Introduction Phil Smithwiki.computing.hct.ac.uk/_media/computing/hnd/l4_u...an organization does not...
Transcript of Introduction Phil Smithwiki.computing.hct.ac.uk/_media/computing/hnd/l4_u...an organization does not...
Introduction
Phil Smith
Learning outcomesOn successful completion of this unit you will be able
to:
LO1. Examine networking principles and their
protocols.
Role of networks1. working practice
2. commercial opportunity
3. information sharing
4. Collaboration
Role of networks Task
Investigate the purpose, resource implications,
communications, working practice, commercial
opportunity, information sharing and collaboration of
networks.
System types1. Network operating systems are used to manage
multiple computers on a single system. Every
computer has an operating system for the
individual device, but a network system is used as
a central system for an entire grouping of
computers. The types of network systems vary
according to the specific demands of the system.
Network System typesTask
You will be given two numbers.
Research the system types from the list below against the numbers you have been given.
Then report to the class what you have found.
1. Peer-based
2. client-server
3. cloud
4. cluster
5. centralised
6. virtualised
System types1. Peer-based,
1. These networks are far less common as they involve
storing the files on individual computers rather
than a centralized network. This means each
computer must share hard-drive contents with all
other computers on the network. Collectively, the
computers make the network possible. This model is
more common when used by a single individual
while connecting multiple devices.
System types1. client-server
1. These are the most common types of network
operating systems and they are frequently used in
business, government, schools and other
organizations that require a central server. The
server houses all of the files for the network, and
each computer is tied into the server.
System types Cloud based storage and browser based software has
changed the way many businesses operate. Cloud based
systems are more effective and efficient in most cases.
The only downside to the cloud systems is the need for
connectivity. A stable connection to the cloud is
mandatory for file access.
Rather than storing everything on a centralized, physical
server, the business hosts all files on a cloud based
account.
They can manage permissions for file access, and each
employee has a login to
access files on the cloud account.
E.g. Onedrive
System types1. Cluster
A cluster network is two or more computing devices working together for a common computing purpose. These networks take advantage of the parallel processing power of the computing devices. In addition to the increased processing power, shared computing resources in a cluster network also can provide scalability, high availability, and failover capabilities should one computing device have a problem.
There are three basic types of computing clusters: load-balancing clusters, high availability clusters, and high-performance clusters.
System types1. A high availability cluster
System types1. Centralised
1. A type of network where all users connect to a
central server, which is the acting agent for all
communications. This server would store both the
communications and the user account information.
Most public instant messaging platforms use a
centralized network. Also called centralized server-
structure
System types1. Virtualised
1. Application Virtualization
2. Desktop Virtualization
3. Hardware Virtualization
4. Network Virtualization
5. Storage Virtualization
System types1. Network Virtualization
1. Network virtualization is a method that combines all
physical networking equipment into a single resource. It is
the process of dividing bandwidth into multiple,
independent channels, each of which can be assigned to
servers and devices in real time.
TopologyNetwork topology refers to the physical or logical
layout of a network. It defines the way different
nodes are placed and interconnected with each
other. Alternately, network topology may describe
how the data is transferred between these nodes.
There are two types of network topologies:
physical and logical.
Physical topology emphasizes the physical layout
of the connected devices and nodes, while the
logical topology focuses on the pattern of data
transfer between network nodes.
Topology Logical
Ethernet
The IEEE 802.3 standard is popularly called as Ethernet (more on this later)
The Ethernet topology was developed at the University of Hawaii to connect computers on the various Islands. It was radio based design.Ethernet is one of the most popular Computer Network or LAN technologies in use today covering more than 85% of the computer networks.
Topology Logical
A token ring network is a local area network (LAN) topology where nodes/stations are arranged in a ring topology. Data passes sequentially between nodes on the network until it returns to the source station. To prevent congestion and collision, a token ring topology uses a token to ensure that only one node/station on the line is used at a time, thereby easily denoting media users of its activity.
A token ring LAN is physically wired as a star topology but configured as a ring topology.
The token ring LAN system was standardized by the Institute of Electrical and Electronics Engineers as IEEE 802.5.
Topology physical
e.g. star, bus, mesh, tree, ring.
Topology physical
Bus Topology: All the devices/nodes are connected
sequentially to the same backbone or transmission
line. This is a simple, low-cost topology, but its single
point of failure presents a risk.
Topology physical
Mesh Topology: The topology in each node is directly
connected to some or all the other nodes present in
the network. This redundancy makes the network
highly fault tolerant but the escalated costs may limit
this topology to highly critical networks.
Topology physical
Tree Topology: A root node is connected to two or
more sub-level nodes, which themselves are
connected hierarchically to sub-level nodes.
Physically, the tree topology is similar to bus and star
topologies; the network backbone may have a bus
topology, while the low-level nodes connect using star
topology.
Topology physical
Ring Topology: All network devices are connected
sequentially to a backbone as in bus topology except
that the backbone ends at the starting node, forming
a ring. Ring topology shares many of bus topology's
disadvantages so its use is limited to networks that
demand high throughput.
Topology physical
Star Topology: All the nodes in the network are
connected to a central device like a hub or switch via
cables. Failure of individual nodes or cables does not
necessarily create downtime in the network but the
failure of a central device can. This topology is the
most preferred and popular model.
Topology – quick task What kind of topology is your home network?
Use draw.io to draw a network diagram of your home
network.
Then decide what type of topology it is?
Networking standards Conceptual models
OSI model
TCP/IP model
standards: e.g. IEEE 802.x.
Important standards organisations -
• American national standard institute (ANSI)
•Institute of electrical and electronics engineers (IEEE)
•International standard organization (ISO)
Networking standards Conceptual models
standards: e.g. IEEE 802.x.
Networking standards Conceptual models
standards: what standard is used on your lab PC
See if you can discover the 802.xx standard on your
pc.
1. Choose network & internet settings
2. Choose change connection settings then look at the
information being displayed. (Do not change anything).
https://standards.ieee.org/standard/802_11-2012.html
Networking standards Conceptual OSI model
developers
Network engineer
Networking standards Conceptual models
e.g. OSI model and TCP/IP model
Networking standards Conceptual models
Networking standards Conceptual models
Protocols1. Purpose of protocols
1. Network Protocols are a set of rules governing
exchange of information in an easy, reliable and
secure way. The most popular model used to
establish open communication between two systems
is the Open Systems Interface (OSI) model
proposed by ISO.
Protocols1. The OSI protocols are called a protocol stack or
network stack as they all communication using
standardized protocols (rules and formats).
Protocols1. routed protocols e.g.
1. IPv4
1. IPv4 is a type of Internet networking protocol that
functions as an address for devices connected to a
network. Once connected to a network, an IPv4 address is
assigned by the host (usually an Internet service provider,
or ISP) to the client (the user's device, be it computer, cell
phone or gaming system) as a way of identifying where
queried traffic should be routed to.
2. A global unicast address is simply what we call a public IP
address in IPv4—that is, an IP address that is routed
across the whole Internet. You can make out a global
unicast address easily: The first three bits are set to 001.
Protocols1. routed protocols e.g.
1. IPv4 addresses are commonly found in the format of
xxx.xxx.xxx.xxx or some variation thereof, with each
x replaced by a number from one to nine.
Protocols1. IPV4, IPv6, IPv6 addressing
1. There are three general types of IPv6 addresses: unicast, multicast, and anycast.
2. Multicast addresses are also known in IPv4. These addresses identify multiple network interfaces / hosts. A typical use of multicast addresses in a Windows environment is the deployment of OS images to multiple hosts, simultaneously.
3. You know unicast addresses from IPv4. A unicast address is the most common form of an IP address and is assigned to one network interface.
4. This is a new address type in IPv6. Like a multicast address, an anycast address identifies multiple interfaces; however, while multicast packets are accepted by multiple machines, anycast packets are delivered only to one interface (host). This address type allows for services that are provided by multiple servers where only one server has to respond. In routing, anycast addresses are used to route packets to the closest routers.
Protocols IPv6 has different address types. One of the
important and widely used IPv6 Address type is IPv6 Link Local Address. Every IPv6 enable interfaces must have a Link-Local Address either with manual configuration or auto-address configuration. IPv6 Link Local Address is the address used between Point-to-Point interfaces and provide IPv6 Neighbor Discovery.
Point-to-point interfaces do not need a Global IPv6 Address to communicate each other. Instead, they use IPv6 Link Local Addresses for point-to-point communication. Routers do not forward these Link-Local Addresses because they are used only on a single link.
Protocols1. A routing protocol specifies how routers communicate
with each other, distributing information that enables
them to select routes between any two nodes on a
computer network. Routers perform the "traffic
directing" functions on the Internet. Each router has a
prior knowledge only of networks attached to it directly.
A routing protocol shares this information first among
immediate neighbors, and then throughout the network.
This way, routers gain knowledge of the topology of the
network. The ability of routing protocols to dynamically
adjust to changing conditions such as disabled data
lines and computers and route data around
obstructions is what gives the Internet its survivability
and reliability.
Protocols1. EUI-64 (Extended Unique Identifier) is a method
we can use to automatically configure IPv6 host
addresses. An IPv6 device will use the MAC
address of its interface to generate a unique 64-bit
interface ID.
Protocols
ProtocolsTask
Using your number allocated to you earlier research the meaning of 3 terms below.
1. FTP
2. HTTP
3. SMTP
4. POP3
5. SSL
6. Then deliver 1 point from each 1 to the class.
Protocols Final Task
Research Internet Protocol Address Management
(IPAM)
Make a few short notes then deliver 1 to the class.
All You Need To Know About IPAM We currently live in an IP dependent world; the explosion of
IP enabled devices such as smartphones, laptops, tablets and other random devices in the workplace has made today’s enterprise networks more dynamic and complex. If an organization does not have the right tools in place to handle this demand, managing the network can become a nightmare. Immediate access to accurate network information is important to an organization’s success and the only way to ensure the network is reliable, secure and well maintained is through Internet Protocol Address Management (IPAM).
https://www.getfilecloud.com/blog/2013/12/internet-protocol-address-management-ipam-explained/
What have we learnt in this
session?
1. System types
2. Networking standards
3. Topology
4. Protocols