CompTech 213 Topic 5 Net - Building
CompTech 213 Topic 5 Net - Building
• Speed: Speed is a measure of how fast data is transmitted over the network. A more precise term would be data rate.
• Cost: Cost indicates the general cost of components, installation, and maintenance of the network.
• Security: Security indicates how secure the network is, including the data that is transmitted over the network. The subject of security is
important and constantly evolving. You should consider security whenever you take actions that affect the network.
• Availability: Availability is a measure of the probability that the network will be available for use when required. For networks that are meant
to be used 24 hours a day, 7 days a week, 365 days a year, availability is calculated by dividing the time it is actually available by the total time
in a year and then multiplying by 100 to get a percentage.
• Scalability: Scalability indicates how well the network can accommodate more users and data transmission requirements. If a network is
designed and optimized for just the current requirements, it can be very expensive and difficult to meet new needs when the network grows.
• Reliability: Reliability indicates the dependability of the components (routers, switches, PCs, and so on) that make up the network. Relia bility
is often measured as a probability of failure, or mean time between failures (MTBF).
• Topology: Networks have two types of topologies: the physical topology, which is the arrangement of the cable, network devices, and end
systems (PCs and servers), and the logical topology, which is the path that the data signals take through the physical topology.
These characteristics and attributes provide a means to compare different networking solutions. Increasingly, features such a s security, availability,
scalability, and reliability have become the focus of many network designs because of the importance of the network to the business process.
Elements of a Network
The diagram shows elements of a typical network, including devices, media, and services, tied together by rules, that work to gether to send messages.
We use the word messages as a term that encompasses web pages, e-mail, instant messages, telephone calls, and other forms of communication enabled
by the Internet.
Networking is a very graphically oriented subject, and icons are commonly used to represent networking devices. On the left s ide of the diagram are
shown some common devices which often originate messages that comprise our communication. These include various types of computers (a PC and
laptop icon are shown), servers, and IP phones. On local area networks these devices are typically connected by LAN media (wired or wireless).
The right side of the figure shows some of the most common intermediate devices, used to direct and manage messages across th e network, as well as
other common networking symbols. Generic symbols are shown for:
• Switch - the most common device for interconnecting local area networks
• Firewall - provides security to networks
• Router - helps direct messages as they travel across a network
• Wireless Router - a specific type of router often found in home networks
• Cloud - used to summarize a group of networking devices, the details of which may be unimportant to the discussion at hand
• Serial Link - one form of WAN interconnection, represented by the lightning bolt-shaped line
1
Network Connections
Network connections can be wired or wireless. In wired connections, the medium is either copper, which carries electrical signals, or optical fiber, which
carries light signals. In wireless connections, the medium is the Earth's atmosphere, or space, and the signals are microwaves. Copper medium includes
cables, such as twisted pair telephone wire, coaxial cable, or most commonly, what is known as Category 5 Unshielded Twisted Pair (UTP) cable. Optical
fibers, thin strands of glass or plastic that carry light signals, are another form of networking media. Wireless media may include the home wireless
connection between a wireless router and a computer with a wireless network card, the terrestrial wireless connection between two ground stations, or
the communication between devices on earth and satellites.
NETWORK ARCHITECTURE
Network architecture is the design of a communication network. It is a framework for the
specification of a network's physical components and their functional organization and
configuration, its operational principles and procedures, as well as data formats used in its
operation.
Networks must support a wide range of applications and services, as well as operate over
many different types of physical infrastructures. The term network architecture, in this
context, refers to both the technologies that support the infrastructure and the
programmed services and protocols that move the messages across that infrastructure. As
the Internet and networks in general, evolve, we are discovering that there are four basic
characteristics that the underlying architectures need to address in order to meet user
expectations: fault tolerance, scalability, quality of service, and security.
2
Fault Tolerance
The expectation that the Internet is always available to the millions of users who rely on it requires a network architecture that is designed and built to
be fault tolerant. A fault tolerant network is one that limits the impact of a hardware or software failure and can recover quickly when such a failure
occurs.
Scalability
A scalable network can expand quickly to support new users and applications without impacting the performance of the service being delivered to
existing users. Thousands of new users and service providers connect to the Internet each week.
Quality of Service (QoS)
The Internet is currently providing an acceptable level of fault tolerance and scalability for its users. But new applications available to users over
internetworks create higher expectations for the quality of the delivered services. Voice and live video transmissions require a level of consistent quality
and uninterrupted delivery that was not necessary for traditional computer applications.
Security
The Internet has evolved from a tightly controlled internetwork of educational and government organizations to a widely acces sible means for
transmission of business and personal communications. As a result, the security requirements of the network have ch anged. The security and privacy
expectations that result from the use of internetworks to exchange confidential and business critical information exceed what the current architecture
can deliver.
PRINCIPLES OF COMMUNICATION
Source, Channel, and Destination
The primary purpose of any network is to
provide a method to communicate
information. From the very earliest primitive
humans to the most advanced scientists of
today, sharing information with others is
crucial for human advancement.
All communication methods have three
elements in common. The first of these
elements is the message source, or sender. Message sources are people, or electronic devices, that need to communicate a message to other individuals
or devices. The second element of communication is the destination, or receiver, of the message. The destination receives the message and interprets
it. A third element, called a channel, provides the pathway over which the message can travel from source to destination.
Rules of Communication
In any conversation between two people, there are many rules, or protocols, that the two must follow in order for the message to be successfully
delivered and understood. Among the protocols for successful human communication are:
• Identification of sender and receiver
• Agreed-upon medium or channel (face-to-face, telephone, letter, photograph)
• Appropriate communication mode (spoken, written, illustrated, interactive or one-way)
• Common language
• Grammar and sentence structure
• Speed and timing of delivery
3
Shared Peripheral
Shared peripherals are not directly connected to the network, but instead are connected to hosts. The host is then responsible for sharing the peripheral
across the network. Hosts have computer software configured to enable people on the network to use the attached peripheral devices.
The network devices, as well as networking media, are used to interconnect hosts. Some devices can play more than one role, d epending on how they
are connected. For example, a printer directly connected to a host (local printer) is a peripheral. A printer directly connected to a network device and
participates directly in network communications is a host.
COMMON NETWORK DEVICES AND FUNCTIONS
Network Switch
Switches are used to connect multiple devices on the same network within a building or
campus. For example, a switch can connect your computers, printers and servers, creating a
network of shared resources. There are two basic types of switches to choose from as part of
your networking basics: managed and unmanaged. An unmanaged switch works out of the
box and does not allow you to make changes. Home-networking equipment typically offers
unmanaged switches. A managed switch allows you access to program it. This provides greater
flexibility to your networking basics because the switch can be monitored and adjusted locally
or remotely to give you control over network traffic, and who has access to your network.
Modem
A modem modulates one or more carrier wave signals to encode digital information for
transmission, and demodulates signals to decode the transmitted information. The goal is to
produce a signal that can be transmitted easily and decoded reliably to reproduce the
original digital data.
Router
Routers analyze the data being sent over a network, change how it is packaged, and send it to another network, or over a different type of network. They
connect your business to the outside world, protect your information from security threats, and can even decide which computers get priority over
others. Depending on your business and your networking plans, you can choose from routers that include different capabilities . These can include
networking basics such as:
Firewall: Specialized software that examines incoming data and protects your business network against attacks
Virtual Private Network (VPN): A way to allow remote employees to safely access your network remotely
IP Phone network: Combine your company's computer and telephone network, using voice and conferencing technology, to simplify and unify your
communications
Access Point
An access point is a device that creates a wireless local area network, or WLAN, usually in an office or large building. An access point connects to a wired
router, switch, or hub via an Ethernet cable, and projects a Wi-Fi signal to a designated area.
Organizational Standards
The Physical layer consists of hardware, developed by engineers, in the form of electronic circuitry, media, and connectors. Therefore, it is appropriate
that the standards governing this hardware are defined by the relevant electrical and communications engineering organizations. By comparison, the
protocols and operations of the upper OSI layers are performed by software and are designed by software engineers and computer scientists. As we saw
in a previous chapter, the services and protocols in the TCP/IP suite are defined by the Internet Engineering Task Force (IETF) in RFCs.
Similar to technologies associated with the Data Link layer, the Physical layer technologies are defined by organizations such as:
• The International Organization for Standardization (ISO)
• The Institute of Electrical and Electronics Engineers (IEEE)
• The American National Standards Institute (ANSI)
• The International Telecommunication Union (ITU)
• The Electronics Industry Alliance/Telecommunications Industry Association (EIA/TIA)
• National telecommunications authorities such as the Federal Communication Commission (FCC) in the USA.
4
2. Throughput
Throughput is the measure of the transfer of bits across the media over a given period of time. Due to a number of factors, throughput usually does not
match the specified bandwidth in Physical layer implementations such as Ethernet. In an internetwork or network with multiple segments, throughput
cannot be faster than the slowest link of the path from source to destination. Even if all or most of the segments have high bandwidth, it will only take
one segment in the path with low throughput to create a bottleneck to the throughput of the entire network.
Figure shows Data Throughput and Good put
3. Goodput
Goodput is the measure of usable data transferred over a given period of time, and is therefore the measure that is of most interest to network users.
As shown in the figure, goodput measures the effective transfer of user data between Application layer entities, such as between a source web server
process and a destination web browser device.
As an example, consider two hosts on a LAN transferring a file. The bandwidth of the LAN is 100 Mbps. Due to the sharing and media overhead the
through put between the computers is only 60 Mbps. With the overhead of the encapsulation process of the TCP/IP stack, the actual rate of the data
received by the destination computer, goodput, is only 40Mbps.
Cabling
Cables should be considered a long term investment. What may be sufficient now
may not be in the near future. Always plan for the future by complying with all
current standards. Remember that standards help to ensure that the cables will be
able to deliver acceptable performance as the technology evolves. It is important to
observe cabling best practices in all environments. Strict adherence to these
practices, in home and business environments, helps reduce the number of potential
problems. It will save a great amount of time, money and frustration.
1. It is important that the type of cables and components used on a network adhere to the standards required for that network. M odern converged
networks carry voice, video and data traffic on the same wires; therefore the cables used on converged networks must be able to support all these
applications.
2. Cable standards specify maximum lengths for different types of cables. Always adhere to the length restrictions for the type of cable being installed.
3. UTP, like all copper cable, is susceptible to EMI. It is important to install cable away from sources of interference such as high-voltage cables and
fluorescent lighting. Televisions, computer monitors and microwaves are other possible sources of interference. In some environments it may be
necessary to install data cables in conduit to protect them from EMI and RFI.
4. Improper termination and the use of low quality cables and connectors can degrade the signal carrying capacity of the cable. Always follow the rules
for cable termination and test to verify that the termination has been done properly.
5. Test all cable installations to ensure proper connectivity and operation.
6. Label all cables as they are installed, and record the location of cables in network documentation.
Structured Cabling
Structured cabling is a method for creating an organized cabling system that can be easily understood by installers, network administrators, and any
other technicians who deal with cables. One component of structured cabling is cable management. Cable management serves multiple purposes. First,
it presents a neat and organized system which aids in the isolation of cabling problems. Second, by following cable management best practices, the cables
are protected from physical damage which greatly reduces the number of problems experienced.
References:
Adapted and Compiled from:
CCNA IT Essential, “PC Hardware and Software” version 4.0, Cisco Networking Academy
CCNA Discovery 1, “Networking for Home and Small Businesses”, Cisco Networking Academy
CCNA Discovery 2, “Working at a Small-to-Medium Business of ISP”, Cisco Networking Academy
CCNA Exploration 1, “Network Fundamentals”, Cisco Networking Academy
Cisco Networking Academy Program, CCNA 1 and 2 Companion Guide, Cisco Press
Website
http://www.conceptdraw.com/examples/wireless-router-network-diagram
https://en.wikipedia.org/wiki/Computer_network