Uploaded by Basil Manganyi

Network assignment topologies

advertisement
Table of Contents
Question 1 ..................................................................................................................................................... 1
1.1.1. Networking Topologies ................................................................................................................... 1
WAN ...................................................................................................................................................... 1
Star Topology ........................................................................................................................................ 1
1.1.2. Connectors ...................................................................................................................................... 1
Hub ........................................................................................................................................................ 1
Bridge .................................................................................................................................................... 2
Switch .................................................................................................................................................... 2
Router ................................................................................................................................................... 2
1.1.3. Wiring standards ............................................................................................................................. 3
Fiber-optic cable ................................................................................................................................... 3
Crossover cable ..................................................................................................................................... 3
Rollover Cable ....................................................................................................................................... 4
Loopback cable...................................................................................................................................... 4
1.1.4. Data Transmission ........................................................................................................................... 4
Firewalls ................................................................................................................................................ 5
Noise Immunity STP .............................................................................................................................. 5
CSMA/CD ............................................................................................................................................... 5
Frequency.............................................................................................................................................. 6
Bibliography ........................................................................................Ошибка! Закладка не определена.
Question 1
1.1.1. Networking Topologies
WAN
The K & G has different companies that need to be connected. Which suggest that the K & G
companies will need to be connected over a Wide Area Network. By installing routers and
public links in each company all companies can be connected to a common network. The
routers can connect two LAN’s into a single merged ranged network. Topologies describe the
layout characteristics of a network such as displaying were certain components of the network
are allocated and connected to each other mainly components such as computers, cables and
hubs.
Star Topology
Comparing all topologies one that is best recommended in all network cases is star topology. A
star topology’s computers are connected to a central point with their own individual cables or
wireless connections. Central point which is usually a device like a hub, a switch, or an access
point. Star topology offers a lot of advantages over bus topology, making it more widely used
even though it obviously requires more physical media. Advantages such as due each K & G
computer or network segment is connected to the central device individually, if the cable fails,
It brings down only that particular machine or network segment. That’s truly a great benefit
because it makes the network much more fault tolerant as well as a lot easier to troubleshoot.
Another great thing about a star topology is that it’s a lot more scalable—all you have to do if
you want to add to it is run a new cable and connect to the machine at the core of the star. If
cost isn’t an issue than a hybrid topology can be installed. Due to the fact that its combined
topologies this means more advantages for the K & G’s network.
The star topology will have a backbone in the network. Which is a cable with high performance
power and significant bandwidth that is a core for the network, which the servers and the K & G
network segments will be connected to the backbone? A Gigabit Ethernet will be ideal due to
its high bandwidth and capacity.
1.1.2. Connectors
Hub
A Hub device will be placed at each segment of the K & G network as a central point of the
network. Hub is the device that connects all the segments of the network together in a star
topology Ethernet network. All devices in the network that connect to the hub through a single
cable and is used to connect multiple devices without segmenting a network. Any transmission
received on one port will be sent out all the other ports in the hub, including the receiving pair
for the transmitting device, so that Carrier Sense Multiple Access with Collision Detection
(CSMA/CD) on the transmitter can detect any collision occurrence. By so, basically, this means
that if one station sends a broadcast, all the others will receive it; yet based on the addressing
found in the frame, only the intended recipient will actually listen to it. This arrangement
simulates the physical bus that the CSMA/CD standard was based on.
Bridge
A bridge is also another device that can be used to connect network segments and separate
network domains. This means that collision domains will be separate in a network also resulting
in less traffic in the network as an advantage. The bridge only allows traffic to pass through the
device only if the data transmitted is intended to reach the other segment computers on the
network. Bridges are software based meaning software must be installed and bridge devices
can be monitored and checked for network performances.
Switch
The best connector to be used is a switch. A switch is a device that connects network segments
unlike the hub a switch can recognize frames pays attention to the source and destination MAC
address of the incoming frame as well as the port on which it was received. When a switch
identifies that a frame’s source happens to be on a segment that’s connected via a different
port than the one on which the frame was received, the switch will only forward the frame out
from the specific port on which its destination is located. If the switch can’t figure out the
location of the frame’s destination, it will flood the frame out every port except the one on
which the frame port was received. Which will be a benefit the K & G network segments for the
source detection and the ability to send frames?
Router
A router is a network device used to connect network segments together by combining them
into an internetwork. A well-configured router can make intelligent decisions about the best
way to get network data to its destination. It gathers the information it needs to make these
decisions based on a network’s particular performance data. Router that provides wired and
wireless access for hosts and connects them to the Internet without any necessary
configuration. But know that I certainly don’t recommend leaving a router with the default
configuration. Routers can be multifaceted devices that behave like computers unto themselves
with their own complex operating systems—for example, Cisco’s IOS. You can even think of
them as CPUs that are totally dedicated to the process of routing packets. And due to their
complexity and flexibility, you can configure them to actually perform the functions of other
types of network devices such as firewalls, for example) by simply implementing a specific
feature within the router’s software.
1.1.3. Wiring standards
Fiber-optic cable
Fiber-optic cable uses light impulses to transmit digital signals rather than electric, it’s immune
to EMI and RFI meaning noise and wire tapping making it safer to install these wires to protect
K & G’s information. UTP cable run down an elevator shaft would definitely use fiber feature
because fiber cable allows light impulses to be carried on either a glass or a plastic core. Glass
can carry the signal a greater distance, but plastic costs less. The core surrounded by a glass or
plastic cladding with a different refraction index that reflects the light back into the core.
Around this is a layer of flexible plastic buffer that can be wrapped in an armor coating that’s
usually Kevlar which is then sheathed in PVC or plenum. The cable comes in single-mode fiber
SMF or multimode fiber MMF the difference between them is in the number of light rays (the
number of signals) they can carry. Multimode fiber is most often used for shorter-distance
applications and single-mode fiber for spanning longer distances. Although fiber-optic cable
may sound like the solution to many problems, it has pros and cons just like the other cable
types. Advantages include immunity to EMI and RFI, Can transmit up to 40 kilometers (about
25 miles) Disadvantages, Is difficult to install, Is more expensive than twisted-pair,
Troubleshooting equipment is more expensive than twisted-pair test equipment, Is harder to
troubleshoot. Comparing to other cables such as coaxial and untwisted shielded pair. Fiber
optic is the best to install in the network due to its high performance for the K & G cables.
Crossover cable
A crossover cable is typically used to connect two switches together, but it can also be used to
test communications between two workstations directly. A crossover cable is used only in
Ethernet UTP installations. You can connect two workstation NICs or a workstation and a server
NIC directly with it. The crossover cable is usually connected to the hub in a workstation in
order to engage in communication between the two devices. Which makes the workstation
dependable on the cable because without the cable the workstation won’t be able to
communicate with the hub and network will be non-responsive? If you want to ensure that a
server’s NIC is functioning correctly, you can just connect your laptop directly to the server’s
NIC using your handy crossover cable. You should be able to log in to the server if both NICs are
configured correctly. Extra feature such as using a cable tester to make sure that what you’re
dealing with is in fact a crossover cable. The tester can also tell you if there’s a problem with
the cable which is a benefit.
Rollover Cable
Rollover cable is used to connect a host to a router console serial communication com port.
Due to the presence of a router or switch, we use this cable to connect your PC running HyperTerminal or some other terminal-emulation program to the hardware. Eight wires are used in
This cable to connect serial devices, although not all eight are used to send information just as
in Ethernet networking. The eight wires used in a rolled cable are the easiest cables to make
because you just cut the end off on one side of a straight-through cable, turn it over, and put
the connector back on.
Hardware Loopback
Loopback cable
Loopback is a wiring standard it is a way to redirect data flow. Sometimes you may need a
computer to think it has a live connection to a network when it doesn’t, because it’s a good
testing strategy and because you need a live network to install. In these cases, you will need to
trick the PC into seeing its own output as input and you do this with a loopback plug. It works a
lot like a crossover cable except that it connects the transmit pins directly to the receive pins.
It’s used by the NIC’s software diagnostics to test transmission and reception capabilities.
A hardware loopback is no bigger than a single RJ-45 connector with a few small wires on the
back. With NIC hardware diagnostics that can use the loopback the hardware loopback plug will
be included with the NIC. To install it we plug the loopback into the RJ-45 connector on the
back of the NIC then we start the diagnostic software. Select the option in your NIC’s diagnostic
software that requires the loopback, and start your diagnostic routine. These diagnostics will
tell us if the NIC is functional to receive and send data over the workstation.
1.1.4. Data Transmission
Full-duplex uses two pairs of wires at the same time instead of one in order to send and receive
data at the same time. Full duplex uses a point-to-point connection between a transmitter of
the sending device and a receiver of the receiving device. This means that with full-duplex data
transfer, which provides a faster transfer speed of data and preventing collision events while
transferring data. We don’t need to worry about collisions because multiple wires each with a
dedicated purpose instead of the single wire like half duplex. Full-duplex Ethernet is very
efficiency in both directions of transferring due to the fact we can get 20Mbps with a 10Mbps
Ethernet running full duplex or 200Mbps for Fast Ethernet. But this rate is something known as
an aggregate rate, which translates 100 percent efficiency. Full-duplex Ethernet can be used in
many situations as a solution such as connecting from a switch to a host, a connection from a
switch to a switch and creating a connection from a host to a host using a crossover cable since
it is used in the network
Firewalls
Firewalls act as a filter in a network in order to monitor and protect the network usage. It is a
benefit to a network having a firewall installed due in a situation that makes security a crucial
factor due to events like cyber-attacks. The firewall will protect our network resources from
invaders that prowl the Internet for unprotected networks, while simultaneously preventing all
or some of your LAN’s computers from accessing certain services on the Internet. Configuration
is possible in order to set up suitable restrictions in the compliments of the K & G company on
rules create and configure the type of information allowed be accessed and sent out of the
network’s Internet connection. A firewall can be either a physical device “black box” or a
software implementation placed on a server or router. The firewall may have two forms of
network connections, first is to the Internet or public side and second is the network or private
Side. Sometimes, there is a second firewall this firewall is used to connect servers and
equipment that can be considered both public and private like web and email servers. This
intermediary network is known as a demilitarized zone. It has great features included meaning
more filter options and an increase in the networks security with the DMZ firewall installed.
Noise Immunity STP
Noise Immunity STP wires decrease the chances of wire tapping a little harder, but not hard
enough. The best suggestion is to solve the magnetic-flux problem caused by electricity is to not
use these wires at all. Instead using fiber-optic cables to carry the signal as light on a glass or
really pure plastic strand, and light is not susceptible to magnetic flux, making fiber optics
difficult to tap. Another magnetic-flux issue comes from the outside in instead of from the
inside out. Because wires can take on additional current if they’re near any source of
magnetism, by keeping copper cables away from all powerful magnetic sources like electric
motors, speakers.
CSMA/CD
Ethernet networking uses Carrier Sense Multiple Access with Collision Detection (CSMA/CD) is a
protocol that helps devices share the bandwidth evenly without having two devices transmit at
the same time on the network medium. CSMA/CD was created to overcome the problem of
those collisions that occur when packets are transmitted simultaneously from different hosts.
When a host wants to transmit over the network, it first checks for the presence of a digital
signal on the wire. If all is clear, meaning that no other host is transmitting, the host will then
proceed with its transmission. The transmitting host frequently monitors the wire to make sure
no other hosts begin transmitting. If the host detects another signal on the wire, it sends out a
jam signal that causes all hosts on the interlinked to the network to cease data transmition
which is a busy signal that is sent. The hosts respond to that jam signal by waiting a while
before attempting to transmit again. The backoff algorithms determine when the colliding
stations can retransmit. If collisions keep occurring after 15 tries, the hosts attempting to
transmit will then time out. Only bridges and routers can effectively prevent a transmission
from propagating throughout the entire network.
Frequency
Each cable type has a specified maximum frequency that gives you the transmission bandwidth
it can handle. Cat 5e cable is tested to 100MHz maximum frequency and can run 1Gbps signals
for relatively short distances. That’s maxing it out, but it’s still good for connecting desktop
hosts at high speeds. On the other hand, Cat 6 is a 250MHz cable that can handle 1Gbps data
flow all day long with ease. Cat 6 has a lot more twists and thicker cables, so it is best used
when connecting floors of a building.
Download