0% found this document useful (0 votes)
14 views62 pages

CAPE COMPUTER SCIENCE Lesson 9 Advanced Networking

Network management involves processes, tools, and applications for administering and maintaining network infrastructure, with key functions including access control and user account management. Various network architectures, such as peer-to-peer and client/server, facilitate communication among devices, while protocols like TCP/IP and FTP enable data transmission. The document also discusses multi-user systems, network protocols, and the advantages and disadvantages of different networking technologies.

Uploaded by

Sheldon Sookoo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views62 pages

CAPE COMPUTER SCIENCE Lesson 9 Advanced Networking

Network management involves processes, tools, and applications for administering and maintaining network infrastructure, with key functions including access control and user account management. Various network architectures, such as peer-to-peer and client/server, facilitate communication among devices, while protocols like TCP/IP and FTP enable data transmission. The document also discusses multi-user systems, network protocols, and the advantages and disadvantages of different networking technologies.

Uploaded by

Sheldon Sookoo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 62

Network management refers to the processes, tools and

applications used to administer, operate and maintain a network


infrastructure.
Network management refers to the processes, tools and applications used to
administer, operate and maintain a network infrastructure. The main
functions of network management include:
A network manager is responsible for an organization's computer network
system. A network is designed to give staff in an organization access to files
and documents, corporate systems and email, and access to the Internet.
Hardware

Network
Operating Network Apps
System

Physical
Connections
The Network Manager is in charge of the entire network for an organization .
One of a Network manager’s main duties is access control.
Network access control is the act of keeping unauthorized users and devices
out of a private network. Activities include:
➢ Discover all devices on the network.
➢ Profile all devices to identify what access they should have
➢ Provide appropriate network access
to devices.
➢ Create & assign user accounts
A user account is comprised of a username, password and any information
related to the user. Most networks which need to be accessed by multiple
users make use of user accounts. Email accounts are one of the most
common examples of user accounts. A user account allows you to sign in to
your computer.
Computer systems can have 2 modes :
➢ Single User
➢ Multi User
There are two main types of user accounts:
➢Administrator - used for making changes to system settings or
managing other people's accounts. They have full access to every
setting on the computer.
➢ Standard

A user account is comprised of a username,


password and any information related to the user.
An access log is a list of all the requests for individual files that people have
requested from the network . These files will include the HTML files and
their imbedded graphic images and any other associated files that get
transmitted.

Almost all information technology systems generate a log, which serves as a


record of all the activity that the system conducted in its operation.
NE T W O R K A R C H I T E C T U R E
Network architecture refers to how computers are organized in a system and
how tasks are allocated between these computers. Two of the most widely
used types of network architecture are peer-to-peer and client/server.
Client/server architecture is also called 'tiered' because it uses multiple
levels. Other architectures include distributed networks . A distributed system
is a system whose components are located on different networked
computers, which communicate
; and coordinate their actions by passing
messages to one another.
DISTRIBUTED NETWORKS
A Distributed system is a collection of independent computers,
interconnected via a network, capable of collaborating on a task. It consists
of multiple autonomous computers that communicate through a computer
network .
EXAMPLES OF DISTRIBUTED SYSTEMS

➢Local Area Network and Intranet


➢Database Management System
➢Automatic Teller Machine Network
➢Internet
ADVANTAGES DISADVANTAGES
Economic Complexity
Speed Network problems
Inherent distribution of applications Security
Reliability
Extensibility and Incremental Growth
Data integration
MULTI-USER SYSTEMS
A multi-user operating system (OS) is one that can be used by more than
one person at a time while running on a single machine. Different users
access the machine running the OS through networked terminals. The OS
can handle requests from users by taking turns among connected users
TYPES OF MULTI-USER OPERATING SYSTEM
➢ Distributed System
➢ Time – sliced System
➢ Multi-processor system
TIME SLICED SYSTEM
It is the system where each user task is allocated to a short span of CPU time. In other words, each task is
assigned to a short period. These time slices appear too small to the eyes of the user. The decision to run
the next piece of job is decided by an internal component called the ‘Scheduler’. This scheduler identifies
and executes the run instruction or task that needs to be executed depending on the priority cycle.

The users can take turns and thus the Operating System will handle user’s requests among the users who
are connected. This feature is not available in the Single User Operating System, where the user and the
machine come in contact directly.

Example of Time sliced system:


Mainframe, a practical exam of the time-sliced system, where a user will be allocated a specific time slice
to perform a complex task
MULTIPROCESSOR SYSTEM
Multiprocessor system is the one, where the system uses more than one processor at the same time.
Since all the processors would be working side by side, the work would be completed at a pace that
would be much faster than the single-user operating system.

Example of Multi-processor system:


We can take Windows Operating System as a practical example of a multi-processing system where word
processor, spreadsheets, music player etc., everything can be opened at the same time without affecting
the efficiency of any application that is being opened.
FEATURES OF A MULTI-USER OPERATING SYSTEM
The Multi-user operating system can be documented with 4 features:

Multiple processing As described earlier, we can execute multiple programs at the same time.
Sharing of resources Multiple peripherals such as printers, hard drives, etc. can be shared or we can
even share different files or data.
Processing of data at the back end
Invisibility Many functions of the multi-user operating system is invisible to the users.
COMPONENTS OF A MULTI-USER OPERATING SYSTEM

PROCESSOR MEMORY

MULTI-USER
OPERATING
SYSTEM

TERMINAL
ADVANTAGES DISDVANTAGES
Avoids Disruption Virus
Real time Scenario Visibility of data
Stability of servers Multiple Accounts
Most of the companies are marching towards
multi operating system to reduce their
expenditure.
Backing up of Data
Speed efficiency
THINGS TO CONSIDER WHEN BUILDING A NETWORK
➢ COST
➢ SECURITY
➢ MANAGEMENT
➢ EXPANDABILITY
➢ INTERCONNECTIVITY
➢ WIRED VS WIRELESS
➢ CONFIGURATION
➢ FIREWALLS
ACTIVITY BUILDING A NETWORK
USE THE VISUAL PARADIGM ONLINE TOOL TO CREATE A SIMPLE
NETWORK

https://online.visual-
paradigm.com/drive/#diagramlist:proj=0&new
WHAT IS A NETWORK PROTOCOL ?
A network protocol is an established set of rules that determine how data is
transmitted between different devices in the same network. Essentially, it
allows connected devices to communicate with each other, regardless of any
differences in their internal processes, structure or design.
HOW DO PROTOCOLS WORK ?
Network protocols serve these basic functions:

➢ Address data to the correct recipients.

➢ Physically transmit data from source to destination, with security


protection if needed.

➢ Receive messages and send responses appropriately.


TYPES OF PROTOCOLS
➢ Network Management Protocols

➢ Network Communication Protocols

➢ Network Security Protocols


ETHERNET
Ethernet is a way of connecting computers together in a local area network or
LAN. It has been the most widely used method of linking computers together
in LANs since the 1990s. The basic idea of its design is that multiple
computers have access to it and can send data at any time.

Ethernet describes how network devices


can format and transmit data so other
devices on the same local or campus area
network segment can recognize, receive
and process the information. An Ethernet
cable is the physical, encased wiring over
which the data travels.
ADVANTAGES DISADVANTAGES
Relatively low cost It is intended for smaller, shorter distance
networks.
Backward compatibility Mobility is limited.
Generally resistant to noise Use of longer cables can create crosstalk.
Good data transfer quality* It does not work well with real-time or
interactive applications.
Speed Increased traffic makes the Ethernet
speed go down.
Data security -- common firewalls can be Receivers do not acknowledge the
used reception of data packets.
Reliability When troubleshooting, it is hard to trace
which specific cable or node is causing
the issue.

* ATTENUATION
TYPES OF ETHERNET
Name Description
Fast Ethernet Can transmit data at a rate of 100 mbps through a twisted-pair cable or fiber-optic cable.
The data can be transferred from 10 mbps to 100 mbps with no protocol translation or
changes in the application and networking software.
Gigabit Ethernet Transfers data at a rate of 1000 mbps based on a twisted-pair cable or fiber-optic cable.

Switch Ethernet This is a piece of network equipment that is required for multiple network devices in a
LAN. This Ethernet cable forwards the data from one device to another device with the
same network. Normally, this supports different data transfer rates. Ethernet is widely
used as a network technology .
FIBER DISTRIBUTED DATA INTERFACE (FDDI)
Fiber Distributed Data Interface, or FDDI, is a
high-speed network technology which runs at
100 Mbps over fiber-optic cabling, often used for
network backbones in a local area network
(LAN) or metropolitan area network (MAN). Fiber
Distributed Data Interface (FDDI) is usually
implemented as a dual token-passing ring within
a ring topology (for campus networks) or star
topology (within a building).
ADVANTAGES DISADVANTAGES
It offers higher bandwidth (upto 250 Gbps). Hence it can
handle data rates upto 100 Mbps. FDDI is complex. Hence installation and maintenance
It offers high security as it is difficult to eavesdrop on fiber require great deal of expertize.
optic link.
Fiber optic cable does not break as easily as other types of
cables.
FDDI is costly. This is because fiber optic cable, adapters
Fiber optic cables are not susceptible to EMI (Electromagnetic
and concentrators are very expensive.
Interference).
Fiber optic cables transmit signals over greater distances of
about 200 Kms.
TRANSMISSION CONTROL PROTOCOL/INTERNET PROTOCOL
(TCP/IP)
The Transmission Control Protocol (TCP) is a communications standard that enables
application programs and computing devices to exchange messages over a network. It is
designed to send packets across the internet and ensure the successful delivery of data
and messages over networks. TCP organizes data so that it can be transmitted between a
server and a client. It guarantees the integrity of the data being communicated over a
network. It works together with the Internet Protocol (IP) .

The Internet Protocol (IP) is the method for sending data from one device to another
across the internet. Every device has an IP address that uniquely identifies it and enables
it to communicate with and exchange data with other devices connected to the internet.
IP is responsible for defining how applications and devices exchange packets of data
with each other.
ADVANTAGES DISADVANTAGES
Data Re-transmission Slow Start
Congestion Control Image Blockings
Unique Identification Loss Result of Congestion
In Order Delivery TCP connection is optimized only for
Wide Area Networks (WAN)
Error Detection
FILE TRANSFER PROTOCOL (FTP)
What is FTP (File Transfer Protocol)? FTP is a
widely used network protocol for transferring files between computers over a TCP/IP-
based network, such as the Internet. FTP lets people and applications exchange and
share data within their offices and across the Internet. FTP is built on a client-server
model architecture using separate control and data connections between the client and
the server. It may be used by a business to transfer files from one computer system to
another, or websites may use FTP to upload or download files from a website's server.
ADVANTAGES DISADVANTAGES
FTP is Capable of Large File Transfers FTP Lacks Security
Your Workflow is Improved Encryption isn’t a Given
Transfers can be Resumed FTP can be Vulnerable to Attack
Transfers can be Scheduled It’s Difficult to Monitor Activity
Recover Lost Data
HYPERTEXT TRANSFER PROTOCOL (HTTP)
HTTP is the foundation of data communication for the world wide web. It is the Protocol
for all things that move around in the network. It was designed for communication
between web browsers and web servers, but it can also be used for other purposes.
ADVANTAGES DISADVANTAGES
HTTP uses advanced scheme of addressing. It assigns HTTP is considered to be an insecure method prone
IP address with recognizable names so that it can be to data integrity issues
identified easily in the World Wide Web.
Whenever there are additional capabilities needed Privacy is another problem faced in a HTTP
by an application, HTTP has the capability to connection.
download extensions or plugins and display the
relevant data. These can include Flash players and
Acrobat reader.
Security Even if HTTP receives all the data that it needs,
clients does not take measures to close the
connection. Therefore, during this time period,
server will not be present.
When the page is loaded for the first time, all of the HTTP uses more number of system resources which
HTTP pages gets stored inside the internet caches leads to more power consumption
known as the page cache. Therefore, once the page
is visited again, the content is loaded quickly.
HYPERTEXT TRANSFER PROTOCOL
SECURE SOCKET LAYER (HTTPS)
Hyper Text Transfer Protocol Secure (HTTPS) is the secure version of HTTP, the protocol
over which data is sent between your browser and the website that you are connected to.
The 'S' at the end of HTTPS stands for 'Secure'. It means all communications between your
browser and the website are encrypted.
ADVANTAGES DISADVANTAGES
Encryption: the informations are highly secured. When you move onto HTTPS, you need to purchase a SSL
certificate. There are ways to get a free SSL certificate,
but for security reasons its not recommended.
The data is not at the risk of theft at the public space. The response time is delayed decreasing the speed of the
website.
If you are using HTTPS, users can guarantee that their There are some firewalls and proxy systems that deny
data is sent to the right place and not to any invalid sites. access to HTTPS sites.
All of the data transfers that are taking place and If there are problems in the configuration, your site will
components such as sender and receiver are validated. start downloading files from HTTP instead of HTTPS
The green padlock that appears on the webpage URL
always gives a sense of trust to the visitors that the site is
security conscious. When the site is reliable, the
customers will probably will be ready to do transactions.
IEEE802.11a/b & IEEE802.16g
These are standards and rules used to create and implement wireless networks . Networks
using 802.11a operate at radio frequency of 5GHz or 3.7GHz and a bandwidth of 20MHz.
It is especially well suited to use in office settings. Data speeds as high as 54 Mbps are
possible. The indoor/outdoor ranges from 35m to 125m for 5GHz operating frequency.
The outdoor range goes to 5Km for operating frequency of 3.7G. The IEEE802.11a is less
prone to interference compared to with 802.11b due to the high operating frequency of
5GHz.

IEEE 802.11b standard standard provides 11 Mbps transmission (with a fallback to 5.5,
2 and 1 Mbps) in the 2.4 GHz operating frequency and bandwidth of 22MHz . Max range
is 140m .

802.11g is the standard for Wi-Fi wireless networking and it supports maximum
network bandwidth of 54 Mbps compared to 11 Mbps for 802.11b. This standard
operates at 2.4GHz frequency and bandwidth of 20MHz . Max range is 140m .
VOICE OVER INTERNET PROTOCOL
Is an o technology that allows you to make voice calls using a broadband Internet
connection instead of a regular (or analog) phone line. Also called IP telephony,

ADVANTAGES DISADVANTAGES
Cost Reliable Internet Connection Required
Accessibility Power Outages/Emergencies
Flexibility. Latency
Voice Quality
Extra/Less Expensive Features
ADVANCED NETWORKING ARCHITECTURE
OPEN SYSTEM INTERCONNECTION (OSI) MODEL.

The OSI Model (Open Systems


Interconnection Model) is a conceptual
framework used to describe the functions
of a networking system. The OSI model
characterizes computing functions into a
universal set of rules and requirements in
order to support interoperability between
different products and software.
THE OSI MODEL.

Data

Data Packet

42
Software/Data

Software/Data Formatting

Software/Communications

Data Flow/Addressing

Backbone/Infrastructure/Data Flow

Hardware Internal

Hardware /Nodes
44
HYBRID TOPOLOGY
A hybrid topology is a type of network topology that uses two or more differing network
topologies. These topologies can include a mix of bus topology, mesh topology,
ring topology, star topology, and tree topology.
For example, if there is a Mesh topology in one office department while a Ring topology in
another department, connecting these two with bus topology will result in Hybrid topology.
Combination of Star-Ring and Star-Bus networks are the most common examples of the
hybrid network topology.
ADVANTAGES DISADVANTAGES
Hybrid network combines the benefits of different types of It is expensive
topologies
Can be modified as per requirement The design of a hybrid network is complex.
It is extremely flexible.
It is very reliable. Hardware changes are required in order to connect
It is easily scalable topology to another topology
ADVANCED NETWORK DEVICES
MICROWAVE
A microwave link is a communications system that uses a beam of radio
waves in the microwave frequency range to transmit information between
two fixed locations on the earth. They are crucial to many forms of
communication and impact a broad range of industries. Microwave radio
frequencies can range about 500 MHz to 300 GHz. Most systems depend
on microwaves when it comes to transmitting data.
ADVANTAGES DISADVANTAGES
Every station of the microwave radio system only requires a small
It is limited to line of sight mode only
piece of land, hence, it does not require huge towers .
They are capable of storing large amounts of data. The more bandwidth you want, the higher the
transmitted radio frequency (RF) you’re going to
need.
It is the most cost-effective option for businesses
It can transmit data more rapidly. High attenuation rate .
It requires little maintenance
ADVANCED NETWORK DEVICES
SATELLITE
Satellite communication is an electronic communication package placed in an
orbit. These satellites act as relay stations. From the earth station, the satellite
accepts data/signals, amplifies them, and re-transmit them to another earth
station. Data can be transmitted to the other side of the earth using such a
setup in only one step.
ADVANTAGES DISADVANTAGES
Coverage over geographical area is quite large mainly for sparsely Design, development, investment and insurance of
populated areas. satellite requires higher cost.
High bandwidth. To reach the satellite from Earth, time can vary
between 270 milliseconds and return again to 320
milliseconds. This propagation delay can cause an
echo over telephone connections
It is used in wide variety of applications Satellites are not easy to repair and maintain.
Security in satellite transmission is usually provided by the coding Some circumstances like weather or sunspots affect
and decoding equipment. the satellite’s signal and can cause interference and
make proper operation of the satellite very difficult.
Service from one single provider is easy to obtain and uniform
service is available.
Over long distances, it can be cheaper.
It requires to be monitored and controlled on regular
Maintenance is easy and cheap in satellite communication
periods so that it remains in the orbit, once it has
therefore it is best alterative.
been launched.
During critical condition, each Earth Station may be removed
relatively quickly from a location and reinstalled somewhere else.
Ground station sites are easy to install and maintain.
ADVANCED NETWORK DEVICES
FIREWIRE
FireWire (IEEE 1394) is a method to transfer information between digital
devices like audio and video components. It is a popular connector for adding
peripherals to computer. Firewire was originally developed by Apple and
comes standard on Macintosh computers, it is also available on computers
made by Sony (as i.Link) and other PC manufacturers.
ADVANTAGES DISADVANTAGES
It can connect many devices It is slower in speed
It is co-operatively managed by connected devices where as USB
requires master controller.
Firewire is limited to use with copper cables
It allows devices with moderate power requirements to operate
without separate power supply.
FireWire supports full duplex communication i.e. simultaneous
communication in both the directions unlike previous versions to
USB3.0. It is more expensive.
Firewire host supports DMA and memory mapped devices which
allows data transfer without waiting for host CPU with interrupts
and buffer copy operations.
MOBILE NETWORKS
Mobile networks are also known as cellular networks. They're made up of
"cells," which are areas of land that are typically hexagonal, have at least one
transceiver cell tower within their area, and use various radio frequencies.
These cells connect to one another and to telephone switches or exchanges.
Cell towers connect to each other to hand off packets of signals—data, voice,
and text messaging—ultimately bringing these signals to mobile devices such
as phones and tablets that act as receivers.
MOBILE NETWORK ACCESS METHODS
In any cellular system or cellular technology, it is necessary to have a scheme that enables
several multiple users to gain access to it and use it simultaneously. As cellular technology
has progressed different multiple access schemes have been used. They form the very core
of the way in which the radio technology of the cellular system works.

Code Division Multiple Access (CDMA) is a sort of multiplexing that


facilitates various signals to occupy a single transmission channel. It
optimizes the use of available bandwidth. The technology is commonly used
in ultra-high-frequency (UHF) cellular telephone systems, bands ranging
between the 800-MHz and 1.9-GHz.
ADVANTAGES DISADVANTAGES
The CDMA does not require any synchronization. The system is more complicated.
It has more number of users can share the same bandwidth. Guard band and guard time both are required to be
provided.
It is well-matched with other cellular technologies.
Due to codeword allocated to each user, interference is As the number of users increases, the overall quality of
reduced. services decreases.
Efficient practical utilization of fixed frequency spectrum
Time Division Multiple Access (TDMA)

Time-division multiple access (TDMA) is a channel access method for


shared-medium networks. It allows several users to share the same
frequency channel by dividing the signal into different time slots. The
users transmit in rapid succession, one after the other, each using its
own time slot.
ADVANTAGES DISADVANTAGES
It can convey 64 kbps to 120 Mbps of information rates. Network and spectrum planning require more efforts.
TDMA is the savvy innovation to change a simple framework
Multipath interference affects call quality.
over to computerize.
TDMA gives the client broadened battery life since
communicating the lone part of the time during discussions
Double band 800/1900 MHz
Switching from one base station cell to the other cell results
The different types of traffic e.g. voice, data and video are into dropped calls.
transmitted using TDMA technique as this require different
data rates which can be easily achieved using allocation of
multiple time slots.
GLOBAL SYSTEM FOR MOBILE COMMUNICATION (GSM)
is a digital mobile network that is widely used by mobile phone users in Europe
and other parts of the world. GSM digitizes and compresses data, then sends it
down a channel with two other streams of user data, each in its own time slot. It
operates at either the 900 megahertz (MHz) or 1,800 MHz frequency band.
ADVANTAGES DISADVANTAGES
GSM techology has been matured since long and hence
Many of the GSM technologies are patented by Qualcomm
GSM mobile mobile phones and modems are widely
and hence licenses need to be obtained from them.
available across the world.
It provides very cost effective products and solutions. In order to increase the coverage repeaters are required to
be installed.
The GSM based networks (i.e. base stations) are deployed
across the world and hence same mobile phone works
across the globe. This leverages cost benefits as well as GSM provides limited data rate capability, for higher data
provides seamless wireless connectivity. This will help users rate GSM advanced version devices are used.
avail data and voice services without any disruption. Hence
international roaming is not a concern.
Advanced versions of GSM with higher number of antennas Here multiple users share same bandwidth and hence will
will provide high speed download and upload of data. lead to interference when more number of users are using
the GSM service. In order to avoid this situation, robust
frequency correction algorithms are used in mobile phones
and base stations.
It is easy to maintain GSM networks due to availability of GSM uses pulse based burst transmission technology and
large number of network engineers at affordable cost. This hence it interferes with certain electronics. Due to this fact
will help in revenue increase by the telecom operators airplanes, petrol bunks and hospitals prevent use of GSM
based mobile or other gadgets.
General Packet Radio Service (GPRS)
GPRS is classed as being a packet switched network whereby radio resources are
used only when users are actually sending or receiving data. Rather than
dedicating a radio channel to a mobile data user for a fixed period of time, the
available radio resource can be concurrently shared between several users.
ADVANTAGES DISADVANTAGES
Large amounts of data can be transferred to & from the GPRS technology uses the cellular network’s GSM band to
mobile device over the Internet by using GPRS . transmit the data , more often than not , when the
connection is active , The calls & the other network-related
functions cannot be used ,
GPRS-enabled mobile phones double up as portable Most GPRS connections run slower than 56K connections on
Internet connections for the laptops. the computer because of the limitations of the GPRS
technology
Most phones can be used as a modem once connected to We sometimes notice a drop in the performance as we move
the laptop . because of the distance factor involved in GPRS technology ,
The farther away you are from the base station , the more
your performance drops
GPRS access is possible in the remote places You may have problems with your GPRS communication if
many people talk on their phones at the same time in your
area .
Through GPRS technology , the users are constantly
connected to the Internet , as GPRS services are available
wherever there is GSM coverage .

You might also like