Networks - PEGSnet

advertisement
Networks
Software Development Unit 2
2010
What is a network?

A network is two or
more computers
connected together
for the purpose of:


sharing resources
(printers, files,
software, hardware)
communication
How are they classified?





Their size: LAN, WAN
Their configuration: client-server, peer-to-peer
(no servers)
The rules they use to exchange data:
protocols
How they are linked together: cable, wireless
Their logical shape (topology): bus, tree, star,
ring, mesh
Types of networks:

Local Area Networks
(LAN)


One location
Wide Area Networks
(WAN)


Centralised WAN: Servers
in one location
Distributed WAN: Servers
distributed throughout
the network (the Internet
is an example of this)
LAN
WAN
Network configurations

Client-server

File server


Application server



Files stored and accessed
from central location
Applications installed and
executed from central
location.
Often used in combination
with file servers
Peer-to-peer


No servers
Applications installed on
each PC, files shared
Protocols




A protocol is a convention or a
standard that controls or
enables the connection,
communication and data
transfer between computers on
a network
Contains rules governing the
syntax, semantics and
synchronization of
communication
May be implemented by
hardware, software or a
combination
Like two people agreeing to
speak the same language…
Communication protocols


Communication protocols are specifically
designed to control data transfer over a
communications channel
Some common examples:
 TCP/IP: Two protocols that control
communication across the Internet and These examples are
some networks
often referred to as the
 POP3, IMAP, SMTP: Protocols that can
‘Internet protocols’
be used to send and receive email
 HTTP: Method of publishing and
retrieving web pages
 FTP: Protocol for sending and receiving
files
Network Protocols



Rules and conventions for
communication between
network devices
The commonly used are
Ethernet, Wi-Fi
Others exist but are not as
widely used
Ethernet

Uses an access method called
CSMA/CD (Carrier Sense Multiple
Access/Collision Detection)



CS – Computers (or nodes) ‘listen’ to
the network to see if there are any
signals being transmitted
MA – All computers (or nodes) can
‘hear’ what is being transmitted on
the network at any one time
CD – Collision detection: two
computers (or nodes) could transmit
at the same time, causing a collision
Ethernet

What happens when there is a
collision?




Each computer (or node) waits a
random amount of time and then
retransmits
The random time delay is usually
enough to ensure the collision does
not reoccur
The Ethernet specified speed is
10Mb/s
The Fast Ethernet standard
increases this to 100Mb/s
Wi-Fi


Based on the 802.11x
standard
Cannot do collision
detection and instead
uses RTS/CTS


RTS: Request to send –
packet sent by the sender
CTS: Clear to send –
packet sent by the
intended recipient that
alerts all other nodes to
be ‘quiet’
TCP/IP

TCP/IP consists of two
protocols: TCP and IP protocol

TCP (Transport Control Protocol)



Used to divide data that needs to be
transmitted into a number of packets,
each with a sequence number
The TCP at the destination address
assembles the data and notifies the
sender if any packets are not received
within a certain time (‘timeout’)
IP (Internet Protocol)

Defines how information gets sent
between network nodes
TCP/IP: IP Address



In order for packets to be able
to be sent across the Internet or
a network, each node must have
a unique IP address (just like a
street address)
Domain Name Servers (DNS)
translate URLs to IP addresses
An IP address consists of 4
bytes (32 bits)

For example: 255.255.255.255
TCP/IP: Packets


TCP divides data to be sent
into packets
Each packet contains:

A header consisting of:








a destination address
a source address
the packet number
the total number of packets
a checksum
and some other things…
The data itself (known as the
payload)
A trailer
TCP/IP: From source to
destination




If a packet arrives at a
destination with an incorrect
checksum, it is discarded
The path from the source to
destination is in flux, therefore
packets ‘get lost’, are corrupted
or are duplicated
If a ‘timeout’ occurs or a packet
is corrupted, a request for a
resend of that packet is sent
After several unsuccessful
attempts at receiving a packet,
the connection is broken
Network Hardware

Network hardware
includes:






Network Interface
Controllers (NICs)
Switches / Hubs
Repeaters
Bridges
Routers
Transmission media
(cabling)
Network interface controller



NICs provide a physical
connection from a
computer (or node) to the
network
Can be integrated on the
motherboard
Each has a unique 48-bit
MAC address




Stored in ROM
Media Access Control
Acts like a name for the card
No two the same
http://en.wikipedia.org/wiki/Network_card
Hubs




Connects a number of
NICs together
Consists of a number of
ports
Signals arriving at one
port and sent to all
other ports
Large number of
collisions: a “dumb
device”
http://en.wikipedia.org/wiki/Ethernet_hub
Switches



Sends data only to the port
that requires it – a “clever
hub”
Reduces collisions – and in
many cases can eliminate
them altogether
Much better than hubs –
traditionally were much
more expensive, but this is
no longer the case
http://en.wikipedia.org/wiki/Network_switch
Repeaters


As a network signal
degrades as it travels
over large distances, a
repeater can be used
to boost the signal
Both switches and hubs
act as repeaters
http://www.unitedsale.net/products/image02/D-Link-DWL-G710-Range-Extender2.jpg
Bridges


Network devices that
can be used to connect
two different physical
networks together
For example, a bridge
could be used to join
an ethernet network
and a fast ethernet
network or a star and a
bus topology
http://www.streamshop.ru/Modems/P6212.jpg
Routers



Acts as a junction between two
or more networks
Directs traffic in the same way
as a switch, but can also
translate and filter (firewall)
Used to connect LANs to the
Internet


For example, a router may
connect to the Internet and be
assigned an IP address by an ISP
IP addresses may exist within the
LAN that duplicate those on the
Internet, but the router ensures
these are private to the LAN
http://shopproducts.howstuffworks.co
m/Linksys+WRT54GS+Wireless+Ro
uter/SF-1/PID-20664068
Bridges vs Routers


Bridges and routers work
in different ways (on
different OSI layers – look
up the definition of this if
you want to know more)
Bridges are not able to
convert from one protocol
to another where routers
can
http://images.amazon.com/images/P/
B000H1L5W4.01._AA280_SCLZZZ
ZZZZ_V61775592_.jpg
Network Cabling


Cables transmit data from
one network node to
another
Several types of cable
exist, each having a
particular bandwidth




Coaxial cable
UTP cable
Fibre optic cable
Different types can be
used within the same
network, but this can
affect bandwidth
Coaxial cable

http://searchnetworking.techtarget.co
m/sDefinition/0,,sid7_gci211806,00.h
tml




http://www.fotosearch.com/resu
lts.asp?keyword=coaxial+cable
&category=&searchtype=sss

Consists of a round conducting
wire, surrounded by an
insulating spacer, surrounded
by a cylindrical conducting
sheath
Highly resistant to signal
interference
Not used much today
Bayonet style connectors
Often associated with bus
networks
Bandwidth: 10Mb/s
UTP Cable





Unshielded Twisted Pair
(UTP) is the most popular
cabling used currently
Also comes in a Shielded
Twisted Pair version, that
prevent interference
Cables are twisted
together to decrease
interference
Length limit is 100 metres
Cheap
UTP Cable




Connector on the end is
called an RJ45
CAT5 is most common
version and provides a
bandwidth of 100Mb/s
CAT5e can provide
1000Mb/s (or a gigabit/s)
CAT6a is a future
specification designed for
10Gb/s!
http://en.wikipedia.org/wiki/Image:U
TP_ethernet_cable_8pin_modular_ja
ck_endings.jpg
http://en.wikipedia.org/wiki/Category
_5_cable
Fiber Optic Cable






Transmits light using the concept of critical angle
As a result, cannot bend through tight angles
Not affected by interference
Can carry multiple signals at the same time
Very hand bandwidth possible
Expensive and difficult to install
http://www.fotosearch.com/PD
S084/aa031778/
Wireless LANs

Wireless network hardware
is available





Wireless router
Wireless NIC
Wireless Access Point
(equivalent to a switch)
Relatively cheap and easy to
install
Encryption a must!


WAP (Wireless Application
Protocol)
WPA, WPA2 are better
Wireless LANs

802.11x is a set of standards
defining the way signals are
formatted, the frequencies they
use and ultimately, transfer speed






802.11a: (1999), max 54Mb/s
802.11b: (1999), max 11Mb/s
802.11g: (2003), max 54Mb/s
802.11n (draft): (2007), max 540Mb/s
Typical speeds are often half the
max speeds due to other network
traffic
Most devices are backwards
compatible, for example a device
might be 802.11bg
http://en.wikipedia.org/wiki/I
mage:Linksys_Router.png
Topology


The arrangement of nodes
within a network
Main types :





Bus
Star
Ring*
Tree
Mesh*
* Not examinable
http://en.wikipedia.org/wiki/I
mage:NetworkTopologies.png
Bus



Contains a backbone
which usually runs the
length of the network
Ends are normally
terminated using special
connectors
Often associated with
coaxial cable
http://compnetworking.about.com/od/networkdesi
gn/ig/Computer-Network-Topologies/BusNetwork-Topology-Diagram.htm
Star

In a star network, a central
point is used to connect all
other network nodes

The central point is usually
a hub or a switch

All messages are routed
through the central
computer which acts as a
traffic cop to prevent
collisions.
http://compnetworking.about.com/od/networkdesi
gn/ig/Computer-Network-Topologies/RingNetwork-Topology-Diagram.htm

Any connection failure between a
node and the hub will not affect the
overall system.

Common network topology

Easy and cheap to implement
Tree Topology
 In a hierarchical network, one computer,
usually the mainframe, controls the
entire network. It can be described as a
multiple star network with various levels
of computers with their own smaller
network, and so on down the
hierarchical chain. The network branches
out similar to a tree.


A tree topology
combines star
and bus
topologies
Usually this takes
the form of star
networks linked
by a network
backbone (or a
bus network)
http://compnetworking.about.com/od/networkdesign/ig/ComputerNetwork-Topologies/Tree-Network-Topology-Diagram.htm

These networks are a lot easier to
repair than other topologies because
you can isolate the problem and it will
not have too much of an effect on the
rest of the network.
Server
Switch
Switch
Mesh Topology

In a mesh topology system every
computer is connected to every other
computer. Designed to offer the
maximum amount of reliability for data
transit and fault-tolerance.
The major problem is the amount of
cabling necessary to create this
topology, plus each link from one
device to another requires an individual
network card.
 Not only are physical components
wasted, but the overall capacity to carry
data is grossly under-utilised unless all
computers are transmitting to one
another almost constantly.


Typically, a mesh network is used by
governments and the defence forces, so
if one computer or a number of
components are knocked out by warfare,
enough links still exist for all of the
remaining computers to be able to talk
to each other.
A mesh topology is
one in which paths
between network
nodes are often
changing as the
status of nodes
changes
 The Internet is a
perfect example of a
mesh topology

http://compnetworking.about.com/od/networkdesign/ig/ComputerNetwork-Topologies/Mesh-Network-Topology-Diagram.htm
Hybrid Topology

A Hybrid topology can be formed by
using elements from more than one of
four topologies - star, ring, bus, mesh.
Ring

All network nodes are
connected in a ring

A token is passed around
the network from one
computer to another

Only the node that holds
the token can transmit
data

No collisions
http://compnetworking.about.com/od/networkdesi
gn/ig/Computer-Network-Topologies/RingNetwork-Topology-Diagram.htm

Used to be implemented using coaxial
cable and is sometimes used with fibre
optic cable today

Two rings transmitting data in different
directions can be used
Other Network Components
Cont

Network Operating System (NOS)
Network Operating Systems
The most popular NOSes are:
•Novell Netware (better, more expensive at first,
cheaper over time)
•Microsoft Server 2003 (now dominant)
They offer similar services.
Network Operating System
(NOS)

Server is a generic term applied to any
machine running a ‘service’ application.
Eg access to shared files (file server) or
access to shared printers (print server).

These tasks, and many more, are
controlled by the Network Operating
System.

A NOS operates in the same way to the
operating system of a PC; however it
has special capabilities that enable it to
connect computers and peripheral
devices, such as printers, to a LAN.

All networking software has a range of
functions to perform once the
connection has been made:
These functions are:
1.
2.
3.
4.
Administration
File Management
Other Resource Management
Security
1.
Administration - the management of
users is the main task. Their
authorisation details need to be added,
deleted and organised into groups.
Backup procedures need to be run.
2.
File Management - the location and
transfers of files being used needs to
be managed between users and
storage locations.
3.
Other Resource Management such as printer management that
involves the spooling of print tasks
and the allocation of these tasks to
the appropriate printer.
4.
Security - the access rights of users
need to be set up and monitored.
Popular Network Operating
Systems

Unix - a multi-user, multi-tasking
operating system that can be used on
a variety of computers ranging from a
mainframe to a personal computer.

Novell NetWare - the most popular
of all NOS. provides users with a
regular interface that is self-sufficient
of the hardware being used at the
time. It is a stand-alone system which
is situated on the server.

Windows 2000, Windows Server
2003 & Windows Server 2008 - is
the major upgrade of Windows NT; it
allows for plug-and-play, which
enables the addition of peripheral
devices. It also uses ‘active directory’
which makes network administration
simpler and more stable.

Linux - is a version of Unix that runs
on a number of hardware platforms.
Because of its stability it is very
popular with Internet Service
Providers (ISPs) as an operating
system for web servers.

Mac OSX Server -is a line of computer
operating systems developed, marketed,
and sold by Apple Inc, the latest of
which is pre-loaded on all currently
shipping Macintosh computers.

Mac OS X is the successor to the
original Mac OS, which had been
Apple's primary operating system since
1984.

Unlike its predecessors, Mac OS X is a
Unix-based operating system built on
technology that had been developed
through the second half of the 1980s.
Servers
Robust central computers at the
heart of a network.
File servers are the most common
server type.
File Servers
File servers run the Network operating system
(NOS) which handles:
•authenticating users during login
•controlling users’ access to resources based on their
rights
•managing print queues
•doing backups
•running centralised software such as virus scanners
•running services like DHCP to give out IP addresses
to workstations
• controlling internet services
File Servers
Servers don’t really have anything special in terms of
hardware.
Expensive because of their high-quality components,
and “scalability” (expandability).
•Memory – servers love lots of RAM.
•Storage –need large and fast hard disks – often RAID
(discussed soon)
File Servers vs Desktops 1
•CPU Processing power – not very important in a file server
•Backup – most servers have inbuilt high-capacity tape
backup drives to protect against data loss. Tape drives usually
use QIC (Quarter Inch Cartridge) DAT (Digital audio tapes)
tapes.
Servers are the muscle men in
the computer world
File Servers vs Desktops 2
Connectivity – servers often have two or more gigabit NICs
to increase their data-throughput.
Robustness - servers run all day for years, and need rugged
high-quality components
Scalability –the ability to increase the size and power of
equipment and networks as required e.g. add 8 hard disks,
two power supplies, two NICs, two CPUs, lots of RAM etc.
Designing and engineering this expandability is expensive.
R.A.I.D.
Redundant Array of Independent [or
Inexpensive] Disks) arrays for reliability
and/or speed.
RAID uses a group of hard disks that work
as a single disk under a RAID controller.
Flavours of RAID: RAID0 to RAID10 (RAID
1 + RAID 0) offer reliability and/or speed
(at ever-increasing cost). Includes
mirroring (for reliability) and striping (for
speed).
RAID disks are usually "Hot Swap".
EXPENSIVE – needs justifying for small
organisation
3-disk RAID array
Server farms
On smaller networks, network services are
performed by software in a single server.
On busy LANs, multiple servers share the work…
•Login servers – authenticate users
•Proxy servers – cache downloads
•DHCP servers – allocate IP addresses
•Print servers –manage print job queues
•Web/FTP servers – serve web pages or files
•Email servers –handle email
Proxy Servers
A proxy server is a program on a special
server computer that is used to access
websites on behalf of other computers;
hence it acts as a proxy for the actual
Internet.
 When a computer wants a website, it is
retrieved by the proxy server and then
sent to the requesting computer after it
has passed the firewall program.

Security
Download