Computer Networks

Download Report

Transcript Computer Networks

In information technology, a network is a series
of points or nodes interconnected by
communication paths.

In a network, a node is a connection point. In
general, a node has programmed or
engineered capability to recognize and
process or forward transmissions to other
nodes.

A network is an interconnected system of
things or people
◦
◦
◦
◦
◦
◦
◦
◦
Religions
Business contacts
Snail Mail
Social Media
Broadcasting - NBC, CBS, ABC, PBS
Transportation (highways & rail)
Cellular phone service
…and of course computer based (internet)
The Internet is a worldwide system of
computer networks - a network of networks
in which users at any one computer can, if
they have permission, get information from
any other computer.

Intranet
◦ An organizations restricted computer network
◦ Private, yet using WWW software

Extranet
◦ Part of a organization‘s intranet that is extended to
users outside the organization – usually via WWW.
◦ Customer access

Internet
◦ A worldwide computer network using TCP/IP protocol
to transmit and exchange data.
 (TCP/IP is a set of communication protocols used by
networks.) Transmission Control Protocol/Internet
Protocol.

Simultaneous Access
◦ Software/Programs
◦ Data

Device Sharing
◦ Printers
◦ NAS – Network Access Storage

Communication
◦ Email
◦ VOIP – Voice over internet protocol (Skype)

Archiving
◦ Backups of multiple clients by a single server

In communication networks, a topology is a
schematic description of the arrangement of
a network, including its nodes and
connecting lines. The topology of a network
is a diagram of the network and the way it
connects.

Topologies
◦ Physical connectivity
 Nodes and Addressing

Work Load
◦ Server networks use the nodes to disperse the
workload


Network topology is the physical system of
interconnections of the elements of a
computer network (Links, Nodes, Clients,
etc.)
Main Types of Network Topology
◦
◦
◦
◦
◦
Star
Bus
Ring
Wireless
Hybrid
Star topology is the most common topology used in
today’s workplace.
North Greenville University in Tigerville uses star
topology.
Bus topology is where in a computer
network, a bus is a transmission path on
which signals are dropped off or picked up
at every device attached to the line. WAP
(wireless access points) are not necessary
needed.
A ring is a network topology or circuit
arrangement in which each device is attached
along the same signal path to two other
devices, forming a path in the shape of a ring.
A wireless Internet service provider (WISP) is an
Internet service provider (ISP) that allows
subscribers to connect to a server at designated
hot spots (access points) using a wireless
connection such as Wi-Fi.

Standards – IEEE 802.11
◦
◦
◦
◦

802.11a
802.11b
802.11g
802.11n
802.11n has a higher frequency and
transmits fastest and the longest range

Coax cable is the kind of copper cable used
by cable TV companies between the
community antenna and user homes and
businesses.
◦ Benefit is one wire for all
computers

Ethernet is the most
widely-installed local area
network ( LAN) technology.
◦ One wire per node/client
Ethernet twisted pair cable is faster
than Wireless and is very
commonly used in businesses

Fiber optic (or "optical fiber")
refers to the medium and the
technology associated with
the transmission of
information as light impulses
along a glass or plastic wire
or fiber.

Each node needs antenna to connect
◦ Low frequency – reliable but slower transmission
◦ High frequency – less reliable but higher speed
transmission

Fiber is the fastest - pricey

Ethernet twisted pair – cheaper and faster

COAX – still needed

Wireless – price greater than Ethernet twisted
pair

Node – Client
◦
◦
◦
◦
◦
◦
◦
Printers
Desktops
Laptops
Copiers
Network storage devices
Routers
Anything that can connect to a network
 Cell phone
 GPS device
 IPOD/PSP/XBOX/PS3/Tivo/DVR/Slingbox…

How does the network identify a node?
◦ NIC MAC address – every node’s is unique




NIC = (Network Interface Card)
MAC = (Media Access Control)
Format: 01-23-45-67-89-ab, 01:23:45:67:89:ab
Hardware address
 Translated into a software address (IP address)
 Two standards for Internet Protocol (IP)
 IP V4
 IP V6

IP Addresses
◦ IP addresses are four octets of the form and range
 (0-255).(0-255).(0-255).(0-255)
◦ Each domain name translates to a unique IP address
 www.google.com translates to 208.67.217.231
◦
ICANN.org is in charge of DNS
◦ A profound shortage of addresses with IP V4
 4.3 billion addresses with some reserved
 Usefulness of static addresses

IP Addresses
◦ Addresses structure:(8 groups of 4 base16 digits)
2001:0db8:85a3:0000:0000:8a2e:0370:7334
◦ Version 6 provides enough addresses for every
atom in the universe - provided they buy a
computer 

LAN – Local Area Network
◦ Ex. – NGU

VLAN – Virtual LAN (act as a LAN due to common
set of needs - collaboration)
◦ In computer networking, a single layer-2 network may
be partitioned to create multiple distinct broadcast
domains, which are mutually isolated so that packets can
only pass between them via one or more routers; such a
domain is referred to as a virtual local area network,
virtual LAN or VLAN.

MAN – Metropolitan Area Network
◦ Ex. - City of Greenville

WAN – Wide Area Network
◦ Ex. – Internet

Server Based
◦ Thin client - relies heavily on server processing
◦ Ex. – NGU email server

Client Server Based
◦ Fat client – shares in the work load with less
expensive server
◦ Ex. – NGU CAMS (clients process the reports)

Peer to Peer Based
◦ Each computer can act as client or server
◦ Ex. - Home network

All networks
◦ Authentication
 User name and password
◦ Encryption
 https – encrypts credit card account #s, email
◦ Firewall Software
 What can network users get to on your machine
◦ Anti-virus Software
 Protect against malware
 Vendors – McAfee, Symantec, AVG, etc…
◦ Finger Print Scanner
◦ Contingency planning – what if the unexpected
happens
 Backups, backups, backups

Wireless
◦ WEP – Wired Equivalency Protocol
 NOT secure (Google “breaking wep encryption”)
◦ WPA – Wireless Protected Access
 WPA & WPA2 – secure provided you use good pass
phrases

What do we transmit/exchange?
◦ Text
 Emails
 Print jobs
 Chat
◦ Graphics
 Pictures
◦ Video
 Movies
 Live Streaming
◦ Audio
 Songs
 Voice

How is it transmitted?
◦ Broken into packets
 Header – Packet 1
 Trailer – Last Packet
 Those in between
◦ Not all packets take the same route
◦ Reassembled on receipt to match that sent

Who owns the internet?
◦ Many companies – Sprint, Verizon, Time-Warner,
Walmart, etc.
 We’re just renting space 
◦ Transmission is not perfect
 Must have schemes for re-sending dropped packets
 What about audio & video – is there any reason to resend?
 What about your debit card atm transmission
 Easier to resend the whole thing or just what’s missing?

TCP/IP – Transmission Control
Protocol/Internet Protocol
◦ Standard network data exchange protocol(standard)
◦ TCP applications




FTP – File transfer protocol (transfer files)
Telnet – Terminal connections
SMTP – email transmission
POP3 – email transmission
◦ IP applications
 HTTP – Hypertext transfer protocol
VOIP – Voice over IP

ISP – Internet service provider
◦ Types of connection for the home





Cable Modem
DSL Modem
ISDN Modem
56K Dial-up Modem
Home satellite




Cable Modem – higher capacity than home
DSL Modem – “
“
“
DS1/T1 High speed line (DS3 /T3 even better)
Satellite
◦ Types of connection for business
◦ Businesses concerned with throughput
◦ Become a node on ISP’s network

Domains
◦ Common
 .com, .net, .org, .edu, .gov
◦ Not so common
 .uk, .us, .tv, .biz, info (checkout godaddy.com)

Sub Domains
◦ Part of the larger domain
◦ Ex. www.ngu.blackboard.com
 Domain is www.blackboard.com
 Sub domain is ngu
 Accessed via ngu.blackboard.com

Websites are designed using html (hypertext markup
language)
◦ Easy enough for anyone to create
 Write html
 Use applications like Dreamweaver or Microsoft Expression
 Can save MS Office 2007 files as web pages
◦ Store cookies
 Ease of use
 User names
 Passwords (not so good if not secure – https)
◦ Store temporary files
 Faster browsing
 Fills up hard drive
 Fragmentation
◦ Your browser will let you purge cookies and files.

Data specific Websites are encoded using XML
(Extensible Markup Language) often used for
transmitting sensitive data.




http://wordnetweb.princeton.edu
http://compnetworking.about.com
http://en.wikipedia.org/
http://www.emailclients.net/