Module 2: Networking Fundamentals

2.1.1 the evolution of data networks.

Sneakernet created multiple copies of the data.

LANs are usually located in single buildings or campuses, and handle interoffice communications.

WANs cover a large geographical area, and connect cities and countries.

¡@

2.1.3 Networking devices

End-user devices that provide users with a connection to the network are also referred to as hosts.

NICs are sometimes called network adapters. Laptop or notebook computer NICs are usually the size of a PCMCIA card.

A repeater is a network device used to regenerate a signal.

Hubs concentrate connections. Active hubs concentrate hosts and also regenerate signals.

Bridges convert network data formats and perform basic data transmission management. Bridges provide connections between LANs.

Workgroup switches add more intelligence to data transfer management. Another difference between a bridge and switch is that a switch does not convert data transmission formats.

Routers have all the capabilities listed above. Routers can regenerate signals, concentrate multiple connections, convert data transmission formats, and manage data transfers. They can also connect to a WAN, which allows them to connect LANs that are separated by great distances.

¡@

2.1.4 Network topology

One part of the topology definition is the physical topology, which is the actual layout of the wire or media.

The logical topology of a network determines how the hosts communicate across the medium. The two most common types of logical topologies are broadcast and token passing.

     1. The use of a broadcast topology indicates that each host sends its data to all other hosts on the network medium. There is no order that the stations must follow to use the network. It is first come, first serve. Ethernet works this way.

     2. The second logical topology is token passing. In this type of topology, an electronic token is passed sequentially to each host. When a host receives the token, that host can send data on the network. If the host has no data to send, it passes the token to the next host and the process repeats itself. Two examples of networks that use token passing are Token Ring and Fiber Distributed Data Interface (FDDI). A variation of Token Ring and FDDI is Arcnet. Arcnet is token passing on a bus topology.

¡@

2.1.5 Network protocols

Protocol suites are collections of protocols that enable network communication between hosts.

A protocol is a formal description of a set of rules and conventions that govern a particular aspect of how devices on a network communicate. Protocols determine the format, timing, sequencing, and error control in data communication.

¡@

2.1.6 Local-area networks (LANs)

LANs allow businesses to locally share computer files and printers efficiently and make internal communications possible.

Some common LAN technologies include the following:

¡@

2.1.7 Wide-area networks (WANs)

WANs are designed to do the following:

Some common WAN technologies include the following:

¡@

2.1.8 Metropolitan-area networks (MANs)

Wireless bridge technologies that send signals across public areas can also be used to create a MAN.

A MAN usually consists of two or more LANs in a common geographic area.

¡@

2.1.9 Storage-area networks (SANs)

A storage-area network (SAN) is a dedicated, high-performance network used to move data between servers and storage resources. Because it is a separate, dedicated network, it avoids any traffic conflict between clients and servers.

SAN technology allows high-speed server-to-storage, storage-to-storage, or server-to-server connectivity.

SANs offer the following features:

¡@

2.1.10 Virtual private network (VPN)

A vitual private network (VPN) is a private network that is constructed within a public network infrastructure such as the global Internet.

Using VPN, a telecommuter can remotely access the network of the company headquarters. Through the Internet, a secure tunnel can be built between the PC of the telecommuter and a VPN router at the company headquarters.

¡@

2.1.11 Benefits of VPNs

A VPN is a service that offers secure, reliable connectivity over a shared public network infrastructure such as the Internet. 

VPNs maintain the same security and management policies as a private network.

The following are the three main types of VPNs:

¡@

2.1.12 Intranets and extranets

Intranet:

One common configuration of a LAN is an intranet.

Intranet Web servers differ from public Web servers in that the public must have the proper permissions and passwords to access the intranet of an organization.

Intranets are designed to permit users who have access privileges to the internal LAN of the organization.

Extranet:

Extranets refer to applications and services that are Intranet based, and use extended, secure access to external users. This access is usually accomplished through passwords, user IDs, and other application-level security.

An extranet is the extension of two or more intranet strategies with a secure interaction between participant enterprises and their respective intranets.

¡@

2.3.4 OSI layers

The OSI reference model is a framework that is used to understand how information travels throughout a network.

Dividing the network into seven layers provides the following advantages:

¡@

2.3.5 Peer-to-peer communications

Each layer of the OSI model at the source must communicate with its peer layer at the destination. This form of communication is referred to as peer-to-peer.

During this process, the protocols of each layer exchange information, called protocol data units (PDUs).

¡@

2.3.6 TCP/IP model

The TCP/IP model has the following four layers:

Some of the most commonly used application layer protocols include the following:

The common transport layer protocols include:

The primary protocol of the Internet layer is:

The network access layer refers to any particular technology used on a specific network.

¡@

2.3.7 Detailed encapsulation process

If one computer (host A) wants to send data to another computer (host B), the data must first be packaged through a process called encapsulation.

Encapsulation wraps data with the necessary protocol information before network transit. Therefore, as the data packet moves down through the layers of the OSI model, it receives headers, trailers, and other information.

¡@

¡@

¡@

¡@