Chapter 5 - Networks

Published on January 2017 | Categories: Documents | Downloads: 28 | Comments: 0 | Views: 178
of 12
Download PDF   Embed   Report

Comments

Content

CHAPTER 5 – NETWORKS
1. Server Computer (Server) – The remote computer that serves the
website; any computer that is running a sharing program
Examples:
 File Server – Servers that provide files to the users on the
network
 Print Server – Servers that hosts printing services for the
users on the network
2. Dedicated Server – A server that is assigned to provide specific
applications or services for the network and nothing else. They
require fewer resources that a non-dedicated server, and usually
have a beneficial impact on network performance.
Example:
 Web Server
 Print Server
 File Server
3. Non-Dedicated Server – Servers that are assigned to provide one
or more network services and local access. They can be used to
direct network traffic and perform administrative actions and/or
as a front-end for the administrator to work with other
applications o services or perform services for more than one
network.
Example:
 A server that hosts file access, printing and is also a
workstation
4. Web Server – Stores the files that make up a website; uses server
programs to store and share data
Example:
 Apache HTTP Server
 Internet Information Server
5. Web Browser – Asks a web server to share the web page files and
displays them.
6. Workstation/Client Computers– The computer that requests the data
from the network. This is the computer that the network users use
to do their work.

1

7. Resource – Anything that one computer might share with another.
8. Network Interface Controller (NIC) – Breaks files into smaller
data units called frames to send across the network and reassembles the frames it receives into whole files
9. Half-Duplex Communication – Either the receiver or the sender can
transmit data at any given time
10. Full-Duplex Communication – A computer can send and receive data
simultaneously. This has advantage on performance than halfduplex.
11. Topology – describes the way that computers connect to each
other in the network

a. Bus Topology – computers connect to the network via a main
line called a bus cable
b. Ring Topology – all computers in the network attach to a
central ring of cable
c. Star Topology – computers on the network connect to a
central wiring point (switch). This is the most common
topology.
d. Mesh Topology – each computer has a dedicated line to each
computer

2

e. Hybrid Topology – combined aspects of the other topologies
to capitalize on their strengths and minimize their
weakness.
Example: Star Bus Topology

SWITCH
ROUTER

12. Logical Topology – The “Blueprint” of the network; How the
network is laid out on a paper
13. Physical Topology – Describes the computer network, complete,
with wires crawling physically (behind the walls, etc.)
14. Packet – Parts of the frames
15. Media Access Control (MAC) Address – An address unique to a
single NIC; represented by a Hexadecimal (48-Bits Long or 12
characters)
Hexadecimal is the shorthand for representing Binary Numbers






Frames Contain the MAC Address of the NIC to which data is being
sent
Frames have the MAC Address of the network card that sent the
data
Frames contains the data
Frames contains a data check called CRC to verify that the
received data is in good order

16. Cyclic Redundancy Check (CRC) – A clever mathematical algorithm
used to verify data sent over the network
17. Ethernet – A series of standards written by DEC, Intel and Xerox
that defines everything necessary to get data from one computer
to another
3

Versions
a. 10 Base T – 10 Mbps
b. 100 Base T – 100 Mbps
c. 1000 Base T – 1000 Mbps (Gigabit Ethernet)
*All versions of the Ethernet use star bus topology and is
connected using a UTP Cable.

18. Unshielded Twisted Pair (UTP) Cable – The cable used for general
networking
19. Shielded Twisted Pair (STP) Cable – The type of networking cable
used for EMI (Electro Magnetic Interference)-Sensitive Areas
20. Coaxial Cable/Coax – A type of cable that contains a center
conductor made of copper surrounded by a plastic jacket with a
braided shield over it. The thicker the copper, the farther a
signal can travel
Coax RG Types
RG #

RG-6

POPULAR NAME

ETHERNET
IMPLEMENTAT
ION
N/A

Solid Copper

10Base5

Solid Copper
Solid Copper
Stranded
Copper
Slid Copper

RG-8

Satellite/Cable
TV, Cable Modems
Thicknet

RG-58 U
RG-58 AU

N/A
Thinnet

None
10Base2

RG-59

Cable Television

N/A

TYPE OF CABLE

MAX
SEGMENT
DISTANCE

500
Meters
185
Meters

*Coax (in Ethernet) has been replaced by twisted pair cabling
like CAT5e, etc.
*RG-58 U is used mostly for two-way communication systems like
WLAN antennas
*Thicknet id highly inflexible and needs to use a connector
called a vampire tap which sinks into the cable, making the
connection with the inner conductor, and the other end connecting
to a 15-pin DIX connector
*Thinnet uses BNC connector to attach to a T-shaped connector
that attached to the workstation. The other side of the T-shaped
connector would either continue to another thinnet segment or be
capped with a terminator
4

*F-Connector is used for televisions

21. Segment – The connection between a computer and a switch (100
meters or less for most cables)
22. CAT Levels

23. Registered Jack (RJ)- A standardized physical network interface
for connecting telecommunications or data.
Popular Types of RJ
a. RJ11 – Connects to a telephone line
b. RJ45 – Standard for UTP Connections
Standards for connecting RJ45 to the UTP Cable
a. TIA/EIA 586A or T586A
b. TIA/EIA 586B or T586B (commonly used)

Types of Cabling
a. Plenum – Used in plenum spaces or high-heat areas
b. PVC Cabling – Used by standard network cables
5

24. Fiber-Optic – consists of a thin, flexible glass or plastic
fiber surrounded by a rubberized outer coating. The transmission
speed is from 100Mbps to 10Gbps and can extend several miles. The
light is “guided” down the center of the fiber called the core.
The core is surrounded by an optical material called the cladding
that traps the light in the core using an optical technique
called total internal reflection.
*The core and cladding are usually made of ultra-pure glass. The
fiber is coated with a protective plastic covering called the
primary buffer coating that protects it from moisture and other
damage. The outside covering is called a jacket.

CORE

BUFFER (JACKET)
COATING
CLADDING

Types of Fiber-Optic Cable
a. Single-Mode (core to cladding diameter ratio is 9µm:125 µm)
Has small diametric core that allows only one mode of
light to propagate. The number of light reflections
created as light passes through the core decreases,
lowering attenuation and creating the ability for the
signal to travel faster, further. This is used in
long-distance, higher bandwidth communication.
Can transmit 10Gbps for up to 40 Kilometers
b. Multi-Mode (core to cladding diameter ratio is 50µm:125µm or
62.5µm:125µm)
Has a large diametric core that allows multiple modes
of light to propagate. The number of light reflections
created as the light passes through the core
increases, creating the ability for more data to pass
through at a given time.
Because of the high dispersion and high attenuation
rate, the quality of signal is reduced over long
distances. This is used in short distance data and
audio/video applications in LANs
Can transmit 10Gbps for up to 550 meters depending on
the standard used

6

25. Network Protocols – A software that takes the incoming data
received by the network card, keeps it organized, sends it to the
application that needs it, takes outgoing data from the
application and hands it to the NIC to be sent out to the network
Examples:
a. Network Basic Input/output System (NETBIOS/NETBEUI)
 Developed during 1980s
 NETBIOS handled naming conventions
 NETBEUI Chopped the data for delivery via frames
 Relied on individual computers to send out frames to the
MAC address “FF-FF-FF-FF-FF-FF” which simply means
everybody (Broadcasting)
 Consumes a lot of bandwidth due to broadcasting
b. Transmission Control Protocol/Internet Protocol (TCP/IP)
 Developed by ARPANET of the US Department of Defense
 Number of protocols that work together
 TCP gets the data between computers
 IP handles the addressing scheme
 An IP Address is used instead of computer names
o Is the unique identification number of computer in
the network
o Consists of four sets of eight binary numbers
(octets), with each set separated by a period
o The numbers ranges from 0 to 255 and is called a
dotted decimal notation (ex. 192.168.2.1)
26. Node – Is any device that has a network connection
27. Local Area Network (LAN) – A group of computers that are located
physically close to each other
28. Personal Area Network (PAN) – A very small-scale network
designed around one person.
Example:
Bluetooth technology
29. Wireless Personal Area Network (WPAN) – Wireless version of PAN
30. Piconet – Is the network that is connected using a wireless
Bluetooth connection. A piconet have a 3-bit address space which
limits the maximum size of a piconet to 8 devices (23 = 8); 1
master and 7 slaves

7

31. Scatternet – A type of ad hoc computer network using two
piconets. This can be formed when a member of one piconet (master
or one of the slaves) elects to participate as a slave in the
second piconet. The basic Bluetooth protocol doesn’t support this
relaying – the host software of each device would need to manage
it.
32. Metropolitan Area Network – A larger LAN, usually a few city
blocks away, that links computers in a different location but in
the same geographic area. This can be differentiated from a WAN
by the group managing it: A central IT Organization like the city
staff is responsible for a MAN and it is implied in a WAN that a
publicly available communication lines, a phone number or a
service provider involved.
Example:
 A network of fire stations in a suburban location
 A chain of community college ( A single campus can use a CAN
– Campus Area Networking)
 Wireless hotspots in the city
33. Broadcast Domain – A group of computers connected by one or more
switches
34. Wide Area Network (WAN) – Widespread group of computers
connected using long distance technologies. A LAN can be
connected to a WAN using a router.
35. Routing – An addressing scheme used by routers to sort the
frames and send them along the proper LAN; requires a routingcapable protocol to function correctly.
36. Network ID – The part of the IP Address that is common for all
the computers in the same broadcast domain
Example:
PC1 192.168.2.101
PC2 192.168.2.102
192.168.2 is the Network ID
37. Subnet Mask – Tells the computer which part of its IP Address is
the Network ID.
Example:
255.255.255.0
If there is a 255, that part of your IP Address is the
Network ID.
8

38. Default Gateway – The IP Address of the LAN Side of your router.
This is the address your computer uses to send data to anything
outside your Network ID.
39. Domain Name Server (DNS) – Keeps databases of IP addresses and
their corresponding names
Example:
209.34.45.163 is http://www.totalsem.com
WEBSITE
SETUP

PAY DNS
SERVER

DNS IS
REGISTERED TO
DNS NAME
(WEBSITE)

40. Top Level Domains (TLDs)
.com
.org
.net
.mil
.edu
.gov
*See ICANNS’s Website for updated list
.int
Configure IP Address Automatically – Used for Dynamic Host
Configuration Protocol (DHCP) Networks
COMPUTE
R

BROADCAST
A DHCP
REQUEST

DHCP
PROVIDES IP
INFO

Network Organization Categories:
a. Workgroup
 Most basic and simplistic
 Default for every fresh installation of Windows
 Every computer in the network needs the same
workgroup name
 To see workgroup name go to SYSTEM APPLET
 To change workgroup name:
SYSTEM APPLET  click CHANGE SETTINGS  CHANGE
then OK
 Lacks centralized control over the network, all
systems connected to the network are equal
b. Domain
 Used by networks that need more control
 Requires specific server to control access to the
network’s resources
 Needs a Windows Server OS
ADMINISTRATOR
CREATES
DOMAIN ON
THE WINDOWS
SERVER SYSTEM

CREATES NEW
USER
ACCOUNTS ON
THE DOMAIN
CONTROLLER

EACH
COMPUTER
JOINS THE
DOMAIN

9





Windows Server System = Domain Controller
User Accounts = Domain Accounts
When using a domain, the user logs in to the domain
rather than the PC itself.
All User accounts are stored in the domain
controller
Single Sign-On – The ability to logon to any
computer on the domain using the same domain
account. This is the biggest benefit to using a
Windows Domain

c. Homegroup
 Available in Windows 7 only
 Shares Windows 7 Libraries (files, printers and
not folders)
 Connects a group of computers using a common
password
 Each computer can only be in one homegroup at a
time
 Can be found in Control Panel as an Applet
 All Homegroup data is encrypted between systems
 Can be accessed from Windows Explorer
 To create a Homegroup:
HOMEGROUP APPLET  CREATE HOMEGROUP 
SELECT FILES TO SHARE  SAVE THE PASSWORD
 To share individual folder:
Right click folder  SHARE WITH  select
HOMEGROUP
Sharing a Folder:
Right click folder  SHARE WITH  SPECIFIC PEOPLE  File
Sharing Dialog Box Appears
Permissions
a. Read – Can open files in the folder but can’t save
anything
b. Read/Write – Open and save files into the folder
c. Owner – Read, Write and set permissions for other users

10

Nomenclature – Used to track Logons
<Computer Name>\<User Name>
Example:
PAUL-PC\PAUL
Ways of accessing a network folder
a. Ask people to login to shared resource
b. Create same accounts with the same username and password
on all computers and give sharing permissions to all the
users for all shares
c. Use one account on all computers
41. File Locking – The inability of multiple users to not use a
software program that ran on a LAN (very rare now)
42. Site License – The arrangement allowing multiple users to use a
single installation of an application

Goal of Networking
- To connect computers so that they can share resources or
access other shared resources
Network Sharing Requirement
a. Hardware – Cables, NIC, routers, etc.
b. Addressing Method
c. Method of sharing resource & accessing those shared
resources
Cabling Tools
a. Crimper – used to put connectors on the end of a cable. It
can strip and snip wires as well as crimp the connector onto
the end.
b. Multimeter – Measures voltage, current and resistance on a
wire
c. Toner Probe – used to trace a wire in a wall from one
location to another
d. Cable Tester – used to determine is a networking cable is
working
e. Loopback Plug – used for testing the ability of the NIC to
send/receive. This is mostly software-assisted
f. Punch-Down Tool – used to connect the exposed end of a wire
into a wiring harness (i.e. 110 Block) to help simplify the
tangled mess of cables.
11










Networking Components
Connectivity Devices – Special class of networking devices that
allow communications to break the boundaries of local network
Modem – Transmits data up to 56Kbps; requires phone line
Access Points –is any point that allows a user on to a network
Hubs – Device used to link several computers together. It broadcasts
signal that comes in at one port.
Bridges – Joins similar topologies and are used to divide network
segments into multiple collision domains. It also isolates
network traffic from entering a segment when there are no
recipients on that segment. Bridges only deal with MAC Addresses;
unable to move data across multiple network simultaneously.
Switches – Provides a centralized connectivity as hubs. It examines
the layer 2 header of the incoming packet and forwards it
properly to the right port and only that port.
Routers – connects multiple network types and determines the best path
for sending data. It can route packets across multiple networks
and use routing tables to store network addresses to determine
the best destination.
Routers break up broadcast domains which mean
that a router cannot broadcast data to another
network. It is typically used to connect one LAN
to another and when a WAN is setup, at least two
routers are used.
Auxiliary Devices – Devices that adds in features outside of
connectivity that can help users with their daily tasks and
protect them from malicious attacks
 Network-Attached Storage (NAS) – A specialized computer that
acts as a hard drive directly attached to the network. It
acts as a file server and may have additional services like
backups.
 Firewall – A hardware or software solution that serves as
the network’s security guard.
 Voice Over Internet Protocol (VoIP) Phones – a technology
that delivers voice communications over the internet (and
some can send data like photo, video, etc)
 Internet Appliance – a specialized hardware that exists
solely to connect to the internet. This are intended lowcost replacement for laptops and mobile devices but these
devices are now obsolete.

12

Sponsor Documents

Or use your account on DocShare.tips

Hide

Forgot your password?

Or register your new account on DocShare.tips

Hide

Lost your password? Please enter your email address. You will receive a link to create a new password.

Back to log-in

Close