Chapter1 full

124
EC301 COMPUTER NETWORKING FUNDAMENTALS CHAPTER 1 INTRODUCTION TO NETWORKING PREPARED BY : AMRUL AKIL BIN AHMAD @ HASHIM 1 POLISAS/JKE/AMR/2011/EC301

description

 

Transcript of Chapter1 full

Page 1: Chapter1 full

1

EC301 COMPUTER NETWORKING FUNDAMENTALSCHAPTER 1

INTRODUCTION TO NETWORKING

PREPARED BY : AMRUL AKIL BIN AHMAD @ HASHIM© POLISAS/JKE/AMR/2011/EC301

Page 2: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

2

Content

Part 1- Basic concepts and components of computer networks

COMPUTER NETWORK DEFINITION

ADVANTAGES OF NETWORKING NETWORK TYPE

PEER-TO-PEER VS CLIENT/SERVER NETWORK JARGON/ELEMENTS NETWORK TOPOLOGIES

Page 3: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

3

Computer Network

A collection of computers and devices interconnected by communications channels that allows communications and sharing of resources and information among interconnected devices

Page 4: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

4

Network Computing Advantages Connectivity and Communication:Using a network, people can communicate

efficiently and easily via email, instant messaging, chat rooms, telephone, video telephone calls, and video conferencing

Page 5: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

5

Network Computing Advantages Sharing

Hardware Computers can access and use hardware

resources on the network, such as printing a document on a shared network printer

Information authorized user may access data and information

stored on other computers on the network Software

may run application programs on remote computer

Page 6: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

6

Network Computing Advantages Internet accessThe Internet is itself an enormous network,

so whenever you access the Internet, you are using a network. The significance of the Internet on modern society is hard to exaggerate, especially for those of us in technical fields.

Page 7: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

7

Network Computing Advantages Data Security and Management. Instead of having this data spread over

dozens or even hundreds of small computers in a haphazard fashion as their users create it, data can be centralized on shared servers. This make data easy to find when the location is known.

Page 8: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

8

Network Computing Advantages Performance Enhancement and

Balancing: In some cases, processing load can be

shared among networked computer.Example: research data calculation.

Page 9: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

9

Network Computing Advantages Entertainment: Networks facilitate many types of games

and entertainment. The Internet itself offers many sources of entertainment, of course. In addition, many multi-player games exist that operate over a local area network.!

Page 10: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

10

NETWORK TYPE

PEER-TO-PEER NETWORK A network in which resources and files

are shared without a centralized management source. workstations are capable of being both clients and servers

Page 11: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

11

Peer-To-Peer Network

ADVANTAGES relatively inexpensive fairly simple to set up Easy to manage.  

Page 12: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

12

Peer-To-Peer Network

DISADVANTAGES limited in extensibility tends to overburden user workstations by

having them play the role of server to other users

largely unsecured Typically unable to provide system-wide

services since the typical workstation will run a standard desktop operating system incapable of hosting any major service (e.g., a post office).

Page 13: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

13

NETWORK TYPE

CLIENT/SERVER NETWORK A communications network that uses

dedicated servers. The network will consist of client/workstation computers and one or many servers. Enable centralization management.

Page 14: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

14

Client/Server Network

In a client-server network architecture certain computers are designated for full-time server duty, while others (such as user workstations) are full-time clients.

Page 15: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

15

Client/Server Network

ADVANTAGES can extend to handle organizational

growth user workstations to function as

unburdened clients, can provide sophisticated system-wide

services configurable for maximum security. 

Page 16: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

16

Client/Server Network

DISADVANTAGES higher initial capital investment to

establish greater level of technology expertise

required to configure and manage – thus need profesional personnel

Page 17: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

17

NETWORK CLASSIFICATION

A network is classify base on its size of deployment. Depend on their size they would be under one of these classification Local Area Network (LAN) Metropolitan Area Network (MAN) Wide Area Network (WAN)

Page 18: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

18

Network Classification

Local Area Network (LAN) connects computers and devices in a

limited geographical area – exp home, school, a computer lab, an office in a building etc. Personal Area Network (PAN)

close to one person – a set of computer ,printer,fax,pda,scanner

<10 meters Home Area Network (HAN)

residential LAN a small number of personal computers and

accessories

Page 19: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

19

Network Classification

Metropolitan Area Network (MAN) a large computer network that usually

spans a city or a large campus usually interconnects a number of LANs MAN might be owned and operated by a

single organization, but it usually will be used by many individuals and organizations

Use of high speed backbone network to interconnect the LANs (usually fiber-optic)

Page 20: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

20

Network Classification

Wide Area Network (WAN) a computer network that covers a broad

area any network whose communications links cross

metropolitan, regional, or national boundaries Exp between city, state or country

Page 21: Chapter1 full

21

© POLISAS/JKE/AMR/2011/EC301

Network Elements

Client Server Workstation Netowork interface

card Network operating

system Node

Connectivity device

Backbone Segment Topology Tranmission

media

These are words normally associated with computer networking. They are the elements that exist within a computer network. The building block of a network.

Page 22: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

22

Network Elements

Client a computer in a network that uses the

services (as access to files or shared peripherals) provided by a server

Server The main computer in a network

which provides files and services that are used by the other computers

Page 23: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

23

Network Elements

Workstation **An intelligent terminal or personal

computer usually connected to a computer network

A powerful microcomputer used especially for scientific or engineering work

**is a high-end microcomputer designed for technical or scientific applications.

Page 24: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

24

Network Elements

Network Interface Card The hardware that provide the interface

between a computer and a network Usually in the form factor of an add-in card

such as a PCI or PCMCIA card. (now we have USB also)

wired connections or wireless

Page 25: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

25

Network Elements

Network Operating System the software that runs on a server and enables

the server to manage data, users, groups, security, applications, and other networking functions

The most popular network operating systems are Microsoft Windows Server 2003, Microsoft Windows Server 2008, UNIX, Linux, Mac OS X, and Novell NetWare.

Page 26: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

26

Network Elements

Node a connection point, either a redistribution

point or a communication endpoint Usually a router, gateway, switch or hub (an

active electronic device). A patch panel is not a node.

In theory it a point in a network topology at which lines intersect or branch.

Page 27: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

27

Network Elements

Connectivity device Device that connect the computer and

network together Repeater Hub/Switch Bridges Router Etc….

Page 28: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

28

Network Elements

Backbone It is a part of computer network

infrastructure that interconnects various pieces of network, providing a path for the exchange of information between different LANs or subnetworks

principal data routes (or connection) between network.

Page 29: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

29

Network Elements

Segment Refers a portion of a computer network. The

nature and extent of a segment depends on the nature of the network and the device or devices used to interconnect end stations.

Page 30: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

30

Network Elements

Topology the layout pattern of interconnections of the

various elements

Page 31: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

31

Network Elements

Transmission Media Transmission media are the physical pathways

that connect computers, other devices, and people on a network UTP cable Fiber optic Wifi WiMAX Etc…

Page 32: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

32

Network Topology

DEFINITION The pattern in which computers or

network devices are interconnected. The physical arrangement of a network;

the way in which cables are arranged in order to connect computers in a network

The arrangement or mapping of the network elements

Page 33: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

33

Network Topology

BUS Each node is connected to a single cable.

Each computer or server is connected to the single bus cable. A signal from the source travels in both directions to all machines connected on the bus cable until it finds the intended recipient

Page 34: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

34

Network Topology

RING Elements are set up in a circular fashion in

which data travels around the ring in one direction and each device on the right acts as a repeater to keep the signal strong as it travels.

Page 35: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

35

Network Topology

STAR Each elements is connected to a central

hub with a point-to-point connection.

Page 36: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

36

Network Topology

HYBRID Is a combination any two or more of

previous topology (bus, star & ring) The network does not exhibit one of the

standard topologies

Page 37: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

37

Network Topology

Exercises:

Page 38: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

38

Network Topology - Pros and Cons

BUSPros Easy to install and manage (hardware) Cheaper, lighter, easy to detect medium

problem – single wireCons Bus down , network down Limited connection, congest, single

packet in bus during a clock pulse

Page 39: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

39

Network Topology- Pros and Cons

RINGPros Very orderly network Performs better than a bus topology under heavy network load Does not require network server to manage the connectivity

between the computers No need to switch on all the computers to work with the networkCons One malfunctioning workstation or bad port in the MAU can create

problems for the entire network Moves, adds and changes of devices can affect the network Network adapter cards and MAU's are much more expensive than

Ethernet cards and hubs Much slower than an Ethernet network under normal load

Page 40: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

40

Network Topology- Pros and Cons

STARPros Easy to design and implement Easy to add node Node – central control Elements are isolated from other element

failure.Cons The hub – a single point failure (very

devastating)

Page 41: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

41

Network Topology - Pros and Cons HYBRID

Pros …………? …………?Cons …………?

Page 42: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

42

Network Topology

Others topologies

Page 43: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

43

END OF CHAPTER 1 – PART 1 Question ?

Page 44: Chapter1 full

44

© POLISAS/JKE/AMR/2011/EC301

Networking Standards

CHAPTER 1 PART 2

Page 45: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

45

STANDARDS & PROTOCOLS

Standardization is the process of developing and implementing technical standards.

A Standard is a mutual understanding, a shared meaning that is typically derived from the adoption of well-established declarations (but can also be established through social conventions).

A Protocol is a mutually understand method of operating

Page 46: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

46

STANDARD & PROTOCOLS

Standards and protocols establish rules which act as positive constraints on a system, providing a framework for that system, such that the components within it can operate along more strict and manageable interactions. 

Page 47: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

47

STANDARD & PROTOCOLS

Think of our roads and the system we have developed for driving.  An example of a standard would be the regulation that says a street light should have three different colored lights, a certain hue of green, amber, and red.  An example of a protocol would be how to respond when you encounter each of these scenarios.   These help us to navigate the road systems in coordination.

Page 48: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

48

NETWORKING STANDARD

Network standards govern the exchange of messages between hardware or software processes on different host computers, including message order, semantics, syntax, reliability, and connection orientation

Also known as protocols Computers are not intelligent, so

standards must be very rigid

Page 49: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

49

NETWORK STANDARDS

Not just computer networking, almost all thing that are deployed or used worldwide have some form of standard in order to work properly .

These are some of the organizations that set standards for networking

•ANSI•EIA & TIA•IEEE•ISO

•ITU•ISOC•IANA & ICANN

Page 50: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

50

ANSI

American National Standard Institute the main organization responsible for

coordinating and publishing computer and information technology standards in the United States

They do not set the standard themselves but oversee and accredit the organizations that actually create the standards – Standards Developing Organizations (SDOs)

www.ansi.org

Page 51: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

51

ANSI

American National Standard Institute It acts as the administrator and coordinator

of US private sector voluntary standardization since1918.

It a nonprofit organization. Accreditation by ANSI signifies that the

procedures used by the standards body in connection with the development of American National Standards meet the Institute’s essential requirements for openness, balance, consensus and due process.

Page 52: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

52

EIA & TIA

Electronic Industries Alliance (EIA): The EIA is an international industry association that is best known for publishing electrical wiring and transmission standards.

Page 53: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

53

EIA & TIA

Telecommunications Industry Association(TIA).

TIA is a part of EIA. It is the communications sector of EIA – responsible for communications standards

TIA is accredited by the American National Standards Institute (ANSI) to develop voluntary industry standards for a wide variety of telecommunications products

Page 54: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

54

EIA & TIA

Since communications, wiring and transmission are related – standard sets by EIA or TIA are often labeled as ‘EIA/TIA’ or ‘TIA/EIA’ Example TIA/EIA-568

a set of three telecommunications standards from the Telecommunications Industry Association, a 1988 offshoot of the EIA. The standards address commercial building cabling for telecom products and services.

Page 55: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

55

EIA & TIA

The best known features of TIA/EIA-568-B.1-2001 are the pin/pair assignments for eight-conductor 100-ohm balanced twisted pair cabling. These assignments are named T568A and T568B, and are frequently referred to as TIA/EIA-568A and TIA/EIA-568B.

Page 56: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

56

IEEE

Institute of Electrical and Electronics Engineers

The IEEE (pronounced “eye-triple-ee”) is a well-known professional organization for those in the electrical or electronics fields, including computers and networking. IEEE's main claim to fame in the networking industry is the IEEE 802 Project, which encompasses many popular networking technologies including Ethernet.

Page 57: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

57

IEEE

IEEE 802 refers to a family of IEEE standards dealing with local area networks and metropolitan area networks.

services and protocols specified in IEEE 802 map to the lower two layers (Data Link and Physical) of the seven-layer OSI** model.

**more in chapter 2

Page 58: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

58

ISO

Probably the biggest standards organization in the world, the ISO is really a federation of standards organizations from dozens of nations.

International Organization for Standardization (ISO)

Page 59: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

59

ISO

In the networking world, the ISO is best known for its OSI Reference Model.

The model provide a framework for both designing networking systems and for explaining how they work.

Other example of ISO standard for networking is ISO/IEC 27032 which provide guidelines for cyber security.

Page 60: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

60

ITU

International Telecommunication Union

another large international body that develops standards for the telecommunications industry

formerly named the International Telephone and Telegraph Consultative Committee or CCITT

Page 61: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

61

ITU

Example of ITU standards. The OSI model is also one of the standard

project by ITU along side ISO. G.hn is the common name for a home network

technology family of standards developed under the International Telecommunication Union's Standardization arm (ITU-T) and promoted by the HomeGrid Forum[1] and several other organizations.[2] The G.hn specification defines networking over power lines, phone lines and coaxial cables with data rates up to 1 Gbit/s.

Page 62: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

62

ISOC

Internet Society a nonprofit organisation founded in 1992

to provide leadership in Internet related standards, education and policy

dedicated to ensuring the open development, evolution and use of the Internet for the benefit of people throughout the world.

Page 63: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

63

ISOC

Internet Society Facilitate and coordinate Internet-related initiatives

around the world Provide leadership in addressing issues that

confront the future of the Internet The organisational home for the groups responsible

for Internet infrastructure standards, including the Internet Engineering Task Force (IETF) and the Internet Architecture Board (IAB).

Act as a global clearinghouse for Internet information and education.

Page 64: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

64

IANA & ICANN

Internet Assigned Numbers Authority (IANA) and Internet Corporation for Assigned Names and Numbers (ICANN) - ICANN managing the Internet Protocol address spaces (IPv4 and

IPv6) assignment of address blocks to

regional Internet registries, for maintaining registries of Internet protocol identifiers, and for the management of the top-level domain name space (DNS root zone), which includes the operation of root nameservers.

Most visibly, much of its work has concerned the introduction of new generic top-level domains (TLDs). The technical work of ICANN is referred to as the "IANA function".

Page 65: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

65

IANA & ICANN

Top Level Domain (TLD) domains at the highest level in the

hierarchical Domain Name System of the Internet.

Organized into 3 main group – Countries (uk,my,us,aus) Categories (edu,gov) , and Multiorganizations (mit,ukm)

With the growth of internet, more generic TLD is define to further enhance the improve the identity of a domain.

Page 66: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

66

END OF CHAPTER 1 – PART 2 Question ?

Page 67: Chapter1 full

67

© POLISAS/JKE/AMR/2011/EC301

Basic Requirement For Communication

PRINCIPLES OF COMMUNICATION IN NETWORKING

Page 68: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

68

CONTENTS

PART 3 – PRINCIPLES OF COMMUNICATION IN NETWORKING

In this part, we shall discuss about the terms, principles and processes that happen during a communication in a computer networking environment.

Page 69: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

69

Network Communication

Basic requirement for communication are A sender – create message to transmit A media – carries the message to A receiver – receive the message

This basic requirement is the same for computer network although the word use is different Source Channel destination

Page 70: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

70

Network Communication

Network communication happens when a source produces a data which travel through a network channel

(line,media) which then arrive at a destination (the

recipient)

Page 71: Chapter1 full

71

© POLISAS/JKE/AMR/2011/EC301

Rules Of Communication

PRINCIPLES OF COMMUNICATION IN NETWORKING

Page 72: Chapter1 full

© POLISA6S/JKE/AMR/2011/EC301

72

Rules Of Communication

In order for communication in network to be successful, there are rules which must be observe and perform during the process of communication.

For these subject, there are six of them in this order :- Establish a link Issue a command and command qualifier Acknowledgment of command Dissection messages Error detection and correction Termination of transmission

Page 73: Chapter1 full

© POLISA6S/JKE/AMR/2011/EC301

73

Rules Of Communication

Establish a link To comunicate between two point (source &

destination) there must be a connection (link) between them.

This link can be a direct wire, through the telephone line or by radio signal (wireless).

*Discussion What are the links available for computer

network?

Page 74: Chapter1 full

© POLISA6S/JKE/AMR/2011/EC301

74

Rules Of Communication

Issue a command and command qualifier A command must be issue by the sender to

start the communication. The command must use the relevant

qualifier base on the information to be send The qualifier act as a control field for the

command.

Page 75: Chapter1 full

© POLISA6S/JKE/AMR/2011/EC301

75

Rules Of Communication

Acknowledgment of command The communication can proceed if the

command given is accept ( the command is according to protocol)

Any error or incorrect command, communication is denied.

Acknowledgement form the recipient is also require in order to determine the communication was a success or not.

Page 76: Chapter1 full

© POLISA6S/JKE/AMR/2011/EC301

76

Rules Of Communication

Dissection messages Messages/data cannot be send as one big

chunk of information. most messages/data is not built only by the

concern information itself but also other information such as the data size, protection, timing and others control information for the data.(sender address,receiver address etc)

Page 77: Chapter1 full

© POLISA6S/JKE/AMR/2011/EC301

77

Rules Of Communication

Error detection and correction During data transmission there a possible

lost of information or control data. A method to check for error and also make

correction if possible must be present.

Page 78: Chapter1 full

© POLISA6S/JKE/AMR/2011/EC301

78

Rules Of Communication

Termination of transmission When error in communication happen, a

mechanism to terminate the communication will terminate/stop the communication.

Also to terminate unsuccessful communication.

Reason This is important so that the communication

channel is free from unwanted data hence freeing the channel for other communication.

Page 79: Chapter1 full

79

© POLISAS/JKE/AMR/2011/EC301

Communication Terminologies

PRINCIPLES OF COMMUNICATION IN NETWORKING

Page 80: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

80

Communication Terminologies These are terminologies* that are related

to communication in networking Message Encoding Message Formatting Message Size Message Timing Message Patterns

*Terminologies -the technical or special terms used in a business, art, science, or special subject

Page 81: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

81

Communication Terminologies Encoding is the process of transforming

a set of Unicode characters into a sequence of bytes. Decoding is the reverse process. Example – decoding an ASCII character to

binary.

Page 82: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

82

Communication Terminologies Encoding is the process of transforming

a set of Unicode characters into a sequence of bytes. Decoding is the reverse process. Example – decoding an ASCII character to

binary.ASCII DEC HEX BINARY

X 088 058 01011000

Page 83: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

83

Communication Terminologies Message Formatting

method that determines the structure of the messages it employs. Obviously, a message that is intended to connect a Web server and a Web browser is going to be quite different from one that connects two Ethernet cards at a low level.

Concerned with the formatting or coding used to represent the data

Page 84: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

84

Communication Terminologies Message Size

The size of data sent through any communication channel is limited by the protocol/rules its imply.

Example : - mobile phone SMS usually limit the message size to 160 normal alphabet (7bit) character. For non alphabet character like the Arabic, Chinese, Korean, japanese or Cyrillic alphabet (Russia, Serbian, Bulgarian etc ) need 16-bit of data to represent them hence limiting the size message to 70 character only.

Page 85: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

85

Communication Terminologies Message Timing

Most data transmission uses asynchronous or synchronous method to send the data.

This required certain timing control information.

It also important to check for delays.

Page 86: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

86

Communication Terminologies Message Patterns

In software architecture, a messaging pattern is a network-oriented architectural pattern which describes how two different parts of a message passing system connect and communicate with each other.

In telecommunications, a message exchange pattern (MEP) describes the pattern of messages required by a communications protocol to establish or use a communication channel.

Page 87: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

87

Communication Terminologies

There are two major message exchange patterns — a request-response pattern, and a one-way pattern. For example, the TCP(Transmission Control Protocol) is a request-response pattern protocol, and the UDP (User Datagram Protocol) has a one-way pattern.

Page 88: Chapter1 full

88

© POLISAS/JKE/AMR/2011/EC301

Communication Problems

PRINCIPLES OF COMMUNICATION IN NETWORKING

Page 89: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

89

Communication Problems

Most communication problems and errors are related to the terminologies (EFSTP)

Page 90: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

90

END OF CHAPTER 1 – PART 3 Question ?

Page 91: Chapter1 full

91

© POLISAS/JKE/AMR/2011/EC301

Network Interface Card Network Interface Controller(NIC)

Functions Of Network Hardware

Page 92: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

92

Summary

Part 4 - Functions Of Network Hardware Identify network hardware Setup hardware and software Peer-peer using cross cable Build a simple LAN Sharing a file Network printer

Page 93: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

93

Network Interface Card

The hardware that provide the interface between a computer and a network Cards on an expansion board inside a

computer (PCI NIC, PCI Express NIC). Cards installed to the computer’s bus

externally (PCMCIA adapter, USB port, FireWire, Compact Flash NIC)

On-board NIC Wireless NIC

Page 94: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

94

Cards on an expansion board inside a computer (PCI NIC, PCI Express NIC)

These are expansion board/card which is slot into the expansion slot in computer motherboard in order to add network functionality to the computer

They come in different type of connection ISA – outdated PCI – most used PCI express - latest

Page 95: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

95

Cards on an expansion board inside a computer (PCI NIC, PCI Express NIC)

ISA network expansion card 1990s Have 2 port type combine in

one card A bayonet cap BNC connector

(left) for use in coaxial-based 10base2 networks

an RJ-45 connector (right) for use in twisted pair-based 10baseT networks.

The ports cannot not be used simultaneously.

Page 96: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

96

Cards on an expansion board inside a computer (PCI NIC, PCI Express NIC)

PCI network expansion card The standard for most pc without onboard

NIC. Usually come as 10/100Mbps combination Auto switch between the two speed

depends on network configuration(or by force-setting in OS)

Page 97: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

97

Cards on an expansion board inside a computer (PCI NIC, PCI Express NIC)

PCI-E network expansion card Following the introduction of PCI-E

expansion slot as standard in today’s PC. 10/100/1000Mbps speed combination The slot pin may vary in size.

Page 98: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

98

NIC Installed Externally

Electronic device miniaturization enable production small electronic device.s

NIC also comes in the form of small adapters /devices that connect directly to external port of a computer.

This allow easy network upgrade compared to previous expansion board type NIC.

Page 99: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

99

NIC Installed Externally

PCMCIA adapter NIC

Page 100: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

100

NIC Installed Externally

USB adapter NIC

Page 101: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

101

NIC Installed Externally

Compact Flash (CF) adapter NIC (wired)

Page 102: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

102

NIC Installed Externally

Fire Wire networking Only for ad-hoc network only (terminal). There no Fire Wire router/switch. But a Fire

Wire hub is available (function same as USB hub)

Support for Fire Wire networking now only available in most OS but not Microsoft Windows.

Microsoft stop supporting IP networking through Fire Wire since Dec 2004.

Page 103: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

103

NIC Installed Externally

Fire Wire networking

6 to 4 pin9 to 4 pin

4 to 4 pin

Page 104: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

104

NIC Installed Externally

Onboard NIC Onboard or built-in NIC refer to network

capability that come with a PC or Laptop mobo as a standard.

User do not need to add an expansion board or an external NIC devices.

Onboard NIC can be both wired NIC (RJ45 port) or wireless NIC.

Page 105: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

105

NIC Installed Externally

Onboard NIC

Page 106: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

106

NIC Installed Externally

Wireless NIC Very popular due to the fact there no need

for a wire to connect to a network. No mess.

Without wire, network can be access from almost anywhere.

Wireless network is easily upgradable. A wireless terminal/device can be setup without any major work of the site.

Page 107: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

107

NIC Installed Externally

Wireless NIC Signal problem was a big factor during the

early stage of the technology introduction. Now no longer an issue. High power

antenna, Repeater and booster is easily available and affordable.

Most concern issue now is security. With small effort and a little investment,

wireless network can be intrude.

Page 108: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

108

NIC Installed Externally

Wireless NIC comes in various form as wired NIC.

Page 109: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

109

NIC Installation & Configuration For windows user, most NIC will work

automatically once install Large driver database in windows. Some may need exact driver/software to

work.

Page 110: Chapter1 full

110

© POLISAS/JKE/AMR/2011/EC301

LAN Connectivity Hardware

Functions Of Network Hardware

Page 111: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

111

LAN Connectivity Hardware

NIC – interface between computer and netwrok

Connectivity hardware – devices that interconnects the network and NIC together. Repeater Hub/Switch Bridges Routers Gateways

Page 112: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

112

Repeater

regenerate incoming electrical, wireless or optical signals

Allow signal to be send to further place preserve signal integrity and extend the

distance over which data can safely travel.

FACTS: Cat 5 and Cat 6 cable has limit of 100meters before Experiencing signal lose

Page 113: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

113

Hub / Switch

provides a central connection point for cables from workstations, servers, and peripherals

Most switches are active (a repeater) memorize addressing of computers and

send the information to the correct location directly

Page 114: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

114

Hub / Switch

Usually configured with 8, 12, or 24 RJ-45 ports

Often used in a star or tree topology Sold with specialized software for port

management Also called hubs Usually installed in a standardized

metal rack that also may store netmodems, bridges, or routers

Page 115: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

115

Bridges

To segment network to smaller network To connect old network technology with

new Bridge direct data to it correct LAN.

These reduce the risk of channel flooding.

It behave like a switch but with mush less no of port for connection.

Page 116: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

116

Bridges

Page 117: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

117

Bridges

Page 118: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

118

Routers

Direct signal traffic efficiently Route messages between any two

protocols Route messages between linear bus,

star, and star-wired ring topologies Route messages across fiber optic,

coaxial, and twisted-pair cabling

Page 119: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

119

Routers

Page 120: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

120

Routers

Bridges knows all computer address on each side of network it connect

routers know the addresses of computers, bridges, and other routers on the network.

Routers can even "listen" to the entire network to determine which sections are busiest -- they can then redirect data around those sections until they clear up. (high end router)

Page 121: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

121

Gateways

A gateway is a network point that acts as an entrance to another network.

enable networks off different protocol to communicate

can be implemented completely in software, completely in hardware, or as a combination of both

By definition, gateways appears at edge of the network.

Page 122: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

122

Gateways

Page 123: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

123

Gateways

Most router acts as gateways since they usually installed between network or to internet.

Page 124: Chapter1 full

© POLISAS/JKE/AMR/2011/EC301

124

END OF CHAPTER 1 – PART 4 Question ?