Hardware & Network Servicing Level III: UC2: Determine Best Fit Topology
Hardware & Network Servicing Level III: UC2: Determine Best Fit Topology
Level III
1
Introduction to Computer Network
2
A network is a group of connected computers that allows people to share
resources.
• LANs connect to other LANs with the help of a router. The router has a
LAN address and a WAN address, which lets it send data to the desired
location.
• All the computers are equal and therefore are known as peers.
The organization and the network will experience only limited growth
within the foreseeable future.
Advantages & Disadvantages of peer-to-peer
Networks
9
• A dedicated server is one that functions only as a server and is not used as a
client or workstation.
• File and print servers:- manage user access and use of file and
printer resources.
• Mail servers:- operate like application servers in that there are separate
server and client applications, with data selectively downloaded from the
server to the client.
• Fax servers:- manage fax traffic into and out of the network by sharing
one or more fax modem boards.
Logical: describes the way network data flows through the physical
components.
Physical: Physical topology describes how the physical components on a
network are connected.
Standard Topology
Bus
Star / Tree
Ring
Mesh
Hybrid
Bus Topology
16
Sending the Signal Network data in the form of electronic signals is sent to
all the computers on the network.
Only the computer whose address matches the address encoded in the
original signal accepts the information.
All other computers reject the data.
Only one computer at a time can send messages.
Because only one computer at a time can send data on a bus network, the
number of computers attached to the bus will affect network performance.
The more computers there are on a bus, the more computers will be waiting
to put data on the bus and, consequently, the slower the network will be.
19
Signal Bounce Because the data, or electronic signal, is sent to the entire
network, it travels from one end of the cable to the other.
If the signal is allowed to continue uninterrupted, it will keep bouncing back
and forth along the cable and prevent other computers from sending signals.
Therefore, the signal must be stopped after it has had a chance to reach the
proper destination address.
The signals travel around the loop in one direction and pass through each
computer, which can act as a repeater to boost the signal and send it on to
the next computer
Method of Data Transmission in Ring Topology
24
The core of a coaxial cable carries the electronic signals that make up the
data. This wire core is usually copper.
37
Thinnet Cable
Thinnet cable is a flexible coaxial cable about 0.64 centimeters (0.25
inches) thick.
Because this type of coaxial cable is flexible and easy to work with, it can
be used in almost any type of network installation.
Thinnet coaxial cable can carry a signal for a distance of up to
approximately 185 meters .
39
Thicknet Cable
Thicknet cable is a relatively rigid coaxial cable about 1.27 centimeters
(0.5 inches) in diameter.
Thicknet cable is sometimes referred to as Standard Ethernet because it
was the first type of cable used with the popular network architecture
Ethernet.
Thicknet cable's copper core is thicker than a thinnet cable core. The
thicker the copper core, the farther the cable can carry signals.
This means that thicknet can carry signals farther than thinnet cable.
Thicknet cable can carry a signal for 500 meters (about 1640 feet).
Coaxial Cable Connector Hardware
40
UTP is the most popular type of twisted-pair cable and is fast becoming
the most popular LAN cabling.
The maximum cable length segment is 100 meters.
There are seven categories of UTP
Category 1 This refers to traditional UTP telephone cable that can
carry voice but not data transmissions. Most telephone cable prior
to 1983 was Category 1 cable.
Category 2 This category certifies UTP cable for data transmissions
up to 4 megabits per second (Mbps). It consists of four twisted pairs
of copper wire.
43
Category 3 This category certifies UTP cable for data transmissions
up to 16 Mbps. It consists of four twisted pairs of copper wire.
Category 4 This category certifies UTP cable for data transmissions
up to 20 Mbps. It consists of four twisted pairs of copper wire.
Category 5 This category certifies UTP cable for data transmissions
up to 100 Mbps. It consists of four twisted pairs of copper wire.
Category 6 wire was originally designed to support gigabit Ethernet
It is similar to CAT5 wire, but contains a physical separator between
the 4 pairs to further reduce electromagnetic interference.
Category 7
44
Shielded Twisted Pair Cable
45
STP cable uses a woven copper-braid jacket that is more protective and
of a higher quality than the jacket used by UTP.
STP also uses a foil wrap around each of the wire pairs.
This gives STP excellent shielding to protect the transmitted data from
outside interference, which in turn allows it to support higher
transmission rates over longer distances than UTP.
STP UTP
Twisted Pair Cable Connector Hardware
46
In fiber-optic cable, optical fibers carry digital data signals in the form of
modulated pulses of light.
This is a relatively safe way to send data because, unlike copper-based
cables that carry data in the form of electronic signals.
No electrical impulses are carried over the fiber-optic cable. This means
that fiber optic cable cannot be tapped, and its data cannot be stolen.
Fiber-optic cable is good for very high-speed, high-capacity data
transmission because of the purity of the signal and lack of signal
attenuation.
48
Installation Logistics:- How easy is the cable to install and work with
other components?
In a small installation where distances are short and security isn't a
major issue, it does not make sense to choose thick, weighty, and
expensive cable.
Cost:- Higher grades of cables can carry data securely over long
distances, but they are relatively expensive; lower-grade cables, which
provide less data security over shorter distances, are relatively
inexpensive.
Infrared Transmission
All infrared wireless networks operate by using an infrared light beam to
carry the data between devices.
These systems need to generate very strong signals because weak
transmission signals are at risk to interference from light sources such as
skylight.
54
This method can transmit signals at high rates because of infrared light's
high bandwidth.
An infrared network can normally broadcast at 10 Mbps.
Infrared transmission mostly used to remote control system.
In infrared transmission the communicating bodies should be
In direct line of sight
If there is any body in between the communicating bodies will be
unable to communicate
Can not be used outdoors
55
Laser transmission
Typically used where laying a cable is not practical
Terrestrial/Global Microwave
Transmits/receives electromagnetic waves in the 2-40 GHz range
Travels in a straight line (line-of-sight propagation)
High data transmission rates: 100’s Mbps
Repeaters spaced 10 - 100 km apart
56
Satellite Microwave
Uses satellite in geostationary 36,000 kmorbit
Source transmits signal to satellite which amplifies or repeats it, and
retransmits down to destinations
Bandwidth of 100’s MHz
VSAT ( Very small Aperture Terminal) :- High speed data
transmission using satellite.
Introduction to Network Operating System
57
Multitasking
A multitasking operating system, as the name suggests, provides the
means for a computer to process more than one task at a time.
Resource Sharing
Sharing is the term used to describe resources made publicly available for
access by anyone on the network.
Most NOSs not only allow sharing, but also determine the degree of
sharing.
Options for sharing include:
Allowing different users different levels of access to the resources.
Coordinating access to resources to make sure that two users do not
use the same resource at the same time.
61
Managing Users
Network operating systems also allow a network administrator to
determine which people, or groups of people, will be able to access network
resources.
A network administrator can use the NOS to:
Create user privileges, tracked by the network operating system,
that indicate who gets to use the network.
Remove users from the list of users that the network operating
system tracks.
62
Network Software
There are two major types of network software:
1. Network software that is installed on clients.
2. Network software that is installed on servers.
Network Access Method
63
The more significant difference arises from the higher speed at which
network traffic moves.
However, if two computers were to put data onto the cable at the same
time, the data packets from one computer would collide with the packets
from the other computer, and both sets of data packets would be
destroyed.
If data is to be sent over the network from one user to another, or
accessed from a server, there must be some way for the data to access
the cable without running into other data.
And the receiving computer must have reasonable assurance that the
data has not been destroyed in a data collision during transmission.
66
By making sure that only one computer at a time can put data on the
network cable, access methods ensure that the sending and receiving of
network data is an orderly process.
Major Access Methods
The three methods designed to prevent simultaneous use of the network
media include:
1. Carrier-sense multiple access methods (with collision detection or
with collision avoidance).
2. Token-passing methods that allow only a single opportunity to send
data.
3. Demand-priority methods.
Carrier-Sense Multiple Access with Collision Detection
(CSMA/CD) Access Method
67
Demand priority is a relatively new access method designed for the 100-
Mbps Ethernet standard known as 100VG-AnyLAN.
The repeater, or hub, is responsible for all addresses, links, and end
nodes and verifying that they are all functioning.
According to the 100VG-Any LAN definition, an end node can be a
computer, bridge, router, or switch.
Demand-Priority Conflict
As in CSMA/CD, two computers using the demand-priority access
method can cause fight by transmitting at exactly the same time.
73
However, with demand priority, it is possible to implement a scheme in
which certain types of data will be given priority if there is conflict.
If the hub or repeater receives two requests at the same time, the
highest priority request is serviced first.
If the two requests are of the same priority, both requests are serviced
by broken between the two.
In a demand-priority network, computers can receive and transmit at
the same time because of the cabling scheme defined for this access
method.
In this method, four pairs of wires are used, which enables quartet
signaling, transmitting 25 MHz signals on each of the pairs of wire in the
cable.
74
Demand-Priority Considerations
In a demand-priority network, there is communication only between the
sending computer, the hub, and the destination computer.
This is more efficient than CSMA/CD, which broadcasts transmissions to
the entire network.
In demand priority, each hub knows only about the end nodes and
repeaters directly connected to it, whereas in a CSMA/CD environment,
each hub knows the address of every node in the network.
75
Packet
Header
The header includes:
An alert signal to indicate that the packet is being transmitted.
The source address.
The destination address.
Information to synchronize/match transmission.
79
Data
This describes the actual data being sent.
This part of the packet varies in size, depending on the network.
The data section on most networks varies from 512 bytes—or 0.5
kilobytes (KB)—to 4 KB.
Because most original data strings are much longer than 4kb, data must
be broken into chunks small enough to be put into packets.
It takes many packets to complete the transmission of a large file.
Trailer /Promo
The exact content of the trailer varies depending on the communication
method, or protocol.
80
Ethernet Frame/Packet
A multiport repeater
(hub) can be used to
extend an Ethernet LAN
10Base2 Standard
It transmits at 10 Mbps over a baseband wire and can carry a signal about
two times 100 meters (the actual distance is 185 meters)
This type of network uses thin coaxial cable, or thinnet, which has a
maximum segment length of 185 meters (607 feet) and a minimum cable
length of at least 0.5 meters (20 inches) between workstations.
There is also a 30-computer maximum per 185-meter segment.
Thinnet cabling components include:
BNC barrel connectors.
BNC T connectors.
BNC terminators.
88
10Base5 Standard
The IEEE specification for this topology is 10 Mbps, baseband, and 500-
meter (five 100-meter) segments. It is also called standard Ethernet.
This topology makes use of thick coaxial cable , also known as thicknet.
Thicknet generally uses a bus topology and can support as many as 100
nodes (stations, repeaters, and so on) per backbone segment.
The distances and tolerances for thicknet are greater than those for
thinnet: a thicknet segment can be 500 meters (1640 feet) long for a total
network length of 2500 meters (8200 feet).
90
10BaseFL Standard
The IEEE committee published a specification for running Ethernet over
fiber-optic cable.
The result, 10BaseFL (10Mbps, baseband, over fiber-optic cable) is an
Ethernet network that typically uses fiber-optic cable to connect computers
and repeaters.
The primary reason for using 10BaseFL is to accommodate long cable runs
between repeaters, such as between buildings.
The maximum distance for a 10BaseFL segment is 2000 meters (about
6500 feet).
92
Two Ethernet standards that can meet the increased demands are:
100BaseVG-AnyLAN Ethernet.
100BaseX Ethernet (Fast Ethernet).
Both 100BaseVG-AnyLAN and Fast Ethernet are about 5 to 10 times
faster than standard Ethernet.
They are also compatible with existing 10BaseT cabling systems.
This means they allow for Plug and Play upgrades from existing 10BaseT
installations.
94
100VG-AnyLAN Standard
The 100VG (Voice Grade) AnyLAN is an emerging networking technology
that combines elements of both Ethernet and Token Ring architectures.
This technology goes by any of the following names, all of which refer to
the same type of network:
100VG-AnyLAN
100BaseVG
VG
AnyLAN
95
Specifications
Some of the current 100VG-AnyLAN specifications include:
A minimum data rate of 100 Mbps.
The ability to support a cascaded star topology over Category 3, 4,
and 5 twisted-pair and fiber-optic cable.
The demand-priority access method that allows for two priority
levels (low and high).
Support for both Ethernet frames and Token Ring packets.
96
Topology
A 100VG-AnyLAN network is built on
a star topology in which all computers
are attached to a hub.
Adding child hubs to the central hub
can expand the network.
The child hubs act as computers to
their parent hubs.
The parent hubs control transmission
of computers attached to their
children.
97
Considerations
This topology requires its own hubs and cards. Also, the cable distances
of 100BaseVG are limited when compared to 10BaseVG and other
implementations of Ethernet.
The longest cable from the 100BaseVG hub to a computer cannot exceed
250 meters (about 820 feet).
Extending this limit requires special equipment used to expand the size
of a LAN.
These cable-length limits mean that 100BaseVG will require more wiring
closets than 10BaseVG.
98