Computer Networks
Download
Report
Transcript Computer Networks
In information technology, a network is a series
of points or nodes interconnected by
communication paths.
In a network, a node is a connection point. In
general, a node has programmed or
engineered capability to recognize and
process or forward transmissions to other
nodes.
A network is an interconnected system of
things or people
◦
◦
◦
◦
◦
◦
◦
◦
Religions
Business contacts
Snail Mail
Social Media
Broadcasting - NBC, CBS, ABC, PBS
Transportation (highways & rail)
Cellular phone service
…and of course computer based (internet)
The Internet is a worldwide system of
computer networks - a network of networks
in which users at any one computer can, if
they have permission, get information from
any other computer.
Intranet
◦ An organizations restricted computer network
◦ Private, yet using WWW software
Extranet
◦ Part of a organization‘s intranet that is extended to
users outside the organization – usually via WWW.
◦ Customer access
Internet
◦ A worldwide computer network using TCP/IP
protocol to transmit and exchange data.
(TCP/IP is a set of communication protocols used by
networks.)
Simultaneous Access
◦ Software/Programs
◦ Data
Device Sharing
◦ Printers
◦ NAS – Network Access Storage
Communication
◦ Email
◦ VOIP – Voice over internet protocol (Skype)
Archiving
◦ Backups of multiple clients by a single server
In communication networks, a topology is a
usually schematic description of the
arrangement of a network, including its
nodes and connecting lines. There are two
ways of defining network geometry: the
physical topology and the logical (or signal)
topology.
Topologies
◦ Physical connectivity
Nodes and Addressing
Geographical Distribution
◦ Where are the nodes?
Work Load
◦ Server networks use the nodes to disperse the
workload
Network topology is the physical
interconnections of the elements (Links,
Nodes, Clients, etc.) of a computer network
Main Types
◦
◦
◦
◦
◦
Star
Bus
Ring
Wireless
Hybrid
Star topology is the most common topology used in
today’s workplace.
North Greenville University in Tigerville uses star
topology.
Bus topology is where in a computer
network, a bus is a transmission path on
which signals are dropped off or picked up
at every device attached to the line. WAP
(wireless access points) are not necessary
needed.
A ring is a network topology or circuit
arrangement in which each device is attached
along the same signal path to two other
devices, forming a path in the shape of a ring.
A wireless Internet service provider (WISP) is an
Internet service provider (ISP) that allows
subscribers to connect to a server at designated
hot spots (access points) using a wireless
connection such as Wi-Fi.
Standards – IEEE 802.11
◦
◦
◦
◦
802.11a
802.11b
802.11g
802.11n
802.11n has a higher frequency and
transmits fastest and the longest range
Coax cable is the kind of copper cable used
by cable TV companies between the
community antenna and user homes and
businesses.
◦ Benefit is one wire for all
computers
Ethernet is the most
widely-installed local area
network (LAN) technology.
◦ One wire per node/client
Ethernet twisted pair cable is faster
than Wireless and is very
commonly used in businesses
Fiber optic (or "optical fiber")
refers to the medium and the
technology associated with
the transmission of
information as light impulses
along a glass or plastic wire
or fiber.
Types
◦ WIMAX (Worldwide Interoperability for Microwave
Access)
◦ Satellite (Dish Network/Direct TV)
High transmission rate (has to be) & latency
Each node needs antenna to connect
◦ Low frequency – reliable but slower transmission
◦ High frequency – less reliable but higher speed
transmission
Fiber is the fastest - pricey
Ethernet twisted pair – cheaper and faster
COAX – still needed
Wireless – price greater than Ethernet twisted
pair
Node – Client
◦
◦
◦
◦
◦
◦
◦
Printers
Desktops
Laptops
Copiers
Network storage devices
Routers
Anything that can connect to a network
Cell phone
GPS device
IPOD/PSP/XBOX/PS3/Tivo/DVR/Slingbox…
How does the network identify a node?
◦ NIC MAC address – every node’s is unique
Format: 01-23-45-67-89-ab, 01:23:45:67:89:ab
Each vendor has a pool of addresses
Linksys
D-Link
Etc.
Hardware address
Translated into a software address (IP address)
Two standards for Internet Protocol (IP)
IP V4
IP V6
IP Addresses
◦ IP addresses are four octets of the form and range
(0-255).(0-255).(0-255).(0-255)
◦ Data is routed between nodes based on IP addresses
◦ Each domain name translates to a unique IP address
www.google.com translates to 208.67.217.231
i.e. try Ping www.google.com from DOS prompt
ICANN.org is in charge of DNS
Maintains Internic.org to provide info about domain names
◦ A profound shortage of addresses with IP V4
4.3 billion addresses with some reserved
Usefulness of static addresses
How many nodes in the world?
IP Addresses
◦ Addresses structure:(8 groups of 4 base16 digits)
2001:0db8:85a3:0000:0000:8a2e:0370:7334
◦ Version 6 provides enough addresses for every
atom in the universe - provided they buy a
computer
◦ Supports 2128 (about 3.4×1038) addresses.
◦ Currently used at main WWW routing points
◦ Advantages of having your own address?
Your are known wherever your node physically resides
LAN – Local Area Network
◦ Ex. – NGU
VLAN – Virtual LAN (act as a LAN due to
common set of needs - collaboration)
MAN – Metropolitan Area Network
◦ Ex. - City of Greenville
WAN – Wide Area Network
◦ Ex. – Internet
Server Based
◦ Thin client - relies heavily on server processing
◦ Ex. – NGU email server
Client Server Based
◦ Fat client – shares in the work load with less
expensive server
◦ Ex. – NGU CAMS (clients process the reports)
Peer to Peer Based
◦ Each computer can act as client or server
◦ Ex. - Home network
All networks
◦ Authentication
User name and password
◦ Encryption
https – encrypts credit card account #s, email
◦ Firewall Software
What can network users get to on your machine
◦ Anti-virus Software
Protect against malware
Vendors – McAfee, Symantec, AVG, etc…
◦ Finger Print Scanner
◦ Contingency planning – what if the unexpected
happens
Backups, backups, backups
Wireless
◦ WEP – Wired Equivalency Protocol
NOT secure (Google “breaking wep encryption”)
◦ WPA – Wireless Protected Access
WPA & WPA2 – secure provided you use good pass
phrases
What do we transmit/exchange?
◦ Text
Emails
Print jobs
Chat
◦ Graphics
Pictures
◦ Video
Movies
Live Streaming
◦ Audio
Songs
Voice
How is it transmitted?
◦ Broken into packets
Header – Packet 1
Trailer – Last Packet
Those in between
◦ Not all packets take the same route
◦ Reassembled on receipt to match that sent
Who owns the internet?
◦ Many companies – Sprint, Verizon, Time-Warner,
etc.
We’re just renting space
◦ Transmission is not perfect
Must have schemes for re-sending dropped packets
What about audio & video – is there any reason to resend?
What about your debit card atm transmission
Easier to resend the whole thing or just what’s missing?
TCP/IP – Transmission Control
Protocol/Internet Protocol
◦ Standard network data exchange protocol(standard)
◦ TCP applications
FTP – File transfer protocol (transfer files)
Telnet – Terminal connections
SMTP – email transmission
POP3 – email transmission
◦ IP applications
HTTP – Hypertext transfer protocol
VOIP – Voice over IP
ISP – Internet service provider
◦ Types of connection for the home
Cable Modem
DSL Modem
ISDN Modem
56K Dial-up Modem
Home satellite
Cable Modem – higher capacity than home
DSL Modem – “
“
“
DS1/T1 High speed line (DS3 /T3 even better)
Satellite
◦ Types of connection for business
◦ Businesses concerned with throughput
◦ Become a node on ISP’s network
Domains
◦ Common
.com, .net, .org, .edu, .gov
◦ Not so common
.uk, .us, .tv, .biz, info (checkout godaddy.com)
Sub Domains
◦ Part of the larger domain
◦ Ex. www.ngu.blackboard.com
Domain is www.blackboard.com
Sub domain is ngu
Accessed via ngu.blackboard.com
Websites are designed using html (hypertext markup
language)
◦ Easy enough for anyone to create
Write html
Use applications like Dreamweaver or Microsoft Expression
Can save MS Office 2007 files as web pages
◦ Store cookies
Ease of use
User names
Passwords (not so good if not secure – https)
◦ Store temporary files
Faster browsing
Fills up hard drive
Fragmentation
◦ Your browser will let you purge cookies and files.
Data specific Websites are encoded using XML
(Extensible Markup Language)
Example – see notes
Standard for data exchange
◦ MS Access can import XML
Microsoft Office 2007 file naming
◦
◦
◦
◦
Word “Document.docx”
Excel “Spreadsheet.xlsx”
PowerPoint “Presentation.pptx”
Access – “Database.accdb” ?????
http://wordnetweb.princeton.edu
http://compnetworking.about.com
http://en.wikipedia.org/
http://www.emailclients.net/