0% found this document useful (0 votes)
13 views97 pages

Lecture 2 Final

The document provides an overview of Internet infrastructure installation and configuration, focusing on key components such as Network Interface Cards (NICs), various types of network cables (fiber optic, coaxial, twisted pair), and networking devices like switches, hubs, bridges, and routers. It details the characteristics, applications, and installation guidelines for these components, emphasizing their roles in facilitating communication within networks. Additionally, it discusses the importance of media interference resistance and the functionality of devices in managing network traffic and security.

Uploaded by

cherkos welday
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views97 pages

Lecture 2 Final

The document provides an overview of Internet infrastructure installation and configuration, focusing on key components such as Network Interface Cards (NICs), various types of network cables (fiber optic, coaxial, twisted pair), and networking devices like switches, hubs, bridges, and routers. It details the characteristics, applications, and installation guidelines for these components, emphasizing their roles in facilitating communication within networks. Additionally, it discusses the importance of media interference resistance and the functionality of devices in managing network traffic and security.

Uploaded by

cherkos welday
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 97

LO2.

Install and configure Internet Infrastructure

1
Network Interface Card (NIC)
◼ The Network Interface Card (NIC), also
known as a network adaptor card,
Ethernet Card and LAN card.
◼ In the list of networking devices, NIC
stands on first place.
◼ Without this device, networking cannot
be done.

2
◼ NIC allows our PC to communicate with
other PCs.
◼ acts as the interface between the
computer and the physical network
connection.
◼ The NIC has RJ-45 socket where
network cable is physically plugged in.

3
◼ Basically it converts data transmission
technology.
◼ A PC uses parallel data transmission
technology to transmit data between its
internal parts while the
◼ media that connects this PC with other
PCs uses serial data transmission
technology.
4
Transmission medias
◼ Guided :UTP/STP, coaxial,
fiber-optic
◼ Unguided :Wireless

networking

5
Network Medias
What Network Medias?
 Carry signals between computers
 cables are Devices which are used in
communication systems
 Cable-based media and wireless
networking.

6
Cont..
◼ The type of cable chosen for a network
is related to the network's
▪topology
▪ protocol

▪ size

7
Media interference
 Electromagnetic interference (EMI) and
cross talk
 Network media vary in their resistance to
the effect of EMC.
 UTP is susceptible and fiber is resistant
 Resistance: Coaxial cable > UTP, STP >
UTP, Fiber > all

8
Network Cable Types
 Fiber optic cable, twisted pair cable and
coaxial cable are three major types of network
cables used in communication systems.
 Each of them is different and suitable for
different applications.
 Since each of them can be equally applied
into network communication
 how they distinct from each other in terms of
features and specifications?

9
Fiber Optic Cable
 Use light transmissions
 EMI, crosstalk and attenuation become no issue.
 Well suited for data, video and voice
transmissions
 Most secure of all cable media
 Installation and maintenance procedures require
skills

10
Cont..
 Cost of cable
 Each optical fiber is individually coated with
plastic layers and contained in a protective
tube, making it extremely resistant to external
interference.
 The result is a very reliable and super-fast
connection that has 26,000X more
transmission capacity than twisted-pair cables,
but that also comes with a much higher cost

11
Types of Fiber optic cable
1) Single mode
 Has a small core and only allows one mode of
light to propagate at a time
 Because of this, the number of light reflections
decrease as they pass through the core
 The result is low attenuation and data that is
able to travel further and faster
 Commonly used in telecom, CATV networks, and
Universities

12
2) Multimode
 Has a larger core diameter that lets
multiple modes of light broadcast
 The amount of light reflections increases
as they travel through the core, which
allows more data to pass through

13
Cont..
 Because of its high dispersion, multimode cables
have lower bandwidth, higher attenuation and
reduced signal quality further it travels
 Most commonly used for communication over
short distances such as LAN, security systems,
and general fiber networks.

14
Summery for fiber optic Cable
◼ Speed and Throughput : 100+ Mbps
◼ Average $ per node: Most Expensive
◼ Media and Connector size: Small
◼ Single mode Max cable length: up to 3000m
◼ Multi mode max cable length: up to 2000m
◼ Single mode : one stream of leaser generated light
◼ Multi mode: Multiple stream of LED generated
stream Light

15
Coaxial Cable
 Coaxial cable, or coax cable, is designed to
transmit high-frequency signals.
 It’s comprised of a round copper conductor and
three layers of insulation and shielding which
prevents crosstalk from motors, lighting and other
sources of EMI.
 With the shield construction, the coaxial cable
can support longer cable lengths between two
devices.

16
Cont..
 Success in both TV transmission and
network implementations
• Insulation, ground, insulation, main wire

17
Cont..
 This type of cable is commonly used to
deliver TV signals (its higher bandwidth
makes it more suitable for video
applications) and to connect computers in
a network.
 Along with stable transmission of data,
coaxial cables also have anti-jamming
capabilities and can effectively protect
signals from being interfered

18
Types of Coaxial Cable
1)10 BASE2 50 Ohm
 Primarily utilized to transmit a data signal in
a 2-way communication system
 Most commonly used for computer ethernet
backbones, AM/FM radio receivers, GPS
antenna, police scanners, and cell phone
systems

19
2) 10 BASE5 75 Ohm
 Most commonly used to transmit video

signals
 Often connects video signals between
different components like DVDs, VCRs, or
receivers commonly known as A/V cables

20
Summery for Coaxial Cable
 Connector: NC
 Speed and throughtput:10 -100 Mbps

 Average & per node: inexpensive

 Media and connector size: Medium

 Max cable length: 500m[medium]

21
Twisted pair cable
o Twisted pair cable is often used for telephone
communications and most modern Ethernet networks.
o It is a kind of wiring in which two conductors of a single
circuit are twisted together.
o A pair of wires forms a circuit that can transmit data.
And the pairs are twisted together to provide
protection against crosstalk, the noise generated by
adjacent pairs

22
Types of Twisted cable
1) Unshielded twisted pair (UTP)
 ‘Unshielded’ meaning it does not rely
on physical shielding to block interference
 Most commonly used cable of the two, often
utilized for both residential and business use
 There are several UTP categories, which
increase in bandwidth as you move up the
scale, for example:
CAT1 = up to 1Mbps | CAT2 = up to 4 Mbps | CAT5e = up to 1Gbps

23
Summery for UTP
 Connector : RJ-45
 Average $ per node : Least Expensive

 Speed and throughput :10 -100 Mbps

 Media and Connector: small

 Max cable length :100m[short]

24
2) Shielded twisted pair (STP)

 ‘Shielded’ with a foil jacket to cancel any


external interference
 Commonly used for large-scale enterprises for
high-end applications
 provides the extra shielding by using an
insulating material wrapped around the wire
 Greater resistance to EMI and attenuation
 More cost
25
Summery for STP
 Connector : RJ-45
 Average $ per node : Moderately Expensive
 Speed and throughput : 10 -100 Mbps
 Media and Connector size :Medium to large
 Max cable length : 100m[short]

26
Installing Cable - Some
Guidelines
◼ When running cable, it is best to follow a
few simple rules:
◼ Always use more cable than you need. Leave
plenty of slack.
◼ Test every part of a network as you install it.
Even if it is brand new, it may have problems
that will be difficult to isolate later.

27
Cont..
◼ Stay at least 3 feet away from fluorescent
light boxes and other sources of electrical
interference.
◼ If it is necessary to run cable across the
floor, cover the cable with cable protectors.
◼ Label both ends of each cable.
◼ Use cable ties (not tape) to keep cables in
the same location together
28
Switch
◼ Switch is a multiple LAN connecting device, which
takes incoming data packet from any multiple
input ports and passes the data packet to specific
output port.

29
Description
◼ It works same as hub but does its work very
efficiently.
◼ It uses MAC address information to switch
forward the data packets to a particular
destination device.

30
Cont…
◼ By monitoring the network traffic, it can
learn where the particular addresses is
located.
◼ Operates at one or more OSI model layers
mainly the data link layer.
◼ Minimizes the collision of data packets.
◼ Provides better security and better
utilization of limited bandwidth
31
Repeater
◼ A repeater operates at the physical layer.
Its job is to regenerate the signal over the
same network before the signal becomes
too weak or corrupted so as to extend the
length to which the signal can be
transmitted over the same network..

32
◼ An important point to be noted about
repeaters is that they do not amplify the
signal. When the signal becomes weak,
they copy the signal bit by bit and
regenerate it at the original strength.
◼ It is a 2 port device

33
Hub
◼ A hub is basically a multiport
repeater. A hub connects multiple
wires coming from different branches,
for example, the connector in star
topology which connects different
stations. Hubs cannot filter data, so
data packets are sent to all connected
devices.

34
◼ In other words, collision domain of all
hosts connected through Hub remains
one. Also, they do not have intelligence
to find out best path for data packets
which leads to inefficiencies and wastage

35
Types of Hub
◼ Active Hub :- These are the hubs which
have their own power supply and can clean
, boost and relay the signal along the
network. It serves both as a repeater as
well as wiring center.
◼ These are used to extend maximum
distance between nodes.

36
◼ Passive Hub :- These are the hubs which
collect wiring from nodes and power supply
from active hub. These hubs relay signals
onto the network without cleaning and
boosting them and can’t be used to extend
distance between nodes

37
Bridge
◼ A bridge operates at data link layer. A
bridge is a repeater, with add on
functionality of filtering content by reading
the MAC addresses of source and
destination.

38
◼ Bridge is used to divide a large network
in smaller segments.
◼ A bridge is used to join two network
segments together; it allows computers
on either segment to access resources
on the other

39
Basic function of Bridge are following

◼ Break a large network in smaller


segments.
◼ Join different media types such as UTP
with fiber optic.
◼ Join different network architectures
such as Ethernet with Token Ring.

40
◼ A bridge can connect two different types of
media or network architecture but it cannot
connect two different types of network layer
protocol such as TCP/IP or IPX.
◼ Bridge requires same network layer protocol
in all segments.
◼ Connects two or more LANs and forwards or
filters data packets between them.
41
◼ It is also used for interconnecting two
LANs working on the same protocol. It
has a single input and single output
port, thus making it a 2 port device.

42
Types of Bridges
◼ Transparent Bridges :- These are the bridge
in which the stations are completely
unaware of the bridge’s existence i.e.
whether or not a bridge is added or deleted
from the network , reconfiguration of the
stations is unnecessary. These bridges
makes use of two processes i.e. bridge
forwarding and bridge learning.

43
◼ Source Routing Bridges :- In these bridges,
routing operation is performed by source
station and the frame specifies which route
to follow. The hot can discover frame by
sending a specical frame called discovery
frame, which spreads through the entire
network using all possible paths to
destination.

44
Transceiver(Media Converter)
◼ is a networking device that converts
from one cabling technology to another.
For example, a transceiver may act as
an interface between a network based
on coaxial cable and one using fibre-
optic cable.

45
◼ Transceiver short for transmitter-
receiver, a device that both transmits
and receives, analog or digital signals.
Transceiver is a small device that has
capability of receiving and sending both
analog and digital signals. coax, within
an existing network. PREPAR
46
◼ For many LANs, the transceiver is built
into the NIC. Some types of networks,
however, require an external
transceiver.
◼ A transceiver is also called a Medium
Access Unit (MAU). Media converters
interconnect different cable type’s
Twisted Pair, Fiber, and Thin or thick
47
Firewall
◼ A firewall functions like a router except that it
blocks traffic from the external network
according to user configured rules.
◼ It effectively acts like a one way digital gate
blocking access to your network from devices
on the Internet, but at the same time
allowing devices on your network to connect
to devices on the Internet.
48
◼ A firewall is a protective barrier between your
PC and cyber world. When you are
connected to the Internet, you are a
potential target to an array of cyber threats,
such as intruders , hackers, Trojans, and key
loggers that attack through security holes.

49
Router
◼ Definition →Router is internetwork
connecting device that determines most
efficient path for sending a data packet to
any given network.

50
Description
◼ Used to connect two or more similar or
dissimilar topological LANs or WLANs
◼ Shares available bandwidth with
multiple computers in a network.
◼ Provides a better protection as a
hardware firewall against hacking.

51
Cont…
◼ Routers are intelligent enough to determine
shortest and fastest path from source to
destination in a network using algorithms.
◼ Operates at network layer of OSI model.
◼ Wireless routers are now widely used in
home and offices as they allow a user to
connect easily without installing any cables.

52
Cont…
◼ Types based on defining paths
◼ Static router
◼ System administrator defines the
shortest path in the network by
executing commands.
◼ Have some limitations and not that
much effective than dynamic router.
◼ Dynamic router
53
Cont…
◼ Router itself determines the shortest
path between the computers in the
network.
◼ System administrator doesn't need to
interact with router that saves time and
cost.
◼ This types of routers are used in
greater extend compare to static router.
54
Cont…
◼ Basic types
• Wired routers
• Wireless routers

55
Gateway
◼ Gateway is a network point that act as entry
point to other network and translates one
data format to another.
◼ Following are some common functions of the
gateway :
o Protocol translation : translates protocol
format into required protocol format of the
network, such as X.25 to TCP/IP.
56
Cont…
◼ Network address translation : translates your public
IP address to the private IP addresses on your
network.
◼ DHCP service : automatically assigns IP address to a
computer from a defined range of addresses for a
given network.
◼ Monitoring and regulating each packet entering and
leaving the network

57
Network Operating Systems
◼ A network operating system provides
services for computers connected to
a network.
◼ NOS is a computer operating system that is
designed primarily to support workstation,
personal computer that are Connected for
the LAN .

58
Cont…
◼ A network administrator can use
the NOS to:
◼ Create user privileges, tracked by
the network operating system,
that indicate who gets to use the
network.

59
Cont…
◼ Grant or deny user privileges on the
network
◼ Remove users from the list of users that
the network operating system tracks

60
Cont…
◼ To simplify the task of managing
users in a large
network, NOSs allow for the creation
of user groups
◼ By classifying individuals into groups,
the administrator can assign
privileges to the group

61
Cont…
◼ All group members have the same
privileges, which
have been assigned to the group as a
whole.
◼ When a new user joins the network, the
administrator can assign the new user to
the appropriate group, with
its accompanying rights and privileges.
62
Cont…
◼ Examples include
 User administration
 Sharing file ,Applications and Hardware Resource
 System maintenance activities like backup
 Tasks associated with file management
 Security monitoring on all resources in the
network
 Setting priority to print jobs in the network

63
Features of NOS
◼ Provide basic OS features
o Support for processors
o Protocols
o Automatic hardware detection
o Multi processing of Applications

64
Cont…
◼ Security Features
• Authentication
• Authorization
• Access control

65
Cont…
◼ User management and support for log
in and logoff
◼ Remote access
◼ System management

66
Categories of NOS
◼ Two categories of Network Operating
Systems:
1. Peer-to-Peer
2. Client/Server

67
Peer-to-Peer NOS
◼ No specialized server operating system
◼ Individual workstations can be configured as a service
requester (redirector/client), a service provider
(server), or both.
◼ Designed as a low cost, workgroup solution

68
Cont…
◼ Offer only file and print services
◼ Lacked the ability to offer centralized
authentication and authorization.
◼ Peer-to-peer network operating systems
were often characterized as lacking
scalability. Meaning that they suffered
from exponential performance decreases as
the number of users increased.

69
Client-server network
◼ Client-server network : Is designed for
end-users , called clients to access
resources such as files , songs
, video collections , or some other
services from a central computer called a
server .
◼ A server serve its clients.

70
Cont…
◼ A client is a computer running a
program that request
the services from server.
◼ A client -server network is where
all resources are
stored centrally on the server and
are accessed by the
client stations.
71
Advantages
1) All files are stored in a central
location/main server
2) Network peripherals are controlled
centrally.
3) Backups and security are controlled
centrally.

72
4)User can access shared data which
is centrally
controlled.
5) Multiple connection to server are
allowed
6) High reliability, very secure OS,
better performance.

73
Disadvantages
1) A specialist NOS is needed
2) The server is expensive to purchase.
3) Expensive administration
4) High cost to setup.
5) Failure of network in any part may cause
disruption.
6) Simultaneous request cause the server to
be overloading

74
Active Directory
◼ has information about all the objects-users
,computers, resources like
shared files/folders , printers in an
organization network.
◼ Arrange all the network’s users, computers
and other objects into
logical, hierarchical groupings.

75
Cont..
◼ Active directory information is used to
authenticate/authorize the
users, computers , resources which are
parts of a network.

76
Active directory objects
a) Domain: logical grouping of objects, is a
hierarchical structure of containers/objects/.
b) Organizational unit: used to denote a
specific department, team functions
etc.
c) User: access the domains resources

77
Cont…
d)Group: contains users and computers who
are called members of the group.
e) Contact: an individual who is not part of the
organization but related to
the organization.

78
Cont…
f)Computer :computers join with the domain
g) Forest :a complete active directory instance
.Objects are explained by their attributes like
name, location, etc.

79
DYNAMIC HOST CONFIGURATION PROTOCOL

◼ Every computer on a network must have a


unique address.
This address is attached to any packets of data
that are
intended for transmission to the computer.
◼ If the network is using the TCP/IP protocol,
these addresses will be IP addresses (i.e. they
will consist of 4 numbers between 0 and 255
separated by dots).

80
Cont…
◼ There are two ways of assigning IP addresses to
computers.
◼ The first is static addressing. In static addressing the
network administrator manually assigns a different IP
address to each computer.
◼ The computer will keep this IP
address until the network administrator changes the
software settings

81
Cont…
◼ If two computers have the same IP
address a conflict will occur. If the
conflict goes undetected
then both computers will compete to
receive packets of data
sent to their IP address.

82
Cont..
◼ However, normally the NOS will detect when
an IP conflict has occurred and warn the
administrator.
◼ Static addressing is a simple and easy solution
and is commonly used in small networks where
significant expansion is not envisaged.

83
Cont..
◼ The second way of assigning IP
addresses is called dynamic
addressing.
◼ In dynamic addressing a program run
on the server is responsible for
assigning IP addresses to each
computer

84
Cont…
◼ When a computer is first joined to
the server’s domain, it requests an IP
address from this program, which
then assigns an address chosen from
a pool of free addresses that it
maintains.

85
Cont…
◼ The address is typically leased to the
computer, i.e. it is not
permanently assigned.
◼ Eventually the computer’s IP address
lease will expire, and it will need to
request a new one.

86
Cont…
◼ This is why the scheme is called
dynamic addressing: the IP
address of a given computer can
change over time, whereas
in the static addressing scheme it is
fixed, or static.

87
Cont…
◼ In Windows Server the program that is
responsible for
leasing IP addresses is called the Dynamic Host
Configuration Protocol (DHCP).
◼ DHCP maintains an address
pool (a list of free IP addresses) and a list of
address leases(the addresses that have already
been leased).

88
DOMAIN NAME SERVICE
◼ Translate domain names to IP
addresses.
◼ As well as having a unique IP address,
each computer on a network has a
unique computer name.

89
Cont…
◼ On the Internet the name will consist
of a sequence of words separated by
dots.
◼ for example www.yahoo.com
or www.bbc.co.uk.
◼ There is a one-to-one mapping
between these computer names and
IP addresses
90
Cont…
◼ every IP address corresponds to a
single computer name and vice versa
◼ The reason for using computer names
instead of just IP addresses to identify
computers is that they are
easier for people to understand and
remember.

91
Cont…
◼ The process of translating a
computer name into an IP
address is known as name
resolution.

92
NETWORK COMPUTER
GROUPS
◼ Workgroups →Used in Peer-to-peer
network Decentralized management
◼ Each computer has own database,
User accounts and security privileges

93
◼ Significantly more administration
effort
◼ Practical for small networks
◼ Mostly used for few users
◼ Simple to design, implement

94
Domains
◼ A domain is just a group of servers and
workstations that agree to centralize
user and machine accounts and
passwords in a Shared database.

95
◼ Domains do several things for us.
◼ Keep a central list of users and
passwords.
◼ Provide a set of servers to act as
“authentication servers” or “logon
servers” known as domain controllers.

96
◼ Maintain a searchable index of the
things in the domain, making it easier
for people to find resources
◼ Let you create users with different
levels of powers
◼ Allow you to subdivide your domains
into subdomains called organization
units or OUs.
97

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy