BEST FIT TOPOL Note
BEST FIT TOPOL Note
LEARNING GUIDE # 1
Sharing information
Data sharing enables different users to work on a certain file concurrently. Few examples of information
sharing are like through database, E-mail, Chat, forums, video conferencing etc.
In a networked banking system, different bank branches can have access to the central
account database. This enables bank clients to carry their transactions on any branch bank
office.
It saves the time which is wasted in copying a file from one system to another, by using a secondary
storage device.
Set By :Emamu Abdela Page 2 of 61
Sharing Hardware
Computer networks enable us to share hardware resource among several computers like printer, CD-
ROM, Fax machines, modems, Hard disk etc.
A typical example of shared resource is printer. Sharing printer avoids the need to have separate printer
for each computer.
Sharing hardware reduce purchasing ,maintenance cost etc
Sharing Software
4. Application (software) sharing occurs when several users at different locations run application
programs that are installed centrally in one location (application server).
5. Software (applications) that are installed centrally can be managed and upgraded centrally. Such
systems are mostly common in financial (i.e bank) system.
In short sharing programs on a network
Saves disk space
Reduces maintenance
Reduce licensing cost
Reduce installation, upgrade time and effort.
In a typical LAN configuration, one computer is designated as the server( stores the hardware and
software that controls the network and shared on the network).
WANs
Wide area networks are networks that cover very large geographical area such as a country or the whole
world. Typical WANs are the telephone networks operated by most long distance telephone companies.
Large companies(i.e banks) having offices scattered around the world use WAN to connect their
computers.
4. When data communication is necessary or desired beyond the reach of a LAN , a wide area network
(WAN) is established.
4. Institutions transferring large amounts of data between offices often decide to lease dedicated
transmission lines from public carriers, in what is termed an enterprise-wide private network.
5. NB: WAN is not managed and installed by a single organization so it is a public network.
6. WAN usually use combination of several types of communication media such as cables, satellites,
microwaves, and fiber-optics.
7. Probably the ultimate /largest WAN is called Internet (network of networks),it is made of many
connected LANs.
Set By :Emamu Abdela Page 4 of 61
8.
9. Figure2. A Wide Area Network
Types of networks based on configuration (Node Relationship or based on how they share data,
administration) categorized as Peer to Peer and Server based network.
In general, all networks have certain components, functions, and features in common, as shown in Figure
4. These include:
4. Servers—powerful computers that provide shared resources to network users or Clients and used to
manage the whole network.
5. Clients normal computers that request and access shared network resources provided by a server.
6. Media/communication channel—The wires/wireless that make the connections for Network
components.
7. Shared data—Files provided to clients by servers across the network.
8. Shared peripherals(i.e printers):hardware resources provided by servers.
As networks increase in size (as the number of connected computers, and the physical distance and traffic
between them, grows), more than one server is usually needed to handle the additional load. Spreading
the networking tasks among several servers ensures that each task will be performed as efficiently as
possible.
Specialized Servers
Servers must perform varied and complex tasks. Servers for large networks have become specialized to
accommodate the expanding needs of users.
Bus Topology
is fairly oldest and you probably won't be seeing much of modern office .
In Bus topology All Nodes are connected directly to the main cable/backbone that carries the data. This
works well in a small network of 2-5 computers, but as the numbers of computers increases so will the
network traffic.
The cable is terminated at each end.
When the main cable fail the entire network will halt/stop.
NB: A node can be any device connected to a computer network. Nodes can be computers(server/client),
cell phones, switches, modems,routers or various other networked devices.
The Star topology is one of the most common network topologies found in most offices and home
networks. It has become very popular in contrast to the bus type, because of ease of troubleshooting.
In the star topology, cable from each computer are connected to a centralized component or device
called a Hub/Switch. Signals are transmitted from the sending computer through the hub to all
computers on the network.
each computer is connected to a central point, this topology requires a great deal of cable in a large
network installation. Also, if the central point /hub fails, the entire network goes down/Halt.
Hybrid Topology
With the hybrid topology, two or more standard topologies are combined to form a complete network.
For example, a hybrid topology could be the combination of a star and bus or ring topology.
Common hybrid topology are:-
A.Star-Bus
In a star-bus topology, several star topology networks are linked to a bus connection. In this topology, if a
computer fails, it will not affect the rest of the network. However, if the central component, or hub, that
attaches all computers in a star, fails, then you have big problems since no computer will be able to
communicate.
B.Star-Ring
In the Star-Ring topology, the computers are connected to a central component as in a star network.
These components, however, are wired to form a ring network.
Like the star-bus topology, if a single computer fails, it will not affect the rest of the network.
Ring 7. Use less cable than Star Topolgy Failure of one computer can impact the rest
8. provides equal access for all of the network, because each computer acts
computers. as a repeater to boost the signal and send it
9. There is no reliance on a central to the next computer.
hub. all messages pass through all Problems are hard to isolate/troubleshoot.
devices. Require more cable than Bus topology
Network reconfiguration disrupts operation.
Star Easy to install and wire. If the centralized point/Hub fails, the
Modifying system and adding new network fails. Hence the network
computers is easy. vulnerable to breakdown as it is essentially
Centralized Hub monitoring and controlled by one device.
management are possible. Require more cable length than Bus and
Failure of one computer does not Ring, so it is expensive in terms of cable and
affect the rest of the network. Hub.
Faults are easier to locate and
isolate/easy to troubleshoot
Peer-to-Peer network OS
Allow users to share resources and files located on their computers and to access shared resources found
on other computers. However, they do not have application server, file server or a centralized
management source .
Eg. Windows for Workgroups like Windows 98, 2000 professional /Xp , windows 7 etc are examples of
as peer-to-peer network operating systems.
Client/Server Network OS
Are very powerful OS that allows to manage users, groups, resources and the whole network centrally
and securely.
Set By :Emamu Abdela Page 13 of 61
Client/Server Network OS are very powerful than Peer-to-peer network OS.
Eg. Novell Netware and Windows 2000 /2008 Server are examples of client/server network operating
systems.
B. Hardware Requirements for Network
Network hardware components includes different devices like Computers(Client/Server), Network
Interface Card ,Peripherals (i.e printer), Hub, Router ,Switch, Bridge, repeater, Cables,
Wireless media etc
A. Servers
server stands at the heart of most networks. It is a very fast computer with multiple processors .with a
large amount of RAM and storage space, along with a fast network interface card. The network
operating system software resides on this computer, along with any software applications, hardwares
and data files that need to be shared.
A server, like any computer, consists of two parts, the hardware and the software.
4.2. Network Interface Cards/NIC or Network Adapter Card
The network interface card (NIC) provides the physical connection between the network media/cable
and the computer.
It used for moving data from the computer to the cable or network and vice versa.
Twisted-Pair Cable
Twisted-pair cable consists of two insulated strands of copper wire twisted around each other.
The cables are twisted to reduce interference and crosstalk (a phenomena where one wire causes
interference on another ,twisting cancels out electrical noise or EMI/ElectroMagnetic Interference/ from
adjacent pairs)
4. The oldest, least expensive, and most commonly used media
5. Highly susceptible to electrical noise, interference, and ‘tapping’ of the signal as compared to the
other guided media
6. Arrangement of twisted pairs into group used for high-speed (10-100 Mbps) LAN
7. Most commonly used for LANs, Telephone system or voice communication.
UTP
STP
Figure 16. UTP and STP cable
There are 7 standard categories/Types of UTP cables:
4. Category 1(Cat-1) This refers to traditional UTP telephone cable that can carry only voice
information not used for other data transmissions unlike other category. It contains 2 twisted
pairs/4wires
5. Category 2 This category certifies UTP cable for data transmissions up to 4 megabits per second
(Mbps). It consists of four twisted pairs of copper wire/8 wires.
Figure 17. Crosstalk occurs when signals from one line bleed into another line
4. Twisted-pair cable uses RJ-45 (Registered Jack-45) connectors(used like for Cat-3,5 with 8wires) to
connect to a computer, and RJ-11 connectors(used to connect Cat-1 cable/Telephone cable with
4wires).
5. The standard connector for unshielded twisted pair cabling is an RJ-45 connector.
4. A device called crimper is used to attach RJ-45 connectors to the twisted cables by the process
called crimping
RJ-45 Connector
Figure 18.RJ-45 connector and jack
Twisted-Pair advantages/disadvantages
UTP advantages
1. It has a large installed base and is a familiar technology.
2. It is relatively cheaper than STP.
3. Most LAN systems are readily capable of running over UTP/it is common.
4. It does not require bonding and grounding.
5. Easy to install and flexible.
UTP disadvantages
Set By :Emamu Abdela Page 17 of 61
6. High-quality UTP systems require specialized installation procedures.
7. UTP is potentially more sensitive to external electromagnetic interference, crosstalk, and
attenuation than other media.
NB: attenuation is the loss of signal strength that begins to occur as the signal travels farther
along a copper cable.
8. Not recommended for LAN that requires a high level of security and you must be absolutely sure
of data integrity.
9. Not suitable for transmitting data over long distances at high speeds.
Shielded Twisted-Pair (STP) Cable
STP cable uses a woven copper-braid jacket that is more protective and of a higher quality than the jacket
used by UTP.
4. It allows to support higher transmission rates over longer distances than UTP but expensive, not
flexible and not common.
Coaxial Cable
In its simplest form, coaxial cable consists of a core of copper wire surrounded by insulation, a braided
metal shielding, and an outer cover.
4.1.1. better shielding than twisted pair Ü can span longer distances at higher speeds
4.1.2. bandwidth dependent on cable quality, length, … - close to 1 GHz for modern cables
The core of a coaxial cable carries the electronic signals that make up the data.
5. It used commonly for TV- System
Coaxial cable has more resistant to interference and attenuation than twisted-pair cabling.
Types of Coaxial Cable
There are two types of coaxial cable:
4. Thin (thinnet) cable
5. Thick (thicknet) cable
Set By :Emamu Abdela Page 18 of 61
Which type of coaxial cable you select depends on the needs of your particular network.
Thinnet Cable: Thinnet cable is a flexible coaxial cable about 0.64 centimeters (0.25 inches) thick.
Because this type of coaxial cable is flexible and easy to work with, it can be used in almost any type of
network installation.
Thinnet coaxial cable can carry a signal for a distance of up to approximately 185 meters (about 607
feet) before the signal starts to suffer from attenuation.
Thicknet Cable: Thicknet cable is a relatively rigid coaxial cable about 1.27 centimeters (0.5 inches) in
diameter. The following figure shows the difference between thinnet and thicknet cable.
Figure 20. Thicknet cable has a thicker core than thinnet cable
The thicker the copper core, the farther the cable can carry signals. This means that thicknet can carry
signals farther than thinnet cable. Thicknet cable can carry a signal for 500 meters (about 1640 feet).
Therefore, because of thicknet's ability to support data transfer over longer distances.
Thinnet vs. Thicknet: As a general rule, the thicker the cable, the more difficult it is to work with. Thinnet
cable is flexible, easy to install, and relatively inexpensive.
Thick cable does not bend easily and is, therefore, harder to install. Thick cable is more expensive than
thin cable, but will carry a signal farther.
Coaxial-Cable Connection Hardware
Both thinnet and thicknet cable use a connection component, known as a BNC/British Naval connector
or Bayone-Neill-Concelman, to make the connections between the cable and the computers.
Optical fiber cable is very thin like hair contains glass (or in some cases, plastic) fibers rather than
copper wire. Signals are transmitted across these fibers in the form of light pulses rather than electrical
pulses this eliminate the problem of Electrical interference.
4.1. Has Extremely high bandwidth: capable of >=2Gbps
4.2. Very high noise immunity, resistant to electromagnetic interference
4.3. Does not radiate energy/cause interference
4.4. Very difficult to tap (secure cable)
4.5. Better security than copper based cables b/c it don’t carry electrical impulses
That means fiber cable can’t be tapped ,and so the data can’t be stolen.
4. NB: use it if you need to transmit data at higher speed over long distance in very secured manner.
Don’t use it if you don’t have enough budget and expert available to properly install and connect
devices to it.
Optical fiber advantages
Optical signals through glass encounter less loss than electrical signals through copper. This translates into
lower attenuation and higher bandwidth than copper, allowing transmission to occur over longer
distances and/or at greater speeds.
High level of immunity to electromagnetic interference since signal is sent as light and not as
electricity.
It is reliable and secure media.
It can be used in hazardous condition like in highly flammable condition.
Optical fiber disadvantage
Due to the required conversions between light and electricity, more expensive electronics are required
than with copper-based systems.
Requires specialized installation procedures
Hard and complex to install.
Less flexible than other media.
Usable cable 185 meters 500 meters UTP and STP: 100 2 kilometers
length meters
Transmission 4-100 Mbps 4-100 Mbps UTP: 4-100 Mbps 100 Mbps or more ( >
rates STP: 16-500 Mbps 1Gbps)
Flexibility Fairly flexible Less flexible than UTP: Most flexible Less flexible than thicknet
thinnet STP: Less flexible
than UTP
Ease of Easy to install Moderately easy UTP: Very easy; Difficult to install
installation to install often preinstalled
STP: Moderately
easy
In wireless system their is no physical connection b/n the transmitter and sender ,they use air as a
medium.
In unguided media transmission and reception are achieved by means of an antenna.
The inherent difficulty of setting up cable networks is a factor that will continue to push wireless
environments toward greater acceptance.
Wireless connectivity can be especially useful for networking:
4. Busy locations, such as lobbies and reception areas.
5. Users who are constantly on the move, such as doctors and nurses in hospitals.
6. Isolated areas and buildings.
7. Departments in which the physical setting changes frequently and unpredictably.
Structures, such as historic buildings, for which cabling presents challenges.
The primary difference between these categories lies in the transmission facilities. Wireless LANs and
extended LANs use transmitters and receivers owned by the company in which the network operates.
Mobile computing uses public carriers, such as long distance telephone companies, along with local
telephone companies and their public services, to transmit and receive signals.
Infrared Transmission
Infrared systems carry data between devices using infrared light
4. Used For short-range communication like
4.1. Remote controls for TVs
4.2. Indoor wireless LANs
5. Do not pass through solid walls
5.1. Better security and no interference (with a similar system in adjacent rooms)
6. No government license is needed
7. Cannot be used outdoors (due to the sunshine)
4. provides high bandwidths of up to 100MBps
The uses of infrared include military, such as: target acquisition, short-ranged wireless communication etc
Radio Transmission
5. It has a frequency range between 1KHz to 1GHz
6. can travel long distances, penetrate buildings unlike Infrared (can be used indoors and outdoors)
Wireless system advantage
4. Can be used in situations where it is difficult or impossible to install cable.
5. Can be used in hazardous condition
6. Mobility(portability) and elimination of unsightly cables(beauty).
7. Installation speed and simplicity: installing a wireless system can be fast and easy and can
eliminate the need to pull cable through walls and ceilings.
8. More Flexibility: wireless networks offer more flexibility and adapt easily to changes in the
configuration of the network.
9. Can be used to transfer data in long distance like Communication satellite
Set By :Emamu Abdela Page 23 of 61
Wireless disadvantages
1. Typically, such systems are not able to meet the performance demands of large or busy networks.
2. Transmission can only occur over limited distances like infrared and at limited bandwidth.
3. The most obvious difference between wired and wireless networking is speed. Wired network has
high speed than wirless.
4. The potential for radio interference due to weather, other wireless devices, or obstructions like
walls (like in Remote Control).
Review Questions
1. What is the use of network transmission media?
2. compare and contrast the cable transmission media
3. list the cable connecter type for each cables
4. explain about wireless networking
5. compare and contrast the wireless transmission media
Ethernet
Is a most popular computer networking technologies (include cables, protocols, NICs etc)commonly used
in LAN and WAN.
Problems related to using Ethernet hardware products from different hardware manufacturers in a single
network are nearly nonexistent.
Ethernet is a network protocol that controls how data is transmitted over a network.
It is most likely that the network in your office, at labs, bank and even at home is an Ethernet LAN.
Besides, most desktop and laptop computers come with integrated an Ethernet card(NIC) inside so that it
is ready to be connected to an Ethernet LAN.
The most commonly installed Ethernet systems are called 100 BASE-T (the "BASE-T" part means
the systems use twisted-pair cabling) and provide transmission speeds up to 100 megabits per second
(Mbps).
Gigabit Ethernet provides speeds of 1000 Mbps (1 gigabit) and 10 GbE, or 10-Gigabit Ethernet,
provides up to 10 Gbps, and so on. Higher speeds are constantly under development for standardization
10BASE5 (also known as thick Ethernet or thicknet) was the first commercially available variant
of Ethernet. 10BASE5 uses a thick and stiff coaxial cable up to 500 metres in length with 10Mbs.
10BASE-T and its successors 100BASE-TX, 1000BASE-T( useUTP cat5e or cat6 with maximum
length of 100 meters) and 10GBASE-T, supporting speeds of 10, 100 Mbit/s and 1 and
10 Gbit/s respectively.
4. 1000BASE-LX is a fiber optic gigabit Ethernet standard with 1 gigabit per second .
INFORMATION SHEET # 2
Unit of Competence: Determine Best Fit Topology
LO 2: Determine user needs
Sender Receiver
2. In duplex it is possible to perform error detection and request the sender to re-transmit
information.
An example of Half Duplex mode Transmission can be Voice communication like
a mobile radio system walkie talkie .
3) Full Duplex mode: Communication can occur in both directions at the same time(simultaneously, i.e.
at the same time on the same channel), or both can send data while receiving.
An example of full Duplex mode Transmission can be telephone communication system
, Computer network.
Circuit Switching
Switching describes how data finds a path from its source to its destination.
Circuit switching was designed in 1878 in order to send telephone calls down a dedicated channel.
3. It defines a static/dedicated path from one point to another; so long as the two points are
connected, all data traveling between those two points will take the same path.
The link between caller and receiver is created, then a dedicated communications link between the two
points (hence the term circuit) is created. The circuit cannot be broken, meaning no one else can use the
line.
In a data communications environment, however, this is a disadvantage because the data often
originates from various sources
Thus, it's unnecessary to include addressing information in the packet with the data. Because there's
only one path, the data can't get lost.
A channel is dedicated to the connection. In circuit switching:-
4.1. Dedicated communications path established for the duration of the conversation
4.2. Data are transmitted along the dedicated path.
4.3. At each node, incoming data are switched to the appropriated outgoing channel without delay.
4.4. Common example of circuit switch is telephone network.
4.5. Establishing circuit Switched network consists of 3 phases:
1) circuit establishment
2) data transfer
3) circuit disconnect
Characteristics of circuit switching:-
4.1.1. There is Call setup/circuit establishment
4.1.2. It is Inefficient: the path is permanently reserved even if there is no data to send.
4.1.3. Guaranteed connection
4.1.4. No delay for path calculation, however, busy when connected.
A packet-switching network has no permanent/dedicated physical path determining how data moves
from point to point. Instead, the addressing information in the packet helps route the data to its
destination. You could think of a circuit-switching network as a complex of moving pipes, each
disconnected from the others and a packet-switching network as a complex of connected pipes, through
which data travels, choosing its path based on variables like traffic conditions.
4. widely used in a modern network environment.
Messages are first divided into smaller pieces called packets. Each packet includes source and
destination address information so that individual packets can be routed through the transmission
system.
Packet Switching has the following characteristics:-
The OSI model was intended to help vendors create interoperable network devices and software in
the form of protocols so that different vendor networks could work with each other.
As networks and suppliers of networking products have spread across the world, the need for
standardization has increased.
Application Layer
4. Layer 7, the topmost layer of the OSI reference model, is the application layer. It is closest to the
user. This layer relates to the services that directly support user applications, such as software for file
transfers, database access, and e-mail. In other words, it serves as a window through which application
processes can access network services. Application-layer protocols are like File Transfer Protocol
It allows two applications on different computers to open, use, and close a connection called
a session. (A session is a highly structured dialog between two workstations.) The session layer is
responsible for managing this dialog. It also provide security, that are needed to allow two applications
to communicate over the network.
5. provides dialogue control between devices, or nodes.
5. . Internet Protocol (IP),IPv6 and Internetwork Packet Exchange (IPX) are examples of network-layer
protocols.
The Transmission Control Protocol/Internet Protocol (TCP/IP) suite was created to ensure and preserve
data integrity, as well as maintain communications in the event of atomic war.
The TCP/IP Suite defines a set of rules to enable computers to communicate over a network. TCP/IP
provides end-to-end connectivity specifying how data should be formatted, addressed, shipped, routed
and delivered to the right destination.
It is a combination of two protocols TCP and IP that is an industry-standard suite of protocols that
provide communications in a heterogeneous (made up of dissimilar elements) environment. TCP/IP
very popular and has become the de facto standard for what's known as internetworking(the
intercommunication in a network that's composed of smaller networks. )
4. TCP/IP is a combination of two individual protocols.
Many connectivity utilities have been written for the TCP/IP suite, including the File Transfer Protocol
(FTP) ,Telnet. They do not dependent on the network operating
system used on either machine. For example, a Windows NT server running an FTP server could be
accessed by a UNIX FTP client to transfer files without either party having to worry about compatibility
issues.
3.Used to Access to the Internet
10. The Internet is built upon this TCP/IP protocol suite.
4. Highly reliable or provide reliable network communication.
5. scalable or use in large network like Internet, client-server architecture
4.1. Internet Protocol (IP) is a packet-switched protocol that performs addressing and route
selection.
4.2. IP is a connectionless protocol and sends packets without expecting the receiving host to
acknowledge receipt.
Transport Layer
The transport layer, corresponding to the transport layer of the OSI reference model.
Is responsible for establishing and maintaining end-to-end communication between two hosts. The
transport layer provides acknowledgment of receipt, flow control, and sequencing of packets. It also
handles retransmissions of packets.
Protocols used in transport layer are like:- TCP or User Datagram Protocol (UDP) protocols depending
on the requirements of the transmission.
Application Layer
Corresponding/contains the session, presentation, and application layers of the OSI model, the
application layer connects applications to the network.
Numerous protocols have been written for use in this layer, including Simple Network Management
Protocol (SNMP), File Transfer Protocol (FTP), SMTP, HTTP, Telnet and many others.
NB:The core protocols that make up TCP/IP are like TCP,IP,ARP,ICMP,FTP,SMTP,SNMP etc
NETWORK PROTOCOLS
Introduction to Protocols
4. Protocols are rules and procedures for communicating.
5. They are language spoken between computers or the rules that two computers must follow in
order to exchange those messages.
6. It is a set of rules or standards that control data transmission and other interactions between
networks, computers, peripheral devices, and operating systems.
7. The same protocol must be used on the sending and receiving devices. It is possible for two devices
that use different protocols to communicate with each other, but a gateway is needed in between.
Keep three points in mind when you think about protocols in a network environment
Non-routable protocoles
1. Assume that all computers communicate with are on the same network.
2. Today’s in modern networks most of these protocols are dying or falling out of use a because
they do not support multi-segment network.
3. Eg . Layer 2 protocols such as NetBEUI and Ethernet are non-routable protocols.
POP3(Post Office Protocol3):-most recent version of standard protocol used by local e-mail clients
for receiving e-mail from a remote server over a TCP/IP connection.
IMAP(Internet Message Access Protocol): standard protocol for receiving e-mail.
FTP (File Transfer Protocol): For exchanging files among computers running TCP/IP
File Transfer Protocol (FTP) enables a file on one system to be copied /downloaded another system., the
correct permissions are necessary to provide access to the files.
FTP transfers can also be initiated from within a Web browser by entering the URL preceded with ftp://.
Real World Scenario: When should you use FTP?
i.e Your Branch office needs a 50MB file e-mailed to them right away. What do you do? Most e-mail
servers would reject the e-mail because they have size limits. Even if there's no size limit on the server,
it still would take much time to send this big file to office ,so FTP to the rescue!
If you need to give someone a large file or you need to get a large file from someone, FTP is a nice
choice than e-mail. Smaller files (less than 5MB) can just be sent via e-mail if you have large bandwidth .
FTP is a fast option you should consider if you are in need of sending and receiving large files.
HTTP(Hyper Text Transfer Protocol):-most common and used for exchanging Hyper Text
documents(text, sound, movie, graphics ,multimedia files etc) On WWW b/n computer.
HTTP clients (such as Web browsers) and servers communicate via HTTP request and response
messages.
HTTP is the protocol used for the majority of World Wide Web communications
SNMP (Simple Network Management Protocol): An Internet protocol for monitoring networks and
network components.
Simple Network Management Protocol (SNMP) provides status messages and problem reports
across a network to an administrator.
Self check Questions
Choose the best answer by circling from the given alternatives
4.1. Which one is a Simplex transmission mode
4.1.1. TV B. Computer network C.Telephone communication
4.2. Which of the following is not true
4.2.1. In full duplex two device can communicate at the same time
Ethiopian TVET-System
INFORMATION SHEET # 3
Unit of Competence: Determine Best Fit Topology
LO 3: Develop best topology
Hub is used as the central hardware component to connect computers in a star topology. Hubs can also
be used to expand the size of a LAN(185 meters) .. Hubs are multiport repeater
A Hub works at the physical layer of the OSI Reference Model to regenerate the network's signals and
resend them out on other segments.
When data enters the hub through any of its ports, the hub amplifies the signal and transmits it out
through all of the other ports.
Passive Hubs: Send the incoming signal directly through their ports without any signal processing.
Or they act as connection points and do not amplify or enhance the signal.
Bridges
Bridge can join segments or workgroup LANs. However, a bridge can also divide a network to isolate
traffic or problems. For example, if the volume of traffic from one or two computers or a single
department is flooding the network with data and slowing down the entire operation, a bridge could
isolate those computers or that department.
4. You might say that the bridge is like a traffic cop at a busy intersection during rush hour. It keeps
information flowing on both sides of the network, but it does not allow unnecessary traffic through.
5. Bridges work at the data-link layer of the OSI reference model.
6. Bridges actually have some degree of intelligence in that they learn where to forward data.
Switch
It is used as the central hardware component to connect computers in a star topology.
Bridges and switches are usually used interchangeably; the difference is that a switch is most often
used to connect individual computers(offer a more direct network connection between the source and
destination computers)
Switches no longer broadcast network packets as hubs did in the past, they memorize addressing of
computers and send the information to the correct location directly based on MAC address(they
amplify, filter and forward packet).
4. In a small home or office, a hub is generally sufficient. However, if many users are always
sending large files to each other, the switch eliminates congestion
Hubs have actually become hard to find, due to the widespread use of switches
fig:48-port switch.
Routers
In an environment that consists of several network segments with differing protocols and architectures,
a bridge might be inadequate for ensuring fast communication among all segments. A network this
complex needs a device that not only knows the address of each segment, but can also determine the
best path for sending data and filtering broadcast traffic to the local segment. Such a device is called a
"router."
Routers work at the network layer of the OSI reference model. This means they can switch and route
packets across multiple networks.
Gateways
Gateways enable communication between different architectures and environments. They repackage
and convert data going from one environment to another so that each environment can understand the
other environment's data. A gateway repackages information to match the requirements of the
destination system. Gateways can change the format of a message so that it conforms to the application
program at the receiving end of the transfer. For example, electronic-mail gateways, such as the X.400
gateway, receive messages in one format, translate it, and forward it in X.400 format used by the
receiver, and vice versa.
A gateway links two systems that do not use the same:
4. Communication protocols.
5. Data-formatting structures.
6. Languages.
7. Architecture.
Gateways interconnect heterogeneous networks; for example, they can connect Microsoft Windows NT
Server to IBM's Systems Network Architecture (SNA).
Network addressing
Addressing on a network can take one of three forms:
4.3. Computer names: on a typical network, most users prefer to use computer names to
communicate; computer names are far easier to remember than IP addresses. A computer
name is the logical equivalent of an IP or MAC address
4.4. IP(Internet protocol) addresses: Although users can use IP addresses, customarily IP addresses
are used primarily by applications to communicate with locations on or outside the network
MAC Addressing
4. A host’s MAC address is based on a 12-digit hexadecimal address (48bits) such as 0C.43.F6.D2.FF.7A.
Usually, the MAC address is burned in the NIC.
Although the MAC address is always used in networking. It cannot be routed. The MAC address is not
routable because of ,It does not pass through routers (because of its position in the OSI model is 2 not3 )
IP Addressing
An IP address is a logical address of a computer/software, which is expressed as a four 8-bit group of
bits (a total of 32 bits) separated by periods. Each 8-bit group of bits can be represented by a 3-digit
decimal that spans between 0 and 255. For example 196.27.22.42
You can depict an IP address using one of three methods:
1. Dotted-decimal, as in 172.16.30.56
2. Binary, as in 10101100.00010000.00011110.00111000
3. Hexadecimal, as in AC.10.1E.38
The total number of distinct addresses one can have from these 32 bit addressing scheme is 2 32 =
4,294,967,296.
4. It shows the specific location of a device on the network.
5. It allow a host on one network to communicate with a host on different network
6. It is hierarchical address that makes it to handle large number of address(2 32) like Telephone
number.
An IP address consists of two parts a network address that identifies the network and a host address
that identifies the particular host(i.e PC), or node. Host Is computer, connected to a physical network,
that exchanges information with another computer.
IPV4 Addressing
The IP address identifies and differentiates a given machine from all others on the network. It consists of
a 32-bit number that is usually displayed as four octets expressed in decimal and separated by periods.
=>8bits. 8bits. 8bits. 8bits.
Internet designer decided to create classes of network based on network size, they created classful IP
address. For large number of network and small number of hosts probably class C IP address is an
option.
There are five different classes of networks: A, B, C, D and E. classes D and E are reserved.
Class D is reserved for multicasting purpose and class E for experimental purpose.
Class A networks/Address
4. Designed to meet the needs of large networks with many nodes.
5. This class will only support 126 networks; but each network can support 16,777,214 hosts.
6. The first octet of the IP address is network portion and the rest is the node portion (part).
The Class A format is: NetworkID/bit. nodeID. nodeID. nodeID
NetworkID
0 x x X X X x x 24 bits node ID
For example, in the IP address 49.22.102.70 => 49 is the network address, and 22.102.70 is the Node
address.
To know the range of class A consider the first octet which is 0xxxxxxx ,here 0 is constant ,If we turn the
other 7 bits all off(0) and then turn them all on(1), we'll find the Class A range of network
addresses:00000000 = 0 and 01111111 = 127
So, a Class A network is defined in the first octet between 0 and 127, and it can't be less or more.
NB: 0 and 127 are not valid in a class A network b/c they are reserved, so we use 1-126.
A maximum of 126 (27-2) networks can be defined. The calculation requires that the 2 is subtracted
because 0.0.0.0 is reserved for use as the default route and 127.0.0.0 (also written 127/8 or 127.0.0.0/8)
has been reserved for the "loopback" function. The host calculation requires that 2 is subtracted
because the all-0’s of host bit is reserved for designating "this network" and all-1’s reserved for
"broadcast" address .
Example of valid class A IP address 12.100.90.6, here 12 is the network address and 100,90 &6 is the
node address.
Reserved/not valid IP address in classful IPAddress
Network address of all 0’s reserved/Interpreted to mean "this network or segment”
Eg. 0.67.9.8 , 0.123.44.67 etc
Network address of all 1’s class reserved/Interpreted to mean "all networks."
Eg. 255.4.96.37
Network 127.0.0.1 Reserved for loopback tests. Designates the local node
and allows that node to send a test packet to itself without generating network traffic
Node address of all 0’s in any class Interpreted to mean "network address" or any host on
specified network.
7. Each Class B network address has a 16-bit network-prefix with the two highest order bits set to 10
and a 14-bit network number, followed by a 16-bit host-number.
The Class B format is: NetworkID/bit. NetworkID. nodeID. nodeID
8. To know the range of class B consider the first octet which is 10xxxxxx ,here 1 and 0 are
constant ,If we turn the other 6 bits all off(0) and then turn them all on(1), we'll find the Class B range
of network addresses:10000000 = 128 and 10111111 = 191
9. A maximum of 16,384 (214) networks can be defined with up to 65,534 (216-2) hosts per network.
10. Example of valid class B IP address 172.16.30.56, here 172&16 is the network address and
30&56 is the node address.
11. Example of invalid class B IP address for PCs,255.255.30.56, 172.16.0.0, 172.45.255.255 etc
Class C networks
1. Was designed for small networks; thus the number of hosts per network will be small, however it
will support many more networks total.
2. The first three octet are the network portion and the remaining one for node.
1 1 0 (21 bits) network id 8 bits node id
3. A maximum of 2,097,152 (221 ) networks can be defined with up to 254 (28-2) hosts per network
4. Each Class C network address has a 24-bit network-prefix with the three highest order bits set to
1-1-0 and a 21-bit network number, followed by an 8-bit host-number.
5. To know the range of class C consider the first octet which is 110xxxxx ,here 110 are constant If
we turn the other 5 bits all off(0) and then turn them all on(1), we'll find the Class C range of
network addresses:11000000 = 192 and 11011111 = 223
NB: class A network(not mostly used) support the largest number of Host address and class C
(which the opposite of Class A)support the largest number of Network address.
6. Example of valid class C IP address 192.16.30.56, here 192, 16 and 30 is the network address
and 56 is the node address.
When you determine the IP address, remember:
4. Each logical network must have its own network address.
IP address type
6.1. Private IP addresses/ networks
Private IP addresses are typically used on local networks including home, school and business LANs.
Devices with private IP addresses cannot connect directly to the Internet. Likewise, computers outside
the local network cannot connect directly to a device with a private IP. Instead, access to such devices
must be brokered by a router.
1. Three ranges of address are reserved for use in private networks. These ranges are not routable or
accessible outside of private networks and private machines cannot directly communicate with
public networks.
The following are the three ranges reserved for private networks:
Clas Address range Number of addresses
s
A 10.0.0.1–10.255.255.254 16777216
B 172.16.0.1–172.31.255.254 1048576
C 192.168.0.1–192.168.255.254 65536
Subnetting
A subnetwork, or subnet, is a logically visible subdivision(part of a network) of a network. The
practice /process of creating subnetworks is called subnetting.
4. Subnetting is the process of breaking down an IP network into smaller sub-networks called
“subnets.”
There are many reasons to perform subnetting. Some of the benefits of subnetting include the following:
6. Reduced network traffic With routers, most traffic will stay on the local network; only packets
destined for other networks will pass through the router this reduce network traffic on that network
segment.
7. Optimized network performance This is a result of reduced network traffic.
8. Simplified network management It ís easier to identify and isolate network problems in a group of
smaller connected networks than within one large network.
9. To use address space more efficiently
The most common reason of subnetting is to control network traffic/to control heavy traffic loads.
To create subnet we borrow/take at least 2 bits from host bits so there will be a three level addressing
hierarchy which is Network number/bits ,subnet number and Host number.
NB: Host ID/no. -----198.10.20.10000000=>198.10.20.128 is not valid b/c all host bits can’t be 0’s and
Host ID/no. -----198.10.20.10111111=>198.10.20.191 is not valid b/c all host bits can’t be 1’s which is
broadcast address.
5. A.The broadcast ID/no. for the 1st subnet/198.10.20.01000000 is 198.10.20.01111111=>
198.10.20.127
5B.The broadcast ID/no. for the 2nd subnet/198.10.20.10000000 is 198.10.20.10111111=>
198.10.20.191
NB:We get the broadcast address by making all host bits 1’s in any subnet or by subtracting 1 from the
next subnet ID or last host ID + 1.
6.the subnet mask is 11111111.11111111.11111111.11000000=>255.255.255.192
NB:We get the subnet mask by making all network and subnet bits 1’s and all host bits 0’s .
Exercise
1. Subnet the IP Address/network 200.10.20.0/27 by borrowing 3 bits
From the Host and answer the above six questions.
2. A company leased 193.62.52.0 Address , this company requires 6 sunbnets for it’s 6 branches and it
also has 10 hosts per subnet. Answer the above six questions.
3. Subnet the IP Address/network 199.7.8.0 by borrowing 4 bits from the Host. And answer the above
six questions.
4.AAU leased 130.62.0.0 Address , for its 7 campus subnets(4killo,5killo,6killo,commerce building
,debreziet campus and blackline) and each campus has 140 hosts. Answer the above six questions.
IPv6 Features
These different types of domains mean different things and when designing a LAN both of these
domains can harm the performance of your network.
The definition of a collision domain is a set of LAN devices whose frames could collide with one another.
This happens with hubs, bridges, repeaters and wireless access points as only one device can send and
receive at a time. If more than one device tries sending or receiving, the information is lost and
irrecoverable it will need to be resent. This can slow down network performance along with making it a
security threat.
A hub is considered a layer one device of the OSI model; all it does is send packets out on all ports
including the port in which the packet was received on. This causes a collision domain b/c only one
device can transmit at time. This also shares the bandwidth of all devices connected to that collision
domain.
A switch uses layer two of the OSI model, so the switch uses MAC addresses to send the packet to the
correct device. Rather than sending it to all ports a switch only sends the packet out one port, if it has
the MAC address in its MAC address table. If not the switch will send the packet on all ports except for
the port in which the packet was received on. Switches provide separate collision domains on each port.
This provides dedicated bandwidth to that device. This also allows simultaneous conversations b/n
devices on different ports. Each port can be operated at full-duplex so the device can send and receive
information at the same time
Design Networks
During network design we do/consider a lot of things like:-
Whenever we start to design a network for an organization, we should clearly identify the organizational
objective and the goal of the network to be developed.
This is actually a simple process, but one that should not be taken lightly. For each computer, you will
need to gather information, including:
4. Make and model. , Processor manufacturer and speed.
5. Amount of memory (RAM) installed.
6. The size and manufacturer of each hard drive.
7. Details of any other installed drives, such as compact-disc and removable disk drives.
8. Monitor:make, model, and size, Any installed peripherals like printers, plotters, and scanners etc
Software Survey
Be aware of all the software currently in use throughout the potential network. For example, if you were
to convert all the computers to Windows NT while you were installing the new network, you might find
that some of the old standby programs, once used on a daily basis, now no longer run. For each software
program, gather the following information:
It might seem strange to review the existing telecommunications equipment (like modems
telephone lines)when you are installing a LAN, but this is actually a very important element of your
survey, especially if you intend to use like Internet connections a host on a LAN that includes modems
and enables users to connect to the network over telephone lines.)
Requirements of the Network
After you have examined the existing facility and equipment, you need to define the requirements of
your network. You'll then match these requirements to the existing hardware, software, and
telecommunications features available and determine what steps need to be taken to develop the
network. At a minimum, you should consider the following:
4. The size of the facility (located on a single floor vs. multiple floors)
5. The number of users
6. Whether the LAN will be extended to several buildings
7. The environment (office, manufacturing, out-of-doors)
8. The current network media, if any
9. The technical competence of users
10. The amount of network traffic (initially, and anticipated for the future)
11. The level of security
Building a Map
Now it's time to lay out the network. But before you begin to recommend a network plan for our bicycle
company, you will first need to make a map of all the elements involved. During this step, you should
consider two aspects of the network: the physical layout, including the location of each piece of
hardware and how it relates to the others, and the physical and logical topology of the proposed
network.
The second step is to create a layout of the network topology. Don't forget to include printers and other
peripherals, such as scanners and modems.
Choosing Network Media
The choice of which media to select should not be taken lightly. The cost of installation can be quite
high. The media you choose will usually be related to the geographic requirements of the site
NB: to choose cable you need to consider different factor like cable cost, distance cover, bandwidth
,security etc
Network documentation
The Results of Undocumented Network
let see the case if none of the primary server systems were documented. No one knew what server did
what, how much memory, disk space, what type of processor(s), and in some cases, did not know what
Operating System was installed. Because of the lack of network documentation, no one knew what was
suppose to be done to maintain enterprise Anti-Virus system. virus signatures had not been updated in
over six months. the system was not even functioning and nearly 90% of systems on the network were
infected with virus and worms (and not the annoying kind either, the destructive kind)
there were four different tape backup servers, and again, because of the lack of network
documentation, none of them had been maintained. The customer just kept changing tapes. And do you
know what, none of the backup jobs had been running for months. Talk about a false sense of security!
The very last thing that we want to talk about is how lack of network documentation and procedures
can affect network security.
All server hardware and operating systems should be documented, including the physical locations and
what primary, secondary, etc.. purpose they serve. All key service accounts , login account, user-id and
password's should be documented and stored in a safe location. A visual diagram of the network layout,
even from a high level, should exist no matter how small or large the network is.
5. Procedures on how to maintain the network technology, including Operating Systems, security
related services, backup and disaster recovery (business continuity), and firewall technologies should
exist.
6. Additionally, you should document and secure all Operating System and application licensing.
7. Other information to have documented is key contact information. For instance, who do you call if
your Internet connection goes down? Who do you contact if your offsite web services are not
functioning?
The above is just the basic items that need to be documented within a computer network. There are
many more aspects to network documentation.