Chapter 1- Introduction
Chapter 1- Introduction
1.0 Introduction
The word networking appears in many spheres of life: a road network linking
towns; a business network of companies and clients; a social network; a water
network; an electrical power-grid network; telecommunication network;
computer network; etc.
All the above networks always have something in common; it contains nodes
(people, things, town, etc) linked (related, connected, associated, etc) to one
another, a various fashions.
The purpose of having networks is generally to share information; receive or
send information; ensure favours; and so on and so forth.
In this course we shall limit our study to computer networks, which is widely
used today. One of the greatest outcomes of computer networking in the
Internet?
In reality the internet is tens of thousands kilometers of fiber optic cable, hundreds of thousands to
millions of kilometers of copper wire, and hardware and software connecting them all together in
a redundant, fast, and self-sufficient network. But not to worry, it’s not that bad: you only have to
worry about a very small portion of the network, you can let someone else worry about the rest.
Any device capable of connecting to a network is considered a network device, below are
just a few of the more commonly connected network devices you're likely to find on a
home network.
A network can be setup in dozens of different ways known as network topologies. Common
configurations include the bus topology, mesh topology, ring topology, star topology, tree
topology and hybrid topology. Most home users will have a home network with a tree
topology that is connected to the Internet. Many corporate networks also use the tree
topology setup but will have many more star networks and may have an Intranet for
employees only.
Ring topology
Alternatively referred to as a star network, a star topology is one of the most common
network setups where each of the devices and computers on a network connect to a
central hub. A major disadvantage of this network topology is that if the central hub fails,
all computers connected to that hub would be disconnected. Below is a visual example of
a simple computer setup on a network using the star topology.
Bus topology
A bus topology is a type of network setup where each computer and network device is
connected to a single cable or backbone. Below, is a visual example of a simple computer
setup on a network using the bus topology.
Mesh topology
Tree topology
Alternatively referred to as a star bus topology, tree topology is one of the most
common network setups that is similar to a bus topology and a star topology. A tree
topology connects multiple star networks to other star networks. Below is a visual example
of a simple computer setup on a network using the star topology.
In the above example picture, if the main cable or trunk between each of the two star
topology networks failed, those networks would be unable to communicate with each other.
However, computers on the same star topology would still be able to communicate with
each other.
A hybrid topology is a network topology that uses two or more network topologies.
• Is limited in size, typically spanning a few hundred meters, and no more than a mile
• Is fast, with speeds from 10 Mbps to 10 Gbps
• Requires little wiring, typically a single cable connecting to each device
• Has lower cost compared to MAN’s or WAN’s
• LANs are capable of very high transmission rates (100s Mb/s to G b/s).
Advantages of LAN
• Speed
• Cost
• Security
• E-mail
• Resource Sharing
Disadvantages of LAN
• Expensive To Install
• Requires Administrative Time
• File Server May Fail
• Cables May Break
• A metropolitan area network (MAN) is a large computer network that usually spans
a city or a large campus.
• A MAN often acts as a high speed network to allow sharing of regional resources.
• A MAN typically covers an area of between 5 and 50 km diameter.
• Examples of MAN: Telephone company network that provides a high speed DSL
to customers and cable TV network.
• WAN covers a large geographic area such as country, continent or even whole of
the world.
• A WAN is two or more LANs connected together. The LANs can be many miles
apart.
• Multiple LANs can be connected together using devices such as bridges, routers,
or gateways, which enable them to share data.
• The world's most popular WAN is the Internet.
A personal area network (PAN) is a computer network used for communication among
computer devices, including telephones and personal digital assistants, in proximity to an
individual's body.
The devices may or may not belong to the person in question. The reach of a PAN is
typically a few meters.
Transmission media are the physical pathways that connect computers, other devices, and
people on a network—the highways and byways that comprise the information
superhighway. Each transmission medium requires specialized network hardware that has
to be compatible with that medium. You have probably heard terms such as Layer 1, Layer
2, and so on. They encompass the physical entity and describe the types of highways on
which voice and data can travel.
It would be convenient to construct a network of only one medium. But that is impractical
for anything but an extremely small network. In general, networks use combinations of
media types. There are three main categories of media types:
• Copper cable—Types of cable include unshielded twisted-pair (UTP), shielded twisted-
pair (STP), and coaxial cable. Copper-based cables are inexpensive and easy to
work with compared to fiber-optic cables, but as you'll learn when we get into the
specifics, a major disadvantage of cable is that it offers a rather limited spectrum
that cannot handle the advanced applications of the future, such as teleimmersion
and virtual reality.
The frequency spectrum in which a medium operates directly relates to the bit rate that can
be obtained with that medium. You can see in Table 2.1 that traditional twisted-pair affords
the lowest bandwidth (i.e., the difference between the highest and lowest frequencies
supported), a maximum of 1MHz, whereas fiber optics affords the greatest bandwidth,
some 75THz.
Another important characteristic is a medium's susceptibility to noise and the subsequent
error rate. Again, twisted-pair suffers from many impairments. Coax and fiber have fewer
impairments than twisted-pair because of how the cable is constructed, and fiber suffers
the least because it is not affected by electrical interference. The error rate of wireless
depends on the prevailing conditions, especially weather and the presence of obstacles,
such as foliage and buildings.
Yet another characteristic you need to evaluate is the distance required between repeaters.
This is a major cost issue for those constructing and operating networks. In the case of
twisted-pair deployed as an analog telephone channel, the distance between amplifiers is
roughly 1.1 miles (1.8 km). When twisted-pair is used in digital mode, the repeater spacing
drops to about 1,800 feet (550 m). With twisted-pair, a great many network elements must
be installed and subsequently maintained over their lifetime, and they can be potential
sources of trouble in the network. Coax offers about a 25% increase in the distance between
repeaters over twisted-pair. With microwave and satellite, the distance between repeaters
depends on the frequency bands in which you're operating and the orbits in which the
satellites travel. In the area of fiber, new innovations appear every three to four months,
and, as discussed later in this chapter, some new developments promise distances as great
as 4,000 miles (6,400 km) between repeaters or amplifiers in the network.
Security is another important characteristic. There is no such thing as complete security,
and no transmission medium in and of itself can provide security. But using encryption and
authentication helps ensure security. For example, with fiber, an optical time domain
reflectometer (OTDR) can be used to detect the position of splices that could be the result
of unwanted intrusion. (Some techniques allow you to tap into a fiber cable without splices,
but they are extremely costly and largely available only to government security agencies.)
Twisted-Pair
The historical foundation of the public switched telephone network (PSTN) lies in twisted-
pair, and even today, most people who have access to networks access them through a local
loop built on twisted-pair. Although twisted-pair has contributed a great deal to the
evolution of communications, advanced applications on the horizon require larger amounts
of bandwidth than twisted-pair can deliver, so the future of twisted-pair is diminishing.
Figure 2.1 shows an example of four-pair UTP.
Characteristics of Twisted-Pair
The total usable frequency spectrum of telephony twisted-pair copper cable is about 1MHz
(i.e., 1 million cycles per second). Newer standards for broadband DSL, also based on
twisted-pair, use up to 2.2MHz of spectrum. Loosely translated into bits per second (bps)—
a measurement of the amount of data being transported, or capacity of the channel—
twisted-pair cable offers about 2Mbps to 3Mbps over 1MHz of spectrum. But there's an
inverse relationship between distance and the data rate that can be realized. The longer the
distance, the greater the impact of errors and impairments, which diminish the data rate. In
Categories of Twisted-Pair
There are two types of twisted-pair: UTP and STP. In STP, a metallic shield around the
wire pairs minimizes the impact of outside interference. Most implementations today use
UTP.
Twisted-pair is divided into categories that specify the maximum data rate possible. In
general, the cable category term refers to ANSI/TIA/EIA 568-A: Commercial Building
Telecommunications Cabling Standards. The purpose of EIA/TIA 568-A was to create a
multiproduct, multivendor standard for connectivity. Other standards bodies—including
the ISO/IEC, NEMA, and ICEA—are also working on specifying Category 6 and above
cable.
The following are the cable types specified in ANSI/TIA/EIA 568-A:
There is no limitation for the number of computers in a peer-to-peer network. But Peer-to-
Peer implementations are meant for small networks. Typically a Workgroup contain less
The Client/Server computer network model is made-up of Client computers and Server
computers. Now we need to understand the terms Client and Server.
What is a Client? A computer which is seeking any resource from another computer is a
Client Computer. You can think a client as a computer in your network, where a network
user is performing some network activity. For Example: Downloading a file from a File
Server, Browsing Intranet/Internet etc. The network user normally uses a client computer
to perform his day-to-day work.
In a Client-Server network, high-end servers, installed with the Network Operating System
(Server Operating System) and the related software, serve the clients continuously on a
network, by providing them with specific services upon request.
Well known Server Operating System Products are Windows 2012 / Windows 2012 R2,
Unix (Oracle Solaris, IBM AIX, HP UX, FreeBSD, NetBSD, OpenBSD, SCO Unix etc),
GNU/Linux (RedHat Enterprise Linux, Debian Linux, SUSE Enterprise, Ubuntu Server,
CentOS Server, Mandriva, Fedora etc.
Client-Server networks require dedicated servers. Server hardware is more costly than
normal Desktop computers. Client-Server networks cost more than peer-to-peer networks.
Network Operating System (Server Operating System) are also more costly than Desktop
Operating Systems.
File Server: File servers are used to store the user documents and files centrally. An ideal
file server should have a large amount of memory and storage space, fast hard-disks,
multiple processors, fast network adapters, redundant power supplies etc.
A File server runs FTP (File Transfer Protocol) in Windows, Linux or Unix Networks, or
SMBP (Server Message Block Protocol) in Windows Networks. Well known FTP software
products are Micrsoft IIS, vsftpd, Apache FTP Server, Filezilla, etc.
The main advantage of keeping network user files and electronic documents centrally in a
file server is that the network user files and documents can be managed (backup'd) easily.
Think about managing network user files and electronic documents kept distributed inside
user workstations in a network consists of thousands of computers! Nearly impossible.
Print Server: Print Server, which redirects print jobs from client computers to specific
Mail Server: Mail Servers are used to transmit emails using email protocols. Most widely
used email transmission protocol is SMTP (Simple Mail Transfer Protocol). Mail Servers
exchange emails between different domains.
Most widely used Mail Server software products are Microsoft Exchange Server,
SENDMAIL (now proofpoint), qmail, Postfix etc.
Database Server: Database Server allows authorized network clients to create, view,
modify and/or delete an organization's data, stored in a common database. Examples of
Database Management Systems are Oracle 10g/11g, Microsoft SQL Server
2000/2005/2008/2012, PostgreSQL, IBM DB2, MySQL, Sybase, Informix, etc.
Directory Servers: Directory Servers allows the central administration and management
of network users and network resources. Directory Servers provide the basic functions of
network security, Authentication, Authorization and Accounting.
Examples of Directory Servers are Microsoft Active Directory, NetIQ eDirectory, Fedora
Directory Server, OpenLDAP , etc.
1. Repeater – A repeater operates at the physical layer. Its job is to regenerate the signal
over the same network before the signal becomes too weak or corrupted so as to extend the
length to which the signal can be transmitted over the same network. An important point
to be noted about repeaters is that they do not amplify the signal. When the signal becomes
weak, they copy the signal bit by bit and regenerate it at the original strength. It is a 2 port
device.
2. Hub – A hub is basically a multiport repeater. A hub connects multiple wires coming
from different branches, for example, the connector in star topology, which connects
different stations. Hubs cannot filter data, so data packets are sent to all connected
devices. In other words, collision domain of all hosts connected through Hub remains
one. Also, they do not have intelligence to find out best path for data packets, which leads
to inefficiencies and wastage.
3. Bridge – A bridge operates at data link layer. A bridge is a repeater, with add on
functionality of filtering content by reading the MAC addresses of source and destination.
It is also used for interconnecting two LANs working on the same protocol. It has a single
input and single output port, thus making it a 2 port device.
4. Switch – A switch is a multi port bridge with a buffer and a design that can boost its
efficiency(large number of ports imply less traffic) and performance. Switch is data link
layer device. Switch can perform error checking before forwarding data, that makes it very
efficient as it does not forward packets that have errors and forward good packets
selectively to correct port only. In other words, switch divides collision domain of hosts,
but broadcast domain remains same.
5. Routers – A router is a device like a switch that routes data packets based on their IP
addresses. Router is mainly a Network Layer device. Routers normally connect LANs and