Documente Academic
Documente Profesional
Documente Cultură
Network Definition
l A network can be defined as two or more computers connected
together in such a way that they can share resources.
l The purpose of a network is to share resources.
Advantages of networking
l Connectivity and Communication
l Data Sharing
l Hardware Sharing
l Internet Access
l Internet Access Sharing
l Data Security and Management
l Performance Enhancement and Balancing
l Entertainment
Wired technologies
Network Cables
Category 5 cable
Category 5 cable (Cat 5 or Chady) is a twisted pair high signal integrity cable
type. This type of cable is used in structured cabling for computer networks
such as Ethernet and ATM (Asynchronous Transfer Mode), and is also used
to carry many other signals such as telephony and video. Most Category 5
cables are unshielded (UTP), relying on the twisted pair design for noise
rejection. Category 5 has been superseded by the Category 5e specification.
Hub
An Ethernet hub, active hub, network hub, repeater hub or hub is a device
for connecting multiple twisted pair or fiber optic Ethernet devices together
and making them act as a single network segment.
When configuring it, you connect an RJ-45 cable from the network card of a
computer to one port of the hub.
In most cases for a home-based or a small business network, you may not
need a hub.
Like a hub, a router is another type of device that acts as the central point
among computers and other devices that are part of a network. Here is an
example of a wired router:
A router functions a little differently than a hub. In fact, a router can be
considered a little "intelligent" than the hub.
Like a hub, the computers and other devices are connected to a router using
network cables. To make this possible, a router is equipped with holes, called
ports, in the back. Here is an example:
Based on advances in the previous years from IEEE and other organizations
or research companies, there are wireless routers. With this type, the
computers and devices connect to the router using microwaves (no physical
cable).
In our (small) network, we wish to use a wireless router. Therefore, this is the
kind we suggest you purchase. You can purchase a wireless router from a
computer store or on the internet (http://www.tigerdirect.com,
http://www.3com.com, http://www.provantage.com, etc). You can also buy a
wireless router from a computer store.
Repeaters
Bridges
A network bridge connects multiple network segments at the data link layer
(layer 2) of the OSI model. Bridges broadcast to all ports except the port on
which the broadcast was received. However, bridges do not promiscuously
copy traffic to all ports, as hubs do, but learn which MAC addresses are
reachable through specific ports. Once the bridge associates a port and an
address, it will send traffic for that address to that port only.
Switches
A network switch is a device that forwards and filters OSI layer 2 datagrams
(chunks of data communication) between ports (connected cables) based on
the MAC addresses in the packets.[9] A switch is distinct from a hub in that it
only forwards the frames to the ports involved in the communication rather
than all ports connected. A switch breaks the collision domain but represents
itself as a broadcast domain. Switches make forwarding decisions of frames
on the basis of MAC addresses. A switch normally has numerous ports,
facilitating a star topology for devices, and cascading additional switches.[10]
Some switches are capable of routing based on Layer 3 addressing or
additional logical levels; these are called multi-layer switches. The term
switch is used loosely in marketing to encompass devices including routers
and bridges, as well as devices that may distribute traffic on load or by
application content (e.g., a Web URL identifier).
The term commonly refers to a multi-port network bridge that processes and
routes data at the data link layer (layer 2) of the OSI model. Switches that
additionally process data at the network layer (Layer 3) and above are often
referred to as Layer 3 switches or multilayer switches.
Firewalls
Firewalls are the most important aspect of a network with respect to security.
A firewalled system does not need every interaction or data transfer
monitored by a human, as automated processes can be set up to assist in
rejecting access requests from unsafe sources, and allowing actions from
recognized ones. The vital role firewalls play in network security grows in
parallel with the constant increase in 'cyber' attacks for the purpose of
stealing/corrupting data, planting viruses, etc.
Cabling
What is Network Cabling?
Cable is the medium through which information usually moves from one
network device to another. There are several types of cable which are
commonly used with LANs. In some cases, a network will utilize only one
type of cable, other networks will use a variety of cable types. The type of
cable chosen for a network is related to the network's topology, protocol, and
size. Understanding the characteristics of different types of cable and how
they relate to other aspects of a network is necessary for the development of a
successful network.
The TIA/EIA 568-A standard which was ratified in 1995, was replaced by the
TIA/EIA 568-B standard in 2002 and has been updated since. Both standards
define the T-568A and T-568B pin-outs for using Unshielded Twisted Pair
cable and RJ-45 connectors for Ethernet connectivity. The standards and
pin-out specification appear to be related and interchangeable, but are not
the same and should not be used interchangeably.
1. Pull the cable off the reel to the desired length and cut. If you are
pulling cables through holes, its easier to attach the RJ-45 plugs
after the cable is pulled. The total length of wire segments
between a PC and a hub or between two PC's cannot exceed
100 Meters (328 feet) for 100BASE-TX and 300 Meters for
10BASE-T.
2. Start on one end and strip the cable jacket off (about 1") using a
stripper or a knife. Be extra careful not to nick the wires,
otherwise you will need to start over.
3. Spread, untwist the pairs, and arrange the wires in the order of
the desired cable end. Flatten the end between your thumb and
forefinger. Trim the ends of the wires so they are even with one
another, leaving only 1/2" in wire length. If it is longer than 1/2" it
will be out-of-spec and susceptible to crosstalk. Flatten and
insure there are no spaces between wires.
4. Hold the RJ-45 plug with the clip facing down or away from you.
Push the wires firmly into the plug. Inspect each wire is flat even
at the front of the plug. Check the order of the wires. Double
check again. Check that the jacket is fitted right against the stop
of the plug. Carefully hold the wire and firmly crimp the RJ-45
with the crimper.
5. Check the color orientation, check that the crimped connection is
not about to come apart, and check to see if the wires are flat
against the front of the plug. If even one of these are incorrect,
you will have to start over. Test the Ethernet cable.
1. Click the connection device that you want to use for this connection (a
parallel or serial port, or an infrared port), and then click Next.
2. Grant access to the users who are allowed to connect by selecting the
appropriate check boxes, and then click Next.
3. Click Finish to end the configuration process.
Troubleshooting
To view a video about how to configure the host computer for Internet
Connection Sharing, click the Play button (
Collapse this imageExpand this image
http://support.microsoft.com/servicedesks/ShowMeHow/3061261.asx
Note To view this video, you must use Windows Media Player 7.0 or later.
Note You can also assign a unique static IP address in the range of
192.168.0.2 to 192.168.0.254. For example, you can assign the
following static IP address, subnet mask, and default gateway:
8. IP Address 192.168.0.2
9. Subnet mask 255.255.255.0
10. Default gateway 192.168.0.1
11. In the Local Area Connection Properties dialog box, click OK.
12. Quit Control Panel.
To view a video about how to confirm the LAN adapter IP configuration, click
the Play button (
Collapse this imageExpand this image
) on the following Windows Media Player viewer:
http://support.microsoft.com/servicedesks/ShowMeHow/3061262.asx
Note To view this video, you must use Windows Media Player 7.0 or later.
When you now start Microsoft Internet Explorer, the client computer will try
to connect to the Internet by using the host computer's shared Internet
connection.
To view a video of how to configure the client computer to use the shared
Internet connection, click the Play button (
Collapse this imageExpand this image
http://support.microsoft.com/servicedesks/ShowMeHow/3061263.asx
Note To view this video, you must use Windows Media Player 7.0 or later.
· IP address conflict
Each computer on the LAN must have a unique IP address. If more
than one computer has the same IP address, an IP conflict occurs, and
one of the network adapters turns off until the conflict is resolved. To
resolve this conflict, configure the client computer to automatically
obtain an IP address, or assign it a unique IP address.
· Loss of network connectivity
If your network is configured with a different IP address range than
Internet Connection Sharing uses, you will lose network connectivity
with the host computer. To resolve this issue, configure the client
computers to automatically obtain an IP address, or assign each client
computer a unique IP address in the range of 192.168.0.2 to
192.168.0.254.
Network topology
l A topology is a way of “laying out” the network. Topologies can
be either physical or logical.
l Physical topologies describe how the cables are run.
l Logical topologies describe how the network messages travel
l Bus (can be both logical and physical)
l Star (physical only)
l Ring (can be both logical and physical)
l Mesh (can be both logical and physical)
Bus
l A bus is the simplest physical topology. It consists of a single
cable that runs to every workstation
l This topology uses the least amount of cabling, but also covers
the shortest amount of distance.
l Each computer shares the same data and address path. With a
logical bus topology, messages pass through the trunk, and each
workstation checks to see if the message is addressed to itself. If
the address of the message matches the workstation’s address,
the network adapter copies the message to the card’s on-board
memory.
l it is difficult to add a workstation
l have to completely reroute the cable and possibly run two
additional lengths of it.
l if any one of the cables breaks, the entire network is disrupted.
Therefore, it is very expensive to maintain.
Advantages
• Simple and inexpensive to install, very limited cabling is
required.
• Easy to include additional stations without disruption of the
network.
Disadvantages
• The whole network is dependant on a single cable, hence if the
cable fails the whole system fails too
• Difficult to locate cable failure.
• Network performance is directly related to traffic.
• Not meant to be used as a stand-alone solution in a large
building.
• Terminators are required at both ends of the backbone cable
along with T-Junctions at each work station
Star Topology
l A physical star topology branches each network device off a
central device called a hub, making it very easy to add a new
workstation.
l Also, if any workstation goes down it does not affect the entire
network. (But, as you might expect, if the central device goes
down, the entire network goes down.)
l Some types of Ethernet and ARCNet use a physical star
topology. Figure 8.7 gives an example of the organization of the
star network.
l Star topologies are easy to install. A cable is run from each
workstation to the hub. The hub is placed in a central location in
the office.
l Star topologies are more expensive to install than bus networks,
because there are several more cables that need to be installed,
plus the cost of the hubs that are needed.
Advantages
• If one cable fails, other stations are not effected
• Consistent performance even when the network is heavilly
used
• Reliable
• No problem of data collision as each station has its own
network
• New stations may be included with the addition of new cables
• Easy to install and wire.
• No disruptions to the network then connecting or removing
devices.
• Easy to detect faults and to remove parts.
Disadvantages
• Generally, costly to install due to the amount of cabling
required and hub(s).
• If the hub or concentrator fails, nodes attached are disabled
.
Ring
l Each computer connects to two other computers, joining them in
a circle creating a unidirectional path where messages move
workstation to workstation.
l Each entity participating in the ring reads a message, then
regenerates it and hands it to its neighbor on a different network
cable.
l The ring makes it difficult to add new computers.
l Unlike a star topology network, the ring topology network will go
down if one entity is removed from the ring.
l Physical ring topology systems don’t exist much anymore, mainly
because the hardware involved was fairly expensive and the
fault tolerance was very low.
Advantages
• No collision is possible due to the token system.
• Performance is effected if heavy load is encountered.
Disadvantages
• Network is disrupted if additional stations are added (the system
must be updated in terms of new addresses being added).
• A break in the network will stop the system.
Mesh
l The mesh topology is the simplest logical topology in terms of
data flow, but it is the most complex in terms of physical design.
l In this physical topology, each device is connected to every other
device
l This topology is rarely found in LANs, mainly because of the
complexity of the cabling.
l If there are x computers, there will be (x × (x–1)) ÷ 2 cables in
the network. For example, if you have five computers in a mesh
network, it will use 5 × (5 – 1) ÷ 2, which equals 10 cables. This
complexity is compounded when you add another workstation.
l For example, your five-computer, 10-cable network will jump to
15 cables just by adding one more computer. Imagine how the
person doing the cabling would feel if you told them you had to
cable 50 computers in a mesh network—they’d have to come up
with 50 × (50 – 1) ÷ 2 = 1225 cables!
l Because of its design, the physical mesh topology is very
expensive to install and maintain.
l Cables must be run from each device to every other device. The
advantage you gain from it is its high fault tolerance.
l With a logical mesh topology, however, there will always be a
way of getting the data from source to destination.
l It may not be able to take the direct route, but it can take an
alternate, indirect route. It is for this reason that the mesh
topology is still found in WANs to connect multiple sites across
WAN links. It uses devices called routers to search multiple
routes through the mesh and determine the best path.
l However, the mesh topology does become inefficient with five or
more entities.