COMPUTING FUNDAMENTALS AND OFFICE PRODUCTIVITY TOOLS IT111

REFERENCENCES: LOCAL AREA NETWORK BY DAVID STAMPER, 2001, HANDS ON NETWORKING FUNDAMENTALS 2ND EDITION MICHAEL PALMER 2013 NETWORKING FUNDAMENTALS Network Structure

WHAT IS NETWORK

 Network • An openwork fabric; netting • A system of interlacing lines, tracks, or channels • Any interconnected system; for example, a television-broadcasting network • A system in which a number of independent computers are linked together to share data and peripherals, such as hard disks and printers

 Networking

• involves connecting computers for the purpose of sharing information and resources

STAND ALONE ENVIRONMENT (WORKSTATION)

 users needed either to print out documents or copy document files to a disk for others to edit or use them. If others made changes to the document, there was no easy way to merge the changes. This was, and still is, known as "working in a stand-alone environment."

STAND ALONE ENVIRONMENT (WORKSTATION)

 Copying files onto floppy disks and giving them to others to copy onto their computers was sometimes referred to as the "sneakernet." GOALS OF COMPUTER NETWORKS • increase efficiency and reduce costs

 Goals achieved through: • Sharing information (or data) • Sharing hardware and software • Centralizing administration and support

 More specifically, computers that are part of a network can share: • Documents (memos, spreadsheets, invoices, and so on). • E-mail messages. • Word-processing software. • Project-tracking software. • Illustrations, photographs, videos, and audio files. • Live audio and video broadcasts. • Printers. • Fax machines. • Modems. • CD-ROM drives and other removable drives, such as Zip and Jaz drives. • Hard drives.

GOALS OF COMPUTER NETWORK

 Sharing Information (or Data)

• reduces the need for paper communication

• increase efficiency

• make nearly any type of data available simultaneously to every user who needs it.

• allows quick communication quickly with large numbers of people

SHARING INFORMATION THROUGH NETWORK SHARING FROM STAND ALONE

 Sharing Hardware and Software

 share and standardize applications, such as word processors, spreadsheets, inventory databases, and so on

SHARING THROUGH NETWORK CENTRALIZED THROUGH NETWORK

 Centralizing Administration and Support

• more efficient IT support one version of one operating system or application and to set up all computers in the same manner

 The Two Major Types of Networks:

1. Local Area Network (LAN)

2. Wide Area Network (WAN)

LOCAL AREA NETWORK (LAN)

• the basic building block of any computer network.

• can range from simple (two computers connected by a cable) to complex (hundreds of connected computers and peripherals throughout a major corporation).

• The distinguishing feature that it is confined to a limited geographic area.

LOCAL AREA NETWORK WIDE AREA NETWORK (WAN)

• has no geographical limit • can connect computers and other devices on opposite sides of the world. • made up of a number of interconnected LANs. • ultimate WAN is the Internet.

NETWORK CONFIGURATION OVERVIEW:

 Servers—Computers that provide shared resources to network users.  Clients—Computers that access shared network resources provided by a server.  Media—The wires that make the physical connections.

 Shared data—Files provided to clients by servers across the network.  Shared printers and other peripherals— Additional resources provided by servers.  Resources—Any service or device, such as files, printers, or other items, made available for use by members of the network.

COMMON NETWORK ELEMENT FOR SHARING DATA NETWORK TYPES IMPLEMENTATION

• Peer-to-peer networks • Server-based networks

 Factors to consider before implementation:

• Size of the organization. • Level of security required. • Type of business. • Level of administrative support available. • Amount of network traffic. • Needs of the network users. • Network budget

NETWORK TYPES

 Peer-to-Peer Networks

• there are no dedicated servers • there is no hierarchy among the computers • all the computers are equal and therefore are known as peers • each computer functions as both a client and a server • there is no administrator responsible for the entire network • the user at each computer determines what data on that computer is shared on the network

NETWORK TYPES

 Peer-to-Peer Networks

 Size  Peer-to-peer networks are also called workgroups  Typically 10 or fewer computers in a peer-to-peer network.  Cost  relatively simple.  no need for a powerful central server or for the other components required for a high-capacity network  can be less expensive than server-based networks.  Operating Systems  the networking software does not require the same standard of performance and level of security as the networking software designed for dedicated servers.  built into many operating systems.  no additional software is required to set up a peer-to-peer network.  Implementation  offers the following advantages: 1. Computers are located at users' desks. 2. Users act as their own administrators and plan their own security.

NETWORK TYPE- PEER-TO-PEER

 Peer-to-peer networks are good choices for environments where:

1. There are 10 users or fewer. 2. Users share resources, such as files and printers, but no specialized servers exist. 3. Security is not an issue. 4. The organization and the network will experience only limited growth within the foreseeable future.

Site an Example

NETWORK TYPE- PEER-TO-PEER

 Peer-to-Peer Network Considerations:

 Administration

 Network administration tasks include:  1. Managing users and security.  2. Making resources available.  3. Maintaining applications and data.  4. Installing and upgrading application and operating system software.

* In a typical peer-to-peer network, no system manager oversees administration for the entire network. Instead, individual users administer their own computers.

NETWORK TYPE- PEER-TO-PEER

Peer-to-Peer Network Considerations:

 Server Requirements

 In a peer-to-peer environment, each computer must:  1. Use a large percentage of its resources to support the user at the computer, known as the local user.  2. Use additional resources such as hard-disk space and memory, to support the user's accessing resources on the network, known as the remote user.

 Sharing Resources

 All users can share any of their resources in any manner they choose.

NETWORK TYPE- PEER-TO-PEER

Peer-to-Peer Network Considerations:

Security All peer-to-peer network users set their own security, and shared resources can exist on any computer rather than on a centralized server only

Training Because every computer in a peer-to-peer environment can act as both a server and a client, users need training before they are able to function properly as both users and administrators of their computers.

NETWORK TYPE

Server-Based Networks

• A dedicated server is one that functions only as a server and is not used as a client or workstation.

• Servers are described as "dedicated" because they are not themselves clients, and because they are optimized to service requests from network clients quickly and to ensure the security of files and directories.

•Server-based networks have become the standard models for networking.

NETWORK TYPE- SERVER BASE

Different Types of Server

NETWORK TYPE- SERVER BASE

Server-Based Network Advantages:

1. Sharing Resources

server-based data sharing can be centrally administered and controlled.  data are easier to find and support than resources on individual computers.

2. Security  in a server-based environment, one administrator who sets the policy and applies it to every user on the network can manage security. NETWORK TYPE- SERVER BASE

 Server-Based Network Advantages:

3. Backup  Server backups can be scheduled to occur automatically, according to a predetermined schedule, even if the servers are located on different parts of the network.

4. Redundancy  Through the use of backup methods known as redundancy systems, the data on any server can be duplicated and kept online.

5. Number of Users  A server-based network can support thousands of users.

6. Hardware Considerations  Client computer hardware can be limited to the needs of the user because clients do not need the additional random access memory (RAM) and disk storage needed to provide server services.

NETWORK TYPE INTERNET

• Understanding • “Surfing” the Internet • Using different search engines and downloading of text and graphics WHAT IS INTERNET

 Internet..  Is a network of computers that many different types of computer all over the world  ARPANET is the WAN that had only four sites in 1969 it is used for interconnecting computers.

 Used for research organizations and universities to share and exchange information

 Advanced Research Projects Agency Network (ARPANET)  1989 the US Government lifted restrictions and allowed it to be used for commercial purposes as well  Internet Interconnects more than 30,000 networks, allowing more than 10 million computers and more than 50 million users in more than 150 countries to communicate with each other BASIC SERVICES OF INTERNET

 E-mail (Electronic mail): Allow user to send a mail (message) to another Internet user in any part of the world in a near-real-time manner  Several email applications :  MS outlook, Mozilla Thunderbird, Windows Live Mail,  File Transfer Protocol (FTP): Allows user to move a file from one computer to another on the internet  Filezilla,  Telnet: Allows user to log in to another computer somewhere on the internet  Usenet News: Allows group of users to exchange their views/ideas/information ELECTRONIC MAIL

 Advantage  Faster than paper mail  Unlike telephone, the persons communicating with each other need not be available at the same time  Unlike fax documents, e-mail documents can be stored in a computer and be easily edited using editing programs

FTP

 Moving file from a remote computer to ones own computer is known as downloading  Moving file from ones own computer to a remote computer is known as uploading  Anonymous ftp site is a computer allowing a user to log in with a username of anonymous and password that is user’s e-mail address.  Anonymous ftp site are called publicly accessible sites because they can be accessed by any user on the Internet

TELNET

 Common uses  Using computing power of the remote computer  Using a software on the remote computer  Accessing remote computer’s database or archive  Logging in to ones own computer from another computer USENET NEWS

 Several usenet groups exist on the internet and are called newsgroups  In a moderated newsgroup only selected members have the right to directly post a message to the virtual notice board. Other members can only read the posted messages  In a nonmoderated newsgroup any member can directly post a message to the virtual notice board  Netiquette (network etiquette) deals with rules of framing messages that will not hurt others

WWW

 World wide web  Use concept of Hypertext document on the internet are known as web pages – for information storage and retrieval on the internet

 Hyper text enable this by using series of links  Web pages are created by using a special language called Hypertext Markup Language (HTML)  WWW uses the client-server model and an internet Protocol called Hypertext Transport Protocol (HTTP) for interaction among the computers on the internet  Any computer on the Internet that uses the HTTP protocol is called a web server and any computer that can access that server is called web client  Example of Hypertext Document WWW BROWSER

 A special software loaded on a web client computer that normally facilities to user  Does not require a user to remote log in  Allow user to visit server computer’s web site and to access information stored by specifying its URL (Uniform Resource Locator) address.  Allow user to create and maintain personal hotlist of favorite URL  Allow user to download information in various formats from server to user’s own computer  Some of different browser  -shells  based  Gecko- and Trident-based  WebKit-based

 Sample of Gecko-based  Mozilla , Sea monkey,Yahoo! Browser,  Trident-shell  Bento, Enigma, Realplayer, TomeRaider  WebKit-based  Amazon Kindle, , epihany, WebOS,  For Java Platform  Bitsream ThunderHawk, Mini, Flying Saucer, HtmlUnit USES OF INTERNET

 Strategic use of computer  On-line communication  Software sharing  Exchange views on topics of common Interest  Posting of information of general interest  Product promotion  Customer support service  Online shopping  World-wide video conferencing

 Use of different search engine  Information retrieval system designed to help find information stored on computer system. The search results are usually presented in a list and are commonly called hits.  Types of Search Engine

 Database , Desktop, enterprise, Human, hybrid, Metasearch  General Search Engine

 Google, Yahoo, Blekko, Bing, Sogou (Chinese)  Accountancy – IFACnet  Business – GlobalSpec, Nexis,Thomasnet ONLINE ELECTRONIC MAIL

 Sending /Receiving  File Attachment DIFFERENT TYPES OF DEDICATED SERVER GENERAL CATEGORY OF MACHINE OVER NETWORK

• Servers • Machines that provide services (like Web servers or FTP servers) to other machines

• Clients • Machines that are used to connect to services provide by server.

GENERAL CATEGORY OF MACHINE OVER NETWORK

• Example • When you connect to Yahoo! (www.yahoo.com)

• Yahoo! is providing a machine (probably a cluster of very large machines), for use on the Internet, to service your request.

• Yahoo! is providing a server. • Your machine, on the other hand, is probably providing no services to anyone else on the Internet. Therefore, it is a user machine, also known as a client. OTHER TYPES OF SERVERS

 File Server – As the name itself suggests, it is a server for files to be shared. Access to this files will be done via access permissions. Access permissions can be set so as to allow only those authorized to read and/or modify the file.  Printer Server – A printer server allows the printer connected to it be shared to other users. The shared printer is also called a network printer.

 Communication Server – A communications server will allow voice communications and SMS messaging to be delivered to and from the network.  handle data and e-mail messages between the servers' own networks and other networks, mainframe computers, or remote users who dial in to the servers over modems and telephone lines.

 Video Server – The video server serves as a repository for delivery and or retrieval of these media on the network.  Application Servers  make the server side of client/server applications, as well as the data, available to clients.  With an application server, the database stays on the server and only the results of a request are downloaded to the computer making the request.  Fax Servers  Fax servers manage fax traffic into and out of the network by sharing one or more fax modem boards.  Directory Services Servers  enable users to locate, store, and secure information on the network.

FTP SERVER WHAT IS FTP?

File Transfer Protocol FTP is a protocol designed for transferring files over the network and Internet. The standard FTP protocol is not encrypted

FTP SERVER

An FTP server is a required software application on networks that wish to support file sharing using FTP and Internet servers.

HOW FTP WORKS CONNECTION MODE

 The FTP server may support Active or Passive connections, or both.  Active,

 the client opens a port and listens and the server actively connects to it.  Passive,

 the server opens a port and listens (passively) and the client connects to it. You must grant Auto FTP Manager access to the Internet and to choose the right type of FTP Connection Mode.

ACTIVE MODE

 In this connection you must set your firewall to accept connections to the port that your FTP client will open.  Problem,  many Internet service providers block incoming connections to all ports above 1024.  Active FTP servers generally use port 20 as their data port

PASSIVE MODE

 Most FTP servers support the Passive mode.  For Passive FTP connection to succeed, the FTP server administrator must set his / her firewall to accept all connections to any ports that the FTP server may open.  Problem:  The server administrator's problem (and standard practice for servers) is you can go ahead, make and use FTP connections.

SAMPLES OF FTP SERVER SOFTWARE

WS_FTP Server Filezilla Server  zFTPServer Suite  Serv-U FTP Server Golden FTP server War FTP daemon

WEB SERVER

 a program that generates and transmits responses to client requests for Web resources.  can generate the response message in a variety of ways:  retrieves the file associated with the URL and returns the contents to the client.  invoke a script that communicates with other servers or a back-end database to construct the response message.

If you want to get into a bit more detail on the process of getting a onto your computer screen, here are the basic steps that occurred behind the scenes:

The browser broke the URL into three parts:  The protocol ("http")  The server name ("www.howstuffworks.com")  The file name ("web-server.htm")

. Handling a client request consists of several key steps:  Parsing the request message  Checking that the request is authorized  Associating the URL in the request with a file name  Constructing the response message  Transmitting the response message to the requesting client

STEPS IN HANDLING CLIENT REQUEST A Web server proceeds through the following steps in handling an HTTP request:  Read and parse the HTTP request message for example GET the resource /foo.htm  Translate the URL to a file name for example the resource be located in the base directory such as /www, where the URL http://www.bar.com/foo/index.html corresponds to the file of www/foo/index.  Determine whether the request is authorized  Generate and transmit the response that includes header to show the status information

DHCP

. Stands for Dynamic Host Configuration Protocol

. A client/server protocol that automatically provides an IP host with its IP address and other related configuration information such as subnet mask and default gateway. (technet.microsoft.com) DHCP

. A network protocol used on Internet Protocol networks for dynamically distributing network configuration parameters, such as IP addresses for interfaces and services. (wikipedia.org) DHCP

. DHCP determines if your IP is static or dynamic and the length of time an IP address is assigned.

. Your router can be a DHCP server, and if you’re on a home network, it most likely serves this purpose.

. You can’t assign a static IP? No. You still can.

. DHCP enabled, simply means you’re letting a DHCP server assign its IP.

DHCP

. A true DCHP (not your Linksys router) gives LAN administrator a ton of control with IP assigning.

MAIL SERVER

. serves as the entry and exit point of mails to be delivered to and from the network and/or the internet. . It can receive emails from client computers and deliver them to another mail servers.

. It can also deliver emails to client computers.

MAIL SERVER

. Simple Mail Transfer Protocol (SMTP) . A protocol used when emails are delivered from clients to servers and servers to other servers.

. Post Office Protocol (POP) . A protocol used to retrieve e-mails from a server over TCP/IP connection.

MAIL SERVER

PROXY SERVER

31 TOPICS

 Introduction  What is a proxy server?  Purpose of proxy server  Types of proxy server  Mechanism of proxy server  Understanding briefly about http and ftp protocol  Understanding http and ftp proxy servers

32 PROTOCOL

 A protocol is set of rules for data representation, authentication, and error detection.

33 INTRODUCTION TO HTTP

 Hypertext Transfer Protocol (HTTP) is an application-level protocol for distributed, collaborative, hypermedia information systems.

34 PROXY SERVER

• A proxy server is a server that acts as an intermediary for requests from clients seeking resources from other 35 servers. PURPOSE OF PROXY SERVER

 Proxy servers have two main purposes:

 To keep machines behind it anonymous (mainly for security)  To speed up access to a resource (via caching). It is commonly used to cache web pages from a web server.

36 OPERATING PRINCIPLE OF PROXY SERVERS

37 TYPES OF PROXY SERVERS

• Caching proxy server • Web proxy server • Content-filtering web proxy • Anonymizing proxy server

38 MECHANISM OF PROXY SERVER

client ISP

www.abc.com www.xyz.co m Proxy server www.abc.com

www.abc.co m

39 Block www.xyz.com

MECHANISM OF PROXY SERVER

 Proxy server accepts request from client.  It generates response based on two conditions.  If the document exits in the local cache, proxy server itself provides the required retrieval to the client.

40 MECHANISM OF PROXY SERVER

 If there is a cache miss then the request is been forwarded to the original server.  The proxy server transfers the replies to the client and also being caches them.  The proxy server thus acts both as the client and the server.

41 HYPER TEXT TRANSFER PROTOCOL(HTTP)

 Used to access data in WWW.  to transfer data in the of hypertext, plaintext, audio, video.  It functions like a combination of FTP and SMTP.

42 HYPER TEXT TRANSFER PROTOCOL(HTTP)

 It is similar to FTP because it transfers files and uses the services of TCP.

 It is simpler than FTP as it uses only one TCP connection on a well known port 80.

43 HTTP (CONT…)

 It is similar to SMTP since data are transferred from client and the server.  Http differs from SMTP in the way messages are sent.  Http are not destined to be read by humans  They are read and interpreted by the http server and http client.  Client sends a request which look like mail to the server.  The server sends the response which looks like a mail reply to the client.

 Http itself is a stateless protocol. 44 HTTP (CONT..)

 Client sends a request which look like mail to the server.  The server sends the response which looks like a mail reply to the client.  Http itself is a stateless protocol.

45 FILE TRANSFER PROTOCOL (FTP)

 It is a standard mechanism provided by the internet for copying a file from one host to another.  There are many difficulties in file transfer.  It establishes two TCP connections between the client and the server.

46 FILE TRANSFER PROTOCOL (FTP)

 One connection for data transfer other for control information(commands and response).  It is more efficient and the control connection is simpler whereas the data connection is complex.

47 HTTP PROXY SERVERS

 "Middlemen" between clients and servers  Proxies which process http and (not always) ftp requests are known as http proxy servers

Looks like a server sending responses Proxy Looks like a client Server making requests

48 KEY FEATURES OF HTTP PROXY SERVERS

 It may rewrite the client’s requests  It Provides Anonymity and Security  It is a Caching Proxy server  Serves as content filter  Multithreading

49 ANONYMITY OF A HTTP PROXY

 HTTP proxy servers have several anonymity levels  Based on Anonymity degree, they are classified as:  Transparent  Anonymous  Distorting  Highly Anonymous

50 CACHING MECHANISM

51 FUNCTIONS OF HTTP PROXY SERVER

 Caching  Reduces Latency  Reduces Traffic on the web  Bandwidth Conservation  Increases accessibility  firewalling and filtering  connection sharing

52

ADVANTAGES OF HTTP PROXY SERVERS

 Better Performance  Less trafficking  Reduces latency  Conserves bandwidth  Good at logging

53 DISADVANTAGES OF HTTP PROXY SERVERS

 Proxy services lag behind nonproxied services  Proxy services may require different servers for each service  Proxy services usually require modifications to clients, procedures, or both  Proxy services don't protect you from all protocol weaknesses  Proxy services are not workable for some services

54 FTP PROXY SERVERS

 An ftp proxy server support file sharing on networks using the file transfer protocol (ftp)  Concurrency control  Master mechanism  Opens port  Waits for client  Choose port  Starts slave  Continue

55 FTP PROXY SERVER(CONT..)

 Slave Mechanism Keep control processes and the control connection alive as long as the ftp session is alive  We can use ftp proxy server in two modes  Active  Passive

56 Database server is the term used to refer to the back-end system of a database application using client/server architecture.

The back-end, sometimes called a database server, performs tasks such as data analysis, storage, data manipulation, archiving, and other non-user specific tasks. 57 58 A stand-alone computer in a local area network that holds and manages the database.

It implies that database management functions, such as locating the actual record being requested, is performed in the server computer. Contrast with file server, which acts as a remote disk drive and requires that large parts of the database, for example, entire indexes, be transmitted to the user's computer where the real database management tasks are performed.

First-generation personal computer database software was not designed for a network; thus, modified versions of the software released by the vendors employed the file server concept. Second-generation products, designed for local area networks, perform the management tasks in the server where they should be done, and consequently are turning the file server into a database server.

59 REFERENCES:

 http://techterms.com/definition/ftp  http://www.deskshare.com/resources/articles/ftp- how-to.aspx  http://computer.howstuffworks.com/web- server1.htm

IT111 Computing Fundamentals Networks: LAN and WAN

Reference : Presentation by PUPOU Info net Group Reporting 2014, Hands on Networking Fundamentals by Michael Palmer 2nd Edition 2013 TOPICS

 Features and Topology of LAN/WAN  LAN/WAN Components  LAN Access Control Methods  Inter-LAN Connection Equipment  LAN Speed-up Technology  Network Equipment and Cabling

FEATURES AND TOPOLOGY OF LAN/WAN and its Architecture LAN (Local Area Network) LANs are a network infrastructure that spans a small geographical area.  LANs interconnect end devices in a limited area such as a home, school, office building, or campus.  A LAN is usually administered by a single organization or individual. The administrative control that governs the security and access control policies is enforced on the network level.  LANs provide high-speed bandwidth to internal end devices and intermediary devices.

TOPOLOGY OF LAN

 Bus Topology - With the Bus topology, all workstations are connect directly to the main backbone that carries the data. Traffic generated by any computer will travel across the backbone and be received by all workstations.  HUB or STAR Topology - The advantage of the star topology is that if one computer on the star topology fails, then only the failed computer is unable to send or receive data. The remainder of the network functions normally. - The disadvantage of using this topology is that because each computer is connected to a central hub or switch, if this device fails, the entire network fails! TOPOLOGY OF LAN (cont)

 Ring Topology - Computers are connected on a single circle of cable.  Mesh Topology - each computer is connected to every other computer by a separate cable. - This configuration provides redundant paths through the new work, so if one computer blows up, you don't lose the network.  Hybrid Topology (Star-Bus) - In this topology, if a computer fails, it will not affect the rest of the network. However, if the central component, or hub, that attaches all computers in a star, fails, then you have big problems since no computer will be able to communicate. WAN (Wide Area Network) WANs are a network infrastructure that spans a wide geographical area. WANs are typically managed by service providers (SPs) or Internet service providers (ISPs).

 WANs interconnect LANs over wide geographical areas such as between cities, states, provinces, countries, or continents.  WANs are usually administered by multiple service providers.  WANs typically provide slower-speed links between LANs. TOPOLOGY OF WAN

 Peer-to-Peer - The WAN peer-to-peer topology is often the best option for organizations with only a few sites and the capability to use dedicated circuits--that is, continuously available communications channels between two access points that are leased from a telecommunications provider, such as an ISP.  Ring - Ring WAN topology connects locations rather than local nodes. TOPOLOGY OF WAN (cont)

 Star - The star WAN topology mimics the arrangement of a star LAN. A single site acts as the central connection point for several other points.  Mesh - a mesh WAN topology incorporates many directly interconnected nodes--in this case, geographical locations. TOPOLOGY OF WAN (cont)

 Tiered Topology - In a tiered WAN topology, WAN sites connected in a star or ring formations are interconnected at different levels, with the interconnection points being organized into layers. LAN/WAN COMPONENTS LAN Components

 Network Adapter  Network Medium  Cable Connectors  Power Supply  HUB/Switch/Router  Network Software

http://smallbusiness.chron.com WAN Components

 Routers / Modems  Satellites  ISP Mainframes  Transmission Media

LAN ACCESS CONTROL METHODS TOKEN BASED ACCESS

- Used in bus and ring network topologies. - A computer may only transmit information if it is in possession of the token. - This prevents collisions that occur when data is sent at the same time over the network.

By: Shire Sedrick CARRIER SENSE MULTIPLE ACCESS (CSMA)

- Usually used in a bus topology. - Used in Ethernet LAN’s - When two nodes transmit at the same time, a collision occurs. The first station to detect the collision sends a jam signal into the network.  2 Types of CSMS - Multiple Access – Any of the network devices can transmit data onto the network at will; there is no central controller. - Carrier Sense – Before sending data, stations listen to the network to see if it is already in use.

By: Shire Sedrick INTER-LAN CONNECTION EQUIPMENT HUBS

 When a workstation transmits to a hub, the hub immediately resends the data frame out all connecting links.  A hub can be managed or unmanaged. A managed hub possesses enough processing power that it can be managed from a remote location.  A hub is similar to a repeater, except it broadcasts data received by any port to all other ports on the hub. HUBS BRIDGES

 The bridge examines the destination address in a frame and either forwards this frame onto the next LAN or does not.  A bridge is a device that connects two segments of the same network BRIDGES SWITCHES

 A switch is a combination of a hub and a bridge.  When a frame arrives at a switch, the switch examines the destination address and forwards the frame out the one necessary connection.  A switch can allow simultaneous access to multiple servers, or multiple simultaneous connections to a single server.

SWITCHES ROUTERS

 The device that connects a LAN to a WAN or a WAN to a WAN. ROUTERS LAN SPEED-UP TECHNOLOGY LAN High-Speed Transmission

1. What is Ethernet? 2. Fast Ethernet 3. Gigabit Ethernet and 10 Gigabit Ethernet 4. Firewire and USB 5. Fiber Channel 6. Bluetooth 7. 802.11 8. HIPERLAN/1

Note: According to Novell the following apply primarily to LAN ://www.novell.com/info/primer/prim11.html • What is Ethernet? • it refers to the family of LAN products covered by the IEEE 802.3 standard that defines what is commonly known as CSMA(Carrier Sence Multiple Access)/CD Protocol. Currently there are 4 data rates are defined for operation over optical fiber and twisted-pair cables: 1. 10 Mbps 10Base-T Ethernet 2. 100 Mbps – Fast Ethernet 3. 1,000Mbps – Gigabit Ethernet 4. 10,000Mpbs – 10 Gigabit Ethernet • Ethernet is currently used for approximately 85% of the worlds LAN-connected PC and workstation

• Fast Ethernet  according to Wikipedia, fast ethernet is a collective term for a number of Ethernet Standard and currently 100BASE-TX is by far the most common. It is also know as 100BaseT.  It was introduced in 1995 and an extension of the existing Ethernet, similar to 10BASE-T all cables are attached to hub

• 1 Gigabit Ethernet and 10 Gigabit Ethernet  Gigabit Ethernet is term describing various technologies for transmitting Ethernet frames a rate of 1,000,000,000 bits per second. It came to use beginning in 1999 gradually to replace Fast Ethernet wired network  1 Gigabit also know as 1000Base-T or 802.3z in IEEE (1998) . Requires CAT5/CAT5e cable . It was designed to function on the same cabling as 100Base-T so that upgrades would be inexpensive and straightforward . current standard is 1000Base-LX10 or IEEE 802.3ah ratified in 2004 . Current PC and routers nowadays is capable up to 1Gigabit Ethernet LAN  10 Gigabit is 1000Base-T or 802.3ae and it requires CAT6 or CAT7 cable . IEEE approved this standard on Jun 25, 2002 for fiber and around 2006 as a twisted pair standard . Adoption of this standard is gradual than previous Ethernet, this is due to the cost vs 1Gigabit Ethernet

• IEEE 1394 (Firewire) and USB  IEEE 1394 aka Firewire and USB are 2 standards that apply to data transmission between computer and peripheral hardware. These 2 standard is different but their application is fundamentally related and therefore they are covered in the same section  Firewire is a high speed standard developed for processing-intensive peripherals like cameras, scanner, removable storage devices etc. Firewire ports are integrated into higher-end computers  USB is more suitable for peripherals that do not require as much speed such as mice and keyboards

• Fiber Channel  Is a high speed network technology commonly running 2, 4, 8, 16gigabit per second rates  Primarily used in supercomputers in a data center and used to connect computer data storage like SAN (Storage Area network),  It has begun to replace the SCSI (small computer system interface) as the transmission interface between servers and clustered storage

This figure represent Fiber Channel over Ethernet • Bluetooth  Also known as IEEE 802.15.1  Is a wireless technology standard for exchanging data over short distance from fixed and mobile devices and building PAN (personal area network). Initially the purpose is to create a wireless headset initiated by Nils Rydbeck CTO of Ercisson Mobile  Invented by Ericsson in 1994 as wireless alternative to RS-232 data cable which is a serial port was once standard in PC, used to connections to modem, printer, mice, UPS, and other peripheral devices  It uses UHF radio waves in ISM band from 2.4Ghz -2.485Ghz with normally 10 meters distance  Currently majority of mobile devices has Bluetooth features and last Dec 2, 2014 version 4.2 was released.

Sample BlueTooth Profile • Wireless LAN or 802.11 variant  IEEE 802.11 is an extension of Ethernet standard adapted for wireless LAN. It operates at 2.4, 3.6, 5, 60Ghz signal.  2 Basic mode of operation  Adhoc mode – mobile units transmit directly peer-to-peer  Infrastructure mode – communicate via access point that serves as bridge to other network like Internet or LAN  Vic Hayes, who held the chair of IEEE 802.11 for 10 years, and has been called the "father of Wi-Fi", was involved in designing the initial 802.11b and 802.11a standards within the IEEE  802.11a/b/g/n/ac variant is the most common among popular devices like smartphone, tablets, WIFI Access Point etc.

The Linksys WRT54G cont ains a router with an 802.11b/g radio • HIPERLAN/1  High-Performance Radio LAN, Type 1 (HIPERLAN/1) is a standard developed by the European Telecommunications Standards Institute (ETSI) to improve on the data throughput rates of 802.112 Basic mode of operation  HIPERLAN has 4 standard (1-4), and HYPERLAN/1 operates in 5Ghz range and has been approved the rest are still in development  Its transmission scheme is the same as that for GSM and can achieve data transfer rates up to 23.5Mbps

Table of Comparison from Different Type LAN Connection Type of High Speed LAN Pro Con Connection Fast Ethernet • Adapter card and cable are • Compared to 10Base-T, currently available from 100Base-T reduces the various vendors maximum network diameter • Inexpensive to make your from 500 to 205 meters network faster since

1Gb and 10Gb Ethernet • can use existing • 10Gigabit is still expensive infrastructure and cabling hence it hinders the due to compatibility adaptation • easy to upgrade Firewire and USB • Ease of use, both standard • Firewire compatible support ”hot-swapping” and hardware is hard to find, daisy chain connection because it is intellectual • Support data transfer speeds property of Apple Computer higher than conventional • Firewire and USB are also ports not compatible hence it needs individual ports each Table of Comparison from Different Type LAN Connection -- continuation Type of High Speed LAN Pro Con Connection

Fiber Channel • Support data-transmission • It used optical fiber media speed up to 100Mbps, since that cost a lot the data is transmitted as a pulse of light vs electronic signal • Data is immune to electromagnetic interference Bluetooth • A de facto standard, and • With limited range, it should supports data and voice be near another Bluetooth transmissions that does not transmitter require line of sight

Wireless LAN or 802.11 • Can be integrated seamlessly • Several interferences into conventional LAN • Less secure than wired networks Table of Comparison from Different Type LAN Connection -- continuation Type of High Speed LAN Pro Con Connection

HIPERLAN/1 • HIPERLAN/1 is compatible • HIPERLAN is an emerging with wired and wireless technology, so only a few Ethernet. It is very stable and HIPERLAN/1-compatible flexible. devices exist

ORIGINS AND HISTORY OF ETHERNET • 1983 - The IEEE released their version of the • Pre-1976 - Xerox was interested in finding a way to Ethernet standard in in the document IEEE 802.3. share their expensive printers between workstations IEEE 802.3 was based largely on the DIX standard • 1976 - Dr. Robert Metcalf (also David Boggs?) at but with significant changes in frame format. PARC was tasked with creating a shared However it was still backwards compatible with the communications mechanism for this purpose. Dr. DIX standard. Metcalfe wrote a paper circa called "Ethernet • 1985 - IEEE 802.3a "Thinnet" (10 Mbps) - lower Distributed Packet Switching for Local Computer cost than thicknet. Networks" • 1987 - IEEE 802.3d "FOIRL" - Fibe Optic Inter- • 1973 - Dr. Metcalfe aquired patent #4,063,220 for Repeater Link (10Mbps at 1000 meters) his Ethernet. • 1990 - IEEE 802.3i - "10bT" - Category 3 • Ethernet was originally called the Alto Aloha Unshielded Twisted pair compatible cabling. Network protocol or "ALOHAnet" (later Allowed use of existing telephony wiring. renamed Ethernet to indicate multi-platform • 1993 - IEEE 802.3j - 10bF - 2000' range over fiber compatibility) • 1995 - IEEE 802.3u - Defines the modern-day • 1979 - DEC and Intel joined forces with Xerox 100bT standard. write a standard for ethernet. This was referred to as • 1997 - IEEE 802.3x - Full duplex operation the DIX standard, and the publication was called the Ethernet Bluebook. Ethernet is defined as a 10 Mbps protocol running over coaxial cable and using CSMA/CD for transmission (thicknet). - See more at: http://www.inetdaemon.com/tutorials/networking/lan/ethernet/o rigins.shtml#sthash.vW5s78Jd.dpuf NETWORK EQUIPMENT AND CABLING What we need to build a Computer Network? To build a computer network you will need a range of physical equipment including the following pieces of network hardware

Cables and connectors These link together the computers, printers, servers and other equipment on your network. Example below is a CAT5e cable and RJ45 connector A router or switch This manages network traffic, ensuring devices can communicate with each other

Wireless Access Point This allows users to connect to the network wirelessly Internet Connection This could be a simple broadband connection over telephone line or a faster fiber connection. ISP usually supply a modem to its customer to provide internet connection Hardware Firewall This acts as a security gateway and creates a secure barrier between your network and the internet, blocking security threats. A firewall can be software or hardware implementation.

Example of Firewall Appliance