a network. Protocols establish rules for protocols
transmission of data and error detection. By using
the same protocol, different types of computers can
communicate with each other even though they may
be using different operating systems.

Types of protocols
Network protocols are grouped into sets of NetBIOS & NetBEUI AppleTalk
compatible protocols referred to as ‘suites’. The Network Basic Input/Output AppleTalk allows file transfer,
protocols that we will discuss in this unit are: System and NetBIOS Extended printer sharing and mail service
User Interface allow applications among Apple systems.
• TCP/IP • IPX/SPX on different computers to
communicate within a LAN.
• NetBIOS and NetBEUI • AppleTalk.

158 Information and Software Technology


communicate to any PC using a SPX verifies and acknowledges file transfer, printer sharing and
desktop or network operating successful packet delivery to any mail service between Apple
system anywhere in the world as network destination by systems (using the LocalTalk
long as it supports the TCP/IP requesting verification from the interface, which is built into
suite. It is the protocol of choice destination that the data were Apple hardware) and to send data
for Internet and intranet received. The SPX verification to other network media. For
applications. must include the value that example, it allows
TCP/IP can be thought of as a matches a value which was communication with other
special set of numbers, similar to calculated from the data before network protocols such as
those used in telephones. In the transmission. By comparing the Ethernet either by using
same way that homes and values, SPX ensures that the data LocalTalk to Ethernet bridges or
businesses have unique phone packet arrived at the destination through Ethernet add-in boards
numbers, so must the PCs using and that it arrived intact. If a on Apple machines.
TCP/IP. TCP/IP addresses are certain number of data AppleTalk is a multi-layered
split into four octets with full transmissions fail to be protocol providing data
stops (dots) between them, such acknowledged, SPX assumes that transmission between networks,
as 127.248.119.145. An octet is an the connection has failed and transaction and data stream
eight-bit storage unit or a byte. warns the operator of the failure. service (data streaming for audio
Because the numbers are often and video), naming service
difficult to remember, these NetBIOS and NetBEUI (domain name service — DNS),
address numbers can be NetBIOS stands for Network and comprehensive file and print
associated with a domain name Basic Input/Output System. It is a sharing. In addition, many third-
that people can understand and protocol that can communicate party applications exist for the
remember more easily. The with network hardware without AppleTalk protocols.
address numbers are substituted using any other network software.
for the domain name by domain NetBIOS enables the use of
name servers, which have naming conventions rather than • describe the purpose
conversion tables to convert the the typical numbering schemes, of a protocol?
four-octet version of an address such as those used by TCP/IP and • identify and describe
to a domain name. IPX. However, NetBIOS does not types of protocols?
support routing to other
IPX/SPX networks; other protocols, such
IPX/SPX is an acronym for as TCP/IP, are needed for
Internet Packet eXchange/ communication between
Sequenced Packet eXchange. networks.
Unlike TCP/IP, IPX/SPX is a NetBEUI stands for NetBIOS Remember
proprietary protocol, owned and Extended User Interface. It was 1. Define the term ‘protocol’.
developed by Novell but also used originally developed in 1985 by 2. Explain what ‘TCP/IP’
by other network operating IBM as a networking protocol. As stands for and describe the
system companies. an extension of NetBIOS, it has main features of this
protocol.
IPX is a protocol that sends the same shortcomings as
data packets to requested NetBIOS. Because of these Think
3. Discuss why are there so
destinations, such as workstations limitations, it is recommended many different protocols.
and servers. The IPX protocol for linking fewer than 200 PCs on
addresses and routes outgoing the same segment, or where Investigate
4. Find out what IEEE stands
data packets across a network. It bridging or switching is used to for. What are the main IEEE
reads the assigned addresses of connect segments. standards for networking?
returning data and directs the In IEEE 802.11, what do the
data to the proper area within the AppleTalk letters at the end stand for
(e.g. IEEE 802.11g)?
workstation’s or network server’s Apple Computer developed the
operating system. AppleTalk protocol suite to allow

Networking systems 159


6.4 Network topologies
Node

Node Node
Before you start, have you completed the
following unit?
6.2 Networking

Node Node
When we talk of the topology of a network, we are
describing the cabling arrangement between the
nodes of the network. There are three main ways to
connect the nodes: star topology, ring topology and
bus topology.
Node Node

Star topology
In a star topology, an individual wire connects each
PC (or node in the case of peripherals) to a central
location. Here, all the wires are connected to a hub
(or switch) device, which completes the electronic
connections. The hub or switch acts as a central
A ring network topology
place for all of the signals to meet and then branch
out to their individual destinations.
Node
Bus topology
Node Node
The bus topology uses a cable in a single line with
two end points. At each end point, there is a
terminator that prevents signals at the end of the
cable from being reflected back into the network.

Node Node Node Node

Central
Node node Node

Bus

Terminator

A star network topology

Ring topology
In a ring topology, the cable is laid in a circle. Each
signal has to pass by each node sequentially in the
ring. Traffic can be one-way around the loop or it Node Node
can travel in both directions if a double loop is used. A bus network topology

160 Information and Software Technology


TOPOLOGY ADVANTAGES DISADVANTAGES

Star • Each node has its own cable and does not • If the central node fails, the entire network will
need to share the line with any other node. cease to operate.
• If a cable to a node is broken, then only that • More cabling is required than for other network
node is affected. topologies.
• New links to the central node can be added
easily, or existing links removed, without
affecting the rest of the network.
• It is easy to identify a faulty cable because it
will affect only a single link.

Ring • A single cable is used to connect all the • If the ring is broken, or the cable is faulty, the
nodes. entire network will stop working.
• The ring must be broken (and the network
stopped) to add new nodes or to remove
existing ones.

Bus • They are easy and cheap to set up. • Because one cable carries all the data,
• Nodes can be added and removed easily. collisions (data traffic jams) can affect networks
with many nodes.
• A fault in the cable can be difficult to locate
because it will usually stop all the nodes from
transmitting or receiving.

Advantages and disadvantages


The table above summarises the advantages and • graphically illustrate network topologies?
disadvantages of each type of network topology. • critically analyse a given network
topology for a particular situation?

Node Node

Remember
1. Describe the three network topologies.
2. Identify one advantage for each of the different
topologies.
3. Identify one disadvantage for each of the
different topologies.
Think
4. What topology would you use so that you and
three of your friends could play networked
Ter
computer games? Explain your decision.
Investigate
5. If your school has a network, find out what
topology it uses. What would be the most
appropriate network topology for your particular
school? (Hint: The size of your school and the
number of computers on your network will
influence your decision.)
Node Node

Networking systems 161


6.5 Data transmission — modes and rates

Before you start, have you completed the


following units?
6.2 Networking
10.3 Data coding Simplex mode of data transmission — Data can move through the
medium in one direction only.
10.5 Data transmission and compression

Data transmission modes


In very general terms, data transmission is the act of
moving any kind of information from one space to
another. Historically, this was done by courier, a
chain of bonfires or semaphores, and later by Morse
code over copper wires. In computer terms, it means
sending a stream of bits or bytes from one location
to another.
A range of media can be used to transmit data,
Half duplex mode of data transmission — Data can travel through
such as copper wire, optical fibre, radio-link, laser, the medium in only one direction at a time.
radio and infra-red light. These are discussed in
6.6 Data transmission media.
When we speak of data transmission modes, we
are speaking of the direction of flow of data. There
are three data transmission modes: simplex, half
duplex and full duplex.

Simplex
In simplex data transmission mode, data can
travel in one direction only: from sender to receiver.
The simplex mode is used in radio, telegrams and
television. When thinking of the simplex mode,
imagine a car travelling along a one-way street. Full duplex mode of data transmission — Data can travel through
the medium in both directions simultaneously.

Half duplex
In half duplex data transmission mode, data can it would be difficult to talk and listen at the same
travel in both directions but not at the same time; time! If we continue the car analogy, imagine two
the sender and receiver must take turns. The half cars on a road wide enough to allow them to travel
duplex mode is used in two-way and ham radios. in opposite directions at the same time.
This time, imagine two cars wishing to use a street
that is wide enough to allow only one car through
at a time. Data transmission rates
Data transmission rate is the rate at which data can
Full duplex be transferred from one point to another. The speed
Full duplex data transmission mode allows data to of data transmission depends on a number of factors
flow in both directions simultaneously. The current including the data transmission mode, transmission
telephone system uses the full duplex mode. Both medium and other connection devices such as
participants may speak simultaneously, even though modems and network adapters.

162 Information and Software Technology


Baud rates vs bits per second difference between the highest
Baud rate (named after Emile and lowest signal frequencies
Baudot, a French (measured in hertz) that a
communications pioneer) is the particular link can carry. When
number of distinct signal events only one link uses the available
or timing intervals in a second. bandwidth, the link is classified as
Bits per second (bps) is a count baseband. When the single
of the number of bits transmitted bandwidth can be split into many
each second. smaller separate bands (each
Baud and bps do not measure capable of carrying a different
exactly the same thing. Consider signal), the link is classified as
a single message, containing five broadband. Broadband links can
bits, sent out in one second. The be more useful for networks than
message has five distinct signal baseband.
events (timing intervals) in the
second so the baud rate and the
bits per second are the same • recognise the
different modes of
(5 baud and 5 bps). Now consider data transmission?
two separate messages, each
• discuss and compare
containing five bits, being sent at the methods used to
the same time. The transmission measure transmission
rate is 5 baud or 10 bps. This is rates?
because there are still only five
distinct signal events but twice
the amount of data is being
transmitted in each event. This
can be achieved because the Remember
signals are sent in different 1. Define the term ‘data
frequency bands so that they do transmission’.
not interfere with each other. 2. Describe the three modes of
The transmission device and data transmission.
the available bandwidth 3. Explain what is meant by
determine the speed of data ‘baud rate’.
transmission. Bandwidth is the
Think
4. Explain the difference
between baud rate and bps.
5. Distinguish between
baseband and broadband.
Investigate
1
Signal 6. Investigate at least five
1 channel 1 Internet service providers
0 which you could use in your
1 home, including dial-up and
Signal broadband services.
channel 2

0 0
Compile a report comparing
their services and costs. In
1 second 1 second your report, compare the
advantages, disadvantages
Signal events and costs of dial-up access
and broadband (cable or
ADSL).
A 5 Baud, 5 bps message A 5 Baud, 10 bps message

Networking systems 163


6.6 Data transmission media
Twisted pair cable
A twisted pair cable consists of pairs of insulated
Before you start, have you completed the
copper wire twisted together (to reduce interference)
following units? and covered by an outer jacket. The twisted pair
6.2 Networking
cable used in networks is called unshielded twisted
pair (UTP). It is called unshielded because there is
6.5 Data transmission — modes and rates
no shielding between the insulated pairs and the
outer jacket. Its main advantage is that it is cheap to
purchase and install. UTP cable is currently able to
To allow transmission, data need some type of transfer data at 1000 Mbps (1 Gbps).
medium through which they can travel. This
medium can be either a cable, such as copper wire or
optical fibre, or it may be wireless, using radio or
microwaves.

Cable media
Cable media include copper wire, as a coaxial cable
or a twisted pair cable, and optical fibre cable. Each
of these media has several advantages and
disadvantages.

Coaxial cable
A coaxial cable is made of stiff copper wire
surrounded by insulating material, which is then
encased in a cylindrical conductor like a mesh. The
cable is then coated in a plastic cover. The mesh
shielding helps to block electrical interference; this
Twisted pair cable
makes it a more reliable carrier of data than a twisted
pair cable, However, it is heavier and less flexible Optical fibre cable
than a twisted pair cable and takes up more space. Optical fibre cable allows data to be sent as pulses of
The data transfer rate through a coaxial cable is light. One light pulse can signal a ‘1’ bit, while a no-
limited to 10 Mbps. light pulse signals a ‘0’ bit. The optical fibre consists
of an extremely thin fibre of glass or plastic
Insulation Mesh shielding
surrounded by a layer of a different type of glass or
Outer insulation
plastic. The boundary between the two different
materials acts like a mirror and traps the light pulses
inside the inner cable. A laser diode at one end of the
Conductor
cable emits light pulses into the cable. A photodiode
(light-detecting diode) at the other end of the cable
detects the light pulses.
Optical fibre cable has several advantages over
copper wire cables:
• It is not affected by electrical interference, such as
lightning and power surges.
• It is thinner and lighter than coaxial cables.
• It provides greater security because it is difficult
Coaxial cable to intercept.

164 Information and Software Technology


Fibres

Outer sheath Tube

Kevlar strength
member

125-micron cladding

Primary buffer

62.5-micron core

Optical fibre cable Wireless media are alternatives to the expense of laying cables
over vast distances and to rural areas.
• It has a high transmission speed and low error
rate. Wireless media
• It can carry thousands of separate signals. Laying cables to link urban and rural centres over
vast and harsh terrain is an extremely expensive
However, optical fibre cable also has some operation; the maintenance costs are also very high.
disadvantages: Technologies, such as radio and microwave links,
• It is expensive to make and repair. have been developed to avoid this expense. Using
• It needs transponders at each end of the link to these links, data can travel in radio waves or
convert the data between light pulses and microwaves, either through the air, or through space
electrical signals. in the case of satellite microwaves.

A comparison of data transmission media


MEDIUM ADVANTAGES DISADVANTAGES DATA TRANSMISSION RATE

Coaxial cable Cheap Slow data transfer Up to 10 Mbps


Easily terminated Connectors prone to moisture
Shielding allows many cables to damage and corrosion
be combined into larger cables.

Unshielded Cheap Data loss due to 10 Mbps to 1 Gbps


twisted pair Easily terminated electromagnetic interference

Flexible Maximum 100 m between


nodes

Optical fibre High bandwidth Expensive Over 400 Mbps (maximum


50 km between antennas Difficult to join/terminate capacity not yet known)

Can be used where cabling is not Inflexible; will break if bent too
possible or too expensive far

Microwave High bandwidth Subject to interference by Over 2 Gbps


50 km between antennas weather

Can be used where cabling is not Antennas must be in line of


possible or too expensive sight of each other.

Networking systems 165


Radio
Radio can use either a narrow
line-of-sight transmission or a
wide area transmission, similar to
commercial radio stations. The
major drawbacks with using
radio as a communications
medium are signal interference
and the lack of security; anyone
can tune in to a radio frequency
and intercept your transmissions.

Microwaves
Microwave transmitters send very
high frequency radio waves in a
direct line. These transmissions
can be sent and received by
towers mounted on tall buildings
or mountain tops or by satellites
orbiting the Earth.
Communications satellites are
placed 35 000 kilometres above
the Earth so they can send Microwave transmissions for international signals are sent and received by satellite.
microwave signals to, and receive
signals from, up to a third of the
Earth’s surface.
Satellites are commonly used
for international telephone
signals as well as television and
data links. However, microwaves
can be affected by the weather
and temperature changes, which
can weaken the signals. Because
of this, and the high production
and launch costs of satellites,
optical fibre cables will eventually
replace them.

Wireless networks
Wireless networks, which use FM
radio frequencies, have become
increasingly popular in homes
and small businesses. This is
because they do not require
cabling, which can be expensive
and requires specialist
installation. To set up a wireless
network, you need a wireless base
station and wireless network
cards for each PC. Wireless Wireless networks give laptop computers freedom of movement but
networks operate on the 802.11 require a WAP (wireless access point) and wireless network cards.

166 Information and Software Technology


network standard; the current for UTP is 100 metres in total

can you?
standard, 802.11g, can transfer between nodes. Data • describe the different
media available for data
data at 54 Mbps. This is transmission signals degrade over
transmission?
approximately half the speed of distance so you will need to
determine how many repeaters • explain how different
a 100BASE-T network. As with
factors affect the choice
radio transmission media, are required to ensure there is no of transmission media?
security can be a problem for data loss. Over large distances,
wireless networks and all you may need to decide between
manufacturers of wireless base using optical fibre cable and
stations have built-in data microwave; cost will then be an
encryption and security facilities. important factor.

The number of nodes


Factors influencing media In a network, nodes are the
transmission devices at the end of a cable, such
When creating a network, you as workstations and printers. The
need to consider a number of size and shape of your network Remember
factors that influence media will be determined in part by the 1. Describe three types of
transmission. These include set-up number of nodes in it; a network
data transmission media.
cost, the number of nodes and the with two nodes will be very 2. Give three advantages of
distance between them, and the different from a network with optical fibres over copper
ease with which the network can wire cables for data
1000 or more nodes. The number transmission. Give one
be maintained and expanded. of nodes in your network will also disadvantage.
influence the transfer rate of data 3. Describe one disadvantage
Cost through your network. The more of using radio waves to
One of the major influencing nodes you have, the greater the transmit data.
factors in building a network is demand for individual Think
cost. When building a network, frequencies (bandwidth) for data 4. Explain the differences
there is always a trade-off transmission. between optical fibre and
between what is desired and what The number of nodes may also UTP cables.
is affordable; nearly all network influence whether you choose Challenge
development projects are hubs or switches. Hubs share 5. You have been asked to
constrained by the available funds develop a network plan for
their bandwidth between the a local community office
or budget. The budget will number of users, so a 100-Mbps which has five computers
influence all decisions including hub with 10 users will give each (one is a laptop). The four
the type and brand of hubs, user 10 Mbps. However, switches desktop computers are on
switches and cabling. For give each user the full bandwidth, desks about 15 metres
apart and one of them will
example, optical fibre cabling is so a 100-Mbps switch with be used as a server. When
faster and can carry data for 10 users will give each user the laptop is in the office, it
greater distances than UTP but it 100 Mbps. will need to be connected to
is also more expensive. Building a the network. Only two or
Sustainability and expansion three people will use
suitable network with a limited
computers at any given
budget is a difficult task. (scaling) time. Draw a physical
When designing a network, you network diagram of your
Distance need to consider how it will be solution; show the office
Distance is an important factor to layout and placement of
maintained and you need to
computers as well as any
consider when deciding what design it so that it can expand cabling. Find out an
type of cabling to use. Different easily. For example, it is easier approximate cost for the
types of cable have maximum and cheaper to add nodes to a materials used in your
effective length limits. For star network than to a ring solution.
example, the maximum length network.

Networking systems 167


6.7 Security of information
host by acting as an intermediary. Proxy servers can
also be set up as ‘honey pots’; these are sites without
Before you start, have you completed the
sensitive data which trick hackers by attracting them
following units? away from the real servers in your network.
6.2 Networking Data encryption/decryption
10.5 Data transmission and compression Encryption and decryption of data is special coding
10.6 Data storage and function or scrambling of a communication signal for security
10.7 Data security purposes. When data are sent, they are encrypted.
12.3 Legal and security issues
Upon arrival at their destination, they have to be
decrypted before they can be used. There are a
number of encryption/decryption systems available
that work at a variety of levels, from very strong
The primary purpose of a network is to share files encryption to mild encryption.
among authorised users. However, data and One way of encrypting data is to use public and
information in a network are also open to attack by private keys. A public key is designed to be spread
unauthorised users, such as hackers, as well as around freely, while a private key is held only by its
malicious attack by viruses. Some attacks are made owner and should never be disclosed publicly. The
simply as a means for hackers to test their skills; they keys complement each other so that, if you encrypt
get a buzz from being able to hack into a system. something with a public key, it can be decrypted only
Others try to gain access to systems for monetary with your corresponding private key. The security of
gain, to damage files or to steal information. Data and these keys depends on a mathematical relationship
information are not vulnerable to attack only while between the public and private keys. You can’t derive
stored on the system; they are also open to attack one from the other, so passing out the public key
while being transmitted from one point to another. does not compromise the security of the private key.
Encryption hides data so that only the intended
party can read them. Signing uses encryption to
Security
prove the origin and authenticity of some piece of
A number of systems can be put into place to secure
data. These two processes in combination provide
data stored in or transmitted through networks. These
the following three features that ensure data security:
include firewalls, proxy servers and data encryption.
• Privacy is ensured when data are properly
Firewalls encrypted. Data cannot be read by anyone except
A firewall is a hardware or software solution that the intended recipient.
controls access to a protected network. Firewall • Authentication can be used to demonstrate that the
managers use one of two philosophies during receiving server has the proper private key, thus
firewall configuration: proving its identity and its right to the data.
• allow all incoming transmissions except Authentication also allows you to verify that a piece
designated packets of data was not tampered with after it was sent.
• block all incoming transmissions except • Non-repudiation is an aspect of conventional
designated packets. business often overlooked by e-commerce users.
For example, if we sign a paper contract and give
Today, the latter is becoming far more prevalent. you a copy, it is very hard for us to say later that
Everything is locked out by default. Only designated we never signed it. Digital signatures can make
packets are allowed through the firewall. electronic transmissions legally binding.

Proxy servers Storage


Proxy servers can be configured to act as firewalls that Each server’s operating system stores data in a
prevent direct communication between a client and a proprietary format on its local disk, which users can

168 Information and Software Technology


access. This proprietary file
system helps to enforce the
security and special features that
the server’s operating system may
support. Files can be stored on
many different types of media
from slow tape backup to very
high-speed disk arrays.
There are many other types of
storage media in use today
including CD-RW (compact disc),
DVD+/–RW (digital video disc), A variety of backup media
DLT (digital linear tape) and
various other backup tapes. the file server fails. Protecting

can you?
Magnetic hard disk arrays still data on the file server is vital, and • describe the appropriate
storage medium,
provide the fastest access to a data backup policy is just as
including backup
information at a relatively low cost. important an an insurance policy. requirements, for
Media which can be moved away Most file servers use a system different situations?
from the system are best when backup every night when the • discuss implications of
considering backup strategies. network is not being used. All the various backup and
data created or altered during the storage techniques?
Backup day are copied to magnetic tapes, • discuss a range of
In most networks, the file server although high-capacity, security techniques for
stores important data needed for recordable DVDs are now starting networks?
the operation of the business or to be used. On some systems, the
organisation. It can be a disaster backup is done by copying all the
if the data are lost or damaged, or data to another file server.

Characteristics of various data backup media


Remember
MEDIUM CAPACITY ADVANTAGES DISADVANTAGES 1. Explain the term ‘firewall’.
2. Identify the two areas where
Tape 4–8 GB High capacity Expensive hackers may be able to
Removable Prone to breakage
attack network data.
Rewritable Low access speeds
3. Explain how proxy servers
CD-R 650–700 MB Low cost Not rewritable help to secure data.
High access speed Low capacity
Removable Prone to scratches and Think
loss of data 4. Discuss why network
security is so important.
CD-RW 650–700 MB Low cost Low capacity
High access speed Prone to scratches and Investigate
Removable loss of data 5. Visit some online businesses
Rewritable like amazon.com and ebay®.
How do these companies
DVD+/-R 4.5 GB Low cost Not rewritable ensure secure transactions?
High access speed Prone to scratches and (Hint: When you visit these
Removable loss of data websites, look for their
security information
DVD+/-RW 4.5 GB Low cost Prone to scratches and sections.)
High access speed loss of data
Removable 6. How does your school
protect data such as
DVD+/-R 9 GB Low cost Prone to scratches and student information and
Dual layer High access speed loss of data exam results?
Removable

Networking systems 169


6.8 Network operating systems
services simultaneously. The NOS must be able to
handle several requests at once; this is called
Before you start, have you completed the
‘multitasking’. In addition, the client operating
following unit? system must be able to multitask because it needs to
6.2 Networking
handle incoming network traffic, such as email,
without demanding the user’s attention. This allows
the user to perform other tasks on the workstation
without interruption.
Until a computer’s operating system is loaded, it is The NOS typically comprises two parts: the client
just a collection of hardware. It is the operating software that is installed on each workstation and the
system that makes the computer usable. This also server software that is installed on the server only.
applies to networks. A network requires cables, Together, the client software and the server software
workstations, hubs and switches but it is the network provide a secure method for clients to access
operating system (NOS) that enables data to be resources on the server. When users log in, their
transferred between these components. The network identity is authenticated by the server. This means
operating system is a set of programs that ensures that the client software sends the user name and
reliable data transfer. It also provides tools so that the password to the server. The server software then
network administrator can manage various
functions of the network.

One of the many network operating systems available

Purpose
The network operating system manages the flow of
data across the network. It enables clients
(workstations) attached to the network to access
network resources, such as files and printers, that are
shared by the network servers.
Usually, many clients are attached to a LAN so
clients may request access to one or more network Network management involves many routine tasks.

170 Information and Software Technology


searches its database for that permissions are usually • use of compression technologies.
username. If the user exists and applied when the user logs in No matter how new or
the password is correct, the user to the network. expensive a network is, it
will be logged in to the system. • policies and profiles. Policies seems that it never has enough
If the user does not exist or the and profiles are used to storage space and it never has
password is incorrect, the user customise the client’s desktop. high enough data transfer
will not be logged in to the Policies can be ‘open’ (users rates. Compression
system and an error message have rights to use everything technologies go some way to
will be displayed. on the client machine) or solving these two problems.
For a network to function ‘locked down’ to restrict what Data that are used infrequently
efficiently, the network server a user can do on a client can be tagged for compression,
running the NOS must meet the machine. Profiles can be used thus taking up less disk space
minimum required specifications. in conjunction with policies. while not in use. Equally, there
The table on the right shows Profiles generally give the user are a number of data
the minimum hardware a uniform working compression technologies that
requirements of some popular environment regardless of compress data to be
network operating systems. which workstation they use on transferred so that they will
the network. require less bandwidth.
Management
A network operating system NOS NOVELL WINDOWS 2000 SERVER LINUX
provides the network
administrator with the tools to CPU 1 CPU 133 MHz Pentium 1 CPU Pentium
manage the network. The Pentium II
network administrator uses these
Memory 128 MB 128 MB minimum, 32 MB minimum,
tools to perform a huge range of (RAM) 256 MB recommended 64 MB recommended
tasks including:
• establishing users and groups. Storage 1.3 GB 1 GB minimum, 2 GB 500 MB minimum,
recommended 600 MB
The network administrator recommended
adds and removes users and
groups from the system. Users Other VGA video card, CD-ROM drive, network card, PS/2 mouse
and groups are allocated access
to the resources they need to
do their work. Groups contain • explain the purpose of a NOS?
users who have similar tasks to • discuss effective network
perform and who require management strategies?
access to the same resources.
Establishing groups allows the
network administrator to give Remember
file and resource permissions 1. Explain the function of a NOS.
to a group instead of individual
2. Identify the two parts of a NOS.
users. When users are added to
a group, they acquire the 3. Explain the term ‘multitasking’.
permissions of that group. 4. Distinguish between a user and a group.
• security permissions. Security is Think
an integral part of any 5. Discuss why is it important to keep your password to yourself.
network. When users are Investigate
created, they are given access 6. What network operating system is used at your school? Are there any
only to the files and resources advantages of using this NOS rather than another NOS? Is more than
one NOS being used? Find out how and why.
that they will need to perform
their work. These security

Networking systems 171


6.9 P RO J E C T
— Creating a peer-to-peer network

Before you start, have you completed the


following units? BEWARE: To complete step 1a, you will need to
open your computer case. Your computer case
6.2 Networking
contains sensitive electrical equipment that can be
6.3 Protocols damaged easily by static electricity. The case also
6.8 Network operating systems contains a 220–240 volt power supply that can be
extremely dangerous. If you are not confident with
this step, ask a professional computer technician
to install the NICs.
If you choose to perform this step yourself, make
Project outline sure that you follow the installation instructions
In this project, you will connect two computers to that come with the NICs. Also, ensure that you
create a simple peer-to-peer network. We will use follow anti-static procedures whenever you work
two computers that are running Windows XP inside your computer. At the very least, you should
use an anti-static wrist strap.
Professional®.
Imagine that you and a friend wish to share some
files which are stored on your computers. These files
are too large to fit on a floppy disk and neither of you c Finally, plug in your network cable(s). If you
has a CD burner. However, you will be able to share have a hub or a switch, you will need a standard
the files if you set up a peer-to-peer network. network cable for each computer. These are plugged
You will need: into each computer’s NIC at one end, with the other
• two computers of comparable specifications: that end of the cable being plugged into an empty port
is, similar (preferably the same) operating systems on the hub or switch.
on both machines, the same CPU and a similar
If you do not have a hub or a switch, you will
amount of RAM
need to use a network crossover cable. These cables
• a network interface card (NIC) in each computer have two of the copper strands inside crossed over to
• one crossover network cable (You will need two different pins at each end of the cable. You could
standard network cables if you use a hub or make one yourself with some Cat 5 cable, cable ends
switch.) and a crimping tool, but it is probably cheaper and
• TCP/IP networking protocol easier to buy a ready-made cable.
• static IP addresses for each computer.
Step 2 Give your computers unique IP addresses
Creating the network a In XP Professional, you need to find the
Network Connections window. Click on Start, right
Step 1 Install the hardware click on My Network Places and select Properties
a If your computers do not already have network (see screen 1 on the next page).
interface cards, you will need to install them. b From the resultant Network Connections
window, right click on Local Area Connection and
b Once the NICs are installed, you need to start
select Properties (screen 2).
your computer. XP Professional will detect the new
hardware and will install the software drivers for it. c In the Local Area Connection Properties window,
(You may need to insert the driver disk that came select Internet Protocol (TCP/IP) and then click on
with the NIC.) Properties (screen 3).

172 Information and Software Technology


Screen 1 — Finding Network Connections in XP Professional

Screen 2 — Selecting Local Area Connection Properties Screen 3 — Selecting Internet Protocol (TCP/IP)
Properties

d In the Internet Protocol (TCP/IP) Properties simplicity, use 192.168.0.1 and 192.186.0.2 for
window (screen 4): your two computers.)
• Select Use the following IP address. Type in an IP • Enter a Subnet mask number. Use 255.255.255.0.
address (192.168.0.xxx), substituting the xxx for a (Note: The subnet mask number must be the same
number of your choice. (Note: The number that on both computers.)
you put in place of xxx must be different on each
of your computers. Valid numbers are 1–244. For • Leave Default gateway blank.

P R O J E C T — Creating a peer-to-peer network 173


P R O J E C T — Creating a peer-to-peer network

Screen 5 — Finding My Computer Properties


Screen 4 — Setting the TCP/IP properties

Screen 6 — Changing the computer name and


workgroup settings

• Finally, when you clicked on Use the following IP Step 3 Give each computer a unique network
address, the option Use the following DNS server name
addresses was selected automatically. You can leave a Click on Start, right click on My Computer and
these fields blank. Click OK to accept the settings.
select Properties (screen 5).
You may need to restart your computer for these b From the System Properties window (screen 6),
settings to take effect.
select the Computer Name tab. Make sure that each
computer has a unique name and is a member of
the same workgroup. These properties are usually
Repeat step 2 for the second computer. set when installing Windows. You can change them
Remember that each computer MUST have a here by clicking on Change. For simplicity, use
unique IP address and the SAME subnet mask. ‘Computer1’ and ‘Computer2’ as the Computer
names and use ‘Workgroup’ as the Workgroup name.

174 Information and Software Technology


Click on the folder
you wish to share.

Screen 7 — Selecting a folder to share

Screen 8 — Setting network sharing and security properties

Step 4 Set up a share point on not a good idea to share an entire share on each computer. Click on
each computer drive and, if you try to do so, Start and double click on My
a You need to set up at least Windows will warn you before Computer. Find the folder that
one share point on each allowing you to proceed. Either you wish to share, right click on
computer. This can be an entire create a new folder or select an it and select Sharing and Security
disk drive or a single folder. It is existing folder that you wish to (screen 7).

P R O J E C T — Creating a peer-to-peer network 175


P R O J E C T — Creating a peer-to-peer network

Screen 9 — Creating a new user

b In the Properties window for


the selected folder (screen 8), Screen 10 — Setting authentication details for a new user
click on the Sharing tab and:
• select Share this folder on the b Fill in the appropriate details network connections for a
network for your new user (screen 10). computer of that name that is in
• give the folder a Share name Use a password that is easy to the same workgroup as your
remember. Select Password never computer.
• select Allow network users to
change my files expires. Click Create when all Once a connection is
details have been entered. established you should see the
• click OK to accept these folder that you shared on the
settings. Step 6 Establish a connection other computer (screen 12).
Registered users will now be between the two You can now treat that folder as
able to log in to your shared computers though it were on your own
folder and work with files in that computer.
Click on Start and double click
folder as though they were on on My Computer. In the address
their own computer. bar of Windows Explorer (screen
11), type:
Step 5 Set up registered users
• ‘//computer1’ if you are using
a Click on Start, right click ‘Computer2’ and wish to
on My Computer and select connect to ‘Computer1’
Manage. From the Computer • ‘//computer2’ if you are using
Management window (screen 9), ‘Computer1’ and wish to
select Local Users and Groups. connect to ‘Computer2’.
Right click in the white space of
the right-hand window and Windows will then search Screen 11 — Selecting the computer you
select New User. through all of your active want to connect to

176 Information and Software Technology


Screen 12 — Folders on the remote computer

Extensions
Now that you have set up your own peer-to-peer
network, you can explore some of the other aspects Screen 13 — Allowing other network users access to a printer
of networks with one or more of the following
extension activities.

Create a LAN
Start with a single, 5- or 8-port hub and add
additional computers to your network using the
same procedures outlined in the project. Set up
another network (it may be in a different room)
using the same IP address sequence (192.168.0.xxx).
Use the uplink ports on the two hubs and a longer
network cable to connect the two hubs.
Attach a printer to one of the computers on your
network. After installing the driver for the printer on
the computer, set it up so that it can be shared with
other computers (see screen 13).
Each computer on the network will have to install
the printer as a new printer attached to the network
(see screen 14). Screen 14 — Adding a network printer

Design and construct an intranet adequate? What additional information and software
If you have also completed (or are currently technology would be needed to make the expansion
studying) chapter 5 The Internet and website worthwhile?
development, design and build an intranet for your
network. Use one computer as the web server
containing all the web content. • design and construct an intranet?
• evaluate the performance of a given
Evaluate a network network in terms of bandwidth, speed
Imagine that you will be expanding your new of device and cables?
network throughout the school, including to nearby
• assemble a simple peer-to-peer
buildings. Evaluate the performance of your current communication system?
network in relation to this expansion — will it be

P R O J E C T — Creating a peer-to-peer network 177

Das könnte Ihnen auch gefallen