Fundnet
From Mycomputer Notes
(→Network Protocols) |
(→Network Protocols) |
||
Line 151: | Line 151: | ||
* CCITT | * CCITT | ||
- | {| | + | {| width="100%" border="1" |
- | + | | <span style="font-size:9.0pt">LAN</span> | |
- | |- | + | | <span style="font-size:9.0pt">WAN</span> |
- | | | + | | <span style="font-size:9.0pt">MAN</span> |
- | |- | + | | <span style="font-size:9.0pt">SAN</span> |
- | | | + | |- |
- | |- | + | | <span style="font-size:9.0pt">LAN allow business to locally shared computer files, printers efficiently and make internal communications possible.</span> |
- | | | + | | <span style="font-size:9.0pt">WAN interconnects LAN. WAN provide instant communications across large geographical areas to computer or file servers</span> |
+ | | <span style="font-size:9.0pt">A MAN usually consist of two or more LAN in a common geographic area. A service provider is used to connect the LAN sites using private communication lines.</span> | ||
+ | | <span style="font-size:9.0pt">SAN is a dedicated high performance network used to moved data between servers and storage resources. <br /> Separate network therefore it avoids any traffic conflict between client and servers.</span> | ||
+ | |- | ||
+ | | | ||
+ | <span style="font-size:9.0pt">LAN Technologies:</span> | ||
+ | |||
+ | * <span style="font-size:9.0pt">Ethernet </span> | ||
+ | * <span style="font-size:9.0pt">Token Ring </span> | ||
+ | * <span style="font-size:9.0pt">FDDI</span> | ||
+ | | | ||
+ | <span style="font-size:9.0pt">WAN Technologies:</span> | ||
+ | |||
+ | * <span style="font-size:9.0pt">Modem </span> | ||
+ | * <span style="font-size:9.0pt">ISDN, </span> | ||
+ | * <span style="font-size:9.0pt">DSL </span> | ||
+ | * <span style="font-size:9.0pt">T1, E1. T3, E3</span> | ||
+ | | | ||
+ | | | ||
+ | <span style="font-size:9.0pt">SAN Offer the following features:</span> | ||
+ | |||
+ | * <span style="font-size:9.0pt">Performance </span> | ||
+ | * <span style="font-size:9.0pt">Availability </span> | ||
+ | * <span style="font-size:9.0pt">Scalability</span> | ||
+ | |- | ||
+ | | | ||
+ | <span style="font-size:9.0pt">LAN are designed to:</span> | ||
+ | |||
+ | * <span style="font-size:9.0pt">Operate within a limited geographic area. </span> | ||
+ | * <span style="font-size:9.0pt">Allow multiple access to high bandwith media. </span> | ||
+ | * <span style="font-size:9.0pt">Control the network privately under local administration. </span> | ||
+ | * <span style="font-size:9.0pt">Provide full time connectivity to local services. </span> | ||
+ | * <span style="font-size:9.0pt">Connect physically adjacent devices.</span> | ||
+ | | | ||
+ | <span style="font-size:9.0pt">WAN are designed to:</span> | ||
+ | |||
+ | * <span style="font-size:9.0pt">Operate over a large geographical area. </span> | ||
+ | * <span style="font-size:9.0pt">Allow access over serial interfaces operating at lower speeds. </span> | ||
+ | * <span style="font-size:9.0pt">Provide full-time and part time connectivity. </span> | ||
+ | * <span style="font-size:9.0pt">Connect devices seperated over a wide, even global area</span> | ||
+ | | | ||
+ | | | ||
|} | |} | ||
=Bandwith= | =Bandwith= | ||
=Networking Models= | =Networking Models= |
Revision as of 00:41, 3 April 2006
In thi chapters will introduced some terminology used by networking professionals and various types of computer networks. It also introduces an explanation on how standards ensure greater compatibility and interoperability among various types of computer netwroks. It also describes the OSI Model and the basic fonctions thtat takes place at each layer of the OSI Model.
Contents |
Networking Terminology
Data networks developed as a result of business applications that were written for microcomputers. The microcomputers were not connected so there was no efficient way to share data among them. It was not efficient or cost-effective for businesses to use floppy disks to share data.
Businesses needed a solution that would successfully address the following three problems:
- How to avoid duplication of equipment and resources
- How to communicate efficiently
- How to set up and manage a network
Networking Devices
- Networking devices
- Equipement that connect directly to a network segment. These devices are borken into two classifications.
End-User devices:
- Computers, Printers, Scanners and other deevices that provide services to the user. Devices that connect end-user to the network.
Network devices:
- All devices that connect the end-user devices together to allow them to communicate. Network devices are used to extend cable connections, concentrate connections, convert data formats and manage data transfers (i.e repeaters, hubs, switches and routers)
Repeaters:
- Layer 1 Devices on the OSI Referance Model.
- Regenerate adn retime network signals
- Single port "IN" & Single port "OUT"
Hub:
- Regenerate adn retime network signals
- Common connection point for device in the LAN
- Connects segments of a LAN
- Multiports (When a packet arrives at one port, it is copied to the other ports so that all the LAN segments
can see all the packets.)
- Also known as Multiport Repeaters
NIC:
- Layer 2 Devices because of the MAC Address (Media Access Control)
- Controls the Access of the host to the medium (the copper wire)
Bridges:
- Layer 2 devices
- Designed to create 2 or more LAN segments (seperate Collision Domains)
- Filter trafffic on the LAN (Filter frames)
- Keeps Track of which MAC addresses are on each side.
- Learned about devices by examinning MAC addresses.
- Maintain MAC Address Tables
- Broadcast
- Is a data packet that is sent to all nodes on a network.
- Broadcast Domain
- All the devices connected to a network that receives the data packet broadcast by a
node to all other nodes on the same network.
Bridges always foward broadcast because thy can not learn the broadcast MAC address of FF.FF.FF.FF.FF.FF; therefore all segments in a bridged environnement are considered to be in the same Broadcast Domain.
Swtiches:
- Another Layer 2 device
- Like Bridges they connect LAN segments
- Use a table of MAC addresses to determine the segment of which a frame needs to be transmitted and reduce traffic
- Foward and flood traffice based on MAC addresses.
- Each switch port is like its own Bridge
- Each host connect to the switch port has the full bandwith of the medium. This process is called microsegmentation.
- Microsegmentation
- the creation of private or dedicated segments -one host per segment. Each host does not have to compete for the medium banthwith with other host, so it has the full bandwith of the medium.
Routers:
- Internetworking device that passes data packets between networks based on Layer 3 addresses.
- Makes decisions regarding the best path for delivery of data on the network.
- Examing incoming packets.
- Choose the best path for the packets.
- Switches the packets to the proper outgoing network.
- Routers connect different Layer 2 technologies such as Ethernet, Token Ring & FDDI
Networking Topology
Network topology defines how computers, printers, network devices and other devices are connected. The topology describes the layout of the wire and devices as well as the paths used by data transmissions.
A topology can be both Physical and Logical.
- Physical Topology: physical layout of the wire media
- Logical Topology:how the host access the media to sent data
Common Physical Topologies:
- Bus Topology a.k.a linear topology
- Connects all the devices using a single backbone cable. This cable proceed from computer to the next like a bus line.
- The main cable segment must end with a terminator.
- The terminator absorbs the signal when the it reaches the end.
- Star and Extended Topologies
- Each host in the network is connected to the central device with its own cable.
Advantage Disadvantage
- When a cable has a problem only one host is affected.
- The rest of the Network remains operational.
- Central point is desirable for security or restricted acces.
- Cost more to implement.
- If the central device fails, the whole network fails.
- An extended star topology links individual stars together by connecting the hubs or switches.
- Ring Topology
- Host are connected in the form of a ring or cirlce.
- One host to the next and the last host to the first.
- This creates a physical ring of cable
- Hierarchical Topology
- Similar to an extended star. However, instead of linking the hubs or switches together, the system is linked to a computer that controls the traffic on the topology.
- Full Mesh
- Connects all devices (nodes) to each other for redudancy and fault tolerance. Usually implemented in WAN between routers.
Advantage Disadvantage
- Every node is physically connected to every other node creating redundant connection.
- Other.
- Other.
- For an small amount of nodes, the amount of media for the links and the number of the connections becomes overwhelming.
- Very expensive & difficult to implement.
- Parial Mesh
- At least one device maintains multiple connections to others with being fully meshed.
Partial mesh still provides redundancy by having several alternatives routes.
The logical topology of a network determines how the hosts communicate across the medium. The two most common types of logical topologies are broadcast and token passing.
- Broadcast (each host sends its data to all other host on the network medium, no order to follow, first come first serve)
- Token passing (electronic token is passed sequentially to each host. When that host can send data on the network. if the host has not data to sent on the network is passes the token to the next host)
Network Protocols
A Protocol is a formal set of rules and conventions that describes a particular aspects of how devices on a network communicate. Protocols determine the format, timing, sequencing and error control in data communication.
Protocols control all aspects of data communications:
- How the physical network is built.
- How the computers connect to the network.
- How the data is formatted for tranmission .
- How the data is sent.
- How to deal with errors.
These network rules are governed by different organizations & committees
- IEEE
- ANSI
- TIA
- EIA
- ITU
- CCITT
LAN | WAN | MAN | SAN |
LAN allow business to locally shared computer files, printers efficiently and make internal communications possible. | WAN interconnects LAN. WAN provide instant communications across large geographical areas to computer or file servers | A MAN usually consist of two or more LAN in a common geographic area. A service provider is used to connect the LAN sites using private communication lines. | SAN is a dedicated high performance network used to moved data between servers and storage resources. Separate network therefore it avoids any traffic conflict between client and servers. |
LAN Technologies:
|
WAN Technologies:
|
SAN Offer the following features:
| |
LAN are designed to:
|
WAN are designed to:
|