Netcom Module 1
Netcom Module 1
INTRODUCTION TO DATA
COMMUNICATIONS AND NETWORKING
Lesson 1 Networking
Fundamentals
Module I
9
MODULE I
INTRODUCTION
OBJECTIVES
There are four lessons in the module. Read each lesson carefully then
answer the exercises/activities to find out how much you have benefited
from it. Work on these exercises carefully and submit your output to your
instructor or to the College of Computer Science office.
Module I
10
Module I
11
Lesson 1
Networking Fundamentals
The information technology has been the driving force in most of the
advances witnessed this century. There has been a revolution in the way
information is gathered, processed and distributed. This revolution can’t be
done without the convergence of computing and communications.
Telephones, radio, television, and computers nowadays are the tools for this
information revolution. Geographically distributed computers can be hooked
up together to permit the exchange of data and information. Computer
network can be defined as a collection of devices that can store and
manipulate electronic data, interconnected in such a way that network
users can store, retrieve, and share information.
Commonly connected devices include microcomputers,
minicomputers, mainframe computers, terminals, printers, fax machines,
pagers, mobiles and various data storage devices as shown in Figure 1.1.
Module I
12
Module I
13
Module I
14
EXERCISE
Module I
15
Lesson 2
Module I
16
The physical medium can take many shapes and forms, and does not
have to be of the same type for each transmitter-receiver pair along the
path. Examples of physical medium include twisted-pair copper wire,
coaxial cable, multimode Optical fiber cable, terrestrial radio spectrum and
satellite radio spectrum.
Module I
17
Module I
18
● Cisco NX-OS, IOS XE, and IOS XR; families of network operating
systems used across various Cisco Systems device including the Cisco
Nexus and Cisco ASR platforms
Module I
19
● Cumulus Linux distribution, which uses the full TCP/IP stack of Linux
● DD-WRT, a Linux kernel-based firmware for wireless routers and
access points as well as low-cost networking device platforms such as
the Linksys WRT54G
● Dell Networking Operating System; DNOS9 is NetBSD based, while
OS10 uses the Linux kernel
● Extensible Operating System runs on switches from Arista and uses an
unmodified Linux kernel
● ExtremeXOS (EXOS), used in network devices made by Extreme
Networks
● FTOS (Force10 Operating System), the firmware family used
on Force10 Ethernet switches
● ONOS, an open source SDN operating system (hosted by Linux
Foundation) for communications service providers that is designed for
scalability, high performance and high availability.
● OpenWrt used to route IP packets on embedded devices
● pfSense, a fork of M0n0wall, which uses PF
● OPNsense, a fork of pfSense
● SONiC, a Linux-based network operating system developed
by Microsoft
● VyOS, an open source fork of the Vyatta routing package
EXERCISE
Module I
20
Lesson 3
Types of Networks
Module I
21
Module I
22
Module I
23
Module I
24
In the old days, the clients were simply dumb tubes. They had a
monitor and a keyboard. This type of system is still common in banks and
hotels where storage of data locally at the client is undesired or
unnecessary. The trend has been to use smart clients in most new
client/server networks. Smart clients will have their own local storage of
data and programs that offer far more flexibility.
Module I
25
due to the fact that some software companies charge more for
each client computer that requires connection to the main server.
2. Another downside to be considered is the possibility of the main
server having problems. How fast must you have the network
working again? If you need all time operability, you should allow in
your budget a second "redundant" server. Hence if the main server
goes down, the redundant server will step in and provide services
until the primary server is back up again. An experienced
administrator should be able to setup redundant servers that will
assume control of failing servers without user intervention.
Most networks in the world are hybrid networks that run clients,
peers and servers together. Users get the best of all worlds - shared
resources are located on servers but the users can still directly touch
their peers (bypassing the PDC) for shared resources. This has an
important implication on security - users can be assigned variable levels
of access to the server and peer machines depending on the importance
of the data.
Hybrid Access Networks refer to a special architecture for broadband
access networks where two different network technologies are combined
to improve bandwidth. A frequent motivation for such Hybrid Access
Networks to combine one xDSL network with a wireless network such
as LTE. The technology is generic and can be applied to combine
different types of access networks such as DOCSIS, WiMAX, 5G or
satellite networks. The Broadband Forum has specified an
[1]
architecture as a framework for the deployment of such converged
networks.
Module I
26
EXERCISE
Lesson 4
Module I
27
Module I
28
Module I
29
Module I
30
alphabet say E to it. You can then refer to the shared directory on
the remote computer as E and the redirector will locate it.
Designators make it unnecessary for users to worry about the actual
location of data or peripherals. They can send requests to computers
or peripherals.
Module I
31
Module I
32
● Data base Services: Data base requests are made using the SQL
syntax. SQL is an industry standard language supported by many
vendors.
Module I
33
Print servers accept print jobs sent by anyone across the network.
The print-server software also reports the status of jobs waiting for
printing and recognizes the priorities assigned to specific users.
Mail Servers: Mail servers manage local (within your network) and
global (Internet-wide) electronic messaging. The mail server you
choose should support the Internet standards such as POP3, and
SMTP.
Fax Servers: Fax servers manage fax traffic in and out of the
network, allowing multiple users to send and receive faxes without a
fax machine.
Module I
34
base with many users may need a dedicated DBMS to serve all the
requests.
Wi
Module I
35
EXERCISE
Module I