Tải bản đầy đủ (.ppt) (56 trang)

Mang may tinh 1

Bạn đang xem bản rút gọn của tài liệu. Xem và tải ngay bản đầy đủ của tài liệu tại đây (2.59 MB, 56 trang )

<span class='text_page_counter'>(1)</span><div class='page_container' data-page=1>

<b>Ch.2 – Networking Fundamentals</b>



</div>
<span class='text_page_counter'>(2)</span><div class='page_container' data-page=2>

<b>Overview</b>



Students completing this module should be able to:



Explain the importance of bandwidth in networking.



Use an analogy from their experience to explain bandwidth.



Identify bps, kbps, Mbps, and Gbps as units of bandwidth.



Explain the difference between bandwidth and throughput.



Calculate data transfer rates.



Explain why layered models are used to describe data communication.



Explain the development of the Open System Interconnection model (OSI).



List the advantages of a layered approach.



Identify each of the seven layers of the OSI model.



Identify the four layers of the TCP/IP model.



Describe the similarities and differences between the two models.



Briefly outline the history of networking.



Identify devices used in networking.




Understand the role of protocols in networking.



Define LAN, WAN, MAN, and SAN.



Explain VPNs and their advantages.



</div>
<span class='text_page_counter'>(3)</span><div class='page_container' data-page=3>

<b>Data networks</b>



One early solution was the creation of local-area network (LAN) standards.


Because LAN standards provided an open set of guidelines for creating



network hardware and software, the equipment from different companies


could then become compatible.



This allowed for stability in LAN implementation.



In a LAN system, each department of the company is a kind of electronic


island.



</div>
<span class='text_page_counter'>(4)</span><div class='page_container' data-page=4>

<b>Data networks</b>



What was needed was a way for information to move



efficiently and quickly, not only within a company, but also


from one business to another.



</div>
<span class='text_page_counter'>(5)</span><div class='page_container' data-page=5></div>
<span class='text_page_counter'>(6)</span><div class='page_container' data-page=6></div>
<span class='text_page_counter'>(7)</span><div class='page_container' data-page=7></div>
<span class='text_page_counter'>(8)</span><div class='page_container' data-page=8></div>
<span class='text_page_counter'>(9)</span><div class='page_container' data-page=9></div>
<span class='text_page_counter'>(10)</span><div class='page_container' data-page=10>

<b>Network topology</b>



Network topology defines the structure of the network.




Physical topology, which is the actual layout of the wire or media.



Logical topology, which defines how the media is accessed by the hosts for


sending data.



The logical topology of a network is how the hosts communicate across the


medium.



</div>
<span class='text_page_counter'>(11)</span><div class='page_container' data-page=11>

<b>Bus Topology</b>



</div>
<span class='text_page_counter'>(12)</span><div class='page_container' data-page=12></div>
<span class='text_page_counter'>(13)</span><div class='page_container' data-page=13></div>
<span class='text_page_counter'>(14)</span><div class='page_container' data-page=14>

<b>Ring Topology</b>



</div>
<span class='text_page_counter'>(15)</span><div class='page_container' data-page=15>

<b>Token Ring</b>



</div>
<span class='text_page_counter'>(16)</span><div class='page_container' data-page=16>

<b>Star Topology</b>



“A star topology connects all cables to a central point of



</div>
<span class='text_page_counter'>(17)</span><div class='page_container' data-page=17>

<b>Extended Star Topology</b>



“An extended star topology uses the star topology to be created. It links


individual stars together by linking the hubs/switches. This, as you will


learn later in the chapter, will extend the length and size of the



</div>
<span class='text_page_counter'>(18)</span><div class='page_container' data-page=18>

<b>Hierarchical Topology</b>



</div>
<span class='text_page_counter'>(19)</span><div class='page_container' data-page=19>

<b>Hierarchical Topology</b>



</div>
<span class='text_page_counter'>(20)</span><div class='page_container' data-page=20>

<b>Mesh Topology</b>




“A mesh topology is used when there can be absolutely no break in



communications, for example the control systems of a nuclear power


plant. So as you can see in the graphic, each host has its own



connections to all other hosts. This also reflects the design of the


Internet, which has multiple paths to any one location.”



</div>
<span class='text_page_counter'>(21)</span><div class='page_container' data-page=21></div>
<span class='text_page_counter'>(22)</span><div class='page_container' data-page=22>

<b>Network protocols</b>



Protocol suites are collections of protocols that enable network



communication from one host through the network to another host.



A protocol is a formal description of a set of rules and conventions that


govern a particular aspect of how devices on a network communicate.


Protocols determine the format, timing, sequencing, and error control


in data communication.



</div>
<span class='text_page_counter'>(23)</span><div class='page_container' data-page=23>

<b>Network protocols</b>



Protocols control all aspects of data communication, which include the


following:



How the physical network is built



How computers connect to the network



How the data is formatted for transmission




How that data is sent



How to deal with errors


Examples



Institute of Electrical and Electronic Engineers (IEEE),



American National Standards Institute (ANSI),



Telecommunications Industry Association (TIA),



Electronic Industries Alliance (EIA)



International Telecommunications Union (ITU), formerly known as the


Comité Consultatif International Téléphonique et Télégraphique



</div>
<span class='text_page_counter'>(24)</span><div class='page_container' data-page=24>

<b>Local-area networks (LANs)</b>



Some common LAN technologies are:



Ethernet



Token Ring



</div>
<span class='text_page_counter'>(25)</span><div class='page_container' data-page=25>

<b>Wide-area networks (WANs)</b>



Some common WAN technologies are:


Modems


Integrated Services Digital Network (ISDN)


Digital Subscriber Line (DSL)


Frame Relay


US (T) and Europe (E) Carrier Series – T1, E1, T3, E3


</div>
<span class='text_page_counter'>(26)</span><div class='page_container' data-page=26>

<b>Metropolitan-area networks (MANs)</b>



A MAN is a network that spans a metropolitan area such as a city or


suburban area.



A MAN usually consists of two or more LANs in a common geographic


area.



</div>
<span class='text_page_counter'>(27)</span><div class='page_container' data-page=27>

<b>Storage-area networks (SANs)</b>



A SAN is a dedicated, high-performance network used to move data between


servers and storage resources.



SANs offer the following features:



<b>Performance</b>

– SANs enable concurrent access of disk or tape arrays by two


or more servers at high speeds, providing enhanced system performance.



<b>Availability</b>

– SANs have disaster tolerance built in, because data can be


mirrored using a SAN up to 10 kilometers (km) or 6.2 miles away.




</div>
<span class='text_page_counter'>(28)</span><div class='page_container' data-page=28>

<b>Virtual private network (VPN)</b>



VPN is a private network that is constructed within a public network


infrastructure such as the global Internet.



Using VPN, a telecommuter can access the network of the company



headquarters through the Internet by building a secure tunnel between the


telecommuter’s PC and a VPN router in the headquarters.



</div>
<span class='text_page_counter'>(29)</span><div class='page_container' data-page=29>

<b>Benefits of VPNs</b>



The following are the three main types of VPNs:


<b>Access VPNs </b>– Access VPNs provide remote access to a mobile worker and small
office/home office (SOHO) to the headquarters of the Intranet or Extranet over a shared
infrastructure.


<b>Intranet VPNs</b> – Intranet VPNs link regional and remote offices to the headquarters of
the internal network over a shared infrastructure using dedicated connections. Allow
access only to the employees of the enterprise.


<b>Extranet VPNs</b> – Extranet VPNs link business partners to the headquarters of the


</div>
<span class='text_page_counter'>(30)</span><div class='page_container' data-page=30>

<b>Intranets and extranets</b>



<b>Intranets</b> are designed to permit access by users who have access privileges to the
internal LAN of the organization.


Within an Intranet, Web servers are installed in the network.


Browser technology is used as the common front end to access information such as
financial data or graphical, text-based data stored on those servers.


<b>Extranets</b> refer to applications and services that are Intranet based, and use extended,
secure access to external users or enterprises.


</div>
<span class='text_page_counter'>(31)</span><div class='page_container' data-page=31>

<b>Importance of bandwidth</b>



Bandwidth is defined as the amount of information that can flow


through a network connection in a given period of time.



</div>
<span class='text_page_counter'>(32)</span><div class='page_container' data-page=32></div>
<span class='text_page_counter'>(33)</span><div class='page_container' data-page=33>

<b>Measurement</b>



In digital systems, the basic unit of bandwidth is bits per


second (bps).



Bandwidth is the measure of how much information, or bits,


can flow from one place to another in a given amount of



</div>
<span class='text_page_counter'>(34)</span><div class='page_container' data-page=34>

<b>Limitations</b>



Bandwidth varies depending upon the type of media as well as the LAN and WAN


technologies used.



The physics of the media account for some of the difference.



Signals travel through twisted-pair copper wire, coaxial cable, optical fiber, and


air.




</div>
<span class='text_page_counter'>(35)</span><div class='page_container' data-page=35>

<b>Throughput</b>



Throughput refers to actual measured bandwidth, at a specific time of day, using


specific Internet routes, and while a specific set of data is transmitted on the network.


Throughput is often far less than the maximum possible digital bandwidth of the
medium that is being used. Internetworking devices


The following are some of the factors that determine throughput:


Type of data being transferred


Network topology


Number of users on the network


User computer


Server computer


</div>
<span class='text_page_counter'>(36)</span><div class='page_container' data-page=36>

<b>Data transfer calculation</b>



Using the formula transfer time = size of file / bandwidth (T=S/BW)


allows a network administrator to estimate several of the important


components of network performance.



</div>
<span class='text_page_counter'>(37)</span><div class='page_container' data-page=37>

<b>Digital versus analog</b>



Analog bandwidth is measured by how much of the electromagnetic spectrum is

occupied by each signal.


The basic unit of analog bandwidth is hertz (Hz), or cycles per second.


While analog signals are capable of carrying a variety of information, they have some
significant disadvantages in comparison to digital transmissions.


The analog video signal that requires a wide frequency range for transmission cannot
be squeezed into a smaller band.


Therefore, if the necessary analog bandwidth is not available, the signal cannot be
sent.


In digital signaling all information is sent as bits, regardless of the kind of information it
is.


</div>
<span class='text_page_counter'>(38)</span><div class='page_container' data-page=38>

<b>Other information</b>



For most of this chapter we will rely on other sources.



Comer does a good job in explaining “what happens” but


does not provide enough information to see “how it works.”



</div>
<span class='text_page_counter'>(39)</span><div class='page_container' data-page=39>

<b>Digital and Analog Bandwidth</b>



<b>Bandwidth = The width or carrying capacity of a communications circuit.</b>


<b>Digital bandwidth = the number of bits per second (bps) the circuit can </b>



carry




used in digital communications such as T-1 or DDS



measure in bps



T-1 -> 1.544 Mbps



<b>Analog bandwidth = the range of frequencies the circuit can carry</b>



used in analog communications such as voice (telephones)



measured in Hertz (Hz), cycles per second



</div>
<span class='text_page_counter'>(40)</span><div class='page_container' data-page=40>

Digital and Analog Bandwidth



GOLDMAN: DATACOMM
FIG.02-14
<i><b>DTE</b></i> <i><b>DCE</b></i>
<i><b>DTE</b></i> <i><b>DCE</b></i>
<i><b>Modulation</b></i>
<i><b>Demodulation</b></i>
digital analog
digital analog
<i><b>PSTN </b></i>
Dial-up network
<i><b>PSTN </b></i>
Dial-up network

<b>Digital Signals</b>



digital signal = a signal whose state consists of discrete elements such


as high or low, on or off




<b>Analog Signals</b>



analog signal = a signal which is “analogous” to sound waves



</div>
<span class='text_page_counter'>(41)</span><div class='page_container' data-page=41></div>
<span class='text_page_counter'>(42)</span><div class='page_container' data-page=42>

<b>Analog Signals, Modulation and Modem </b>


<b>Standards</b>



A perfect or steady tone makes a wave with consistent height


(amplitude) and pitch (frequency) which looks like a

<i><b>sine wave.</b></i>



(Figure 4-15)



A cycle or one complete cycle of the wave



The frequency (the number of cycles) of the wave is measured in Hertz



</div>
<span class='text_page_counter'>(43)</span><div class='page_container' data-page=43></div>
<span class='text_page_counter'>(44)</span><div class='page_container' data-page=44>

<b>Using layers to analyze problems in a flow </b>


<b>of materials </b>



The concept of layers is used to describe communication from one computer to another.


The OSI and TCP/IP models have layers that explain how data is communicated from
one computer to another.


The models differ in the number and function of the layers.


</div>
<span class='text_page_counter'>(45)</span><div class='page_container' data-page=45>

<b>Using layers to describe data </b>


<b>communication </b>




In order for data packets to travel from a source to a



destination on a network, it is important that all the devices


on the network speak the same language or protocol.



</div>
<span class='text_page_counter'>(46)</span><div class='page_container' data-page=46>

<b>OSI model</b>



To address the problem of network incompatibility, the International



Organization for Standardization (ISO) researched networking models like


Digital Equipment Corporation net (DECnet), Systems Network Architecture


(SNA), and TCP/IP in order to find a generally applicable set of rules for all


networks.



Using this research, the ISO created a network model that helps vendors


create networks that are compatible with other networks.



The Open System Interconnection (OSI) reference model released in 1984 was


the descriptive network model that the ISO created.



It provided vendors with a set of standards that ensured greater compatibility


and interoperability among various network technologies produced by



</div>
<span class='text_page_counter'>(47)</span><div class='page_container' data-page=47></div>
<span class='text_page_counter'>(48)</span><div class='page_container' data-page=48>

<b>OSI layers</b>



• It breaks network communication into smaller, more manageable parts.


• It standardizes network components to allow multiple vendor development and
support.



• It allows different types of network hardware and software to communicate with
each other.


• It prevents changes in one layer from affecting other layers.


</div>
<span class='text_page_counter'>(49)</span><div class='page_container' data-page=49>

<b>Peer-to-peer communications </b>



In order for data to travel from the source to the destination, each layer of the


OSI model at the source must communicate with its peer layer at the



destination.



This form of communication is referred to as peer-to-peer.



During this process, the protocols of each layer exchange information, called


protocol data units (PDUs).



</div>
<span class='text_page_counter'>(50)</span><div class='page_container' data-page=50>

<b>TCP/IP model</b>



Unlike the proprietary networking technologies mentioned earlier,


TCP/IP was developed as an open standard.



This meant that anyone was free to use TCP/IP. This helped speed up


the development of TCP/IP as a standard.



Although some of the layers in the TCP/IP model have the same name


as layers in the OSI model, the layers of the two models do not



</div>
<span class='text_page_counter'>(51)</span><div class='page_container' data-page=51>

<b>TCP/IP model</b>




Some of the common protocols specified by the TCP/IP reference model layers. Some of the
most commonly used application layer protocols include the following:


File Transfer Protocol (FTP)


Hypertext Transfer Protocol (HTTP)


Simple Mail Transfer Protocol (SMTP)


Domain Name System (DNS)


Trivial File Transfer Protocol (TFTP)
The common transport layer


protocols include:


Transport Control Protocol (TCP)


User Datagram Protocol (UDP)
The primary protocol of the


Internet layer is:


</div>
<span class='text_page_counter'>(52)</span><div class='page_container' data-page=52>

<b>TCP/IP model</b>



Networking professionals differ in their opinions on which model to use. Due to the


nature of the industry it is necessary to become familiar with both. Both the OSI


and TCP/IP models will be referred to throughout the curriculum. The focus will be


on the following:




TCP as an OSI Layer 4 protocol



IP as an OSI Layer 3 protocol



Ethernet as a Layer 2 and Layer 1 technology



</div>
<span class='text_page_counter'>(53)</span><div class='page_container' data-page=53>

<b>Detailed encapsulation process </b>



All communications on a network originate at a source, and are sent to


a destination.



The information sent on a network is referred to as data or data


packets. If one computer (host A) wants to send data to another



</div>
<span class='text_page_counter'>(54)</span><div class='page_container' data-page=54>

<b>Detailed encapsulation process</b>



Networks must perform the following five conversion steps in order to


encapsulate data:



<b>1.</b>

<b>Build the data. </b>



<b>2.</b>

<b>Package the data for end-to-end transport.</b>



<b>3.</b>

<b>Add the network IP address to the header. </b>



<b>4.</b>

<b>Add the data link layer header and trailer.</b>



</div>
<span class='text_page_counter'>(55)</span><div class='page_container' data-page=55>

<b>Application </b>


<b>Header + data</b>




Data Encapsulation Example



Let us focus on the Layer 2, Data Link, Ethernet Frame for


now.



010010100100100100111010010001101000…



<b>Application Layer</b>



<b>Layer 4: Transport Layer</b>


<b>Layer 3: Network Layer</b>



<b>Layer 2: </b>


<b>Network </b>


<b>Layer</b>



</div>
<span class='text_page_counter'>(56)</span><div class='page_container' data-page=56></div>

<!--links-->

Tài liệu bạn tìm kiếm đã sẵn sàng tải về

Tải bản đầy đủ ngay
×