-
There
are two main types of networks Peer to Peer
and
client server
-
Peer to peer networks may only
be used in small sized networks and client server
networks should be used in
large sized networks.
-
There are different access
methods to a network
including token
ring and CSMA/CD
.
-
The devices
used in a network
include NIC cards, Hubs,
Switches
, Routers and Gateways
.
-
Types
of Networks
-
Peer To Peer Networks
-
Client Server
Networks
-
Authentication
-
Server Operating System
-
Access Method
-
CSMA/CD
|
-
Token
Ring
-
Network Hardware
-
Hubs
-
Bridges
-
Routers
-
Gateways
|
·
These Logical networks
have
nothing to do with topology.
·
Each computer acts as
both client and server computer.
-
Operating
systems
offering
client side networking include Windows95, Windows 98, Windows NT
workstation,
Windows Professional
, Windows XP
·
Each user must set their
own local computers security settings in a peer-to-peer network
-
There
exists a centralized
server
that interacts with the workstations on the network
-
All users on the network
must log on the server (become
authenticated) before they can access the resources
of the network including files
and printers
.
-
Security
is
centralized
on
the network
and
managed by a dedicated network administrator
-
Servers are suitable for
networks of all sizes from several computers to several thousand
computers.
-
Backing up of data is
centralized
and made easy on a client
server
network
-
Operating systems
with server side software
include Novell
OS, Windows NT
, Windows 2000
, and Unix
.
-
Server
Operating System is a lot more expensive then workstation software
-
All server operating systems are subject to license agreement, as to the
number of users per server.
-
Access
method
is
the process that is used by the networking operating system
to
transmit data on the networking medium from the network
card.
-
Ethernet
network
that
are both the BUS and STAR topologies
use
CSMA/CD
access
method.
-
Carrier
Sense Multiple Access with Collision Detections
(CSMA/CD
).
-
Another
access method is the Token Ring
.
·
The transmitting
computer checks to see if there is data on the network
bus.
-
Sometimes
referred as Token Ring
because
there is a digital token
sent
around the network
which
any computer within the loop
can
pickup, and only the computer with the token can talk.
-
The token
ensures that only one computer
transmits at any time and there are no packet collisions
on the network
.
-
The Token Ring
contention
method ensures that the network
is
fairly fast because there is no packet collision, and packets don’t have
to be retransmitted on the network.
-
A
network
can
contain any number of equipment used for communication
, network expansion and network
segmentation from the simple network card to the routers
and
gateways used for segmenting networks.
-
Lets take a closer look at all the
components that make up our network
·
Network card is the
physical device on the computer responsible for transmitting the data pulses
of 5V and 0V on the network
for
1’s and 0’s. Each network card has a unique ID code burned on the card
itself.
Physical
installation
of
BUS Topology
Connecting
NIC to system
Connecting
the cable to the card
Terminating
the cable
Installation
of the Star Topology
Connecting
NIC to system
The
RJ45 connector on the twisted pair cable
Connecting
the cable to the NIC
-
Medium
is the cable
that
transfers the data, there are many different cables associated with
different topologies
including
Thinnet
, Thicknet
, twisted pair
, fiber optic, etc.
–Active
Hubs
–Passive
Hubs
–Hybrid
Hubs
.
-
It
controls network
traffics
by checking if the ID of the source PC and Destination PC network cards
are
on the same port. If the two PC’s are on the same port (e.g. PC1 and
PC2), the data is blocked from all other ports.
-
If
the addresses of the two communicating PC’s are on two separate ports
(e.g.. PC1 and PC2), then a route is opened directly only between the two
ports and all other ports are blocked.
-
Bridges
can link networks that use different access methods, but switch can only
use one access method.
-
Switches
can allow maximum bandwidth
through each port.
-
Routers
are responsible controlling network
traffic
by routing data between networks using the network cards
logical
address called the IP
address
-
Routers
can communicate with each other to dynamically route network
traffic
depending on network congestion, broken links.
Questions
1) What are the
advantages of a Peer-to-Peer network
? (Choose all the apply)
a)
Centralized security
b)
Forced authentication
c)
Cheap
d)
Centralized backup
e)
Unlimited network
size
2) What are the
advantages of a client server
network
? (Choose all the apply)
a)
Centralized security
b)
Forced authentication
c)
Cheap
d)
Centralized backup
e)
Unlimited network
size
3) What is the
contention method used in the star topology?
a)
CSMA/CD
b)
CSMA/CA
c)
Token
d)
CSMT/TD
4) What is the
contention method used in the bus topology?
a)
CSMA/CD
b)
CSMA/CA
c)
Token
d)
CSMT/TD
5) What is the
contention method used in the ring topology?
a)
CSMA/CD
b)
CSMA/CA
c)
Token
d)
CSMT/TD
6) What are the
features of a network
card? (Choose all that apply)
a)
Sends pulses of 1's and 0's on to the network
b)
Its identified by an network
assigned address
c)
It is the link between the computer and the network
d)
Its identified by a unique fixed hardware address
e)
A ROM
chip can be installed on them that
enable booting from the card
7) What devices
can be used to expand a network
?(choose all that apply)
a)
Network card
b)
Barrel connector
c)
Switch/Bridge
d)
Hub
e)
Repeater
f)
Router
8) What devices
can be used to segment a network
? (Choose all that apply)
a)
Network card
b)
Barrel connector
c)
Switch/Bridge
d)
Hub
e)
Repeater
f)
Router
9) Gateways
can overcome which of the
following network
restrictions? (Choose all that
apply)
a)
Topology
b)
Protocol
c)
Contention method
d)
Routing problems
e)
Slow links
10) Which of the
following are variations of hubs? (Choose all that apply)
a)
Passive hub
b)
Slow hub
c)
Contact hub
d)
Active hub
e)
Hybrid hub
Answers
-
C
-
A,B,D,E
-
A
-
A
-
C
-
A,B,C,D,E
-
B,D,E
-
C,F
-
A,B,C
-
A,D,E