Chapter Two Introduction To Networking at The End of This Session, Student Will Be Able To Know
Chapter Two Introduction To Networking at The End of This Session, Student Will Be Able To Know
Chapter Two Introduction To Networking at The End of This Session, Student Will Be Able To Know
Introduction To Networking
At the end of this session, Student will be able to know:
What is computer network?
What are the advantages and disadvantage of network?
What are the driving force to use data communication and computer
networking
What are the types of network and what the required infrastructure to
implement those networks?
What are types of network topology?
Computer Network
A network is any collection of independent computers that communicate with one
another over a shared network medium.
A network as a group of computers and associated devices that are connected by
communications facilities. A network provides two principle benefits: the ability to
communicate and the ability to share.
– A network supports communication among users in ways that other media
cannot. E-mail, the most popular form of network communication, provides
low-cost, printable correspondence with the capability for forwarding,
acknowledgment, storage, retrieval, and attachments.
– Sharing involves not only information (database records, e-mail, graphics, etc.)
but also resources (applications, printers, modems, disk space, scanners, etc.)
Through its ability to share, a network promotes collaboration
A computer network is a collection of two or more connected computers. When
these computers are joined in a network, people can share files and peripherals
Three forces are driving the evolution of data communications and networking
1. Growth of communication traffic/interchange
— Voice traffic
Reliability
In addition to accuracy of delivery, network reliability measured by frequency of
failure, the time it takes a link to recover from a failure, and the network’s
robustness in catastrophe.
Frequency of failure: all networks fail occasionally. A network that fails
often, however, is little value to a user.
Recovery time of network after failure: how long does it take to restore
service? A network that recovers quickly is more useful than one that does
not.
Catastrophe: network must be protected from catastrophic events such as
fire, earthquake, one protection against unforeseen damage is a reliable
system to back up network software.
Security
Network security issues include protecting data from unauthorized access,
protecting data from damage and development, and implementing policies and
procedures for recovery from breaches and data losses.
Unauthorized access: For the network to be useful, sensitive data must be
protected from unauthorized access. Protection can be accomplished at a
number of levels. At the lowest level are user identification codes and
passwords. At a higher level are encryption techniques (if they are
intercepted by an unauthorized user, they will be unintelligible).
Compiled by: Tadesse O 2013E.C
Page 6
.
Viruses: because a network is accessible from many points, it can be
susceptible to computer viruses. A virus is an illicitly introduced code that
damages the system. A good network is protected from viruses by hardware
and software designed especially for that purpose.
In general WAN
More sophisticated
Expensive technology
Categories of Network:
Network based on management method or how computers behave in a
network can be divided in to two main categories:
Peer-to-peer.
Client/Server – based.
In peer-to-peer networking there are no dedicated servers or hierarchy
among the computers. All of the computers are equal and therefore known as
peers. Normally each computer serves as Client/Server and there is no one
assigned to be an administrator responsible for the entire network. Peer-to-
peer networks are good choices for needs of small organizations where the
users are allocated in the same general area, security is not an issue and the
organization and the network will have limited growth within the
foreseeable future.
Nodes provide and request services
Compiled by: Tadesse O 2013E.C
Page 10
.
User in each node administers resources
No extra investment
Easy to setup
Very weak security
Additional load on nodes
Peer-to-peer network is also called workgroup
No hierarchy among computers Þ all are equal
No administrator responsible for the network
• Low cost
• Simple to configure
• User has full accessibility of the computer
• 10 or less users
• No specialized services required
• Security is not an issue
• Only limited growth in the foreseeable future
Client/Server – based
What is a topology?
A network's topology affects its capabilities. The choice of one topology over
another will have an impact on the:
Compiled by: Tadesse O 2013E.C
Page 15
.
Type of equipment that the network needs
Capabilities of the network
Growth of the network
Way the network is managed
Before computers can share resources or perform other communication tasks they
must be connected. Most networks use cable to connect one computer to another.
However, it is not as simple as just plugging a computer into a cable connecting to
other computers. Different types of cable—combined with different network cards,
network operating systems, and other components—require different types of
arrangements. To work well, a network topology takes planning. For example, a
particular topology can determine not only the type of cable used but also how the
cabling runs through floors, ceilings, and walls. Topology can also determine how
computers communicate on the network. Different topologies require different
communication methods, and these methods have a great influence on the network.
There are four basic types of computer topology: bus, star, ring and mesh.
1. Bus Topology
The bus topology is often referred to as a "linear bus" because the computers
are connected in a straight line. This is the simplest and most common method of
networking computers. Figure 1 shows a typical bus topology. It consists of a
single cable called a trunk (also called a backbone or segment) that connects all of
the computers in the network in a single line.
When sending a signal from one computer on the network to another, network data
in the form of electronic signals is in fact sent to all the computers on the network.
However, only the computer whose address matches the address encoded in the
original signal accepts the information. All other computers reject the data.
Because only one computer at a time can send data on a bus network, the number
of computers attached to the bus will affect network performance. The more
computers there are on a bus, the more computers will be waiting to put data on the
bus and, consequently, the slower the network will be. Computers on a bus either
transmit data to other computers on the network or listen for data from other
computers on the network. They are not responsible for moving data from one
computer to the next. Consequently, if one computer fails, it does not affect the rest
of the network.
1.3 Terminator
To stop the signal from bouncing, a component called a terminator is placed at
each end of the cable to absorb free signals. Absorbing the signal clears the cable
so that other computers can send data.
In a bus topology, if a break in the cable occurs the two ends of the cable at the
break will not have terminators, so the signal will bounce, and all network activity
will stop. This is one of several possible reasons why a network will go "down."
The computers on the network will still be able to function as stand-alone
computers; however, as long as the segment is broken, they will not be able to
communicate with each other or otherwise access shared resources.
2. Star topology
In the star topology, cable segments from each computer are connected to a
centralised component called a hub. Figure 2 shows four computers and a hub
connected in a star topology. Signals are transmitted from the sending computer
through the hub to all computers on the network.
The ring topology connects computers on a single circle of cable. Unlike the bus
topology, there are no terminated ends. The signals travel around the loop in one
direction and pass through each computer, which can act as a repeater to boost the
signal and send it on to the next computer. Figure 3 shows a typical ring topology
with one server and four workstations. The failure of one computer can have an
impact on the entire network.
4. Mesh topology
5. Hybrid topologies
Many working topologies are hybrid combinations of the bus, star, ring, and mesh
topologies. Two of the more common are described below.
The star bus is a combination of the bus and star topologies. In a star-bus topology,
several star topology networks are linked together with linear bus trunks. Figure 5
shows a typical star-bus topology.
If one computer goes down, it will not affect the rest of the network. The other
computers can continue to communicate. If a hub goes down, all computers on that
hub are unable to communicate. If a hub is linked to other hubs, those connections
will be broken as well.
The star ring (sometimes called a star-wired ring) appears similar to the star bus.
Both the star ring and the star bus are centred in a hub that contains the actual ring
or bus. Figure 6 shows a star-ring network. Linear-bus trunks connect the hubs in a
star bus, while the hubs in a star ring are connected in a star pattern by the main
hub.
Until now we have assumed that the word topology is used to refer only to the
physical layout of the network. In fact, we can talk about two kinds of topology:
physical and logical. A network's physical topology is the wire itself. A network's
logical topology is the way it carries signals on the wire. This is an important
distinction that will become clearer in the following discussion of the token ring
topology.
One method of transmitting data around a ring is called token passing. (A token is
a special series of bits that travels around a token-ring network. Each network has
only one token.) The token is passed from computer to computer until it gets to a
computer that has data to send. Figure 7 shows a token ring topology with the
token. The sending computer modifies the token, puts an electronic address on the
data, and sends it around the ring.
The receiving computer returns a message to the sending computer indicating that
the data has been received. After verification, the sending computer creates a new
token and releases it on the network. The token circulates within the ring until a
workstation needs it to send data.
Therefore the token ring network uses a logical ring topology – the token travels
around in a circle from computer to computer. However, the physical topology of a
token ring network is a star – the wires connecting the computers to each other are
connected via a central hub. This is sometimes referred to as a “star-shaped ring”
network.
The token ring avoids a common problem with bus topologies. If there are many
computers on the network a bus will often be busy, seriously affecting network