Beruflich Dokumente
Kultur Dokumente
2.1 Benefits of Networking 2.2 Types of Networks 2.3 Networking Standards 2.4 Network Protocols 2.5 LAN Architecture
Benefits of Networking
Mail Services
E-mail works as a storageand-retrieval application. Mail messages are stored on an e-mail server until the recipient retrieves the e-mail. There will also be a post office box created for the users. When e-mail messages are received, the e-mail server will redirect the messages to the users post office box where the e-mails remain until the user retrieves them.
Mail Services
The storage-and-retrieval nature of e-mail systems does not require that the recipient be connected when the e-mail is sent. It can be picked up or retrieved at a later time.
The Internet
The Internet is a worldwide public network, interconnecting thousands of other networks to form one large "web" for communication. Many private networks, some with thousands of users of their own, connect to the Internet by using the services of Internet Service Providers (ISPs). These linkages enable long distance access to network services for information and device sharing.
Network Administration
The on-going task of maintaining and adapting the network to changing conditions falls to network administrators. As they evaluate new technologies and requirements, administrators must measure their benefits against the issues, costs, and problems the new features may introduce to the network.
Types of Networks
Overview
Some networks are designed to interconnect many users and systems in a limited geographical region and to enable high-speed communication among them. Other networks connect a smaller number of devices that are separated by large geographical distances. To meet the requirements of these two broad categories of users, different types of networks have been designed.
Peer-to-Peer Networks
In a peer-to-peer network, the networked computers act as equal partners, or peers to each other. As peers, each computer can take on the client function or the server function. Individual users control their own resources. They may decide to share certain files with other users. They may also require passwords before they allow others to access their resources.
Client/Server Networks
In a client/server arrangement, network services are located on a dedicated computer called a server, which responds to the requests of clients. The server is a central computer that is continuously available to respond to a client requests for file, print, application, and other services.
Client/Server Networks
The distribution of functions in client/server networks brings substantial advantages, but it also incurs some costs. Although the aggregation of resources on server systems brings greater security, simpler access and coordinated control, introduces a single point of failure into the network.
Networking Standards
The IEEE
The Institute of Electrical and Electronic Engineers (IEEE) has been most active in defining LAN standards. Through its "802" working groups, it has published standards for the most widely implemented LANs. Devices like Network interface cards (NICs) that conform to the IEEE standards permit equipment built and sold by different manufacturers to interoperate on the same LAN.
The ITU
The International Telecommunications Union (ITU) has defined standards for modems (the V.nn series), packet switching networks (X.25), directory services (X.500), electronic messaging (X.400), dialup devices (ISDN), and many other technologies for WANs.
Other Standards
The Electronic Industries Alliance (EIA) supports a large library of technical standards including the definition for serial connections for dial-up modems. The American National Standards Institute (ANSI) contributes standards for local area technologies, including Ethernet and Token Ring. The scope of ANSI standards includes (ASCII), (C, COBOL, and FORTRAN), and (SCSI).
Network Protocols
Protocol Suite
The function of the OSI network model is carried out by the protocols that are active at each layer. When a set of protocols operates in a coordinated way to deliver a number of functions, they are grouped into a protocol suite. A protocol is a controlled sequence of messages exchanged between two or more systems to accomplish a given task.
TCP/IP
The TCP/IP suite of protocols has become the dominant standard for internetworking. TCP/IP represents a set of public standards that specifies how packets of information are exchanged between computers over one or more networks.
TCP/IP
The following protocols function at the application layer of the OSI model:
File Transfer Protocol (FTP) Simple Mail Transport Protocol (SMTP) Domain Name System (DNS)
The following protocols are seen at the transport layer of the OSI model:
Transmission Control Protocol (TCP)
User Datagram Protocol (UDP)
TCP/IP
The following protocols are seen at the network layer of the OSI model:
Internet Protocol (IP) Internet Control Message Protocol (ICMP) Routing Information Protocol (RIP) Open Shortest Path First (OSPF) Address Resolution Protocol (ARP)
IPX/SPX
Internet Packet Exchange/Sequenced Packet Exchange (IPX/SPX) is the protocol suite employed originally by Novell Corporations network operating system, NetWare. It delivers functions similar to the ones included in TCP/IP. In current releases, Novell supports the TCP/IP suite.
AppleTalk
Apple Computer also developed its own proprietary protocol suite to network Macintosh computers. Just as other companies have transitioned to the use of TCP/IP, Apple now fully supports the public networking standards.
LAN Architectures
Ethernet
The Ethernet architecture is the most popular type of LAN link used today. It is based on the 802.3 standard. This specifies that a network that implements the Carrier Sense Multiple Access/Collision Detection (CSMA-CD) access control method must use a baseband transmission over coaxial or twisted-pair cable that is laid out in a bus topology. Standard transfer rates are 10 megabit per second (Mbps), 100 Mbps, or 1000 Mbps.
Ethernet
Currently, 10BASE-T is one of the most popular Ethernet implementations. It uses a star bus topology. Advantages of 10BASE-T is that it is relatively inexpensive and has the ability to upgrade. The disadvantages of 10BASE-T are that the maximum length for a 10BASE-T segment (without repeaters) is only 100 meters (about 328 feet). UTP is more vulnerable to electromagnetic interference (EMI) and attenuation than other cable types. Attenuation is the decreasing of the signal, as it gets further away from the source.
Ethernet
100BASE-X comes in several different flavors. It can be implemented over Category 5 UTP (100BASE-T), over 2-pair Category 5 UTP or STP (100BASE-TX) or as Ethernet over 2-strand fiberoptic cable (100BASE-FX). Advantages are high-speed performance. At 100 Mbps, transfer rates are 10 times that of 10BASE-T. 100BASE-X shares the disadvantages of 10BASET, which are inherent to twisted-pair cabling, such as susceptibility to EMI and attenuation.
Ethernet
1000BASE-T is called Gigabit Ethernet. This architecture supports data transfer rates of 1 gigabit per second (Gbps), which is many times faster than a T-1 line. The greatest advantage of 1000BASE-T is performance. The only disadvantages associated with 1000BASE-T are those common to all UTP networks.
Ethernet
Half duplex allows for only one direction that can be used at a time when data is being transmitted over the lines. Data can only be sent and received at separate times.
Full duplex allows for two simultaneous directions of data flow. A telephone conversation between two people is a good example of how fullduplex transmission occurs.
Token Ring
Token Ring was originally developed by IBM and was designed to be a reliable network architecture based on the token-passing access control method. The Token Ring standards are provided in IEEE 802.5 and referred to as a star-wired ring. The outer appearance of the network design is a star, with computers connecting to a central hub, called a Multistation Access Unit (MSAU).
Token Ring
The first computer that comes online becomes the "hall monitor" and must keep track of how many times each frame circles the ring. It has the responsibility of ensuring that only one token is out on the network at a time. The monitor computer periodically sends a signal called a beacon, which circulates around the ring, as does any other signal. Each computer on the network looks for the beacon. If a computer does not receive the beacon from its Nearest Active Upstream Neighbor (NAUN) when expected, it puts a message on the network that notifies the monitoring computer that the beacon was not received, along with its own address and that of the NAUN that failed to send when expected.