SlideShare una empresa de Scribd logo
1 de 52
McGraw-Hill Technology Education
McGraw-Hill Technology Education

Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved.
Chapter 9A

Network Basics

McGraw-Hill Technology Education

Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved.
Network Definition
• Set of technologies that connects
computers
• Allows communication and collaboration
between users

9A-3
The Uses of a Network
• Simultaneous access to data
– Data files are shared
• Access can be limited

– Shared files stored on a server
– Software can be shared
• Site licenses
• Network versions
• Application servers

9A-4
The Uses of a Network
• Shared peripheral device
– Printers and faxes are common shares
– Reduces the cost per user
– Devices can be connected to the network
– Print servers control network printing
• Manage the print queue

9A-5
Sharing Data

File server contains documents
used by other computers.

9A-6
The Uses of a Network
• Personal communication
– Email
• Instantaneous communication

– Conferencing
•
•
•
•

Tele conferencing
Videoconferencing
Audio-conferencing
Data-conferencing

– Voice over IP
• Phone communication over network wires
9A-7
Voice Over IP

9A-8
The Uses of a Network
• Easier data backup
– Backup copies data to removable media
– Server data backed up in one step

9A-9
Common Network Types
• Local Area Network (LAN)
– Contains printers, servers and computers
– Systems are close to each other
– Contained in one office or building
– Organizations often have several LANS

9A-10
Common Network Types
• Wide Area Networks (WAN)
– Two or more LANs connected
– Over a large geographic area
– Typically use public or leased lines
• Phone lines
• Satellite

– The Internet is a WAN

9A-11
Hybrid Network Types
• Campus Area Networks (CAN)
– A LAN in one large geographic area
– Resources related to the same organization
– Each department shares the LAN

9A-12
Hybrid Network Types
• Metropolitan Area Network (MAN)
– Large network that connects different
organizations
– Shares regional resources
– A network provider sells time

9A-13
Hybrid Network Types
• Home Area Network (HAN)
– Small scale network
– Connects computers and entertainment
appliances
– Found mainly in the home

9A-14
Hybrid Network Types
• Personal Area Network (PAN)
– Very small scale network
– Range is less than 2 meters
– Cell phones, PDAs, MP3 players

9A-15
How Networks Are Structured
• Server based network
– Node is any network device
– Servers control what the node accesses
– Users gain access by logging in
– Server is the most important computer

9A-16
How Networks Are Structured
• Client/Server network
– Nodes and servers share data roles
– Nodes are called clients
– Servers are used to control access
– Database software
• Access to data controlled by server

– Server is the most important computer

9A-17
9A-18
How Networks Are Structured
• Peer to peer networks (P2PN)
– All nodes are equal
– Nodes access resources on other nodes
– Each node controls its own resources
– Most modern OS allow P2PN
– Distributing computing is a form
– Kazaa

9A-19
9A-20
Network Topologies
• Topology
– Logical layout of wires and equipment
– Choice affects
• Network performance
• Network size
• Network collision detection

– Several different types

9A-21
Network Topologies
• Packets
– Pieces of data transmitted over a network
• Packets are created by sending node
• Data is reassembled by receiving node

– Packet header
• Sending and receiving address

– Packet payload
• Number and size of data
• Actual data

– Packet error control
9A-22
Network Topologies
• Bus topology
– Also called linear bus
– One wire connects all nodes
– Terminator ends the wires
– Advantages
• Easy to setup
• Small amount of wire

– Disadvantages
• Slow
• Easy to crash
9A-23
Network Topologies
• Star topology
– All nodes connect to a hub
• Packets sent to hub
• Hub sends packet to destination

– Advantages
• Easy to setup
• One cable can not crash network

– Disadvantages
• One hub crashing downs entire network
• Uses lots of cable
9A-24

– Most common topology
Star Topology

9A-25
Network Topologies
• Ring topology
– Nodes connected in a circle
– Tokens used to transmit data
• Nodes must wait for token to send

– Advantages
• Time to send data is known
• No data collisions

– Disadvantages
• Slow
• Lots of cable
9A-26
Network Topologies
• Mesh topology
– All computers connected together
– Internet is a mesh network
– Advantage
• Data will always be delivered

– Disadvantages
• Lots of cable
• Hard to setup

9A-27
Mesh Topology

9A-28
Network Media
• Links that connect nodes
• Choice impacts
– Speed
– Security
– Size

9A-29
Wire Based Media
• Twisted-pair cabling
– Most common LAN
cable
– Called Cat5 or
100BaseT
– Four pairs of copper
cable twisted
– May be shielded from
interference
– Speeds range from
1 Mbps to 1,000 Mbps
9A-30
Wire Based Media
• Coaxial cable
– Similar to cable TV wire
– One wire runs through cable
– Shielded from interference
– Speeds up to 10 Mbps
– Nearly obsolete

9A-31
Wire Based Media
• Fiber-optic cable
– Data is transmitted
with light pulses
– Glass strand instead
of cable
– Immune to
interference
– Very secure
– Hard to work with
– Speeds up to
100 Gbps
9A-32
Wireless Media
•
•
•
•
•

9A-33

Data transmitted through the air
LANs use radio waves
WANs use microwave signals
Easy to setup
Difficult to secure
Network Hardware
• Network interface cards
– Network adapter
– Connects node to the media
– Unique Machine Access Code (MAC)

9A-34
Network Hardware
• Network linking devices
– Connect nodes in the network
– Cable runs from node to device
– Crossover cable connects two computers

9A-35
Network Hardware
• Hubs
– Center of a star network
– All nodes receive transmitted packets
– Slow and insecure

9A-36
Network Hardware
• Switches
– Replacement for hubs
– Only intended node receives transmission
– Fast and secure

9A-37
Network Hardware
• Bridge
– Connects two or more LANs together
– Packets sent to remote LAN cross
• Other packets do not cross

– Segments the network on MAC addresses

9A-38
Network Hardware
• Router
– Connects two or more LANs together
– Packets sent to remote LAN cross
– Network is segmented by IP address
– Connect internal networks to the Internet
– Need configured before installation

9A-39
Network Hardware
• Gateway
– Connects two dissimilar networks
– Connects coax to twisted pair
– Most gateways contained in other devices

9A-40
Network Cabling
• Cabling specifications
– Bandwidth measures cable speed
• Typically measured in Mbps

– Maximum cable length
– Connector describes the type of plug

9A-41
Network Cabling
• Ethernet
– Very popular cabling technology
– 10 Base T, 10Base2, 10Base5
– Maximum bandwidth 10 Mbps
– Maximum distances100 to 500 meters

9A-42
Network Cabling
• Fast Ethernet
– Newer version of Ethernet
– Bandwidth is 100 Mbps
– Uses Cat5 or greater cable
• Sometimes called 100Base T

– Requires a switch

9A-43
Network Cabling
• Gigabit Ethernet
– High bandwidth version of Ethernet
– 1 to 10 Gbps
– Cat 5 or fiber optic cable
– Video applications

9A-44
Network Cabling
• Token ring
– Uses shielded twisted pair cabling
– Bandwidth between 10 and 25 Mbps
– Uses a multiple access unit (MAU)
– Popular in manufacturing and finance

9A-45
Network Protocols
• Language of the network
– Rules of communication
– Error resolution
– Defines collision and collision recovery
– Size of packet
– Naming rules for computers

9A-46
Network Protocols
• TCP/IP
– Transmission Control Protocol/Internet
Protocol
– Most popular protocol
– Machines assigned a name of 4 numbers
• IP address
• 209.8.166.179 is the White House’s web site

– Dynamic Host Configuration Protocol
• Simplifies assignment of IP addresses

– Required for Internet access
9A-47
Network Protocols
• IPX/SPX
– Internet Packet Exchange/Sequenced
Packet Exchange
– Older protocol
– Associated with Novell Netware
– Replaced by TCP/IP

9A-48
Network Protocols
• NetBEUI
– Network BIOS Extended User Interface
– Used by Windows to name computers
– Transmission details handled by TCP/IP

9A-49
Network Protocols
• Token ring
– Popular in manufacturing and finance
– Nodes communicate when they have the
token

9A-50
Chapter 9A

End of Chapter

McGraw-Hill Technology Education

Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved.
Project due Nov. 16
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•

9A-52

Play the game of FreeCell.
small number on next larger number and alternating color
e.g. Heart Queen on Club King and Spade Jack on Heart Queen
goal: to throw all cards to destination pile
current smallest number of the suit: can be thrown to destination pile
any card can be moved to empty line (stack)
any card can be moved to temporary work space (TMP)
Print every step.
Your last two digits + 1000 are the game number you have to solve.
Game #617:
HQ  CK, S2  TMP, SJ  HQ, C10  DJ, HK  TMP, HK  Line8,
SK  TMP, S10  TMP, SQ  HK, HJ  SQ, S10  HJ, H4  TMP,
D5  C6, H9  S10, C3  TMP, D9  C10, C3 throw, S3  TMP,
H4  Line4, S3  H4, D4  TMP, D3  TMP, D2  S3, C10  Line7,
H5  TMP, DJ  CQ, S4  D5, C4 throw, D3  S4, CQ  DK,
C10  DJ, S7  TMP, SK  Line7, HQ  SK, D4 throw, S3 throw,
S4 throw, H5  C6, CK  TMP, C9  TMP, S9  TMP, CK  Line4,
DQ  CK, CJ  DQ, C7 throw, H6 throw, S8  H9, H7  S8,
S6  H7, D6 throw, S8 throw, S9 throw, CQ  Line2, DK  TMP,
H10  TMP, D10  TMP

Más contenido relacionado

La actualidad más candente

Ppt for tranmission media
Ppt for tranmission mediaPpt for tranmission media
Ppt for tranmission mediaManish8976
 
Computer network basic concepts
Computer network   basic conceptsComputer network   basic concepts
Computer network basic conceptsrahul kapoliya
 
Network Slides
Network SlidesNetwork Slides
Network Slidesiarthur
 
OSI model and TCP/IP model
OSI model and TCP/IP modelOSI model and TCP/IP model
OSI model and TCP/IP modelRubal Sagwal
 
Hub, switch, router, bridge & and repeater
Hub, switch, router, bridge & and repeaterHub, switch, router, bridge & and repeater
Hub, switch, router, bridge & and repeaterMaksudujjaman
 
Chapter 1: Introduction to Data Communication and Networks
Chapter 1: Introduction to Data Communication and NetworksChapter 1: Introduction to Data Communication and Networks
Chapter 1: Introduction to Data Communication and NetworksShafaan Khaliq Bhatti
 
Computer network
Computer networkComputer network
Computer networkKetan Garg
 
Basics of computer networks
Basics of computer networksBasics of computer networks
Basics of computer networksRubal Sagwal
 
Circuit and packet_switching
Circuit and packet_switchingCircuit and packet_switching
Circuit and packet_switchinghoanv
 
Computer networking devices
Computer networking devicesComputer networking devices
Computer networking devicesRajesh Sadhukha
 
Routers.ppt
Routers.pptRouters.ppt
Routers.pptkirbadh
 
protocols and types of protocols.
protocols and types of protocols.protocols and types of protocols.
protocols and types of protocols.Šhæÿæñ Æhmęd
 
Presentation on Transmission Media
Presentation on Transmission MediaPresentation on Transmission Media
Presentation on Transmission MediaSyed Ahmed Zaki
 

La actualidad más candente (20)

Ppt for tranmission media
Ppt for tranmission mediaPpt for tranmission media
Ppt for tranmission media
 
Computer network basic concepts
Computer network   basic conceptsComputer network   basic concepts
Computer network basic concepts
 
Networking Devices
Networking DevicesNetworking Devices
Networking Devices
 
TCP/ IP
TCP/ IP TCP/ IP
TCP/ IP
 
Network Slides
Network SlidesNetwork Slides
Network Slides
 
Switching
SwitchingSwitching
Switching
 
OSI model and TCP/IP model
OSI model and TCP/IP modelOSI model and TCP/IP model
OSI model and TCP/IP model
 
Hub, switch, router, bridge & and repeater
Hub, switch, router, bridge & and repeaterHub, switch, router, bridge & and repeater
Hub, switch, router, bridge & and repeater
 
Chapter 1: Introduction to Data Communication and Networks
Chapter 1: Introduction to Data Communication and NetworksChapter 1: Introduction to Data Communication and Networks
Chapter 1: Introduction to Data Communication and Networks
 
Computer network
Computer networkComputer network
Computer network
 
Basics of computer networks
Basics of computer networksBasics of computer networks
Basics of computer networks
 
Circuit and packet_switching
Circuit and packet_switchingCircuit and packet_switching
Circuit and packet_switching
 
Physical Layer
Physical LayerPhysical Layer
Physical Layer
 
Computer networking devices
Computer networking devicesComputer networking devices
Computer networking devices
 
Routers.ppt
Routers.pptRouters.ppt
Routers.ppt
 
protocols and types of protocols.
protocols and types of protocols.protocols and types of protocols.
protocols and types of protocols.
 
Presentation on Transmission Media
Presentation on Transmission MediaPresentation on Transmission Media
Presentation on Transmission Media
 
Computer networks
Computer networksComputer networks
Computer networks
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Tcp/ip model
Tcp/ip  modelTcp/ip  model
Tcp/ip model
 

Destacado

Basics of storage Technology
Basics of storage TechnologyBasics of storage Technology
Basics of storage TechnologyLopamudra Das
 
Top 10 storage interview questions with answers
Top 10 storage interview questions with answersTop 10 storage interview questions with answers
Top 10 storage interview questions with answersmeganc602
 
Networking Basics
Networking BasicsNetworking Basics
Networking BasicsCarlo Fonda
 

Destacado (6)

NetApp & Storage fundamentals
NetApp & Storage fundamentalsNetApp & Storage fundamentals
NetApp & Storage fundamentals
 
Basics of storage Technology
Basics of storage TechnologyBasics of storage Technology
Basics of storage Technology
 
Netapp Storage
Netapp StorageNetapp Storage
Netapp Storage
 
Storage Basics
Storage BasicsStorage Basics
Storage Basics
 
Top 10 storage interview questions with answers
Top 10 storage interview questions with answersTop 10 storage interview questions with answers
Top 10 storage interview questions with answers
 
Networking Basics
Networking BasicsNetworking Basics
Networking Basics
 

Similar a Network basics (20)

Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computer
 
Intro ch 09_a
Intro ch 09_aIntro ch 09_a
Intro ch 09_a
 
Intro Ch 09A.ppt
Intro Ch 09A.pptIntro Ch 09A.ppt
Intro Ch 09A.ppt
 
Intro Ch 09A.ppt
Intro Ch 09A.pptIntro Ch 09A.ppt
Intro Ch 09A.ppt
 
Intro Ch 09A.ppt
Intro Ch 09A.pptIntro Ch 09A.ppt
Intro Ch 09A.ppt
 
Intro chapter 07_a Networking
Intro chapter 07_a NetworkingIntro chapter 07_a Networking
Intro chapter 07_a Networking
 
Network basics
Network basicsNetwork basics
Network basics
 
Computer Network Basics.pdf
Computer Network Basics.pdfComputer Network Basics.pdf
Computer Network Basics.pdf
 
Chap 9A Networks (Lecture) IT Slides # 1
Chap 9A Networks (Lecture) IT Slides # 1Chap 9A Networks (Lecture) IT Slides # 1
Chap 9A Networks (Lecture) IT Slides # 1
 
Computernetworks.ppt
Computernetworks.pptComputernetworks.ppt
Computernetworks.ppt
 
Chapter 9A
Chapter 9AChapter 9A
Chapter 9A
 
Computernetworksss.ppt
Computernetworksss.pptComputernetworksss.ppt
Computernetworksss.ppt
 
Computernet.ppt
Computernet.pptComputernet.ppt
Computernet.ppt
 
VOip.ppt
VOip.pptVOip.ppt
VOip.ppt
 
Network basicsssssssssssssssssssssss.ppt
Network basicsssssssssssssssssssssss.pptNetwork basicsssssssssssssssssssssss.ppt
Network basicsssssssssssssssssssssss.ppt
 
Networkuses.ppt
Networkuses.pptNetworkuses.ppt
Networkuses.ppt
 
Network basics
Network basicsNetwork basics
Network basics
 
Commonnetwork.ppt
Commonnetwork.pptCommonnetwork.ppt
Commonnetwork.ppt
 
Networktypes.ppt
Networktypes.pptNetworktypes.ppt
Networktypes.ppt
 
Basic networking
Basic networkingBasic networking
Basic networking
 

Más de Ujjwal 'Shanu' (20)

Risk return trade off
Risk return trade offRisk return trade off
Risk return trade off
 
Risk perceprtion of ads of infosys
Risk perceprtion of ads of infosysRisk perceprtion of ads of infosys
Risk perceprtion of ads of infosys
 
Mutual funds
Mutual fundsMutual funds
Mutual funds
 
Corporate governance
Corporate governanceCorporate governance
Corporate governance
 
Whistle blower final
Whistle blower finalWhistle blower final
Whistle blower final
 
M&a
M&aM&a
M&a
 
T test
T testT test
T test
 
Research design
Research designResearch design
Research design
 
Business research
Business researchBusiness research
Business research
 
Measurement and scaling techniques
Measurement  and  scaling  techniquesMeasurement  and  scaling  techniques
Measurement and scaling techniques
 
Taxation
TaxationTaxation
Taxation
 
Shri palaniappan chidambram
Shri palaniappan chidambramShri palaniappan chidambram
Shri palaniappan chidambram
 
Planning
PlanningPlanning
Planning
 
Merger & acquisition
Merger & acquisitionMerger & acquisition
Merger & acquisition
 
Gaar ppt
Gaar pptGaar ppt
Gaar ppt
 
Rbi
RbiRbi
Rbi
 
Production theory
Production theoryProduction theory
Production theory
 
Perfect competition
Perfect competitionPerfect competition
Perfect competition
 
Oligopoly
OligopolyOligopoly
Oligopoly
 
National income
National incomeNational income
National income
 

Último

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 

Último (20)

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 

Network basics

  • 1. McGraw-Hill Technology Education McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved.
  • 2. Chapter 9A Network Basics McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved.
  • 3. Network Definition • Set of technologies that connects computers • Allows communication and collaboration between users 9A-3
  • 4. The Uses of a Network • Simultaneous access to data – Data files are shared • Access can be limited – Shared files stored on a server – Software can be shared • Site licenses • Network versions • Application servers 9A-4
  • 5. The Uses of a Network • Shared peripheral device – Printers and faxes are common shares – Reduces the cost per user – Devices can be connected to the network – Print servers control network printing • Manage the print queue 9A-5
  • 6. Sharing Data File server contains documents used by other computers. 9A-6
  • 7. The Uses of a Network • Personal communication – Email • Instantaneous communication – Conferencing • • • • Tele conferencing Videoconferencing Audio-conferencing Data-conferencing – Voice over IP • Phone communication over network wires 9A-7
  • 9. The Uses of a Network • Easier data backup – Backup copies data to removable media – Server data backed up in one step 9A-9
  • 10. Common Network Types • Local Area Network (LAN) – Contains printers, servers and computers – Systems are close to each other – Contained in one office or building – Organizations often have several LANS 9A-10
  • 11. Common Network Types • Wide Area Networks (WAN) – Two or more LANs connected – Over a large geographic area – Typically use public or leased lines • Phone lines • Satellite – The Internet is a WAN 9A-11
  • 12. Hybrid Network Types • Campus Area Networks (CAN) – A LAN in one large geographic area – Resources related to the same organization – Each department shares the LAN 9A-12
  • 13. Hybrid Network Types • Metropolitan Area Network (MAN) – Large network that connects different organizations – Shares regional resources – A network provider sells time 9A-13
  • 14. Hybrid Network Types • Home Area Network (HAN) – Small scale network – Connects computers and entertainment appliances – Found mainly in the home 9A-14
  • 15. Hybrid Network Types • Personal Area Network (PAN) – Very small scale network – Range is less than 2 meters – Cell phones, PDAs, MP3 players 9A-15
  • 16. How Networks Are Structured • Server based network – Node is any network device – Servers control what the node accesses – Users gain access by logging in – Server is the most important computer 9A-16
  • 17. How Networks Are Structured • Client/Server network – Nodes and servers share data roles – Nodes are called clients – Servers are used to control access – Database software • Access to data controlled by server – Server is the most important computer 9A-17
  • 18. 9A-18
  • 19. How Networks Are Structured • Peer to peer networks (P2PN) – All nodes are equal – Nodes access resources on other nodes – Each node controls its own resources – Most modern OS allow P2PN – Distributing computing is a form – Kazaa 9A-19
  • 20. 9A-20
  • 21. Network Topologies • Topology – Logical layout of wires and equipment – Choice affects • Network performance • Network size • Network collision detection – Several different types 9A-21
  • 22. Network Topologies • Packets – Pieces of data transmitted over a network • Packets are created by sending node • Data is reassembled by receiving node – Packet header • Sending and receiving address – Packet payload • Number and size of data • Actual data – Packet error control 9A-22
  • 23. Network Topologies • Bus topology – Also called linear bus – One wire connects all nodes – Terminator ends the wires – Advantages • Easy to setup • Small amount of wire – Disadvantages • Slow • Easy to crash 9A-23
  • 24. Network Topologies • Star topology – All nodes connect to a hub • Packets sent to hub • Hub sends packet to destination – Advantages • Easy to setup • One cable can not crash network – Disadvantages • One hub crashing downs entire network • Uses lots of cable 9A-24 – Most common topology
  • 26. Network Topologies • Ring topology – Nodes connected in a circle – Tokens used to transmit data • Nodes must wait for token to send – Advantages • Time to send data is known • No data collisions – Disadvantages • Slow • Lots of cable 9A-26
  • 27. Network Topologies • Mesh topology – All computers connected together – Internet is a mesh network – Advantage • Data will always be delivered – Disadvantages • Lots of cable • Hard to setup 9A-27
  • 29. Network Media • Links that connect nodes • Choice impacts – Speed – Security – Size 9A-29
  • 30. Wire Based Media • Twisted-pair cabling – Most common LAN cable – Called Cat5 or 100BaseT – Four pairs of copper cable twisted – May be shielded from interference – Speeds range from 1 Mbps to 1,000 Mbps 9A-30
  • 31. Wire Based Media • Coaxial cable – Similar to cable TV wire – One wire runs through cable – Shielded from interference – Speeds up to 10 Mbps – Nearly obsolete 9A-31
  • 32. Wire Based Media • Fiber-optic cable – Data is transmitted with light pulses – Glass strand instead of cable – Immune to interference – Very secure – Hard to work with – Speeds up to 100 Gbps 9A-32
  • 33. Wireless Media • • • • • 9A-33 Data transmitted through the air LANs use radio waves WANs use microwave signals Easy to setup Difficult to secure
  • 34. Network Hardware • Network interface cards – Network adapter – Connects node to the media – Unique Machine Access Code (MAC) 9A-34
  • 35. Network Hardware • Network linking devices – Connect nodes in the network – Cable runs from node to device – Crossover cable connects two computers 9A-35
  • 36. Network Hardware • Hubs – Center of a star network – All nodes receive transmitted packets – Slow and insecure 9A-36
  • 37. Network Hardware • Switches – Replacement for hubs – Only intended node receives transmission – Fast and secure 9A-37
  • 38. Network Hardware • Bridge – Connects two or more LANs together – Packets sent to remote LAN cross • Other packets do not cross – Segments the network on MAC addresses 9A-38
  • 39. Network Hardware • Router – Connects two or more LANs together – Packets sent to remote LAN cross – Network is segmented by IP address – Connect internal networks to the Internet – Need configured before installation 9A-39
  • 40. Network Hardware • Gateway – Connects two dissimilar networks – Connects coax to twisted pair – Most gateways contained in other devices 9A-40
  • 41. Network Cabling • Cabling specifications – Bandwidth measures cable speed • Typically measured in Mbps – Maximum cable length – Connector describes the type of plug 9A-41
  • 42. Network Cabling • Ethernet – Very popular cabling technology – 10 Base T, 10Base2, 10Base5 – Maximum bandwidth 10 Mbps – Maximum distances100 to 500 meters 9A-42
  • 43. Network Cabling • Fast Ethernet – Newer version of Ethernet – Bandwidth is 100 Mbps – Uses Cat5 or greater cable • Sometimes called 100Base T – Requires a switch 9A-43
  • 44. Network Cabling • Gigabit Ethernet – High bandwidth version of Ethernet – 1 to 10 Gbps – Cat 5 or fiber optic cable – Video applications 9A-44
  • 45. Network Cabling • Token ring – Uses shielded twisted pair cabling – Bandwidth between 10 and 25 Mbps – Uses a multiple access unit (MAU) – Popular in manufacturing and finance 9A-45
  • 46. Network Protocols • Language of the network – Rules of communication – Error resolution – Defines collision and collision recovery – Size of packet – Naming rules for computers 9A-46
  • 47. Network Protocols • TCP/IP – Transmission Control Protocol/Internet Protocol – Most popular protocol – Machines assigned a name of 4 numbers • IP address • 209.8.166.179 is the White House’s web site – Dynamic Host Configuration Protocol • Simplifies assignment of IP addresses – Required for Internet access 9A-47
  • 48. Network Protocols • IPX/SPX – Internet Packet Exchange/Sequenced Packet Exchange – Older protocol – Associated with Novell Netware – Replaced by TCP/IP 9A-48
  • 49. Network Protocols • NetBEUI – Network BIOS Extended User Interface – Used by Windows to name computers – Transmission details handled by TCP/IP 9A-49
  • 50. Network Protocols • Token ring – Popular in manufacturing and finance – Nodes communicate when they have the token 9A-50
  • 51. Chapter 9A End of Chapter McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved.
  • 52. Project due Nov. 16 • • • • • • • • • • • • • • • • • • • • 9A-52 Play the game of FreeCell. small number on next larger number and alternating color e.g. Heart Queen on Club King and Spade Jack on Heart Queen goal: to throw all cards to destination pile current smallest number of the suit: can be thrown to destination pile any card can be moved to empty line (stack) any card can be moved to temporary work space (TMP) Print every step. Your last two digits + 1000 are the game number you have to solve. Game #617: HQ  CK, S2  TMP, SJ  HQ, C10  DJ, HK  TMP, HK  Line8, SK  TMP, S10  TMP, SQ  HK, HJ  SQ, S10  HJ, H4  TMP, D5  C6, H9  S10, C3  TMP, D9  C10, C3 throw, S3  TMP, H4  Line4, S3  H4, D4  TMP, D3  TMP, D2  S3, C10  Line7, H5  TMP, DJ  CQ, S4  D5, C4 throw, D3  S4, CQ  DK, C10  DJ, S7  TMP, SK  Line7, HQ  SK, D4 throw, S3 throw, S4 throw, H5  C6, CK  TMP, C9  TMP, S9  TMP, CK  Line4, DQ  CK, CJ  DQ, C7 throw, H6 throw, S8  H9, H7  S8, S6  H7, D6 throw, S8 throw, S9 throw, CQ  Line2, DK  TMP, H10  TMP, D10  TMP

Notas del editor

  1. Teaching Tip Figure 9A.2 on page 342 visually describes the sharing process. It can be helpful to have students open a shared file that you control. Make a change then have the students open it again. Alternatively, share a document and allow your students to write in it. Then demonstrate how the shared document changes. Spend time discussing why application servers need to be so powerful.
  2. Teaching tip Figure 9A.4 on page 344 shows a print queue. It can be helpful to demonstrate your classroom queue.
  3. Teaching tip It is fun if you can setup a teleconference in your classroom. Students get to learn how to join or create the conference. Additionally, they learn how to participate. Finally, students have fun, especially with shared whiteboards.
  4. Insider information The text describes needing special software to back up data from user drives. However, the backup utility that comes with Windows 2000 and XP is capable of performing this chore.
  5. Teaching tip Use a real world example to describe an organization with interconnected LANs.
  6. Teaching tip Blockbuster Video uses a WAN to connect it’s stores nationwide. Customers from Pittsburgh may rent videos in Hilton Head. Late fees will even be displayed!
  7. Teaching tip An example of a regional resource is a supercomputer. For example, Pittsburgh has the Pittsburgh Super Computing center (www.psc.edu). The various colleges in Pittsburgh connect to the center through a MAN in Pittsburgh.
  8. Insider information PAN is very new. Few devices support PAN. High end cell phones include Bluetooth technology. Once the technology matures, Bluetooth will allow the creation of a PAN.
  9. Teaching tip Spend a few minutes here discussing password policies. Describe why it is important not to give out a password. Also describe why longer, more complicated passwords are important.
  10. Teaching tip Discuss how users managing their own security settings can be bad.
  11. Teaching tip Discuss how your network topology handles collisions. If your students are technical, contrast this with an inferior topology.
  12. Teaching tip For technical students take the time to draw the packet structure on the board. The typical structure is destination address | sending address | packet number | total packets | data size | payload | error control.
  13. Teaching tip Pages 352 and 353 have diagrams of each network topology
  14. Insider information Interference is usually electrical. Magnets, solar flares or electronic devices generate interference.
  15. Teaching tip Remind students that bps is bits per second. Gbps then is billion bits per second.
  16. Teaching tip Now is the time to briefly discuss 802.11 standards. A full discussion of 802.11 is covered in the next section.
  17. Insider Information The Xerox Corporation controls the assignment of Ethernet addresses to NIC manufacturers.
  18. Insider information Twisted pair networks cannot achieve higher than 10 Mbps using a hub. Switches are necessary to achieve 100 Mbps or higher.
  19. Discussion point Ask who in the class has high speed Internet. Then determine if anyone is sharing this to the rest of the house or dorm. If they are, see if they can describe the setup. Most likely, the sharing is done with a router.
  20. Teaching tip Point out that the speed of the cable is the number before the word Base.
  21. Teaching tip Have students determine IP addresses for the computer. On 2000/XP enter ipconfig /all. Windows 98 and back enter winipcfg.
  22. Discussion Point Have students tell you what BIOS stands for.