Chapter 2 Part 2
Chapter 2 Part 2
by
J. Glenn Brookshear
0-2
Network Classifications
Scope
◦ Local area network (LAN)
◦ Metropolitan area network (MAN)
◦ Wide area network (WAN)
Ownership
◦ Closed versus open
Topology (configuration)
◦ Bus and Ring(Ethernet)
◦ Star (Wireless networks with central Access Point)
◦ Irregular
0-3
Figure 4.1 Network topologies
0-4
Network topologies (continued)
Ring
0-5
Figure 4.1 Network topologies
(continued)
0-6
Network topologies (continued)
• Irregular
0-7
Protocols
Protocol – rules by which an activity is
conducted
Carrier sense, multiple access with
collision detection (CSMA/CD)
◦ Nodes contend for the right to send a
message
◦ Used in Ethernet (Bus network)
◦ Silent bus provides right to introduce new
message
0-8
Protocols Cont.
Carrier sense, multiple access with
collision avoidance (CSMA/CA)
◦ Used in WiFi
◦ Hidden terminal problem
0-9
Figure 4.3 The hidden terminal problem
0-10
Connecting Networks
• Repeater: Extends a network
• Bridge: Connects two compatible networks
• Switch: Connects several compatible networks
• Router: Connects two incompatible networks
resulting in a network of networks called an
internet
0-11
Figure 4.4 Building a large bus network
from smaller ones
0-12
Figure 4.5 Routers connection
0-13
Inter-process Communication
Client-server
◦ One server, many clients
◦ Server must execute continuously
◦ Client initiates communication
Peer-to-peer (P2P)
◦ Two processes communicating as equals
◦ Peer processes can be short-lived
0-14
Figure 4.6 The client/server model vs peer-to-
peer model
0-15
Figure 4.8 A typical URL
0-16
Figure 4.12 Package-shipping example
0-17
Internet Software Layers
• Application: Constructs message with
address
• Transport: Chops message into packets
• Network: Handles routing through the
Internet
• Link: Handles actual transmission of
packets
0-18
Figure 4.13 The Internet software layers
0-19
Figure 4.14 Following a message
through the Internet
0-20
Data communication channels
Communication channel – passes
digital information from one location to
another
Physical transmission medium
Wireless transmission medium
0-21
Physical transmission medium
0-22
Physical transmission medium Cont.
Coaxial cable – constructed to permit
high-speed data transmission with less
distortion
0-23
Physical transmission medium Cont.
Fibre optic cable – carries data as laser-
generated pulses of light
0-24
Wireless Communication
Microwave signal or radio signal – signals
travel in a straight line
0-25
Wireless Communication Cont.
Satellite – eliminate the line of sight
limitation
0-26
Security
Attacks
◦ Malware (viruses, worms, Trojan horses, spyware,
phishing software)
◦ Denial of service
◦ Spam
Protection
◦ Firewalls
◦ Spam filters
◦ Antivirus software
0-27
Encryption
FTPS, HTTPS, SSL
Public-key Encryption
◦ Public key: Used to encrypt messages
◦ Private key: Used to decrypt messages
Certificates and Digital Signatures
0-28
Figure 4.16 Public-key encryption
0-29