Understanding Networks II. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.

Slides:



Advertisements
Similar presentations
Networks Terminology and Hardware. Network A network is a group of connected computers that can communicate with each other to share information and equipment,
Advertisements

Computer Networking (Appendix C) Objectives
CHAPTER Practical Token Ring Implementation. Chapter Objectives Give an overview of the Token Ring LAN Describe the characteristics of the Token Ring.
Networks Adapting Computers to Telecommunications Media.
CHAPTER LAN Topology. Chapter Objectives Describe the characteristics of different LAN topologies –Bus, ring, star and mixed topologies Compare and contrast.
Chapter 7 Local Area Networks: The Basics
Internetworking School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 4, Tuesday 1/30/2007)
1 LANs are Subnet Standards Only Physical and Data Link Layer standards Implemented by the NICs:NICs Application Transport Internet LAN Subnet (NIC) Application.
CMPE 80N - Introduction to Networks and the Internet 1 CMPE 80N Winter 2004 Lecture 8 Introduction to Networks and the Internet.
LAN Risanuri Hidayat. LAN-Local Area Network A LAN is a high-speed data network that covers a relatively small geographic area. It typically connects.
1 LAN Topologies, Access methods (Week 1, Wednesday 1/10/2007) © Abdou Illia, Spring 2007.
Core 3: Communication Systems. On any network there are two types of computers present – servers and clients. By definition Client-Server architecture.
Chapter 8 LAN Technologies and Network Topology Direct Point-to-Point Communication Local Area Networks (LANs) LAN Topologies Ethernet Token Ring FDDI.
1 Computer Networks Course: CIS 3003 Fundamental of Information Technology.
Network Topologies An introduction to Network Topologies and the Link Layer.
Networks. Bus Network Terminator‘Workstation’ ‘Client’ ‘Terminal’ ‘Node’ Computer Terminator Backbone Server (optional)
Chapter 4.  Understand network connectivity.  Peer-to-Peer network & Client-Server network  Understand network topology  Star, Bus & Ring topology.
Chapter Five Network Architecture. Chapter Objectives  Describe the basic and hybrid LAN technologies  Describe a variety of enterprise-wide and WAN.
Chapter 20 Networks. 4 Questions that need to be answered concerning networks? –How will each computer be identified? –What kind of wire should you run.
Network Design Essentials
Chapter 5 Networks Communicating and Sharing Resources
NETWORKING COMPONENTS By Cleve Rosser. Hubs allow large numbers of computers to be connected on a single or multiple LAN. Each computer plugs into the.
Chapter 9A Network Basics.
Network Architecture Layout designed and constructed by: Vicki Kertz.
Data Communication & Computer Networks
SIMS-201 Computer Networks. 2 Introduction to Computer Networks Chapter 19 The Local Area Network  Overview.
Chapter 7 Local Area Networks: The Basics. Topics Definition of LAN Primary function, advantage and disadvantage Difference between Client/Server network.
Chapter 8 LAN Architectures Part II: Understanding Internet Access Technologies.
1 Chapter 2: LAN Standards, Physical Connectivity, and Media Access.
Networks LANS,. FastPoll True Questions Answer A for True and B for False A wireless infrastructure network uses a centralized broadcasting device, such.
NETWORK TOPOLOGIES There are three basic configurations used to connect computers they are the  Bus  Ring  Star.
1 LAN Technologies and Network Topology. 2 Direct Point-to-Point Communication.
Basic LAN techniques IN common with all other computer based systems networks require both HARDWARE and SOFTWARE to function. Networks are often explained.
Introduction network Protocol
Network Technologies Chapter 2. Approaches to Network Communication Connection-Oriented –Circuit-switched –A dedicated connection (circuit) is formed.
Understanding Network Architecture Access Methods How Networks Send Data Ethernet Token Ring AppleTalk and ArcNet 1.
Network Hardware and Software. What is a network? A network consists of two or more computers that are linked in order to: share resources (such as printers.
LAN Topologies and Standards Networks and Protocols Prepared by: TGK First Prepared on: Last Modified on: Quality checked by: Copyright 2009 Asia Pacific.
Lesson 3—Networking BASICS1 Networking BASICS Network Design Unit 2 Lesson 3.
Local Area Network Daniel Shin CS 147, Section 3 November 18, 2008.
Logical & Physical Topologies A logical technology is how the hosts are connected logically example token Ring can be laid out in a physical star but.
Network Topologies Lecturer: Hyder R. Hamandi. Network Topologies Physical topologies describe how the cables are run in the network A topology is a way.
S305 – Network Infrastructure Chapter 6 Local Area Network.
 LANs – A Definition - A local area network (LAN) is a computer network covering a small physical area, like a home, office, or small group of buildings,
Networks and Protocols CE Week 2b. Topologies, CSMA/CD, CSMA/CA.
Day10 LAN. Why? Allow more than one machine to share –Resources –Internet connectivity –Information.
5 SECTION A 1 Network Building Blocks  Network Classifications  LAN Standards  Network Devices  Clients, Servers, and Peers  Physical Topology  Network.
Network Concepts Topologies
NETWORK HARDWARE CABLES NETWORK INTERFACE CARD (NIC)
Summary - Part 2 - Objectives The purpose of this basic IP technology training is to explain video over IP network. This training describes how video can.
Understand the Components of a Network Mrs. Whaley.
Chapter 5 Network Architecture. Physical Topologies Bus Ring Star.
Lesson 4—Networking BASICS1 Networking BASICS Network Architectures Unit 2 Lesson 4.
IEEE 802.X Standards The Institute of Electrical and Electronics Engineers (IEEE) has developed a series of networking standards to ensure that networking.
Local Area Networks: Monil Adhikari. Primary Function of a LAN File serving – large storage disk drive acts as a central storage repository Print serving.
Internetworking School of Business Eastern Illinois University © Abdou Illia, Spring 2016 (February 3, 2016)
Simple LAN Topologies  Terminators stop signals after they have reached their destination  Signal bounce –Phenomenon in which signals travel endlessly.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 18 PCs on a Network.
CHAPTER 8 Communication and Network Copyright © Cengage Learning. All rights reserved.
COMPUTER NETWORKS Lecture-8 Husnain Sherazi. Review Lecture 7  Shared Communication Channel  Locality of Reference Principle  LAN Topologies – Star.
CN2668 Routers and Switches Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
Chapter Network Topologies and Related Protocols © Nanda Ganesan, Ph.D.
SIMS-201 Computer Networks.
Chapter Objectives In this chapter, you will learn:
LAN Risanuri Hidayat.
Computer Networks.
Chapter 5 Networks Communicating and Sharing Resources
Review of Important Networking Concepts K. PALANIVEL Systems Analyst, Computer Centre Pondicherry University, Puducherry – LECTURE 2 COMS 525:
SIMS-201 Computer Networks.
Presentation transcript:

Understanding Networks II

Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token Ring, FDDI, and wireless Use the OSI model to understand networking Learn how network computers and servers are addressed

Network Architecture Overview Network architecture is the overall design of a network, including how devices and components are connected, how devices and components communicate, and the network protocols needed to establish reliable communication among nodes on the network.

Network Architecture Overview A node is any device that can be accessed by a computer on a LAN, such as a computer, server, or printer. Physical topology is the physical arrangement or shape in which devices on a LAN are connected to each other.

How NICs Work Typically, an internal NIC plugs into a motherboard expansion slot. An individual NIC can be designed to support Ethernet, Token Ring, FDDI, or wireless architectures, but a single card will not support multiple architectures. The NIC must convert the data it is transmitting into a signal that is in a form that is appropriate for the network. The component on the card responsible for this signal conversion is called the transceiver.

How Ethernet Controls Data Traffic An Ethernet network is a passive network, meaning that the network just sits there and waits for a computer to use it. A computer that wants to send packets over Ethernet first listens on the network for silence. If it hears nothing, it begins to transmit. As it transmits, it also listens.

How Ethernet Controls Data Traffic (Continued) If it hears something other than its own data being transmitted, it stops transmitting and sends out a signal indicating that there has been a collision, which occurs when two computers attempt to send data at the same time. A collision can cause packets that were just sent to be corrupted. Each computer waits for a random amount of time and then tries to transmit again, first listening for silence.

How Ethernet Controls Data Traffic (Continued) This type of network technology is called a contention-based system because each computer must contend for an opportunity to transmit on the network. Computers using Ethernet gain access to the network using the CSMA/CD (Carrier Sense Multiple Access with Collision Detection) method. Another method that can be used by a network technology to control collisions is CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance).

Ethernet Hardware Three variations of Ethernet are available, primarily distinguished from one another by speed: 10-Mbps Ethernet, Fast Ethernet, and Gigabit Ethernet. A hub is a network device that can be used to connect devices that use a BNC or RJ-45 connector. A hub, like the one shown in Figure 5-20, is generally inexpensive and is best suited for a small, simple network. These devices can include computers, servers, or printers.

Ethernet Hardware (Continued) Hubs are easy to configure because they broadcast data packets to every device at once. A switch is used to connect computers on a LAN. A switch reads the destination address at the beginning of a data packet and sends the packet only to the destination computer. Attenuation occurs when signals are weakened due to being transmitted over long distances on a network.

Ethernet Hardware (Continued) A repeater is a device that amplifies signals on a network. There are two kinds of repeaters. An amplifier repeater simply amplifies all incoming signals. A signal-regenerating repeater reads the signal and then creates an exact duplicate of the original signal before sending it on.

Physical Topology A bus topology connects each node in a line and does not include a centralized point of connection; cables just stretch from one computer to the next one, and to the next, and so on. A star topology connects all nodes to a centralized hub or switch.

Physical Topology (Continued)

Wireless LAN Wireless LAN (WLAN) technology, as the name implies, uses radio waves or infrared light instead of cables or wires to connect computers or other devices. Connections are made using a wireless NIC, which includes an antenna to send and receive signals. Wireless devices can communicate directly, or they can connect to a LAN by way of a wireless access point (AP).

Wireless LAN (Continued) Access points are placed so that nodes can access at least on one access point from anywhere in the covered area. The first IEEE standard that outlined wireless LAN specifications was IEEE , published in Most current WLAN devices operate under the 1999 IEEE b standard. This standard is also called Wi-Fi (Wireless Fidelity).

Token Ring and FDDI Token Ring is an older LAN technology developed by IBM that transmits data at 4 Mbps or 16 Mbps. A Token Ring network is physically arranged using a star topology, because each node connects to a centralized device. The centralized device to which the network nodes connect is not a hub or switch, as used in Ethernet networks, but is called a Controlled Access Unit (CAU), a Multistation Access Unit (MSAU or sometimes just MAU), or a Smart Multistation Access Unit (SMAU).

Token Ring and FDDI (Continued) A token is a special series of bits used to control which device transmits data on the network. Because it has a physical star topology and a logical ring topology, a Token Ring network is sometimes said to have a star-wired ring topology. Token Ring can also use another type of connector that has no “male” or “female” version, known as a Universal Data Connector (UDC) or an IBM Data Connector (IDC).

Token Ring and FDDI (Continued) Fiber Distributed Data Interface (FDDI) is a type of network that also involves a token that travels in a ring. With FDDI, data frames travel on the ring without the token, and multiple nodes can have data on the ring at the same time.