Sie sind auf Seite 1von 36

Networking

Chapter 12 CXC Information Technology

What is a Network?

A set of computers that are interconnected via some medium. Its primary purpose is to share resources and provide a means of communication. Each computer on the network is sometimes referred to as a node.

LAN Local Area Network


Provide high-speed, fault tolerant data networks. Covers a small area in a single or group of buildings. Provide connected users with

shared access to devices Applications Exchange files Communicate via email.

WAN Wide Area Network

Cover broader geographic areas Uses transmission facilities provided by common carriers such as telephone companies. Interconnect a number of LANs.

Implementation

A NIC (network interface card) required

Enables each computer to communicate with the network.

Implementation

Various specialist network hardware:

Act as connecting points between nodes Example hubs and switches.

Implementation

Connection medium:

Wire or cable & wireless connection.

OSI Model
Open Systems Interconnection

Developed by ISO
(International Organization for Standardization)

Describes how information moves through a network. Each layer performs a specific function or task. Layers are self-contained. Tasks can be implemented independently.

OSI (layers)
Open Systems Interconnection

Upper layer:

Deals with application issues. Implemented only in software.

Lower layer:

Handles data transport issues.

Physical and data link layers:

Implemented in hardware & software.

Other lower layers:

Implemented only in software.

Physical layer:

Network cabling places info on medium

Clients & Servers

It is important to establish the right network for your organization. There are two types of network:

Peer-to-Peer

Best for small networks Security is non-existent Optimized to serve requests from clients.

Client-Server

What is a server?

A dedicated machine that serves a specific purpose. They deal with requests from other computers known as clients. Examples:

File server Print server Mail server etc.

Benefits for using Servers

Optimization:

Designed to handle requests from clients. Files all in one location for easy administration. Multiple levels of permission for users. Data stored in a redundant way for quick restore.

Centralization:

Security

Redundancy & Backup

Server hardware basics

Any normal desktop may work BUT more robust systems are better. They should have:

Hot-swappable drives bays where drives can be inserted or replaced while the computer is running. Support multiple processors. Support large amounts of RAMs. Faster input and output. Fast network cards. Redundant components to cut down on chance of computer failing.

Server software basics

They come in two categories:

Network Operating System (NOS)

Have file server, print server, backup & security resources. Some may have web servers or mail servers Examples: - Windows NT, 2000 and 2003; Linux; Novell Netware Software designed for many purposes. Example: fax servers, remote access servers tc. Must be able to run on NOS.

Server Applications

Peer-to-Peer

A communication model that allows parties to initiate communication sessions. Each node may be given both serve and client capabilities. On the Internet, this type of network allows group of users with the same network program to connect to each other. Napster and Gnutella are examples but are synonymous of illegal sharing of files.

Network Applications

Are software applications that require or benefit from the presence of a network. Example: SQL Server, web based applications such as Moodle. You thus become reliant on you network. Hence you need a well planned architecture for your network. Implementation of these is done through functional modules such as:

Communication module

If application works through a network, it must have some means of communication. It is important to consider issues that may arise when applications scan multiple computers.

Concurrent Usage module


This is what keeps one task distinct from another. Must be able to maintain the integrity of the data or process when different users want to modify the same bit of information. Network apps must be able to handle this along with multithreading and integrity.

State Management

Defines where a process is for an application that uses a network. This is what is referred to as the state of the process. Single-user, standalone applications finds it easy to maintain this. Multi-users have to maintain a set of data for each user.

Latency

It is the amount of time it takes to communicate to other components on the network. Network latency is how long it takes for the application to communicate over the network. The communication has to go through routers, switches etc that add latency to the communication. The number of times a system need to call a remote server must be considered to maintain acceptable performance.

Rigorous Encapsulation

Encapsulation a technique that hides or encapsulates details of some implementation from the software using the implementation. Object oriented programming uses this method. An application using an object has no idea how the objects maintain the data or implements the methods. One team have no idea who wrote the component etc.

Cabling & Configuration

CAT 5 cable available in


reel-in-box

Has 4 twisted pairs of wire Pairs are color coded one solid color, the other with white background and a strip of the same color. Colors are described using the background color followed by stripe eg. White-orange: white background and orange stripe

Straight-through & Cross-over

Straight-thru has identical ends. Used in Ethernet connections. Commonly known as patch cable. Connect computers, and other enduser devices (eg. Printers) to network devices such as hubs and switches.

Cross-over has different ends. Connects two like devices (eg. Hubs and switches) without the use of an uplink port (device that reverses the transmit and receive circuit connected to it) peer-to-peer Has one end with orange switched with green set.

CAT 5 RJ45 Modular Plug

The Crimper

Has cutters to cut the cable and individual wires May have striping and outer jacket.

Making Cables
VIDEO How to make a Cat5e Network/Ethernet Cable

Cabling Rules 1

Avoid running cable parallel to power cables. Don't bend cables less than four times the diameter of the cable. Zip tie cable together, do not over-cinch them Keep cables away from devices that introduce noise such as TV sets, microwaves, telephones speakers etc.

Cabling Rules 2

Avoid stretching UTP cables (Unshielded Twisted Pair). Do not run UTP cables outside building. It is a very dangerous lightening hazard. Use telephone wire/RG-6 coaxial cable to secure UTP cables.

Network Configuration

Locate Network Connections in Control Panel. Right-click on network or LAN properties. Select Internet Protocols (TCP/IP) Enter values provided by network admin.

TCP/IP configuration

Default setting is DHCP-enabled (obtain IP address automatically) If necessary, enter fixed IP address, subnet mask, default gateway Click OK

Joining a Domain

TCP/IP

Transmission Control Protocol/Internet Protocol Communication language of the Internet. Uses client/server model of communication. It is primarily point-to-point or host-to-computer. Has 2 layers:

Higher layer Lower layer

Higher Layer (TCP)

Manages the assembling of a message or file into smaller packets. Packets are transmitted over the Internet. They are received by the TCP layer and them reassembled into the original message

Lower Layer (IP)


Handles the address part of each packets. This ensures it gets to the right destination.

Higher Layer Application Protocols

These use TCP/IP to get to the Internet:


HTTP: Hyper Text Transfer Protocol FTP: File Transfer Protocol Telnet: lets you login to remote computers SMTP: Simple Mail Transfer Protocol

These are packaged along with the TCP/IP suite.

Related Protocols

These include:

UDP: User Datagram Protocol (used instead of TCP for special purposes)

Protocols used by networks to exchange router information:


ICMP: Internet Control Message Protocol IGP: Interior Gateway Protocol EGP: Exterior Gateway Protocol BGP: Border Gateway Protocol

Das könnte Ihnen auch gefallen