Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Chapter One

Download as pdf or txt
Download as pdf or txt
You are on page 1of 17

Dr Sangar N. Qader.

Introduction to Networks

Chapter One
Explore the Network
We now stand at a critical turning point in the use of technology to extend and empower our ability to communicate.
The globalization of the Internet has succeeded faster than anyone could have imagined. The manner in which
social, commercial, political and personal interactions occur is rapidly changing to keep up with the evolution of
this global network. In the next stage of our development, innovators will use the Internet as a starting point for
their efforts, creating new products and services specifically designed to take advantage of the network capabilities.
As developers push the limits of what is possible, the capabilities of the interconnected networks that form the
Internet will play an increasing role in the success of these projects.

This chapter introduces the platform of data networks upon which our social and business relationships increasingly
depend. The material lays the groundwork for exploring the services, technologies, and issues encountered by
network professionals as they design, build, and maintain the modern network.

Networks of Many Sizes

Networks come in all sizes. They can range from simple networks consisting of two computers to networks
connecting millions of devices. Click the images in the figure to read about networks of different sizes.

Simple networks installed in homes enable sharing of resources, such as printers, documents, pictures and
music between a few local computers.

Home office networks and small office networks are often set up by individuals that work from a home or a
remote office and need to connect to a corporate network or other centralized resources. Additionally, many self-
employed entrepreneurs use home office and small office networks to advertise and sell products, order supplies
and communicate with customers.

In businesses and large organizations, networks can be used on an even broader scale to provide consolidation,
storage, and access to information on network servers. Networks also allow for rapid communication such as
email, instant messaging, and collaboration among employees. In addition to internal benefits, many
Dr Sangar N. Qader. Introduction to Networks

organizations use their networks to provide products and services to customers through their connection to the
Internet.

The Internet is the largest network in existence. In fact, the term Internet means a ‘network of networks’. The
Internet is literally a collection of interconnected private and public networks, such as those described above.

Clients and Servers

All computers connected to a network that participate directly in network communication are classified as hosts.
Hosts are also called end devices.

Servers are computers with software that enable them to provide information, like email or web pages, to other
end devices on the network. Each service requires separate server software. For example, a server requires web
server software in order to provide web services to the network. A computer with server software can provide
services simultaneously to one or many clients. Additionally, a single computer can run multiple types of server
software. In a home or small business, it may be necessary for one computer to act as a file server, a web
server, and an email server.

Clients are computers with software installed that enable them to request and display the information obtained
from the server. An example of client software is a web browser, like Chrome or FireFox. A single computer can
also run multiple types of client software. For example, a user can check email and view a web page while instant
messaging and listening to Internet radio.
Dr Sangar N. Qader. Introduction to Networks

Peer-to-Peer

Client and server software usually runs on separate computers, but it is also possible for one computer to carry
out both roles at the same time. In small businesses and homes, many computers function as the servers and
clients on the network. This type of network is called a peer-to-peer network.

The advantages and disadvantages of peer-to-peer networking are shown in the figure.
Dr Sangar N. Qader. Introduction to Networks

Overview of Network Components

The path that a message takes from source to destination can be as simple as a single cable connecting one
computer to another, or as complex as a collection of networks that literally spans the globe. This network
infrastructure provides the stable and reliable channel over which these communications occur.

The network infrastructure contains three categories of network components:

• Devices

• Media

• Services

Click each button in the figure to highlight the corresponding network components.

Devices and media are the physical elements, or hardware, of the network. Hardware is often the visible
components of the network platform such as a laptop, PC, switch, router, wireless access point, or the cabling
used to connect the devices.

Services include many of the common network applications people use every day, like email hosting services
and web hosting services. Processes provide the functionality that directs and moves the messages through the
network. Processes are less obvious to us but are critical to the operation of networks.
Dr Sangar N. Qader. Introduction to Networks

End Devices

The network devices that people are most familiar with are called end devices. Some examples of end devices
are shown in Figure 1.

An end device is either the source or destination of a message transmitted over the network, as shown in the
animation in Figure 2. To distinguish one end device from another, each end device on a network is identified by
an address. When an end device initiates communication, it uses the address of the destination end device to
specify where the message should be sent.

Intermediary Network Devices

Intermediary devices connect the individual end devices to the network and can connect multiple individual
networks to form an internetwork. These intermediary devices provide connectivity and ensure that data flows
across the network.

Intermediary devices use the destination end device address, in conjunction with information about the network
interconnections, to determine the path that messages should take through the network. Examples of the more
common intermediary devices and a list of functions are shown in the figure.
Dr Sangar N. Qader. Introduction to Networks

Network Media

Communication across a network is carried on a medium. The medium provides the channel over which the
message travels from source to destination.

Modern networks primarily use three types of media to interconnect devices and to provide the pathway over
which data can be transmitted. As shown in Figure 1, these media are:

• Metallic wires within cables - data is encoded into electrical impulses

• Glass or plastic fibers (fiber optic cable) - data is encoded as pulses of light

• Wireless transmission - data is encoded using wavelengths from the electromagnetic spectrum

Different types of network media have different features and benefits. Not all network media have the same
characteristics, nor are they all appropriate for the same purpose.

Network Representations

Diagrams of networks often use symbols, like those shown in Figure 1, to represent the different devices and
connections that make up a network. A diagram provides an easy way to understand how devices in a large
network are connected. This type of “picture” of a network is known as a topology diagram. The ability to
recognize the logical representations of the physical networking components is critical to being able to visualize
the organization and operation of a network.

In addition to these representations, specialized terminology is used when discussing how each of these devices
and media connect to each other. Important terms to remember are:

• Network Interface Card - A NIC, or LAN adapter, provides the physical connection to the network at the
PC or other end device. The media that are connecting the PC to the networking device, plug directly into
the NIC (Figure 2).

• Physical Port - A connector or outlet on a networking device where the media is connected to an end
device or another networking device.
Dr Sangar N. Qader. Introduction to Networks

• Interface - Specialized ports on a networking device that connect to individual networks. Because routers
are used to interconnect networks, the ports on a router are referred to as network interfaces.

Note: Often, the terms port and interface are used interchangeably.

Topology Diagrams

Topology diagrams are mandatory for anyone working with a network. They provide a visual map of how the
network is connected.

There are two types of topology diagrams:

• Physical topology diagrams - Identify the physical location of intermediary devices and cable installation.
(Figure 1)

• Logical topology diagrams - Identify devices, ports, and addressing scheme. (Figure 2)

The topologies shown in the physical and logical diagrams are appropriate for your level of understanding at this
point in the course. Search the Internet for “network topology diagrams” to see some more complex examples. If
you add the “Cisco” to your search phrase, you will find many topologies using similar icons to what you have
seen in this chapter.
Dr Sangar N. Qader. Introduction to Networks
Dr Sangar N. Qader. Introduction to Networks

Types of Networks

Network infrastructures can vary greatly in terms of:

• Size of the area covered

• Number of users connected

• Number and types of services available

• Area of responsibility

The figure illustrates the two most common types of network infrastructures:

• Local Area Network (LAN) - A network infrastructure that provides access to users and end devices in a
small geographical area, which is typically an enterprise, home, or small business network owned and
managed by an individual or IT department.

• Wide Area Network (WAN) - A network infrastructure that provides access to other networks over a wide
geographical area, which is typically owned and managed by a telecommunications service provider.

Other types of networks include:

• Metropolitan Area Network (MAN) - A network infrastructure that spans a physical area larger than a LAN
but smaller than a WAN (e.g., a city). MANs are typically operated by a single entity such as a large
organization.

• Wireless LAN (WLAN) - Similar to a LAN but wirelessly interconnects users and end points in a small
geographical area.

• Storage Area Network (SAN) - A network infrastructure designed to support file servers and provide data
storage, retrieval, and replication.
Dr Sangar N. Qader. Introduction to Networks

Local Area Networks

LANs are a network infrastructure that spans a small geographical area. Specific features of LANs include:

• LANs interconnect end devices in a limited area such as a home, school, office building, or campus.

• A LAN is usually administered by a single organization or individual. The administrative control that
governs the security and access control policies are enforced on the network level.

• LANs provide high speed bandwidth to internal end devices and intermediary devices.

Wide Area Networks

WANs are a network infrastructure that spans a wide geographical area. WANs are typically managed by service
providers (SP) or Internet Service Providers (ISP).

Specific features of WANs include:

• WANs interconnect LANs over wide geographical areas such as between cities, states, provinces,
countries, or continents.

• WANs are usually administered by multiple service providers.

• WANs typically provide slower speed links between LANs.


Dr Sangar N. Qader. Introduction to Networks

The Internet

The Internet is a worldwide collection of interconnected networks (internetworks or internet for short). The figure
shows one way to view the Internet as a collection of interconnected LANs and WANs. Some of the LAN
examples are connected to each other through a WAN connection. WANs are then connected to each other. The
red WAN connection lines represent all the varieties of ways we connect networks. WANs can connect through
copper wires, fiber optic cables, and wireless transmissions (not shown).

The Internet is not owned by any individual or group. Ensuring effective communication across this diverse
infrastructure requires the application of consistent and commonly recognized technologies and standards as
well as the cooperation of many network administration agencies. There are organizations that have been
developed for the purpose of helping to maintain structure and standardization of Internet protocols and
processes. These organizations include the Internet Engineering Task Force (IETF), Internet Corporation for
Assigned Names and Numbers (ICANN), and the Internet Architecture Board (IAB), plus many others.

Note: The term internet (with a lower case “i") is used to describe multiple networks interconnected. When
referring to the global system of interconnected computer networks or the World Wide Web, the term Internet
(with a capital “I”) is used.
Dr Sangar N. Qader. Introduction to Networks

Home and Small Office Internet Connections

The figure illustrates common connection options for small office and home office users:

• Cable - Typically offered by cable television service providers, the Internet data signal is carried on the
same cable that delivers cable television. It provides a high bandwidth, always on, connection to the
Internet.

• DSL - Digital Subscriber Lines provide a high bandwidth, always on, connection to the Internet. DSL runs
over a telephone line. In general, small office and home office users connect using Asymmetrical DSL
(ADSL), which means that the download speed is faster than the upload speed.

• Cellular - Cellular Internet access uses a cell phone network to connect. Wherever you can get a cellular
signal, you can get cellular Internet access. Performance will be limited by the capabilities of the phone and
the cell tower to which it is connected.

• Satellite - The availability of satellite Internet access is a real benefit in those areas that would otherwise
have no Internet connectivity at all. Satellite dishes require a clear line of sight to the satellite.

• Dial-up Telephone - An inexpensive option that uses any phone line and a modem. The low bandwidth
provided by a dial-up modem connection is usually not sufficient for large data transfer, although it is useful
for mobile access while traveling.

Many homes and small offices are more commonly being connected directly with fiber optic cables. This enables
an ISP to provide higher bandwidth speeds and support more services such as Internet, phone, and TV.

The choice of connection varies depending on geographical location and service provider availability.
Dr Sangar N. Qader. Introduction to Networks

The Converging Network

Today, the separate data, telephone, and video networks are converging. Unlike dedicated networks, converged
networks are capable of delivering data, voice, and video between many different types of devices over the same
network infrastructure, as shown in the figure. This network infrastructure uses the same set of rules,
agreements, and implementation standards.

Network Architecture

Networks must support a wide range of applications and services, as well as operate over many different types of
cables and devices, which make up the physical infrastructure. The term network architecture, in this context,
refers to the technologies that support the infrastructure and the programmed services and rules, or protocols,
that move data across the network.
Dr Sangar N. Qader. Introduction to Networks

As networks evolve, we are discovering that there are four basic characteristics that the underlying architectures
need to address in order to meet user expectations:

• Fault Tolerance

• Scalability

• Quality of Service (QoS)

• Security

Fault Tolerance

The expectation is that the Internet is always available to the millions of users who rely on it. This requires a
network architecture that is built to be fault tolerant. A fault tolerant network is one that limits the impact of a
failure, so that the fewest number of devices are affected. It is also built in a way that allows quick recovery when
such a failure occurs. These networks depend on multiple paths between the source and destination of a
message. If one path fails, the messages can be instantly sent over a different link. Having multiple paths to a
destination is known as redundancy.

One way reliable networks provide redundancy is by implementing a packet-switched network. Packet switching
splits traffic into packets that are routed over a shared network. A single message, such as an email or a video
stream, is broken into multiple message blocks, called packets. Each packet has the necessary addressing
information of the source and destination of the message. The routers within the network switch the packets
based on the condition of the network at that moment. This means that all the packets in a single message could
take very different paths to the destination. In the figure, the user is not aware and is unaffected by the router
dynamically changing the route when a link fails.

This is not the case in circuit-switched networks traditionally used for voice communications. A circuit-switched
network is one that establishes a dedicated circuit between the source and destination before the users may
communicate. If the call is unexpectedly terminated, the users must initiate a new connection.

To learn more about packet-switched and circuit-switched networks, refer to the Appendix for this chapter.
Dr Sangar N. Qader. Introduction to Networks

Scalability

A scalable network can expand quickly to support new users and applications without impacting the performance
of the service being delivered to existing users. The figure shows how a new network can be easily added to an
existing network. In addition, networks are scalable because the designers follow accepted standards and
protocols. This allows software and hardware vendors to focus on improving products and services without
worrying about designing a new set of rules for operating within the network.
Dr Sangar N. Qader. Introduction to Networks

Quality of Service

Quality of Service (QoS) is also an ever increasing requirement of networks today. New applications available to
users over internetworks, such as voice and live video transmissions, create higher expectations for the quality of
the delivered services. Have you ever tried to watch a video with constant breaks and pauses? As data, voice,
and video content continue to converge onto the same network, QoS becomes a primary mechanism for
managing congestion and ensuring reliable delivery of content to all users.

Congestion occurs when the demand for bandwidth exceeds the amount available. Network bandwidth is
measured in the number of bits that can be transmitted in a single second, or bits per second (bps). When
simultaneous communications are attempted across the network, the demand for network bandwidth can exceed
its availability, creating network congestion.

When the volume of traffic is greater than what can be transported across the network, devices queue, or hold,
the packets in memory until resources become available to transmit them. In the figure, one user is requesting a
web page and another is on a phone call. With a QoS policy in place, the router can manage the flow of data and
voice traffic, giving priority to voice communications if the network experiences congestion.

Security

The network infrastructure, services, and the data contained on network-attached devices are crucial personal
and business assets. There are two types of network security concerns that must be addressed: network
infrastructure security and information security.

Securing a network infrastructure includes the physical securing of devices that provide network connectivity, and
preventing unauthorized access to the management software that resides on them, as shown in Figure 1.

Information security refers to protecting the information contained within the packets being transmitted over the
network and the information stored on network attached devices. In order to achieve the goals of network
security, there are three primary requirements, as shown in Figure 2:

• Confidentiality - Data confidentiality means that only the intended and authorized recipients can access
and read data.
Dr Sangar N. Qader. Introduction to Networks

• Integrity - Data integrity means having the assurance that the information has not been altered in
transmission, from origin to destination.

• Availability - Data availability means having the assurance of timely and reliable access to data services
for authorized users.

You might also like