CAPE COMPUTER SCIENCE Lesson 9 Advanced Networking
CAPE COMPUTER SCIENCE Lesson 9 Advanced Networking
Network
Operating Network Apps
System
Physical
Connections
The Network Manager is in charge of the entire network for an organization .
One of a Network manager’s main duties is access control.
Network access control is the act of keeping unauthorized users and devices
out of a private network. Activities include:
➢ Discover all devices on the network.
➢ Profile all devices to identify what access they should have
➢ Provide appropriate network access
to devices.
➢ Create & assign user accounts
A user account is comprised of a username, password and any information
related to the user. Most networks which need to be accessed by multiple
users make use of user accounts. Email accounts are one of the most
common examples of user accounts. A user account allows you to sign in to
your computer.
Computer systems can have 2 modes :
➢ Single User
➢ Multi User
There are two main types of user accounts:
➢Administrator - used for making changes to system settings or
managing other people's accounts. They have full access to every
setting on the computer.
➢ Standard
The users can take turns and thus the Operating System will handle user’s requests among the users who
are connected. This feature is not available in the Single User Operating System, where the user and the
machine come in contact directly.
Multiple processing As described earlier, we can execute multiple programs at the same time.
Sharing of resources Multiple peripherals such as printers, hard drives, etc. can be shared or we can
even share different files or data.
Processing of data at the back end
Invisibility Many functions of the multi-user operating system is invisible to the users.
COMPONENTS OF A MULTI-USER OPERATING SYSTEM
PROCESSOR MEMORY
MULTI-USER
OPERATING
SYSTEM
TERMINAL
ADVANTAGES DISDVANTAGES
Avoids Disruption Virus
Real time Scenario Visibility of data
Stability of servers Multiple Accounts
Most of the companies are marching towards
multi operating system to reduce their
expenditure.
Backing up of Data
Speed efficiency
THINGS TO CONSIDER WHEN BUILDING A NETWORK
➢ COST
➢ SECURITY
➢ MANAGEMENT
➢ EXPANDABILITY
➢ INTERCONNECTIVITY
➢ WIRED VS WIRELESS
➢ CONFIGURATION
➢ FIREWALLS
ACTIVITY BUILDING A NETWORK
USE THE VISUAL PARADIGM ONLINE TOOL TO CREATE A SIMPLE
NETWORK
https://online.visual-
paradigm.com/drive/#diagramlist:proj=0&new
WHAT IS A NETWORK PROTOCOL ?
A network protocol is an established set of rules that determine how data is
transmitted between different devices in the same network. Essentially, it
allows connected devices to communicate with each other, regardless of any
differences in their internal processes, structure or design.
HOW DO PROTOCOLS WORK ?
Network protocols serve these basic functions:
* ATTENUATION
TYPES OF ETHERNET
Name Description
Fast Ethernet Can transmit data at a rate of 100 mbps through a twisted-pair cable or fiber-optic cable.
The data can be transferred from 10 mbps to 100 mbps with no protocol translation or
changes in the application and networking software.
Gigabit Ethernet Transfers data at a rate of 1000 mbps based on a twisted-pair cable or fiber-optic cable.
Switch Ethernet This is a piece of network equipment that is required for multiple network devices in a
LAN. This Ethernet cable forwards the data from one device to another device with the
same network. Normally, this supports different data transfer rates. Ethernet is widely
used as a network technology .
FIBER DISTRIBUTED DATA INTERFACE (FDDI)
Fiber Distributed Data Interface, or FDDI, is a
high-speed network technology which runs at
100 Mbps over fiber-optic cabling, often used for
network backbones in a local area network
(LAN) or metropolitan area network (MAN). Fiber
Distributed Data Interface (FDDI) is usually
implemented as a dual token-passing ring within
a ring topology (for campus networks) or star
topology (within a building).
ADVANTAGES DISADVANTAGES
It offers higher bandwidth (upto 250 Gbps). Hence it can
handle data rates upto 100 Mbps. FDDI is complex. Hence installation and maintenance
It offers high security as it is difficult to eavesdrop on fiber require great deal of expertize.
optic link.
Fiber optic cable does not break as easily as other types of
cables.
FDDI is costly. This is because fiber optic cable, adapters
Fiber optic cables are not susceptible to EMI (Electromagnetic
and concentrators are very expensive.
Interference).
Fiber optic cables transmit signals over greater distances of
about 200 Kms.
TRANSMISSION CONTROL PROTOCOL/INTERNET PROTOCOL
(TCP/IP)
The Transmission Control Protocol (TCP) is a communications standard that enables
application programs and computing devices to exchange messages over a network. It is
designed to send packets across the internet and ensure the successful delivery of data
and messages over networks. TCP organizes data so that it can be transmitted between a
server and a client. It guarantees the integrity of the data being communicated over a
network. It works together with the Internet Protocol (IP) .
The Internet Protocol (IP) is the method for sending data from one device to another
across the internet. Every device has an IP address that uniquely identifies it and enables
it to communicate with and exchange data with other devices connected to the internet.
IP is responsible for defining how applications and devices exchange packets of data
with each other.
ADVANTAGES DISADVANTAGES
Data Re-transmission Slow Start
Congestion Control Image Blockings
Unique Identification Loss Result of Congestion
In Order Delivery TCP connection is optimized only for
Wide Area Networks (WAN)
Error Detection
FILE TRANSFER PROTOCOL (FTP)
What is FTP (File Transfer Protocol)? FTP is a
widely used network protocol for transferring files between computers over a TCP/IP-
based network, such as the Internet. FTP lets people and applications exchange and
share data within their offices and across the Internet. FTP is built on a client-server
model architecture using separate control and data connections between the client and
the server. It may be used by a business to transfer files from one computer system to
another, or websites may use FTP to upload or download files from a website's server.
ADVANTAGES DISADVANTAGES
FTP is Capable of Large File Transfers FTP Lacks Security
Your Workflow is Improved Encryption isn’t a Given
Transfers can be Resumed FTP can be Vulnerable to Attack
Transfers can be Scheduled It’s Difficult to Monitor Activity
Recover Lost Data
HYPERTEXT TRANSFER PROTOCOL (HTTP)
HTTP is the foundation of data communication for the world wide web. It is the Protocol
for all things that move around in the network. It was designed for communication
between web browsers and web servers, but it can also be used for other purposes.
ADVANTAGES DISADVANTAGES
HTTP uses advanced scheme of addressing. It assigns HTTP is considered to be an insecure method prone
IP address with recognizable names so that it can be to data integrity issues
identified easily in the World Wide Web.
Whenever there are additional capabilities needed Privacy is another problem faced in a HTTP
by an application, HTTP has the capability to connection.
download extensions or plugins and display the
relevant data. These can include Flash players and
Acrobat reader.
Security Even if HTTP receives all the data that it needs,
clients does not take measures to close the
connection. Therefore, during this time period,
server will not be present.
When the page is loaded for the first time, all of the HTTP uses more number of system resources which
HTTP pages gets stored inside the internet caches leads to more power consumption
known as the page cache. Therefore, once the page
is visited again, the content is loaded quickly.
HYPERTEXT TRANSFER PROTOCOL
SECURE SOCKET LAYER (HTTPS)
Hyper Text Transfer Protocol Secure (HTTPS) is the secure version of HTTP, the protocol
over which data is sent between your browser and the website that you are connected to.
The 'S' at the end of HTTPS stands for 'Secure'. It means all communications between your
browser and the website are encrypted.
ADVANTAGES DISADVANTAGES
Encryption: the informations are highly secured. When you move onto HTTPS, you need to purchase a SSL
certificate. There are ways to get a free SSL certificate,
but for security reasons its not recommended.
The data is not at the risk of theft at the public space. The response time is delayed decreasing the speed of the
website.
If you are using HTTPS, users can guarantee that their There are some firewalls and proxy systems that deny
data is sent to the right place and not to any invalid sites. access to HTTPS sites.
All of the data transfers that are taking place and If there are problems in the configuration, your site will
components such as sender and receiver are validated. start downloading files from HTTP instead of HTTPS
The green padlock that appears on the webpage URL
always gives a sense of trust to the visitors that the site is
security conscious. When the site is reliable, the
customers will probably will be ready to do transactions.
IEEE802.11a/b & IEEE802.16g
These are standards and rules used to create and implement wireless networks . Networks
using 802.11a operate at radio frequency of 5GHz or 3.7GHz and a bandwidth of 20MHz.
It is especially well suited to use in office settings. Data speeds as high as 54 Mbps are
possible. The indoor/outdoor ranges from 35m to 125m for 5GHz operating frequency.
The outdoor range goes to 5Km for operating frequency of 3.7G. The IEEE802.11a is less
prone to interference compared to with 802.11b due to the high operating frequency of
5GHz.
IEEE 802.11b standard standard provides 11 Mbps transmission (with a fallback to 5.5,
2 and 1 Mbps) in the 2.4 GHz operating frequency and bandwidth of 22MHz . Max range
is 140m .
802.11g is the standard for Wi-Fi wireless networking and it supports maximum
network bandwidth of 54 Mbps compared to 11 Mbps for 802.11b. This standard
operates at 2.4GHz frequency and bandwidth of 20MHz . Max range is 140m .
VOICE OVER INTERNET PROTOCOL
Is an o technology that allows you to make voice calls using a broadband Internet
connection instead of a regular (or analog) phone line. Also called IP telephony,
ADVANTAGES DISADVANTAGES
Cost Reliable Internet Connection Required
Accessibility Power Outages/Emergencies
Flexibility. Latency
Voice Quality
Extra/Less Expensive Features
ADVANCED NETWORKING ARCHITECTURE
OPEN SYSTEM INTERCONNECTION (OSI) MODEL.
Data
Data Packet
42
Software/Data
Software/Data Formatting
Software/Communications
Data Flow/Addressing
Backbone/Infrastructure/Data Flow
Hardware Internal
Hardware /Nodes
44
HYBRID TOPOLOGY
A hybrid topology is a type of network topology that uses two or more differing network
topologies. These topologies can include a mix of bus topology, mesh topology,
ring topology, star topology, and tree topology.
For example, if there is a Mesh topology in one office department while a Ring topology in
another department, connecting these two with bus topology will result in Hybrid topology.
Combination of Star-Ring and Star-Bus networks are the most common examples of the
hybrid network topology.
ADVANTAGES DISADVANTAGES
Hybrid network combines the benefits of different types of It is expensive
topologies
Can be modified as per requirement The design of a hybrid network is complex.
It is extremely flexible.
It is very reliable. Hardware changes are required in order to connect
It is easily scalable topology to another topology
ADVANCED NETWORK DEVICES
MICROWAVE
A microwave link is a communications system that uses a beam of radio
waves in the microwave frequency range to transmit information between
two fixed locations on the earth. They are crucial to many forms of
communication and impact a broad range of industries. Microwave radio
frequencies can range about 500 MHz to 300 GHz. Most systems depend
on microwaves when it comes to transmitting data.
ADVANTAGES DISADVANTAGES
Every station of the microwave radio system only requires a small
It is limited to line of sight mode only
piece of land, hence, it does not require huge towers .
They are capable of storing large amounts of data. The more bandwidth you want, the higher the
transmitted radio frequency (RF) you’re going to
need.
It is the most cost-effective option for businesses
It can transmit data more rapidly. High attenuation rate .
It requires little maintenance
ADVANCED NETWORK DEVICES
SATELLITE
Satellite communication is an electronic communication package placed in an
orbit. These satellites act as relay stations. From the earth station, the satellite
accepts data/signals, amplifies them, and re-transmit them to another earth
station. Data can be transmitted to the other side of the earth using such a
setup in only one step.
ADVANTAGES DISADVANTAGES
Coverage over geographical area is quite large mainly for sparsely Design, development, investment and insurance of
populated areas. satellite requires higher cost.
High bandwidth. To reach the satellite from Earth, time can vary
between 270 milliseconds and return again to 320
milliseconds. This propagation delay can cause an
echo over telephone connections
It is used in wide variety of applications Satellites are not easy to repair and maintain.
Security in satellite transmission is usually provided by the coding Some circumstances like weather or sunspots affect
and decoding equipment. the satellite’s signal and can cause interference and
make proper operation of the satellite very difficult.
Service from one single provider is easy to obtain and uniform
service is available.
Over long distances, it can be cheaper.
It requires to be monitored and controlled on regular
Maintenance is easy and cheap in satellite communication
periods so that it remains in the orbit, once it has
therefore it is best alterative.
been launched.
During critical condition, each Earth Station may be removed
relatively quickly from a location and reinstalled somewhere else.
Ground station sites are easy to install and maintain.
ADVANCED NETWORK DEVICES
FIREWIRE
FireWire (IEEE 1394) is a method to transfer information between digital
devices like audio and video components. It is a popular connector for adding
peripherals to computer. Firewire was originally developed by Apple and
comes standard on Macintosh computers, it is also available on computers
made by Sony (as i.Link) and other PC manufacturers.
ADVANTAGES DISADVANTAGES
It can connect many devices It is slower in speed
It is co-operatively managed by connected devices where as USB
requires master controller.
Firewire is limited to use with copper cables
It allows devices with moderate power requirements to operate
without separate power supply.
FireWire supports full duplex communication i.e. simultaneous
communication in both the directions unlike previous versions to
USB3.0. It is more expensive.
Firewire host supports DMA and memory mapped devices which
allows data transfer without waiting for host CPU with interrupts
and buffer copy operations.
MOBILE NETWORKS
Mobile networks are also known as cellular networks. They're made up of
"cells," which are areas of land that are typically hexagonal, have at least one
transceiver cell tower within their area, and use various radio frequencies.
These cells connect to one another and to telephone switches or exchanges.
Cell towers connect to each other to hand off packets of signals—data, voice,
and text messaging—ultimately bringing these signals to mobile devices such
as phones and tablets that act as receivers.
MOBILE NETWORK ACCESS METHODS
In any cellular system or cellular technology, it is necessary to have a scheme that enables
several multiple users to gain access to it and use it simultaneously. As cellular technology
has progressed different multiple access schemes have been used. They form the very core
of the way in which the radio technology of the cellular system works.