chapter1 full
DESCRIPTION
TRANSCRIPT
1
EC301 COMPUTER NETWORKING FUNDAMENTALSCHAPTER 1
INTRODUCTION TO NETWORKING
PREPARED BY : AMRUL AKIL BIN AHMAD @ HASHIM© POLISAS/JKE/AMR/2011/EC301
© POLISAS/JKE/AMR/2011/EC301
2
Content
Part 1- Basic concepts and components of computer networks
COMPUTER NETWORK DEFINITION
ADVANTAGES OF NETWORKING NETWORK TYPE
PEER-TO-PEER VS CLIENT/SERVER NETWORK JARGON/ELEMENTS NETWORK TOPOLOGIES
© POLISAS/JKE/AMR/2011/EC301
3
Computer Network
A collection of computers and devices interconnected by communications channels that allows communications and sharing of resources and information among interconnected devices
© POLISAS/JKE/AMR/2011/EC301
4
Network Computing Advantages Connectivity and Communication:Using a network, people can communicate
efficiently and easily via email, instant messaging, chat rooms, telephone, video telephone calls, and video conferencing
© POLISAS/JKE/AMR/2011/EC301
5
Network Computing Advantages Sharing
Hardware Computers can access and use hardware
resources on the network, such as printing a document on a shared network printer
Information authorized user may access data and information
stored on other computers on the network Software
may run application programs on remote computer
© POLISAS/JKE/AMR/2011/EC301
6
Network Computing Advantages Internet accessThe Internet is itself an enormous network,
so whenever you access the Internet, you are using a network. The significance of the Internet on modern society is hard to exaggerate, especially for those of us in technical fields.
© POLISAS/JKE/AMR/2011/EC301
7
Network Computing Advantages Data Security and Management. Instead of having this data spread over
dozens or even hundreds of small computers in a haphazard fashion as their users create it, data can be centralized on shared servers. This make data easy to find when the location is known.
© POLISAS/JKE/AMR/2011/EC301
8
Network Computing Advantages Performance Enhancement and
Balancing: In some cases, processing load can be
shared among networked computer.Example: research data calculation.
© POLISAS/JKE/AMR/2011/EC301
9
Network Computing Advantages Entertainment: Networks facilitate many types of games
and entertainment. The Internet itself offers many sources of entertainment, of course. In addition, many multi-player games exist that operate over a local area network.!
© POLISAS/JKE/AMR/2011/EC301
10
NETWORK TYPE
PEER-TO-PEER NETWORK A network in which resources and files
are shared without a centralized management source. workstations are capable of being both clients and servers
© POLISAS/JKE/AMR/2011/EC301
11
Peer-To-Peer Network
ADVANTAGES relatively inexpensive fairly simple to set up Easy to manage.
© POLISAS/JKE/AMR/2011/EC301
12
Peer-To-Peer Network
DISADVANTAGES limited in extensibility tends to overburden user workstations by
having them play the role of server to other users
largely unsecured Typically unable to provide system-wide
services since the typical workstation will run a standard desktop operating system incapable of hosting any major service (e.g., a post office).
© POLISAS/JKE/AMR/2011/EC301
13
NETWORK TYPE
CLIENT/SERVER NETWORK A communications network that uses
dedicated servers. The network will consist of client/workstation computers and one or many servers. Enable centralization management.
© POLISAS/JKE/AMR/2011/EC301
14
Client/Server Network
In a client-server network architecture certain computers are designated for full-time server duty, while others (such as user workstations) are full-time clients.
© POLISAS/JKE/AMR/2011/EC301
15
Client/Server Network
ADVANTAGES can extend to handle organizational
growth user workstations to function as
unburdened clients, can provide sophisticated system-wide
services configurable for maximum security.
© POLISAS/JKE/AMR/2011/EC301
16
Client/Server Network
DISADVANTAGES higher initial capital investment to
establish greater level of technology expertise
required to configure and manage – thus need profesional personnel
© POLISAS/JKE/AMR/2011/EC301
17
NETWORK CLASSIFICATION
A network is classify base on its size of deployment. Depend on their size they would be under one of these classification Local Area Network (LAN) Metropolitan Area Network (MAN) Wide Area Network (WAN)
© POLISAS/JKE/AMR/2011/EC301
18
Network Classification
Local Area Network (LAN) connects computers and devices in a
limited geographical area – exp home, school, a computer lab, an office in a building etc. Personal Area Network (PAN)
close to one person – a set of computer ,printer,fax,pda,scanner
<10 meters Home Area Network (HAN)
residential LAN a small number of personal computers and
accessories
© POLISAS/JKE/AMR/2011/EC301
19
Network Classification
Metropolitan Area Network (MAN) a large computer network that usually
spans a city or a large campus usually interconnects a number of LANs MAN might be owned and operated by a
single organization, but it usually will be used by many individuals and organizations
Use of high speed backbone network to interconnect the LANs (usually fiber-optic)
© POLISAS/JKE/AMR/2011/EC301
20
Network Classification
Wide Area Network (WAN) a computer network that covers a broad
area any network whose communications links cross
metropolitan, regional, or national boundaries Exp between city, state or country
21
© POLISAS/JKE/AMR/2011/EC301
Network Elements
Client Server Workstation Netowork interface
card Network operating
system Node
Connectivity device
Backbone Segment Topology Tranmission
media
These are words normally associated with computer networking. They are the elements that exist within a computer network. The building block of a network.
© POLISAS/JKE/AMR/2011/EC301
22
Network Elements
Client a computer in a network that uses the
services (as access to files or shared peripherals) provided by a server
Server The main computer in a network
which provides files and services that are used by the other computers
© POLISAS/JKE/AMR/2011/EC301
23
Network Elements
Workstation **An intelligent terminal or personal
computer usually connected to a computer network
A powerful microcomputer used especially for scientific or engineering work
**is a high-end microcomputer designed for technical or scientific applications.
© POLISAS/JKE/AMR/2011/EC301
24
Network Elements
Network Interface Card The hardware that provide the interface
between a computer and a network Usually in the form factor of an add-in card
such as a PCI or PCMCIA card. (now we have USB also)
wired connections or wireless
© POLISAS/JKE/AMR/2011/EC301
25
Network Elements
Network Operating System the software that runs on a server and enables
the server to manage data, users, groups, security, applications, and other networking functions
The most popular network operating systems are Microsoft Windows Server 2003, Microsoft Windows Server 2008, UNIX, Linux, Mac OS X, and Novell NetWare.
© POLISAS/JKE/AMR/2011/EC301
26
Network Elements
Node a connection point, either a redistribution
point or a communication endpoint Usually a router, gateway, switch or hub (an
active electronic device). A patch panel is not a node.
In theory it a point in a network topology at which lines intersect or branch.
© POLISAS/JKE/AMR/2011/EC301
27
Network Elements
Connectivity device Device that connect the computer and
network together Repeater Hub/Switch Bridges Router Etc….
© POLISAS/JKE/AMR/2011/EC301
28
Network Elements
Backbone It is a part of computer network
infrastructure that interconnects various pieces of network, providing a path for the exchange of information between different LANs or subnetworks
principal data routes (or connection) between network.
© POLISAS/JKE/AMR/2011/EC301
29
Network Elements
Segment Refers a portion of a computer network. The
nature and extent of a segment depends on the nature of the network and the device or devices used to interconnect end stations.
© POLISAS/JKE/AMR/2011/EC301
30
Network Elements
Topology the layout pattern of interconnections of the
various elements
© POLISAS/JKE/AMR/2011/EC301
31
Network Elements
Transmission Media Transmission media are the physical pathways
that connect computers, other devices, and people on a network UTP cable Fiber optic Wifi WiMAX Etc…
© POLISAS/JKE/AMR/2011/EC301
32
Network Topology
DEFINITION The pattern in which computers or
network devices are interconnected. The physical arrangement of a network;
the way in which cables are arranged in order to connect computers in a network
The arrangement or mapping of the network elements
© POLISAS/JKE/AMR/2011/EC301
33
Network Topology
BUS Each node is connected to a single cable.
Each computer or server is connected to the single bus cable. A signal from the source travels in both directions to all machines connected on the bus cable until it finds the intended recipient
© POLISAS/JKE/AMR/2011/EC301
34
Network Topology
RING Elements are set up in a circular fashion in
which data travels around the ring in one direction and each device on the right acts as a repeater to keep the signal strong as it travels.
© POLISAS/JKE/AMR/2011/EC301
35
Network Topology
STAR Each elements is connected to a central
hub with a point-to-point connection.
© POLISAS/JKE/AMR/2011/EC301
36
Network Topology
HYBRID Is a combination any two or more of
previous topology (bus, star & ring) The network does not exhibit one of the
standard topologies
© POLISAS/JKE/AMR/2011/EC301
37
Network Topology
Exercises:
© POLISAS/JKE/AMR/2011/EC301
38
Network Topology - Pros and Cons
BUSPros Easy to install and manage (hardware) Cheaper, lighter, easy to detect medium
problem – single wireCons Bus down , network down Limited connection, congest, single
packet in bus during a clock pulse
© POLISAS/JKE/AMR/2011/EC301
39
Network Topology- Pros and Cons
RINGPros Very orderly network Performs better than a bus topology under heavy network load Does not require network server to manage the connectivity
between the computers No need to switch on all the computers to work with the networkCons One malfunctioning workstation or bad port in the MAU can create
problems for the entire network Moves, adds and changes of devices can affect the network Network adapter cards and MAU's are much more expensive than
Ethernet cards and hubs Much slower than an Ethernet network under normal load
© POLISAS/JKE/AMR/2011/EC301
40
Network Topology- Pros and Cons
STARPros Easy to design and implement Easy to add node Node – central control Elements are isolated from other element
failure.Cons The hub – a single point failure (very
devastating)
© POLISAS/JKE/AMR/2011/EC301
41
Network Topology - Pros and Cons HYBRID
Pros …………? …………?Cons …………?
© POLISAS/JKE/AMR/2011/EC301
42
Network Topology
Others topologies
© POLISAS/JKE/AMR/2011/EC301
43
END OF CHAPTER 1 – PART 1 Question ?
44
© POLISAS/JKE/AMR/2011/EC301
Networking Standards
CHAPTER 1 PART 2
© POLISAS/JKE/AMR/2011/EC301
45
STANDARDS & PROTOCOLS
Standardization is the process of developing and implementing technical standards.
A Standard is a mutual understanding, a shared meaning that is typically derived from the adoption of well-established declarations (but can also be established through social conventions).
A Protocol is a mutually understand method of operating
© POLISAS/JKE/AMR/2011/EC301
46
STANDARD & PROTOCOLS
Standards and protocols establish rules which act as positive constraints on a system, providing a framework for that system, such that the components within it can operate along more strict and manageable interactions.
© POLISAS/JKE/AMR/2011/EC301
47
STANDARD & PROTOCOLS
Think of our roads and the system we have developed for driving. An example of a standard would be the regulation that says a street light should have three different colored lights, a certain hue of green, amber, and red. An example of a protocol would be how to respond when you encounter each of these scenarios. These help us to navigate the road systems in coordination.
© POLISAS/JKE/AMR/2011/EC301
48
NETWORKING STANDARD
Network standards govern the exchange of messages between hardware or software processes on different host computers, including message order, semantics, syntax, reliability, and connection orientation
Also known as protocols Computers are not intelligent, so
standards must be very rigid
© POLISAS/JKE/AMR/2011/EC301
49
NETWORK STANDARDS
Not just computer networking, almost all thing that are deployed or used worldwide have some form of standard in order to work properly .
These are some of the organizations that set standards for networking
•ANSI•EIA & TIA•IEEE•ISO
•ITU•ISOC•IANA & ICANN
© POLISAS/JKE/AMR/2011/EC301
50
ANSI
American National Standard Institute the main organization responsible for
coordinating and publishing computer and information technology standards in the United States
They do not set the standard themselves but oversee and accredit the organizations that actually create the standards – Standards Developing Organizations (SDOs)
www.ansi.org
© POLISAS/JKE/AMR/2011/EC301
51
ANSI
American National Standard Institute It acts as the administrator and coordinator
of US private sector voluntary standardization since1918.
It a nonprofit organization. Accreditation by ANSI signifies that the
procedures used by the standards body in connection with the development of American National Standards meet the Institute’s essential requirements for openness, balance, consensus and due process.
© POLISAS/JKE/AMR/2011/EC301
52
EIA & TIA
Electronic Industries Alliance (EIA): The EIA is an international industry association that is best known for publishing electrical wiring and transmission standards.
© POLISAS/JKE/AMR/2011/EC301
53
EIA & TIA
Telecommunications Industry Association(TIA).
TIA is a part of EIA. It is the communications sector of EIA – responsible for communications standards
TIA is accredited by the American National Standards Institute (ANSI) to develop voluntary industry standards for a wide variety of telecommunications products
© POLISAS/JKE/AMR/2011/EC301
54
EIA & TIA
Since communications, wiring and transmission are related – standard sets by EIA or TIA are often labeled as ‘EIA/TIA’ or ‘TIA/EIA’ Example TIA/EIA-568
a set of three telecommunications standards from the Telecommunications Industry Association, a 1988 offshoot of the EIA. The standards address commercial building cabling for telecom products and services.
© POLISAS/JKE/AMR/2011/EC301
55
EIA & TIA
The best known features of TIA/EIA-568-B.1-2001 are the pin/pair assignments for eight-conductor 100-ohm balanced twisted pair cabling. These assignments are named T568A and T568B, and are frequently referred to as TIA/EIA-568A and TIA/EIA-568B.
© POLISAS/JKE/AMR/2011/EC301
56
IEEE
Institute of Electrical and Electronics Engineers
The IEEE (pronounced “eye-triple-ee”) is a well-known professional organization for those in the electrical or electronics fields, including computers and networking. IEEE's main claim to fame in the networking industry is the IEEE 802 Project, which encompasses many popular networking technologies including Ethernet.
© POLISAS/JKE/AMR/2011/EC301
57
IEEE
IEEE 802 refers to a family of IEEE standards dealing with local area networks and metropolitan area networks.
services and protocols specified in IEEE 802 map to the lower two layers (Data Link and Physical) of the seven-layer OSI** model.
**more in chapter 2
© POLISAS/JKE/AMR/2011/EC301
58
ISO
Probably the biggest standards organization in the world, the ISO is really a federation of standards organizations from dozens of nations.
International Organization for Standardization (ISO)
© POLISAS/JKE/AMR/2011/EC301
59
ISO
In the networking world, the ISO is best known for its OSI Reference Model.
The model provide a framework for both designing networking systems and for explaining how they work.
Other example of ISO standard for networking is ISO/IEC 27032 which provide guidelines for cyber security.
© POLISAS/JKE/AMR/2011/EC301
60
ITU
International Telecommunication Union
another large international body that develops standards for the telecommunications industry
formerly named the International Telephone and Telegraph Consultative Committee or CCITT
© POLISAS/JKE/AMR/2011/EC301
61
ITU
Example of ITU standards. The OSI model is also one of the standard
project by ITU along side ISO. G.hn is the common name for a home network
technology family of standards developed under the International Telecommunication Union's Standardization arm (ITU-T) and promoted by the HomeGrid Forum[1] and several other organizations.[2] The G.hn specification defines networking over power lines, phone lines and coaxial cables with data rates up to 1 Gbit/s.
© POLISAS/JKE/AMR/2011/EC301
62
ISOC
Internet Society a nonprofit organisation founded in 1992
to provide leadership in Internet related standards, education and policy
dedicated to ensuring the open development, evolution and use of the Internet for the benefit of people throughout the world.
© POLISAS/JKE/AMR/2011/EC301
63
ISOC
Internet Society Facilitate and coordinate Internet-related initiatives
around the world Provide leadership in addressing issues that
confront the future of the Internet The organisational home for the groups responsible
for Internet infrastructure standards, including the Internet Engineering Task Force (IETF) and the Internet Architecture Board (IAB).
Act as a global clearinghouse for Internet information and education.
© POLISAS/JKE/AMR/2011/EC301
64
IANA & ICANN
Internet Assigned Numbers Authority (IANA) and Internet Corporation for Assigned Names and Numbers (ICANN) - ICANN managing the Internet Protocol address spaces (IPv4 and
IPv6) assignment of address blocks to
regional Internet registries, for maintaining registries of Internet protocol identifiers, and for the management of the top-level domain name space (DNS root zone), which includes the operation of root nameservers.
Most visibly, much of its work has concerned the introduction of new generic top-level domains (TLDs). The technical work of ICANN is referred to as the "IANA function".
© POLISAS/JKE/AMR/2011/EC301
65
IANA & ICANN
Top Level Domain (TLD) domains at the highest level in the
hierarchical Domain Name System of the Internet.
Organized into 3 main group – Countries (uk,my,us,aus) Categories (edu,gov) , and Multiorganizations (mit,ukm)
With the growth of internet, more generic TLD is define to further enhance the improve the identity of a domain.
© POLISAS/JKE/AMR/2011/EC301
66
END OF CHAPTER 1 – PART 2 Question ?
67
© POLISAS/JKE/AMR/2011/EC301
Basic Requirement For Communication
PRINCIPLES OF COMMUNICATION IN NETWORKING
© POLISAS/JKE/AMR/2011/EC301
68
CONTENTS
PART 3 – PRINCIPLES OF COMMUNICATION IN NETWORKING
In this part, we shall discuss about the terms, principles and processes that happen during a communication in a computer networking environment.
© POLISAS/JKE/AMR/2011/EC301
69
Network Communication
Basic requirement for communication are A sender – create message to transmit A media – carries the message to A receiver – receive the message
This basic requirement is the same for computer network although the word use is different Source Channel destination
© POLISAS/JKE/AMR/2011/EC301
70
Network Communication
Network communication happens when a source produces a data which travel through a network channel
(line,media) which then arrive at a destination (the
recipient)
71
© POLISAS/JKE/AMR/2011/EC301
Rules Of Communication
PRINCIPLES OF COMMUNICATION IN NETWORKING
© POLISA6S/JKE/AMR/2011/EC301
72
Rules Of Communication
In order for communication in network to be successful, there are rules which must be observe and perform during the process of communication.
For these subject, there are six of them in this order :- Establish a link Issue a command and command qualifier Acknowledgment of command Dissection messages Error detection and correction Termination of transmission
© POLISA6S/JKE/AMR/2011/EC301
73
Rules Of Communication
Establish a link To comunicate between two point (source &
destination) there must be a connection (link) between them.
This link can be a direct wire, through the telephone line or by radio signal (wireless).
*Discussion What are the links available for computer
network?
© POLISA6S/JKE/AMR/2011/EC301
74
Rules Of Communication
Issue a command and command qualifier A command must be issue by the sender to
start the communication. The command must use the relevant
qualifier base on the information to be send The qualifier act as a control field for the
command.
© POLISA6S/JKE/AMR/2011/EC301
75
Rules Of Communication
Acknowledgment of command The communication can proceed if the
command given is accept ( the command is according to protocol)
Any error or incorrect command, communication is denied.
Acknowledgement form the recipient is also require in order to determine the communication was a success or not.
© POLISA6S/JKE/AMR/2011/EC301
76
Rules Of Communication
Dissection messages Messages/data cannot be send as one big
chunk of information. most messages/data is not built only by the
concern information itself but also other information such as the data size, protection, timing and others control information for the data.(sender address,receiver address etc)
© POLISA6S/JKE/AMR/2011/EC301
77
Rules Of Communication
Error detection and correction During data transmission there a possible
lost of information or control data. A method to check for error and also make
correction if possible must be present.
© POLISA6S/JKE/AMR/2011/EC301
78
Rules Of Communication
Termination of transmission When error in communication happen, a
mechanism to terminate the communication will terminate/stop the communication.
Also to terminate unsuccessful communication.
Reason This is important so that the communication
channel is free from unwanted data hence freeing the channel for other communication.
79
© POLISAS/JKE/AMR/2011/EC301
Communication Terminologies
PRINCIPLES OF COMMUNICATION IN NETWORKING
© POLISAS/JKE/AMR/2011/EC301
80
Communication Terminologies These are terminologies* that are related
to communication in networking Message Encoding Message Formatting Message Size Message Timing Message Patterns
*Terminologies -the technical or special terms used in a business, art, science, or special subject
© POLISAS/JKE/AMR/2011/EC301
81
Communication Terminologies Encoding is the process of transforming
a set of Unicode characters into a sequence of bytes. Decoding is the reverse process. Example – decoding an ASCII character to
binary.
© POLISAS/JKE/AMR/2011/EC301
82
Communication Terminologies Encoding is the process of transforming
a set of Unicode characters into a sequence of bytes. Decoding is the reverse process. Example – decoding an ASCII character to
binary.ASCII DEC HEX BINARY
X 088 058 01011000
© POLISAS/JKE/AMR/2011/EC301
83
Communication Terminologies Message Formatting
method that determines the structure of the messages it employs. Obviously, a message that is intended to connect a Web server and a Web browser is going to be quite different from one that connects two Ethernet cards at a low level.
Concerned with the formatting or coding used to represent the data
© POLISAS/JKE/AMR/2011/EC301
84
Communication Terminologies Message Size
The size of data sent through any communication channel is limited by the protocol/rules its imply.
Example : - mobile phone SMS usually limit the message size to 160 normal alphabet (7bit) character. For non alphabet character like the Arabic, Chinese, Korean, japanese or Cyrillic alphabet (Russia, Serbian, Bulgarian etc ) need 16-bit of data to represent them hence limiting the size message to 70 character only.
© POLISAS/JKE/AMR/2011/EC301
85
Communication Terminologies Message Timing
Most data transmission uses asynchronous or synchronous method to send the data.
This required certain timing control information.
It also important to check for delays.
© POLISAS/JKE/AMR/2011/EC301
86
Communication Terminologies Message Patterns
In software architecture, a messaging pattern is a network-oriented architectural pattern which describes how two different parts of a message passing system connect and communicate with each other.
In telecommunications, a message exchange pattern (MEP) describes the pattern of messages required by a communications protocol to establish or use a communication channel.
© POLISAS/JKE/AMR/2011/EC301
87
Communication Terminologies
There are two major message exchange patterns — a request-response pattern, and a one-way pattern. For example, the TCP(Transmission Control Protocol) is a request-response pattern protocol, and the UDP (User Datagram Protocol) has a one-way pattern.
88
© POLISAS/JKE/AMR/2011/EC301
Communication Problems
PRINCIPLES OF COMMUNICATION IN NETWORKING
© POLISAS/JKE/AMR/2011/EC301
89
Communication Problems
Most communication problems and errors are related to the terminologies (EFSTP)
© POLISAS/JKE/AMR/2011/EC301
90
END OF CHAPTER 1 – PART 3 Question ?
91
© POLISAS/JKE/AMR/2011/EC301
Network Interface Card Network Interface Controller(NIC)
Functions Of Network Hardware
© POLISAS/JKE/AMR/2011/EC301
92
Summary
Part 4 - Functions Of Network Hardware Identify network hardware Setup hardware and software Peer-peer using cross cable Build a simple LAN Sharing a file Network printer
© POLISAS/JKE/AMR/2011/EC301
93
Network Interface Card
The hardware that provide the interface between a computer and a network Cards on an expansion board inside a
computer (PCI NIC, PCI Express NIC). Cards installed to the computer’s bus
externally (PCMCIA adapter, USB port, FireWire, Compact Flash NIC)
On-board NIC Wireless NIC
© POLISAS/JKE/AMR/2011/EC301
94
Cards on an expansion board inside a computer (PCI NIC, PCI Express NIC)
These are expansion board/card which is slot into the expansion slot in computer motherboard in order to add network functionality to the computer
They come in different type of connection ISA – outdated PCI – most used PCI express - latest
© POLISAS/JKE/AMR/2011/EC301
95
Cards on an expansion board inside a computer (PCI NIC, PCI Express NIC)
ISA network expansion card 1990s Have 2 port type combine in
one card A bayonet cap BNC connector
(left) for use in coaxial-based 10base2 networks
an RJ-45 connector (right) for use in twisted pair-based 10baseT networks.
The ports cannot not be used simultaneously.
© POLISAS/JKE/AMR/2011/EC301
96
Cards on an expansion board inside a computer (PCI NIC, PCI Express NIC)
PCI network expansion card The standard for most pc without onboard
NIC. Usually come as 10/100Mbps combination Auto switch between the two speed
depends on network configuration(or by force-setting in OS)
© POLISAS/JKE/AMR/2011/EC301
97
Cards on an expansion board inside a computer (PCI NIC, PCI Express NIC)
PCI-E network expansion card Following the introduction of PCI-E
expansion slot as standard in today’s PC. 10/100/1000Mbps speed combination The slot pin may vary in size.
© POLISAS/JKE/AMR/2011/EC301
98
NIC Installed Externally
Electronic device miniaturization enable production small electronic device.s
NIC also comes in the form of small adapters /devices that connect directly to external port of a computer.
This allow easy network upgrade compared to previous expansion board type NIC.
© POLISAS/JKE/AMR/2011/EC301
99
NIC Installed Externally
PCMCIA adapter NIC
© POLISAS/JKE/AMR/2011/EC301
100
NIC Installed Externally
USB adapter NIC
© POLISAS/JKE/AMR/2011/EC301
101
NIC Installed Externally
Compact Flash (CF) adapter NIC (wired)
© POLISAS/JKE/AMR/2011/EC301
102
NIC Installed Externally
Fire Wire networking Only for ad-hoc network only (terminal). There no Fire Wire router/switch. But a Fire
Wire hub is available (function same as USB hub)
Support for Fire Wire networking now only available in most OS but not Microsoft Windows.
Microsoft stop supporting IP networking through Fire Wire since Dec 2004.
© POLISAS/JKE/AMR/2011/EC301
103
NIC Installed Externally
Fire Wire networking
6 to 4 pin9 to 4 pin
4 to 4 pin
© POLISAS/JKE/AMR/2011/EC301
104
NIC Installed Externally
Onboard NIC Onboard or built-in NIC refer to network
capability that come with a PC or Laptop mobo as a standard.
User do not need to add an expansion board or an external NIC devices.
Onboard NIC can be both wired NIC (RJ45 port) or wireless NIC.
© POLISAS/JKE/AMR/2011/EC301
105
NIC Installed Externally
Onboard NIC
© POLISAS/JKE/AMR/2011/EC301
106
NIC Installed Externally
Wireless NIC Very popular due to the fact there no need
for a wire to connect to a network. No mess.
Without wire, network can be access from almost anywhere.
Wireless network is easily upgradable. A wireless terminal/device can be setup without any major work of the site.
© POLISAS/JKE/AMR/2011/EC301
107
NIC Installed Externally
Wireless NIC Signal problem was a big factor during the
early stage of the technology introduction. Now no longer an issue. High power
antenna, Repeater and booster is easily available and affordable.
Most concern issue now is security. With small effort and a little investment,
wireless network can be intrude.
© POLISAS/JKE/AMR/2011/EC301
108
NIC Installed Externally
Wireless NIC comes in various form as wired NIC.
© POLISAS/JKE/AMR/2011/EC301
109
NIC Installation & Configuration For windows user, most NIC will work
automatically once install Large driver database in windows. Some may need exact driver/software to
work.
110
© POLISAS/JKE/AMR/2011/EC301
LAN Connectivity Hardware
Functions Of Network Hardware
© POLISAS/JKE/AMR/2011/EC301
111
LAN Connectivity Hardware
NIC – interface between computer and netwrok
Connectivity hardware – devices that interconnects the network and NIC together. Repeater Hub/Switch Bridges Routers Gateways
© POLISAS/JKE/AMR/2011/EC301
112
Repeater
regenerate incoming electrical, wireless or optical signals
Allow signal to be send to further place preserve signal integrity and extend the
distance over which data can safely travel.
FACTS: Cat 5 and Cat 6 cable has limit of 100meters before Experiencing signal lose
© POLISAS/JKE/AMR/2011/EC301
113
Hub / Switch
provides a central connection point for cables from workstations, servers, and peripherals
Most switches are active (a repeater) memorize addressing of computers and
send the information to the correct location directly
© POLISAS/JKE/AMR/2011/EC301
114
Hub / Switch
Usually configured with 8, 12, or 24 RJ-45 ports
Often used in a star or tree topology Sold with specialized software for port
management Also called hubs Usually installed in a standardized
metal rack that also may store netmodems, bridges, or routers
© POLISAS/JKE/AMR/2011/EC301
115
Bridges
To segment network to smaller network To connect old network technology with
new Bridge direct data to it correct LAN.
These reduce the risk of channel flooding.
It behave like a switch but with mush less no of port for connection.
© POLISAS/JKE/AMR/2011/EC301
116
Bridges
© POLISAS/JKE/AMR/2011/EC301
117
Bridges
© POLISAS/JKE/AMR/2011/EC301
118
Routers
Direct signal traffic efficiently Route messages between any two
protocols Route messages between linear bus,
star, and star-wired ring topologies Route messages across fiber optic,
coaxial, and twisted-pair cabling
© POLISAS/JKE/AMR/2011/EC301
119
Routers
© POLISAS/JKE/AMR/2011/EC301
120
Routers
Bridges knows all computer address on each side of network it connect
routers know the addresses of computers, bridges, and other routers on the network.
Routers can even "listen" to the entire network to determine which sections are busiest -- they can then redirect data around those sections until they clear up. (high end router)
© POLISAS/JKE/AMR/2011/EC301
121
Gateways
A gateway is a network point that acts as an entrance to another network.
enable networks off different protocol to communicate
can be implemented completely in software, completely in hardware, or as a combination of both
By definition, gateways appears at edge of the network.
© POLISAS/JKE/AMR/2011/EC301
122
Gateways
© POLISAS/JKE/AMR/2011/EC301
123
Gateways
Most router acts as gateways since they usually installed between network or to internet.
© POLISAS/JKE/AMR/2011/EC301
124
END OF CHAPTER 1 – PART 4 Question ?