By Network Layer
By Network Layer
By Network Layer
com/CAT_1800006_networking-
design.HTM?refer=google_cpc&gclid=CMHE9ueB6Y4CFQfIbgodJmYODQ
ref:- http://en.wikipedia.org/wiki/Computer_network#Definition
Computer networks may be classified according to the network topology upon which the
network is based, such as Bus network, Star network, Ring network, Mesh network, Star-
bus network, Tree or Hierarchical topology network, etc.
Network Topology signifies the way in which intelligent devices in the network see their
logical relations to one another. The use of the term "logical" here is significant. That is,
network topology is independent of the "physical" layout of the network. Even if
networked computers are physically placed in a linear arrangement, if they are connected
via a hub, the network has a Star topology, rather than a Bus Topology. In this regard the
visual and operational characteristics of a network are distinct.
By network layer
Computer networks may be classified according to the network layer at which they
operate according to some basic reference models that are considered to be standards in
the industry such as the seven layer OSI reference model and the four layer Internet
Protocol Suite model. In practice, the great majority of networks use the Internet Protocol
(IP) as their network layer. Some networks, however, are using IP Version 6 IPv6, usually
in coexistence with IPv4. IPv6 use is often experimental. it is an interconnection of a
group of computers in other words.
A network as simple as two computers linked with a crossover cable has several points at
which the network could fail: either network interface, and the cable. Large networks,
without careful design, can have many points at which a single failure could disable the
network.
When networks are critical the general rule is that they should have no single point of
failure. The broad factors that can bring down networks, according to the Software
Engineering Institute [3] at Carnegie-Mellon University:
Why Networking ??
• Network Criteria
• Networking Basics
a.) LAN(Local Area Network)
b.) MAN(Metropolitan Area Network)
c.) WAN(Wide Area Network)
• Types of Connection
• Topologies
• Transmission Media
• N/W Interface Card
• N/W Connectivity Devices
• INTRODUCTION
• NEED OF NETWORKS
• NETWORK CLASSIFICATION
• NETWORK DEVICES
• NETWORK TOPOLOGIES
• NETWORK SOFTWARE
• APPLICATIONS
• CONCLUSION
• BIBLIOGRAPHY
• INTRODUCTION
• TYPES
• TOPOLOGIES
• OSI MODEL
• HARDWARE
• PROTOCOLS
• SECURITY(FIREWALL)
• FUTURE ASPECTSRED
NEEDS OF NETWORKING
1 - RESOURCE SHARING .
2 - HIGH RELIABILITY .
3 - COMMUNICATION MEDIUM
CONTENTS:
http://freecomputerebooks.blogspot.com/2007/05/free-computer-networking-ebooks.html
http://more-networking.blogspot.com/2007/02/computer-networks-and-internets.html
http://basic-networking.blogspot.com/2007/08/computer-network-devices-and-
component.html
A Computer network is comprised of different devices to share, transmit, and
boost the signal, voice and data. Network devices or components are the
physical parts connected to a network. There is a large number of the network
devices and are increasing daily. The basic network devices are: Individual
Computers, Server, Hub, Switch, Bridges, Routers, Modems, Printers, DSL
Modems & Routers, Gateways, Network Interface Cards, Cabling & Wireless
access point. The following is a overview of each of these network devices.
INDIVIDUAL COMPUTERS: The personal computer is usually a desktop
computer, a work station or a laptop. The personal computers are most widely
used in any organization or for personal use. The individual computers are the
most common types of the microcomputers.
SERVER: A server is a computer on a network, which process request and is
used to share the data and resources among the other computers in a network. A
server stores all the necessary information and provides the different services
like, workstation computer’s logon access, internet sharing, print sharing, disk
space sharing etc. There are different types of servers e.g File and print server,
database server, proxy server, Fax server, backup server etc. A database server
stores all the data and software, which may related to the certain database and it
allows other network devices to access and process the database queries. A file
server is used to store the data of any user on the network and a print server
manages one or more printers in a network. Similarly a network server is a server
that manages the network traffic.
NETWORK INTERFACE CARD: Network interface cards are attached with the
computer or other network devices and are used to provide the connectivity
between the two computers. Each network card is specifically designed for the
different types of the network like Ethernet, FDDI, Token Ring and Wireless
Networks. The Network card operates on the first and second layers of the OSI
models i.e Physical layer and datalink layer specifications. NIC basically defines
the physical connection methods and the control signals that provides the timings
of the data transfer over the network.
HUBS: Hub is a simplest network device. The function of the hub is broadcasting
i.e data is forwarded towards the all ports of a hub, regardless of whether the
data was intended for the particular systems in the network or not. Computers in
a network are connected to a hub with a twisted pair (CAT5) cables. There are
two types of the hubs. 1. Active Hubs. 2. Passive Hubs.
SWITCHING HUB: The Switching hub (also called “switch” is the most advance
shape of the basic hub. In a basic hub all the computers are connected with the
hub and the speed of the network is defined by the slowest computer network
card connected. For example if you have 10/100 Mbps cards in a network and
only one card of 10Mbps speed then the system cannot run faster than the 10
Mbps. Now if you have a switching hub in a network, it will allow all the faster
connections in the network to remain at the higher speed and still interact with
the 10Mbps system.
SWITCHES: Switch is a intelligence device than hub. Switch is a layer 2 device.
Swith provides the same function as a hub or a bridge but it has the advance
functionality of connecting the two computers together temporarily. Switch
contains the switch matrix or switch fabric that can connect and disconnect ports.
Unlike hubs, switch only transmit or forwards the data to the destined computer
and it does not broadcasts the data to all its ports.
MODEMS: Modems are the devices, which are used to translate the digital data
into the analog format and vice versa. It performs the two main functions.
Modulation and demodulation. A modulated data can travel across the
conventional telephone lines. The modem modulates the signals at the sending
end and demodulates at the receiving end. Modems are required for different
types of the access methods such ISDN, DSL and 56K data modem. Modem can
be the internal devices that plug into the expansion slots in a system or can be
external devices that plug into the serial or USB ports. In Laptops, PCMCIA cards
are used for this purpose and many new laptops having the built in integrated
modems. The specialized devices are designed for use in the systems such as
handheld computers. In ISPs where the large scaled modems are required, rack
mounted modems are used.
ROUTERS: Routers route the data between two logically and physically different
networks. A Router has the capability to determine the destination address for the
data and hence provides the best way for the data to continue its journey. Router
gets this capability through its software called routing software. Unlike Switches
and Bridges, which use hardware configured MAC address to determine the
destination of the data, router uses logical network address such as IP address to
make the decision in determining the destination of the data.
GATEWAY: A gateway performs the function of translating the data from one
format to another format without changing the data itself. A gateway can be a
device, system, software. A computer with two NIC cards can function as a
gateway. Router acts as a gateway e.g a router that routes the data from a IPX
network to a IP network is technically a gateway. The same can be said of
translational switch converts from a Ethernet network to a token ring network.
CABLES: There are two most common types of the cables. 1. 10baseT and
10base2. 10baseT is a four paired cable. 10baseT has further two types 1. UTP
(unshielded twisted pair) and 2. STP (shielded twisted pair. STP is most secure
cable covered with the silver coated twisted paper to protect the cable. On the
other end Thin 10base2 looks like the copper coaxial cabling that often used to
connect TV sets and VCR. 10baseT/Cat5 cables are most commonly used
cables to connect the computers. It has the connector, (like a telephone
connector) called RJ45 connector.
Twisted pair cables are ideal for the small, medium or large networks.
http://en.wikipedia.org/wiki/Computer_network#By_network_topology
By network layer
Computer networks may be classified according to the network layer at which they
operate according to some basic reference models that are considered to be standards in
the industry such as the seven layer OSI reference model and the four layer Internet
Protocol Suite model. In practice, the great majority of networks use the Internet Protocol
(IP) as their network layer. Some networks, however, are using IP Version 6 IPv6, usually
in coexistence with IPv4. IPv6 use is often experimental. it is an interconnection of a
group of computers in other words.
A network as simple as two computers linked with a crossover cable has several points at
which the network could fail: either network interface, and the cable. Large networks,
without careful design, can have many points at which a single failure could disable the
network.
When networks are critical the general rule is that they should have no single point of
failure. The broad factors that can bring down networks, according to the Software
Engineering Institute [1] at Carnegie-Mellon University:
One obvious form of failure is the loss of electrical power. Depending on the criticality
and budget of the network, protection from power failures can range from simple filters
against excessive voltage spikes, to consumer-grade Uninterruptible Power
Supplies(UPS) that can protect against loss of commercial power for a few minutes, to
independent generators with large battery banks. Critical installations may switch from
commercial to internal power in the event of a brownout,where the voltage level is below
the normal minimum level specified for the system. Systems supplied with three-phase
electric power also suffer brownouts if one or more phases are absent, at reduced voltage,
or incorrectly phased. Such malfunctions are particularly damaging to electric motors.
Some brownouts, called voltage reductions, are made intentionally to prevent a full
power outage.
Some network elements operate in a manner to protect themselves and shut down
gracefully in the event of a loss of power. These might include noncritical application and
network management servers, but not true network elements such as routers. UPS may
provide a signal called the "Power-Good" signal. Its purpose is to tell the computer all is
well with the power supply and that the computer can continue to operate normally. If the
Power-Good signal is not present, the computer shuts down. The Power-Good signal
prevents the computer from attempting to operate on improper voltages and damaging
itself
To help standardize approaches to power failures, the Advanced Configuration and Power
Interface (ACPI) specification is an open industry standard first released in December
1996 developed by HP, Intel, Microsoft, Phoenix and Toshiba that defines common
interfaces for hardware recognition, motherboard and device configuration and power
management.
[edit] By scale
Computer networks may be classified according to the scale: Personal Area Network
(PAN), Local Area Network, Campus Area Network, Metropolitan area network (MAN),
or Wide area network (WAN). As Ethernet increasingly is the standard interface to
networks, these distinctions are more important to the network administrator than the end
user. Network administrators may have to tune the network, based on delay that derives
from distance, to achieve the desired Quality of Service (QoS).
Controller Area Networks are a special niche, as in control of a vehicle's engine, a boat's
electronics, or a set of factory robots.
Computer networks may be classified according to the hardware technology that is used
to connect the individual devices in the network such as Ethernet, Wireless LAN,
HomePNA, or Power line communication.
Computer networks may be classified according to the network topology upon which the
network is based, such as Bus network, Star network, Ring network, Mesh network, Star-
bus network, Tree or Hierarchical topology network, etc.
Network Topology signifies the way in which intelligent devices in the network see their
logical relations to one another. The use of the term "logical" here is significant. That is,
network topology is independent of the "physical" layout of the network. Even if
networked computers are physically placed in a linear arrangement, if they are connected
via a hub, the network has a Star topology, rather than a Bus Topology. In this regard the
visual and operational characteristics of a network are distinct.
[edit] By protocol
Below is a list of the most common types of computer networks in order of scale.
A personal area network (PAN) is a computer network used for communication among
computer devices (including telephones and personal digital assistants) close to one
person. The devices may or may not belong to the person in question. The reach of a PAN
is typically a few meters. PANs can be used for communication among the personal
devices themselves (intrapersonal communication), or for connecting to a higher level
network and the Internet (an uplink).
Personal area networks may be wired with computer buses such as USB and FireWire. A
wireless personal area network (WPAN) can also be made possible with network
technologies such as IrDA and Bluetooth.
A network covering a small geographic area, like a home, office, or building. Current
LANs are most likely to be based on Ethernet technology. The defining characteristics of
LANs, in contrast to WANs (wide area networks), include their much higher data transfer
rates, smaller geographic range, and lack of a need for leased telecommunication lines.
Hosts can be made part of a specific LAN can be defined by setting their address to one
within the address range of the LAN subnet This can be done by manual configuration, or
by configuring DHCPDynamic Host Configuration Protocol autoconfiguration to give the
host an address in the appropriate range.
A network that connects two or more LANs but that is limited to a specific and
contiguous geographical area such as a college campus, industrial complex, or a military
base. A CAN, may be considered a type of MAN (metropolitan area network), but is
generally limited to an area that is smaller than a typical MAN, so it is called a CAN.
This term is most often used to discuss the implementation of networks for a contiguous
area. In the past, when layer 2 switching (i.e., bridging (networking) was cheaper than
routing, campuses were good candidates for layer 2 networks, until they grew to very
large size. Today, a campus may use a mixture of routing and bridging. The network
elements used, called "campus switches", tend to be optimized to have many Ethernet
interfaces rather than an arbitrary mixture of Ethernet and WAN interfaces.
A network that connects two or more Local Area Networks or CAN together but does not
extend beyond the boundaries of the immediate town, city, or metropolitan area. Multiple
routers, switches & hubs are connected to create a MAN
A WAN is a data communications network that covers a relatively broad geographic area
(i.e. one country to another and one continent to another continent) and that often uses
transmission facilities provided by common carriers, such as telephone companies. WAN
technologies generally function at the lower three layers of the OSI reference model: the
physical layer, the data link layer, and the network layer.
The highest data rate commercially available, as a single bitstream, on WANs is 40
Gbit/s, principally used between large service providers. Wavelength Division
Multiplexing, however, can put multiple 10 or 40 Gbyte/s streams onto the same optical
fiber.
Global area networks (GAN) specifications are in development by several groups, and
there is no common definition. In general, however, a GAN is a model for supporting
mobile communications across an arbitrary number of wireless LANs, satellite coverage
areas, etc. The key challenge in mobile communications is "handing off" the user
communications from one local coverage area to the next. In IEEE Project 802, this
involves a succession of terrestrial Wireless local area networks (WLAN) is the [3].
INMARSAT has defined a satellite-based Broadband Global Area Network (BGAN).
IEEE mobility efforts focus on the data link layer and make assumptions about the media.
Mobile IP is a network layer technique, developed by the IETF, which is independent of
the media type and can run over different media while still keeping the connection.
[edit] Internetwork
Two or more networks or network segments connected using devices that operate at layer
3 (the 'network' layer) of the OSI Basic Reference Model, such as a router. Any
interconnection among or between public, private, com, or governmental networks may
also be defined as an internetwork.
In modern practice, the interconnected networks use the Internet Protocol. There are at
least three variants of internetwork, depending on who administers and who participates
in them:
• Intranet
• Extranet
• "The" Internet
Intranets and extranets may or may not have connections to the Internet. If connected to
the Internet, the intranet or extranet is normally protected from being accessed from the
Internet without proper authorization. The Internet itself is not considered to be a part of
the intranet or extranet, although the Internet may serve as a portal for access to portions
of an extranet.
[edit] Intranet
Main article: Intranet
An intranet is a set of interconnected networks, using the Internet Protocol and uses IP-
based tools such as web browsers, that is under the control of a single administrative
entity. That administrative entity closes the intranet to the rest of the world, and allows
only specific users. Most commonly, an intranet is the internal network of a company or
other enterprise.
[edit] Extranet
Main article: Extranet
obtained from address registries that control assignments. Service providers and large
enterprises also exchange information on the reachability of their address ranges through
the Border Gateway Protocol.
All networks are made up of basic hardware building blocks to interconnect network
nodes, such as Network Interface Cards (NICs), Bridges, Hubs, Switches, and Routers. In
addition, some method of connecting these building blocks is required, usually in the
form of galvanic cable (most commonly Category 5 cable). Less common are microwave
links (as in IEEE 802.11) or optical cable ("optical fiber").
[edit] Repeaters
A Because repeaters work with the actual physical signal, and do not attempt to interpret
the data being transmitted, they operate on the Physical layer, the first layer of the OSI
model.BY HAYTECH
[edit] Hubs
A hub contains multiple ports. When a packet arrives at one port, it is copied the packets
to all the ports of the hub. When the packets are copied, the destination address in the
frame does not change to a broadcast address. It does this in a rudimentary way, it simply
copies the data to all of the Nodes connected to the hub. [4]
[edit] Bridges
A network bridge connects multiple network segments at the data link layer (layer 2) of
the OSI model. Bridges do not promiscuously copy traffic to all ports, as does a hub. but
learns which MAC addresses are reachable through specific ports. Once the bridge
associates a port and an address, it will send traffic for that address only to that port.
Bridges do send broadcasts to all ports except the one on which the broadcast was
received.
Bridges learn the association of ports and addresses by examining the source address of
frames that it sees on various ports. Once a frame arrives through a port, its source
address is stored and the bridge assumes that MAC address is associated with that port.
The first time that a previously unknown destination address is seen, the bridge will
forward the frame to all ports other than the one on which the frame arrived.
Switches are a marketing term that encompasses routers and bridges, as well as devices
that may distribute traffic on load or by application content (e.g., a Web URL identifier).
Switches may operate at one or more OSI layers, including physical, data link, network,
or transport (i.e., end-to-end). A device that operates simultaneously at more than one of
these layers is called a multilayer switch.
Overemphasizing the ill-defined term "switch" often leads to confusion when first trying
to understand networking. Many experienced network designers and operators
recommend starting with the logic of devices dealing with only one protocol level, not all
of which are covered by OSI. Multilayer device selection is an advanced topic that may
lead to selecting particular implementations, but multilayer switching is simply not a real-
world design concept.
[edit] Routers
Routers are the networking device that forwards data packets along networks by using
headers and forwarding tables to determine the best path to forward the packets. Routers
work at the network layer (layer 3) of the OSI model. Routers also provide
interconnectivity between like and unlike media.[5] This is accomplished by examining
the Header of a data packet.[6] They use routing protocols such as Open Shortest Path
First (OSPF) to communicate with each other and configure the best route between any
two hosts. A router is connected to at least two networks, commonly two LANs or WANs
or a LAN and its ISP's network. Some DSL and Cable Modems have been integrated with
routers for home consumers.
A simple computer network may be constructed from two computers by adding a network
adapter (Network Interface Controller (NIC)) to each computer and then connecting them
together with a special cable called a crossover cable. This type of network is useful for
transferring information between two computers that are not normally connected to each
other by a permanent network connection or for basic home networking applications.
Alternatively, a network between two computers can be established without dedicated
extra hardware by using a standard connection such as the RS-232 serial port on both
computers, connecting them to each other via a special crosslinked null modem cable.
Practical networks generally consist of more than two interconnected computers and
generally require special devices in addition to the Network Interface Controller that each
computer needs to be equipped with. Examples of some of these special devices are hubs,
switches and routers.
[edit] Ancillary equipment used by networks
Beyond the surge protector, network elements may have uninterruptible power supplies
(UPS), which can be anywhere from a line-charged battery to take the element through a
brief power dropout, to an extensive network of generators and large battery banks that
can protect the network for hours or days of commercial power outages.
Networks, depending on their criticality and the skill set available among the operators,
may have a variety of temporarily or permanently connected performance meaasurement
and diagnostic equipment. Routers and bridges intended more for the enterprise or ISP
market than home use, for example, usually record the amount of traffic and errors
experienced on their interfaces.
Diagnostic equipment, to isolate failures, may be nothing more complicated than a spare
piece of equipment. If the problem disappears when the spare is manually replaced, the
problem has been diagnosed. More sophisticated and expensive installations will have
spare elements that can automatically replace a failed unit. Failures can be made
transparent to user computers with techniques such as the Virtual Router Redundancy
Protocol (VRRP), as specified in RFC 3768.
http://more-networking.blogspot.com/2007/02/networking-fundamentals-v40.html
Take for example a typical office scenario where a number of users in a small
business require access to common information. As long as all user computers
are connected via a network, they can share their files, exchange mail,
schedule meetings, send faxes and print documents all from any point of the
network.
It would not be necessary for users to transfer files via electronic mail or
floppy disk, rather, each user could access all the information they require,
thus leading to less wasted time and hence greater productivity.
Imagine the benefits of a user being able to directly fax the Word document
they are working on, rather than print it out, then feed it into the fax machine,
dial the number etc.
Small networks are often called Local Area Networks [LAN]. A LAN is a
network allowing easy access to other computers or peripherals. The typical
characteristics of a LAN are,
http://physinfo.ulb.ac.be/cit_courseware/networks/default.htm,
It would not be necessary for users to transfer files via electronic mail or floppy disk,
rather, each user could access all the information they require, thus leading to less wasted
time and hence greater productivity.
Imagine the benefits of a user being able to directly fax the Word document they are
working on, rather than print it out, then feed it into the fax machine, dial the number etc.
Small networks are often called Local Area Networks [LAN]. A LAN is a network
allowing easy access to other computers or peripherals. The typical characteristics of a
LAN are,
On power-up, the computer detects the new network card, assigns the correct resources to
it, and then installs the networking software required for connection to the network. All
the user need do is assign the network details like computer name.
For Ethernet or 10BaseT cards, each card is identified by a twelve digit hexadecimal
number. This number uniquely identifies the computer. These network card numbers are
used in the Medium Access [MAC] Layer to identify the destination for the data. When
talking to another computer, the data you send to that computer is prefixed with the
number of the card you are sending the data to.
This allows intermediate devices in the network to decide in which direction the data
should go, in order to transport the data to its correct destination.
The major problem arises with cards for the ISA bus (found in the majority of AT type
computers and clones). This is because the cards are configured by the user (using either
jumpers or a software program).
Users make mistakes, and often configure cards so that they conflict with other cards
already present in this system. This causes intermittent or immediate non-operation of the
computer system.
For instance, a networking card that is allocated the same resources as a serial
communications program may function perfectly, except when the user is logged into the
network and then tries to use the serial port, at which time the machine will crash.
This space is also sometimes used by a remote boot Eprom, which is used for
diskless workstations which download the operating system from the server at
boot time.
So How Do Peripheral Cards Work?
Peripheral cards require a software driver to function. This software driver provides the
interface between the card and the operating system, making the services provided by the
card available to the user.
The software driver is normally configured to match the resource settings of the card.
This is done by a configuration utility, and stored either in the executable file, or a
separate file (like .ini or .cfg).
It is obviously important for the configuration settings in the software driver to match
those configured on the peripheral card.
The resources used by the card are either set by jumpers (or slide switches). New cards
can also be configured using a software program, rather than by manually setting jumpers
on the card. Where cards are software configurable, the cards retain their configuration
when the power is turned off.
• initialization routine
• interrupt service routine
• procedures to transmit and receive data
• procedures for status, configuration and control
The major problem is assigning values of these resources which are already being used
by either the system or another peripheral card. It is therefore handy to know what the
resources are which are used by common peripheral devices. The following tables
identify these.
Common Interrupts
Address Peripheral
A0000-BFFFFh EGA/VGA
B0000-B7FFFh Monochrome
B8000-BFFFFh CGA
C8000-CFFFFh XT Disk
F4000-FFFFFh AT ROM BIOS
F8000-FFFFFh PC/XT ROM BIOS
• define a generic voice and data wiring system that is multi-purpose and multi-
vendor
• help minimize cost of administration
• simplify network maintenance and changes
• horizontal wiring
• backbone wiring
Horizontal Wiring
The horizontal wiring extends from the wall outlet to the system center
(telecommunications closet). It includes the
• star topology
• maximum of two hierarchical levels
• interconnections between any two TC must not go through more than 3 cross
connects
• use of recognized media
• adherence to distance limitations
BRIDGES
Bridges interconnect Ethernet segments. Most bridges today support filtering and
forwarding, as well as Spanning Tree Algorithm. The IEEE 802.1D specification is the
standard for bridges.
During initialization, the bridge learns about the network and the routes. Packets are
passed onto other network segments based on the MAC layer. Each time the bridge is
presented with a frame, the source address is stored. The bridge builds up a table which
identifies the segment to which the device is located on. This internal table is then used to
determine which segment incoming frames should be forwarded to. The size of this table
is important, especially if the network has a large number of workstations/servers.
Bridges are ideally used in environments where there a number of well defined
workgroups, each operating more or less independent of each other, with occasional
access to servers outside of their localized workgroup or network segment. Bridges do
not offer performance improvements when used in diverse or scattered workgroups,
where the majority of access occurs outside of the local segment.
The diagram below shows two separate network segments connected via a bridge. Note
that each segment must have a unique network address number in order for the bridge to
be able to forward packets from one segment to the other.
Ideally, if workstations on network segment A needed access to a server, the best place to
locate that server is on the same segment as the workstations, as this minimizes traffic on
the other segment, and avoids the delay incurred by the bridge.
A bridge works at the MAC Layer by looking at the destination address and forwarding
the frame to the appropriate segment upon which the destination computer resides.
HUBS
There are many types of hubs. Passive hubs are simple splitters or combiners that group
workstations into a single segment, whereas active hubs include a repeater function and
are thus capable of supporting many more connections.
Nowadays, with the advent of 10BaseT, hub concentrators are being very popular. These
are very sophisticated and offer significant features which make them radically different
from the older hubs which were available during the 1980's.
These 10BaseT hubs provide each client with exclusive access to the full bandwidth,
unlike bus networks where the bandwidth is shared. Each workstation plugs into a
separate port, which runs at 10Mbps and is for the exclusive use of that workstation, thus
there is no contention to worry about like in Ethernet.
These 10BaseT hubs also include buffering of packets and filtering, so that unwanted
packets (or packets which contain errors) are discarded. SNMP management is also a
common feature.
In standard Ethernet, all stations are connected to the same network segment in bus
configuration. Traffic on the bus is controlled using the CSMA (Carrier Sense Multiple
Access) protocol, and all stations share the available bandwidth.
10BaseT Hubs dedicate the entire bandwidth to each port (workstation). The workstations
attach to the hub using UTP. The hub provides a number of ports, which are logically
combined using a single backplane, which often runs at a much higher data rate than that
of the ports.
Ports can also be buffered, to allow packets to be held in case the hub or port is busy.
And, because each workstation has it's own port, it does not contend with other
workstations for access, having the entire bandwidth available for it's exclusive use.
The ports on a hub all appear as one Ethernet segment. In addition, hubs can be stacked
or cascaded (using master/slave configurations) together, to add more ports per segment.
As hubs do not count as repeaters, this is a better option for adding more workstations
than the use of a repeater.
Hub options also include an SNMP (Simple Network Management Protocol) agent. This
allows the use of network management software to remotely administer and configure the
hub. Detailed statistics related to port usage and bandwidth are often available, allowing
informed decisions to be made concerning the state of the network.
Virtual Networking
In virtual networking, workgroups can be created on demand. Users can be located
anywhere on the network. Using software management, the network components
(switches) are configured to recognize a number of defined workstations (by MAC
address) as belonging to their own domain.
Any traffic generated by these workstations can be sent to any other workstation in that
domain. Workstations outside that domain are unable to see any packets (including
broadcasts) that belong to the secure domain. Obviously, this has enormous implications
for developing secure networks. Multiple virtual workgroups can exist, like email and
www server. Users can belong to more than one virtual domain, thereby administration is
centralized and security is maintained. The use of switch technology makes this possible.
NETWORK TOPOLOGY
Topology refers to the way in which the network of computers is connected. Each
topology is suited to specific tasks and has its own advantages and disadvantages.
• Bus
• Ring
• Star
• FDDI
Bus Topology
The bus cable carries the transmitted message along the cable. As the message arrives at
each workstation, the workstation computer checks the destination address contained in
the message to see if it matches it's own. If the address does not match, the workstation
does nothing more.
Ring Topology
Advantages Disadvantages
Hub failure cripples all workstations
Easy to add new workstations
connected to that hub
Centralized control Hubs are slighty more expensive than thin-Ethernet
Centralized network/hub monitoring
FDDI Topology
• 100mbps
• normally implemented over fiber optic (fast-Ethernet, UTP)
• dual redundancy built in by use of primary and secondary ring
• automatic bypassing and isolation of faulty nodes
The primary ring is used for data transmission; the secondary is used for data
transmission or to back up the primary ring in the event of a link or station failure. FDDI
supports a sustained transfer rate of about 80Mbps, a maximum of 1000 connections (500
nodes) and a total distance of 200 kilometers end to end. There is a maximum distance of
2 kilometers between active nodes.
http://viewzoft.com/projecttopics/databasesearchresults.asp?textfield=networking&Subm
it=Search
Chat server is a standlone application that is made up the combination of two-application, server application (which
runs on server side) and client application (which runs on client side). This application is using for chatting in LAN.
To start chatting you must be connected with the server after that your message can broadcast to each and every
client.
For making this application we are using some core java features like swing, collection, networking, I/O Streams
and threading also. In this application we have one server and any number of clients (which are to be
communicated with each other). For making a server we have to run the MyServer.java file at any system on the
network that we want to make server and for client we have to run MyClient.java file on the system that we want to
make client. For running whole client operation we can run the Login.java.
Understand and get the chat server application by following steps :
Features and Limitations of the Application
Some features of the application are as follows :
This application is used for sending messages from one client to all clients. In this, server takes a message from
the sender client and sends it to all clients. If any client wants to join the chatting then he runs the client application
on client side, enters the login name and hits the login button and starts the chatting with every client. If any client
joins the chatting system then the message “User_Name has Logged in” comes on the message list box of every
client window. Same like this, if any client exit from the chatting then the message “User_Name has Logged Out”
comes on the message list box of every client window.
In this we are maintaining the list of user names (client name) also. After creating the connection with server, client
sends the user name to server and server store it in the arraylist and sends this arraylist to all clients. Same like
this when any client has logged out then server remove this name from the arraylist and send this updated arraylist
to every client.
For creating the Client side application firstly creates the login frame it consist one textfield and the login button.
After hitting the login button it shows the next frame that Client Frame and it consist one textfield for writing the
message and one send button for sending it. And two list boxes, one is for showing the all messages and another
list box is use to show the all user names. This frame has one more button that is Logout button for terminating the
chat.
Of course, we have come a long way from the primitive pursuits and devices of our
forebears. Nowadays, we have computers talk to each other over vast assemblages of
wires, fiber optics, microwaves, and the like, to make an appointment for Saturday's
soccer match.[1] In the following description, we will deal with the means and ways by
which this is accomplished, but leave out the wires, as well as the soccer part.
We will describe three types of networks in this guide. We will focus on TCP/IP most
heavily because it is the most popular protocol suite in use on both Local Area Networks
(LANs) and Wide Area Networks (WANs), such as the Internet. We will also take a look
at UUCP and IPX. UUCP was once commonly used to transport news and mail messages
over dialup telephone connections. It is less common today, but is still useful in a variety
of situations. The IPX protocol is used most commonly in the Novell NetWare
environment and we'll describe how to use it to connect your Linux machine into a
Novell network. Each of these protocols are networking protocols and are used to carry
data between host computers. We'll discuss how they are used and introduce you to their
underlying principles.
We define a network as a collection of hosts that are able to communicate with each
other, often by relying on the services of a number of dedicated hosts that relay data
between the participants. Hosts are often computers, but need not be; one can also think
of X terminals or intelligent printers as hosts. Small agglomerations of hosts are also
called sites.
Network Introduction
Data Networking continues to evolve. The demand for a High-Speed Network
Infrastructure has been growing at an alarming rate. Just a few short years ago, 4
Mbps (Million bits per second) Token Ring and 10 Mbps Ethernet shared networks
were the norm. Now they can’t keep up with the growing demands from end-users.
End-user applications and files are growing in size and number.
One of the early types of networking topologies was Token Ring. Token Ring uses a
token passing access method. In token passing, collisions between packets are
prevented by assuring that only one station can transmit at any given time. This is
accomplished by passing a special packet, called a token, from one station to another
in a ring topology. (To learn more about ring topologies, please see What is a LAN?)
When a station gets the token, it can transmit a packet, which travels in one direction
around the ring. When the packet passes by the station it is addressed to, it is copied.
The packet continues to travel around the ring until it returns to the sending station,
which removes it and sends the token on to the next station on the ring.
One of the most common types of networks is Ethernet. Originally, Ethernet cables
were coaxial (similar to cable TV wires), but now twisted-pair cables (similar to
telephone wires) are more common. Fiber-optic cables are used for higher speeds
and greater distances than copper wires are capable of providing. One version of
Ethernet, called 10BASE-T, consists of twisted-pair cables and can transmit data at
10Mbps (10 million bits per second). Another version, Fast Ethernet is 10 times
faster than 10 Base-T.
Two of the common types of Fast Ethernet are 100Base-T and 100Base-FX.
100BASE-T consists of twisted-pair cabling similar to 10Base-T except the cables
have to be of a higher quality to transmit the data reliably, and the distance limitation
is 100 meters. 100Base-FX is Fast Ethernet that runs over fiber-optic cabling. The
fiber-optic cable extends the distance to 2,000 meters over Multi-mode cable.
The newest version of Ethernet is called Gigabit Ethernet and it can transmit data at
1000Mbps. Gigabit Ethernet can use either Category 5 twisted-pair cable or fiber-
optic cable to transmit the signals. Soon, 10 Gigabit Ethernet will be available. It
will only use fiber-optic cables. 10 Gigabit Ethernet will primarily be used for
backbone applications.
Ethernet can support both bus and star topologies. (To learn more about bus and star
topologies, please see What is a LAN?) The most popular is the star topology, which
makes use of a central hub or switch through which all information is passed. All
stations on the network are connected to the hub or switch and can "sense" packets
as they are sent across the wire. Because each station can send a packet at any time,
collisions between packets do occur. These are common and are corrected
instantaneously.
Ethernet networks are replacing Token Ring and FDDI networks daily. Ethernet with
its speed, simplicity and low cost has won the war of the LAN. Many sites are
migrating their legacy networks to Ethernet.
• A stand-alone hub is, as the term implies, a single unit with a fixed number
of ports. Stand-alone hubs usually include some method of linking them to
other stand-alone hubs.
• A stackable hub looks and acts like a stand-alone hub except that several of
them can be stacked together, usually joined by short lengths of cable. When
they are linked together, they can be managed as a single unit.
• A modular hub consists of modules that each act like a stand-alone hub, but
like the stackable hubs they can be managed as a single unit. Modular hubs
consist of a chassis and the modules that go into the chassis. The chassis links
the modules together with an internal backplane and handles the management
of individual modules.
All of these hubs can be linked together to broaden the network. In order to create an
internetwork (linking LANs together), other more complex devices are used.
• Bridge - device that connects two or more networks and forwards packets
among them. Usually, bridges operate at the physical network level. For
example, an Ethernet bridge connects two physical Ethernet cables and
forwards from one cable to the other exactly those packets that are not local.
Bridges differ from repeaters because bridges store and forward complete
packets while repeaters forward electrical signals. They differ from IP
Gateways or IP Routers because they use physical addresses instead of IP
addresses.
• Routers - use Network Layer Protocol Information within each packet to
route it from one LAN to another. This means that a router must be able to
recognize all of the different Network Layer Protocols that may be used on
the networks it is linking together.
• Switches - devices with multiple ports, each of which can support an entire
Ethernet, FDDI or Token Ring segment. With a different segment connected
to each of the ports, it can switch packets between them as needed. In effect,
a switch acts like a very fast multi-port bridge because packets are filtered
based on the destination address. A new network technology, called
Asynchronous Transfer Mode (ATM), is based on the switch concept.
Switches are starting to replace hubs and routers in many installations. Switching
technology is increasing the efficiency and speed of networks. This technology is
making current systems more powerful, while at the same time facilitating the
migration to faster networks. Switching directs network traffic in a very efficient
manner. It sends information directly from the port of origin to only its destination
port. Switching increases network performance, enhances flexibility and eases
moves, adds and changes. Switching establishes a direct line of communication
between two ports and maintains multiple simultaneous links between various ports.
It proficiently manages network traffic by reducing media sharing, traffic is
contained to the segment for which it is destined, be it a server, power user or
workgroup.
There are many different types of Switches, some common examples are:
Layer 3 switching (The Network Layer) and all of its related terms (e.g. multilayer
switching, IP switching, routing switches, etc.) was introduced as the router-killer.
Layer 3 switching attempts to reduce the performance bottlenecks associated with
traditional routers. Layer 3 switches use network or IP addresses that identify
locations on the network. They read network addresses more closely than Layer 2
switches—they identify network locations as well as the physical device. A location
can be a LAN workstation, a location in a computer’s memory, or even a different
packet of data traveling through a network. Switches operating at Layer 3 are smarter
than Layer 2 devices and incorporate routing functions to actively calculate the best
way to send a packet to its destination. But although they’re smarter, they may not be
as fast if their algorithms, fabric, and processor don’t support high speeds.
When a single LAN station is connected to a switched port it may operate in full-
duplex mode. Full-duplex does not require collision detection, there is a suspension
of MAC protocols. A single device resides on that port, and therefore no collisions
will be encountered. Full-duplex switching enables traffic to be sent and received
simultaneously. (Hubs between a workgroup and a switch will not run full-duplex,
because the hub is governed by collision detection requirements. The workgroup
connected to the hub is unswitched Ethernet).
The bottom line is a 24 port 100Mbps hub is only capable of sharing the full
100Mbps with all 24-ports, which averages out to 4.16Mbps for each port. While at
the same time a 24-port 100Mbps Switch has 24 individual 100Mbps ports. The
switch is capable of 2400Mbps or 2.4 Gigabits per second. Also a switch can operate
in full-duplex mode, so it has a theoretical throughput of 4800Mbps or 4.8 Gbps.
Wireless networking can prove to be very useful in public places – libraries, guest
houses, hotels, cafeterias, and schools are all places where one might find wireless access
to the Internet. From a financial point of view, this is beneficial to both the provider and
the client. The provider would offer the service for a charge – probably on a pay per use
system, and the client would be able to take advantage of this service in a convenient
location; away from the office or home. A drawback of wireless Internet is that the QoS
(Quality of Service) is not guaranteed and if there is any interference with the link then
the connection may be dropped.
The two current technologies for wireless personal area networks are Infra Red (IR) and
Bluetooth (IEEE 802.15). These will allow the connectivity of personal devices within an
area of about 30 feet. However, IR requires a direct line of site and the range is less.
This technology allows the connection of multiple networks in a metropolitan area such
as different buildings in a city, which can be an alternative or backup to laying copper or
fibre cabling.
These types of networks can be maintained over large areas, such as cities or countries,
via multiple satellite systems or antenna sites looked after by an ISP. These types of
systems are referred to as 2G (2nd Generation) systems.
Below is a table indicating the range that wireless data networks can handle:
Metres Network
0-10 Personal Area Network
0-100 Local Area Network
0-10000 Wide Area Network
http://compnetworking.about.com/od/p2ppeertopeer/a/p2pintroduction.htm
Although they have actually existed for many years, P2P technologies promise to radically change the future
of networking. P2P file sharing software has also created much controversy over legality and "fair use." In
general, experts disagree on various details of P2P and precisely how it will evolve in the future.
The P2P acronym technically stands for peer to peer. Webopedia defines P2P as
"A type of network in which each workstation has equivalent capabilities and responsibilities.
Ultimate Guide to Networking: Part One
BY:- Michael Furdyk
What is a Network?
A network is simply a group of two or more Personal Computers linked together.
Local-Area Networks
Originally, only medium to large-sized businesses could afford the cost of networking
hardware. In the last decade, prices have rapidly dropped as new technology has developed,
and it is now possible to grab a basic 4-PC 10Base-T home networking kit for under $150. The
affordable price and added convienence of having a LAN has made it commonplace to see
networks in many homes and offices. Each PC in a LAN is able to access shared files and
devices anywhere on the LAN. This makes the sharing of expensive devices, such as laser
printers or large removable storage drives, a cost-effective alternative to purchasing a device
for every user.
If you decide to use Ethernet for your LAN (which we recommend you do), you can choose
from 10Base-T (10 million bits per second, or 10 Mbps) or 100Base-T (100 million bits per
second, or 100 Mbps), which is usually refered to as Fast Ethernet. 10Base-T is used mostly
for home and small office networks, because it offers both affordability (around $20-30 for a
network card, and $80 for an 8-port hub) and decent performance. For large businesses, a
100Base-T solution may be required if there are a large number of PCs connected to the
network, or if large amounts of data is frequently transferred.
There are three different types of cabling for Ethernet networks. Unshielded Twisted Pair (UTP)
is the most popular type of cabling, and the one we recommend because of its wide availibility
and low price. The other two types are coaxial and Shielded Twisted Pair (STP). STP cable
provides more shielding against outside Electromagnetic Interference (EMI) than UTP, but is
more expensive. We've never had any problems with EMI, so we suggest the cheaper UTP.
Coaxial uses much thicker and more expensive cable, and must be run in a ring configuration,
from PC to PC, unlike Twisted Pair, which is run directly from each computer to a port on the
hub, making wiring more convienent in most cases.
Ethernet networks require a Hub, a hardware device that all PCs on a network are connected
to by cabling. The hub manages receiving and transmitting data from networked devices. Hubs
come in many different port configurations, but you will probably need a 4, 8, or 12 port hub,
depending on the number of PCs you want to connect together. Each port supports a single
10Base-T connection from a PC or peripheral. If you're using Coaxial cable, you need to find a
hub with one Coaxial port and minimal Twisted Pair ports. There are both Manageable Hubs,
which allow advanced configuration of Hub properties via a software package, and Standard
Hubs, which are cheaper, and usually used for home or small office networks. We recommend
purchasing a standard hub, since the extra features included in Manageable Hubs are not
useful for a home or small office network. Since you will probably purchase a standard hub,
we'll discuss the three types of standard hubs next.
Standard Hubs
When thinking about what type of Standard Hub you want to purchase, you need to think
about what you will be doing with your network in the near future. Will you be adding many
more devices to your network? If so, you need to make sure your hub can handle network
expansion.
Standalone Hubs
Standalone hubs are single products with a number of ports.
Standalone hubs usually include some method of linking them to other standalone hubs for
network expansion. Standalone hubs are usually the least expensive type of hub, and are best
suited for small, independent workgroups, departments, or offices, typically with fewer than
12 users per LAN.
Stackable Hubs
Stackable hubs work just like standalone hubs, except that
several of them can be "stacked" (connected) together,
usually by short lengths of cable. When they are connected
together, they act like a modular hub, because they can be
managed as a single unit. These hubs are ideal if you want
to start with a minimal investment, but realize that your
LAN will grow.
Modular Hubs
Modular hubs are popular in networks because they are easily expanded and always have a
management option. A modular hub is purchased as a chassis, or card cage, with multiple card
slots, each of which accepts a communications card, or module. Each module acts like a
standalone hub, and usually has 12 twisted pair ports. Modules supporting different types of
network cabling, like coaxial or token ring, can also be purchased.
If you are building a home or small office network, you will probably want to purchase a
standalone or stackable hub. For a medium to large sized company, a Modular hub will
probably fit your needs more efficiently. Next, we'll take a look at other types of network
hardware, like routers, bridges, and switches.
There are maximums on distances between workstations and hubs, hubs and hubs, and
stations connected to a single LAN. You can exceed these maximums by linking two LAN
segments (groups of users/devices) together using a Bridge or Router.
Bridges
Bridges are simpler and less expensive then routers. Bridges make a simple do/don't decision
on which packets to send across two segments they connect. Filtering is done based on the
destination address of the packet. If a packet's destination is a station on the same segment
where it originated, it is not forwarded. If it is destined for a station on another LAN, it is
connected to a different bridge port and forwarded to that port.
Routers
Routers are more complex and more expensive than bridges. They use information within each
packet to route it from one LAN to another, and communicate with each other and share
information that allows them to determine the best route through a complex network of many
LANs.
Switches
Switches are another type of device used to link several LANs and route packets between
them. A switch has multiple ports, each of which can support either a single station or an
entire Ethernet or Token Ring LAN. With a different LAN connected to each of the ports, it can
switch packets between LANs as needed.