Transcript Networks
Computers Are
Your Future
© 2005 Prentice-Hall, Inc.
Computers Are Your Future Chapter 6
Computers Are Your Future
Chapter 6
Networks: Communicating and
Sharing Resources
© 2005 Prentice-Hall, Inc
Slide 2
Computers Are Your Future Chapter 6
What You Will Learn About
Basic networking concepts
The three major types of physical media
Bandwidth
How modems transform digital computer signals into
analog signals
Circuit switching and packet switching networks
© 2005 Prentice-Hall, Inc
Slide 3
Computers Are Your Future Chapter 6
What You Will Learn About
The importance of protocols in a computer network
The advantages of a network
Peer-to-peer and client/server LANs
The most widely used LAN protocol
Ways that businesses use WANs
© 2005 Prentice-Hall, Inc
Slide 4
Computers Are Your Future Chapter 6
Network Fundamentals
A computer network consists of
two or more computers linked
together to exchange data and
share resources.
Communications is the process
of sending and receiving
messages.
Communications channels are
the paths through which messages
are passed.
Communications devices
transform electronic signals.
© 2005 Prentice-Hall, Inc
Slide 5
Computers Are Your Future Chapter 6
Physical Infrastructure
Physical infrastructure refers to cables, modems, switches,
and routers.
Twisted-pair – Two insulated wires twisted around each other;
the same type of wire as that used for telephones
Types of twisted-pair technologies:
Leased line (T1)
Integrated Services Digital Network (ISDN)
Digital Subscriber Line (DSL)
Coaxial cable – Consists of an insulated center wire
surrounded by a layer of braided wire; the same type of wire as
that used for cable TV
Fiber-optic cable – Type of fiber glass cable that transmits
data in the form of light impulses; can carry more data for
longer distances than other wire
© 2005 Prentice-Hall, Inc
Slide 6
Computers Are Your Future Chapter 6
Bandwidth
Bandwidth is the amount of data that can be
transmitted through a communications channel.
Digital bandwidth is measured in bits per second
(bps), kilobits per second (Kbps), megabits per
second (Mbps), or gigabits per second (Gbps).
Low bandwidth is 56 Kbps and high bandwidth is
622 Mbps.
© 2005 Prentice-Hall, Inc
Slide 7
Computers Are Your Future Chapter 6
Modems: From Digital to Analog and Back
Modulation
Analog
Digital
Demodulation
Analog
Digital
Modems are devices that transform signals when sending
and receiving transmissions.
Modulation – Transforming digital signals to analog
Demodulation – Transforming analog signals to digital
© 2005 Prentice-Hall, Inc
Slide 8
Computers Are Your Future Chapter 6
Modems: From Digital to Analog and Back
Internal Modem
External Modem
Two types of modems:
Internal modems – Fit into a computer’s expansion slot
External modems – Connect to a port outside the system
box
© 2005 Prentice-Hall, Inc
Slide 9
Computers Are Your Future Chapter 6
Asynchronous and Synchronous
Communications
Asynchronous communication is a method of
networking in which bits of data are sent and
received one bit at a time; each byte contains a start
and stop bit.
Synchronous communication requires a
synchronization signal that identifies units of data.
© 2005 Prentice-Hall, Inc
Slide 10
Computers Are Your Future Chapter 6
Modulation Protocols
Modulation protocols are communications standards
that modems conform to.
Data transfer rate is the rate at which two modems
can exchange data. It is measured in bits per second
(bps).
A modulation protocol called V.90 enables modems
to transfer data at 56 Kbps.
© 2005 Prentice-Hall, Inc
Slide 11
Computers Are Your Future Chapter 6
Cable Modems
Cable modems enable computers to access the
Internet by way of a cable TV connection.
Data is transferred through a coaxial cable.
Bandwidths range from 500 Kbps to 1 Mbps.
Bandwidth is divided among the number of
subscribers using it.
© 2005 Prentice-Hall, Inc
Slide 12
Computers Are Your Future Chapter 6
Switching and Routing Techniques
Packet switching
Circuit switching
Networks create an endto-end circuit between the
sending and receiving
computers.
Electronic switches
establish and maintain the
connection.
© 2005 Prentice-Hall, Inc
Outgoing messages are
divided into fixed-size
data units called packets.
Packets are numbered and
addressed to the receiving
computer.
Routers examine the
packets and send them to
their destination.
Slide 13
Computers Are Your Future Chapter 6
Advantages and Disadvantages of Circuit and
Packet Switching
Advantages
Disadvantages
Circuit switching
Voice and real-time
transmission
No delivery delays
Costly
A direct electrical
connection between the
computers is required
Packet switching
Efficient, less
expensive, and reliable
Will function if part of
the network is down
Delays in receiving
packets
Not ideal for real-time
voice communication
© 2005 Prentice-Hall, Inc
Slide 14
Computers Are Your Future Chapter 6
Protocols
Protocols are
fixed, formalized standards that specify
how computers can communicate over a network.
suite – The total package of protocols that
specify how a network functions
Protocol
© 2005 Prentice-Hall, Inc
Slide 15
Computers Are Your Future Chapter 6
Network Layers
user
layer
physical media
receiving
sending
protocol
user
stack
physical media
Network architecture is the overall design of a network.
The network design is divided into layers, each of which
has a function separate from that of the other layers.
Protocol stack – The vertical (top to bottom) arrangement
of the layers; each layer is governed by its own set of
protocols
© 2005 Prentice-Hall, Inc
Slide 16
Computers Are Your Future Chapter 6
Advantages of Networking
Reduced hardware costs
Users share equipment
Connected people
People can work
together without being
at the same location
Groupware enables
sharing of schedules
and communications
© 2005 Prentice-Hall, Inc
Shared applications
Users share software
File server enables all
users to work with the
same application program
Building information
resources
Users create common
pools of data that can be
accessed by employees
Slide 17
Computers Are Your Future Chapter 6
Types of Computer Networks
Local Area Network (LAN)
Links computers within a
building or group of
buildings
Wide Area Network (WAN)
Links computers separated
by a few miles or thousands
of miles
Uses direct cables, radio, or Uses long-distance
infrared signals
© 2005 Prentice-Hall, Inc
transmission media
Slide 18
Computers Are Your Future Chapter 6
Local Area Networks (LANs)
Network access is controlled by a network administrator.
Users can access software, data, and peripherals.
LANs require special hardware and software.
Computers connected to a LAN are called workstations
or nodes.
Types of LANs:
Peer-to-peer
Client-server
© 2005 Prentice-Hall, Inc
Slide 19
Computers Are Your Future Chapter 6
LAN Hardware and Software
Networking Hardware
Networking Software
Network interface card
Operating system that
(NIC) – Provides the
connection between the
computer and the network
Inserted into a computer’s
expansion slot
supports networking
(Unix, Linux, Windows,
Mac OS)
Additional system
software
NIC
© 2005 Prentice-Hall, Inc
Slide 20
Computers Are Your Future Chapter 6
Peer-to-Peer Networks
All computers on the network are treated as equal.
There are no file servers.
Users decide which files and peripherals to share.
Peer-to peer is not suited for networks with many
computers.
Peer-to-peer is easy to set up. Example: home
networks
© 2005 Prentice-Hall, Inc
Slide 21
Computers Are Your Future Chapter 6
Client-Server Networks
Typical corporate networks are client-server.
Client-server requires various topologies or physical layouts.
The network requires file servers, networked computers
(clients), and a network operating system (NOS).
Clients send requests to servers for programs and data, and
to access peripherals.
© 2005 Prentice-Hall, Inc
Slide 22
Computers Are Your Future Chapter 6
LAN Topologies
The physical layout of a LAN is called its topology.
Topologies resolve the problem of contention, which
occurs when multiple users try to access the LAN at the
same time.
Collisions or corrupt data occur when different computers use
the network at the same time.
Bus
Ring
Startopology
topology
•
•
•
•
•
•
All workstations
Called
Contains
a daisy
a hubchain
orare
central
attached
wiring
in a
Every workstation
concentrator
circular
arrangement
is connected to a
single
Easy
A
special
tocable
add
unit
workstations
of data called a
Resolves
token
travels
collisions
aroundthrough
the ring
contention management
Workstations
can only transmit data
Difficult
when
theytopossess
add workstations
a token
© 2005 Prentice-Hall, Inc
Slide 23
Computers Are Your Future Chapter 6
Wide Area Networks (WANs)
WANs are similar to long-distance telephone systems.
They have a local access number called a point of presence
(POP).
They contain long-distance trunk lines called backbones.
© 2005 Prentice-Hall, Inc
Slide 24
Computers Are Your Future Chapter 6
WAN Applications
LAN-to-LAN
WANs are used to connect
LANs at two or more
geographic locations.
Companies use WANs to
connect their branches to
one network system.
© 2005 Prentice-Hall, Inc
Transaction Acquisition
Information about
transactions is instantly
relayed to the corporate
headquarters.
Point-of-sale (POS)
terminals relay
transactions to central
computers through WANs.
Slide 25
Computers Are Your Future Chapter 6
Backbones
Backbones,
high-capacity transmission lines, are
regional, continental, or transcontinental.
Internet backbones can carry 2.5 gigabits of data per
second.
© 2005 Prentice-Hall, Inc
Slide 26
Computers Are Your Future Chapter 6
WAN Protocols
X.25
is the oldest packet switching protocol. It is used
by automated teller machines and credit card
authorization devices.
New protocols designed for digital lines and faster
data transfer rates are:
Switched Multimegabit Data Service (SMDS)
Asynchronous Transfer Mode (ATM)
© 2005 Prentice-Hall, Inc
Slide 27
Computers Are Your Future Chapter 6
Public Data Network (PDN)
PDN is a for-profit data communications network.
Fees are paid on a per-byte-transferred basis.
They offer good security and network availability.
© 2005 Prentice-Hall, Inc
Slide 28
Computers Are Your Future Chapter 6
Virtual Private Network (VPN)
A virtual private network consists of lines that are
leased to a single company.
The network is not open to the public.
It is the most secure type of WAN.
© 2005 Prentice-Hall, Inc
Slide 29
Computers Are Your Future Chapter 6
Chapter 6 Summary
• Computer networks link two or more computers to exchange
data and share resources.
• Two types of computer networks:
Local area network (LAN)
Wide area network (WAN)
• Computer networks:
Reduce hardware costs
Enable users to share applications
Provide a means to pool an organization’s data
Foster teamwork
• Computer networks require physical media such as telephone
wire, coaxial cable, or fiber-optic cable to connect the
computers.
© 2005 Prentice-Hall, Inc
Slide 30
Computers Are Your Future Chapter 6
Chapter 6 Summary continued
• Modems transform analog and digital signals.
• Network protocols enable the network to function smoothly.
• Data is sent through the network by switching and routing
techniques.
• LAN topologies include:
Bus topology
Star topology
Ring topology
• Wide area networks are used to link computers throughout the
world.
© 2005 Prentice-Hall, Inc
Slide 31