Isc 208 - Fundamentals of Networking Module
Isc 208 - Fundamentals of Networking Module
UNIVERSITY
INSTITUTE OF OPEN LEARNING
Written by:
Rose W. Njoroge
Lecturer
1
DATA COMMUNICATION AND COMPUTER NETWORKS
LECTURE ONE
1.1 INTRODUCTION
Computer data transmitted over networks normally includes text, graphics, sound, videos
etc. Data communication over networks has proved to be very effective and cheap.
Moreover computer networks also allow sharing of data and data maintenance to be
carried out remotely.
COMMUNICATION HARDWARE
e.g. computers, NetWare cables, RJ45s etc.
These involves the hardware computers and the circuits in form of routers, bridges,
etc. that provide for physical connectivity on the networks.
2
Communication hardware can be divided into three classes.
2. COMMUNICATION SOFTWARE
This software act as the manager of the network and often include network
operating system (O/S) that have control of sending and receiving data.
Communication software identifies resources in the network and establishes links
between network resources.
3. PROTOCOLS
These are rules and standards that allow the entities to communicate between each
other. Protocols are a set of rules precisely defining the methods used to
communicate. The internet for example, widely uses the http (hypertext transfer
protocol) in its communication
4. COMMUNICATION MEDIA
5. DATA/ INFORMATION
3
Networks are developed to facilitate transfer of data and information into different
clients sparsely located. Data and information therefore are the main ingredients
for which communication networks are developed.
4
1.4 DATA TRANSMISSION METHOD
There are mainly two types or methods of sending data over some media.
(i) Parallel transmission: blocks of data
(ii) Serial transmission: bit by bit
PARALLEL TRANSMISSION
This involves sending of data in blocks over communication channel. A perfect example
where it occurs is within the computer components such as the memory and central
processing unit (CPU) or between CPU and the printer. Data buses on the motherboard
are used for parallel transmission.
PARALLEL
1 1 1
0 1 0
S 0
1
1
0
0
1 R
0 1 0
1 0 1
1 1 1
A T A
1 1 1
ADVANTAGES
1. This method transmits data at a very high speed.
DISADVANTAGES
1. It is limited only to short distances.
2. It is expensive since it requires more hardware resources.
3. Te computer which is electronic device is much faster than the printer which is
mechanical slows down the processing time
NOTE
To counter for different speed between devices, a centronic interface is required (parallel
interface). Centronic interface is a means of handling different speed due to different
5
devices in use. A centronic interface is a parallel interface standard needed to prevent
data loss during transmission as a result of speed differences.
This is achieved through a process called handshake.
REVISION QUESTION
Explain the activities involved during the process of “handshake” in data transmission.
SERIAL TRANSMISSION
This method is used for long distances since it is much cheaper and easy to implement. It
involves sending of data bit by bit along a single communication media is sequence. If
data is coming from a parallel source. It means it has to be converted so that it transmits
in a serial form. This is normally done by a shift register. Another shift register converts
serial data back to parallel form.
R
s 11000101 11101011 11000101
A T A
ADVANTAGES
1. it is simple and easy to implement.
2. It is very cheap and supports long distance communication.
DISADVANTAGES
1. It is slower due to the conversion especially from parallel to serial and serial to
parallel.
REVISION QUESTION
Explain how the shift register works in data transmission.
6
DATA TRANSMISSION MEDIA
LECTURE TWO
1.1 INTRODUCTION
Data transmission is the process of conveying data through communication system
normally over distant location. Data communication takes place through some media and
this media can be grouped into two:-
Bounded media confine the data to specific physical pathway e.g. coaxial cables, fibre
optics.
Unbounded media transmit the data carrying signals through space. It is independent of
cables and these forms of transmission transmit radio signals, T.V, Waves, mobile phone
signals etc.
Unbounded media is normally used incases where it is impossible to use bounded media.
There are some various factors which need to be considered in selection and choice of a
cable. These include:-
(2) Bandwidth – this is the range of frequency that a cable can accommodate.
(3) Attenuation – This is the degree in which signals are lost over some distance.
7
Silver cables are good conductors but because of cost copper cables are mainly preferred.
Twisted wire consists of strands of copper wire twisted in pairs and is the oldest
transmission media. Most of the telephone systems especially buildings relying on
twisted wires installed for analog communication.
Twisted wires although designed for analog transmission may also be used to transmit
data.
Twisted wires are relatively low in costs and slow in transmitting data and when high
speed transmission is done over them, they are often faced with problem of transmission
interference often referred to as NOISE.
On the other hand new developments in the telecommunication industry have raised the
capacity of existing twisted wire cables up to 10 megabytes per second which is adequate
for connecting microcomputer and other office devices.
8
Twisted pair cables are designed for short distances and do not work well in long
distances.
ADVANTAGES
DISADVANTAGES
1. It does not support transmission in very long distances due to its limited capacity in
transmission.
2. They may be difficult to work with since when connected to many people there is a
problem of cross-talking.
These types of cables are used for television cable and consist of thickly insulated copper
wire which can transmit a larger volume of data than twisted pair cables. It is often used
in place of twisted wire for important links in telecommunication networks since it is
faster, no interference, free transmission and has speeds of up to 200 mega bytes per
second. However, coaxial cables are thick and hard to wire in many buildings and cannot
support analog telephone conversation.
Coaxial cables are referred as to such because they have two conductors that share a
common access. A typical coaxial cable has the following components:-
(d) A jacket.
9
ADVANTAGES OF COAXIAL CABLES
1) They are insensitive to electro-magnetic interference.
2) Due to their thickness they can withstand high environments (e.g.) radiation etc.
DISADVANTAGES
1. They are very bulky and heavy.
2. They are very expensive.
3. They can only withstand electromagnetic interference up to some certain levels
beyond which they get affected by the electron magnetic waves.
NB
Coaxial cables are desirable when you need to transmit sound video and data.
They are also useful when transmission is over long distances and they are less expensive
especially when we consider the distances involved.
They are well known for issues pertaining to security and they greatly support satellite
transmission and therefore heavily used in satellite dishes, T.V transmission.
Fibre optic cables consist of thousands of strands of clear glass fibre with the thickness of
human hair which is bound into cables. Fibre optics utilizes light to transmit data over
distances implying that fibre optics transmission is almost the fastest method of bound
transmission. Data are transferred at the rates of 500 kilobits per second. Fibre optics are
lighter, faster and more durable compared to the wire media and supports systems that
require large volumes of data transmission. On the other hand fibre optics are more
difficult to work with, more expensive and more difficult to install. Fibre optics are best
used as backbone of a network and not for connecting isolated devices to a backbone. In
most cases it is used as the high speed trankline while twisted wire and coaxial cable are
used to connect the trank line to individual devices.
ADVANTAGES
1. Because the fibres are small in diameter cable of a given size can contain more
fibres than copper wire pairs.
10
2. The fibre optics have higher capacity than the other cables meaning that they have
higher bandwidth capacity.
3. Fibre optic have extremely secure and not prone to cross talking.
4. Fibre optic cables do not radiate radio frequency noise.
DISADVANTAGES
11
BASE BAND TRANSMISSION
This transmits unmodulated signal. Each cable carries one signal channel and
propagation of a signal is bi-direction stations are connected via I-connectors and there is
no need for a modem.
ADVANTAGES
1. Very simple to implement
2. Easy to install
3. Low cost
4. High data transmission rate.
DISADVANTAGES
1. It is limited to short distances
2. It only handles text and sound
3. Low capacity
ADVANTAGES
DISADVANTAGES
1. Costly to install because of the need for modems
2. Lack of well developed standards.
12
2.5 UNBOUNDED TRANSMISSION
Electromagnetic waves are another important media of high speed data and do not need
cables to carry out transmission. They use radio waves to carry data especially where it
is difficult or expensive to lay cables.
Microwaves are high frequency signals which can be propagated through the atmosphere.
This is a land link microwave transmission with dishes located on top of the hill
or on high buildings to give a maximum transmission distance for larger
distances, a series of rely towers can carry the signals much further or satellites
can be used.
Satellite are often used for international long distance communication to relay
messages across the globe. They are capable of transmitting data using orbit
satellites to serve as relay stations for transmitting microwave signals over large
distances.
Other forms of unbounded transmission include intra-red technology and cellular (mobile
phone) signals.
13
NETWORK COMPONENTS
LECTURE FOUR
4.1 INTRODUCTION
Network components are the once supporting the network and should these components
fail, then the network is likely to have some problems. Common network components
include:-
(a) PC workstations
(c) Repeaters
(d) Bridges
(e) Routers
(f) Hubs
(g) Switches
(h) Connecters
OTHERS
- Multiplexers
- Concentrators
- Modems
4.3 COMPONENTS
14
All these components work towards the substance of the network.
4.3.1 PC Workstations
These workstations act as terminals in the network and enable connectivity between
different terminals through the network. PC workstations act as client to the network and
seek for services from the sewer.
This provides for a temporally storage area for print jobs sent to the printer. It queues
jobs on the basis of first come first out.
These store electronic data in the form of digital image for later retrieval. File servers
act as the major storage devices in a network due to their high capability of storing data
and information. File sewers act as the basis on which clients request for information.
4.3.4 Repeaters
Repeaters have their main purpose of amplifying an income signal to give it a new life
and momentum so that it travels through the network. They are useful since they enable
us overcome limitations of distances in networks.
4.3..5 Bridges
These are intelligent devices that provide for connectivity in two different networks that
are using separate protocols. They greatly support filtering and have ability to provide
for connectivity of physical layer to OSI model.
4.3.6 Routers
These works similar to bridges in that they filter out unnecessary network traffic and
remove it from network segments. They generally work at the protocol level and they are
intelligent since they send the data the most efficient route available.
15
4.3.7 Hubs
These concentrates more than one data entry terminal and connects these terminals as one
cable that links to the server. They normally come with data points to support either 6,
12, 24 clients.
This is a card (circuit board) that provides fro connectivity and interfaces between local
workstation and the network servers. It converts PCs to become network nodes such that
transmission from the node can be sent to any network device.
An NIC is simply an electrical circuit board used by computers, printers, and other
equipment so that they are able to connect and transfer data in a network.
Software drivers in the NIC provides for interface in the physical and data link layer.
NICs have three major roles in the networks.
(a) To prepare data from the computers ready for network cable transmission.
This involves changing the data into a form that can be understood by the
computer and can be transmitted along the path e.g. 8-bit, 16-bit, 32-bit, 64-bit,
128-bit, 256-bit expandable.
(b) To send data into another computer by identifying the address of recipient
computers.
(c) Controlling the flow of data between the computer e.g. setting the maximum size
of data to be sent.
16
Stores data redundantly (in so many disks)
- It provides multiple assess methods increasing response time since most efficient
route is used.
(C) CONCENTRATORS
These are telecommunication computers that collect and temporarily store messages from
terminals until enough messages are ready to be sent economically. The concentrator
then transmits the messages to the host computers in a burst.
In most computers the CPU has to communicate with several devices or terminals at the
same time. Routine communication task may occupy a large portion of the CPU
processing time at the expense of performance. For this reason many computers have a
small secondary computer dedicated solely for communication i.e. Front – end processor.
2. Error detection
3. Recovery
17
NETWORK PROTOCOLS
LECTURE FIVE
5.1 INTRODUCTION
What is a protocol?
5.3 PROTOCOLS
These are two protocols combined that form a reliable connection and efficient data
transfer method. TCP is the connection oriented protocol that carries out the actual data
transfer and uses connectionless routing provided for by internet protocol (IP)
TCP/IP was implemented to allow computers with different O/S to communicate with
one another. It has enables 1000s of public and commercial networks to connect to the
internet for access by million of users. Just like the OST, TCP/IP involves layers
protocols. It is mainly concerned with middle layers of the OSI model. The set standards
for TCP/IP applications include:-
(1) Telnet – the PC acts as a terminal to a remote universal machine where users can
access resources in the same manner as a locally connected user.
This allows copying of files from one computer to another over the internet.
18
(C) E-mail which allows transfers of messages between users. A main server stores
these messages when the user is offline.
This is a packet – switching protocol that ensures reliable data communication even over
networks with low qualify transmission equipments. It is used for public data networks
and established links between different networks and hosts. Data packets in X25 can be
in 3 models
(iii) Datagrams
(b) Data communication equipment (DCE) e.g. modems, routers, bridges etc.
X25 support multiple channels thus several DTE can transmit over the same link. A
multiple is required for these protocols.
This was adapted by novel and users NetWare as an operating system. Executable files
like Msword are stored in the file server. Netware makes mini computers and PCS
behave like file serves. Netware servers also store data files for workstations.
IPX is the communication protocol used to transfer information between the NetWare
core protocol and the network shell. IPX controls how each frame of data is routed on a
novel network.
19
In PSN a message is fragmented into packets of data of fixed length and transmitted
together with its control data. A packet exchange is used as a switching system and the
packets are directed to the next computer using the appropriate route to the packet
destination.
In PSN the original message is fragmented into packets where each packet can arrive at
the destination at it is own time. Packets of the same message may travel via different
routes.
Data can be switched by circuiting (hard wiring) in a similar way to the telephone. Here
the time is allocated during the course which transmitting a specific data should be
carried out along a particular route. After that time, no other circuit can be transmitted.
This method of switching is uneconomical since it results to underutilization of the path.
ISDN are types of networks that are mainly developed to support analog/telephone
systems and also support digital systems. (SDN have the capability of hosting and
supporting a large number of telephone networked system across large areas. For this
reason, ISDN is used to support telephone operations within a country and between
countries. ISDN forms a universal standard of telephone networks.
Network standards provide a common ground for data transmission and designing
operating system use on a new network.
20
1. They define the maximum time a packet has to travel through one node to another
before it reaches its destination.
3. It establishes how to prevent confusion when too many packets are sent at once.
This determines the screen display guidelines for fibre – optic cable transmission.
It is mainly used in the U.S.A.
It has set standards for LANs and has also set standards for integrated voice and
data networks.
This sets stands for modems, E-mails, Digital data systems, etc.
21
OSI REFERENCE MODEL
LECTURE SIX
6.1 INTRODUCTION
OSI allows for interactivity between different networks. This is due to different
standards available it provides a platform in which these networks can interact.
Application
Presentation Application
Session
Transport
Network
Data link Data transportation
Physical layer
22
It comprises of 7 layers as shown above i.e.
1. Application
2. Presentation
3. Session
4. Transport
5. Network
6. Data link
7. Physical layer
(1) Deal with application issues and generally implemented only in software.
The highest layer, the application layer is closest to the end user. Both users and
application layers interact with the software applications that contain a
communication component.
(2) The lower layer of the OSI model handles data transport issues.
The physical layer and the data link layer are implemented in hardware and software.
The lowest layer i.e. the physical layer is the closet to the physical network medium e.g.
cables and is responsible for actually replacing the information on the medium.
This is the lowest layer of the OSI model and it provides for physical connectivity
between data and transmission. It defines the electrical, mechanical and procedural and
functional specification for activity and de-activity the physical link between
communicating network systems. Physical layer specification define characteristics such
23
as voltage levels, timing of voltage charges, physical data rates, maximum transmission
distances and physical connectors. It specify the electronic, logical and procedural
specification required in transmitting data across the physical media. It can be
categorized as either.
LAN (Local Area Network) specification It deals with transmission of raw bits. The
protocol used by the physical layer should be independent of the transmission media so
that the terminals can be attached to various media e.g. optical fibre.
- RJ 45
- RJ 11
- RJ 232 C
- BNC (T)
This is layer 2 and it deals with the transmission of data units or frames between adjacent
nodes in a network. It therefore deals with
(a) Providing a reliable transfer of each network packeted across the physical link i.e.
Construction of each packet.
(b) It maintains a reliable connection between adjacent node particularly for an error
prove physical channel.
(d) Provides for effort free node to node connectivity example, include media access
control layer referred to as (MAC) found in asynchronous transmission method.
Asynchronous (character by character, serial).
Data link layer provide reliable transit of data across a physical network link. Different
data-link layers specification define different networks and different protocol
24
characteristics including physical addressing, network topology, error notification,
sequencing of frames and flow control.
Physical addressing as opposed to network addressing define how devices are addressed
at the data link layer.
The network topology consists of data-link layer specification that often defines how
devices are to be physically connected e.g. ring, Bus, etc topology.
Error free notification alerts the upper layer protocol that a transmission can occur and
sequence of data frames re-ordered frames that are transmitted outside a sequence.
Flow control moderates transmission of data so that the receiving device is not
overwhelmed by more traffic than it can handle at any one particular time.
This controls the passage of packets along a network. It is the third layer and allows
heterogeneous networks to be interconnected.
3. Addressing messages and translating logical addresses and names into physical
addressing.
4. To determine the route from the source to the destination host or computer.
5. To enable the network adapter on the router to break data into smaller units called
packets and at the end of network layer these packets are re-assembled into
original message.
25
6. It provides control for network congestion and recognizes message priority and
sends messages in the correct order.
Examples of network protocols include internet protocol (IP), X25, virtual circuit
protocols, Novell and IPX (Internet Packet Exchange).
Since this layer defines the logical network layout routers can be used in this layer to
determine how to forward packets. For this reason much of the design and configuration
for internet works happens at layer 3.
At the transport layer, the model is concerned with integrity of data (error free). It
ensures an error free hose to host connection since the data link layer has already checked
for errors at bits level. Transport layer checks for errors at the frame. It accepts data
from the session layer and segments the data for transport across the network.
Generally the transport layer is responsible for making sure that the data is delivered free
of errors and in the proper sequence. For this reason, at the transport layer flow control is
carried out. Flow control manages data transmission between two devices so that the
transmitting device doesn’t send more data than the receiving device can process.
Multiplexing is used here to enable data from several applications to be transmitted onto
a single physical link virtual circuits are established, maintained and terminated by the
transport layer.
Error checking involves creating various mechanisms for detecting transmission errors,
while recovering involves acting such that the requesting data can be re-transmitted to
resolve any errors that occur. The transport protocols used in the internet are TCP and
UOP.
26
This is the 5th layer and it establishes, manages and terminates communication sessions.
Communication sessions consists of service request and service responses that occur
between application located in different networks. The session layer is also responsible
for carrying out any synchronization and translation between network devices.
This provides a variety of coding and conversion functions that are applied at the
application layer. It translates the data format of the sender to the data format of the
receiver. It also establishes the syntax in which data is exchanged between two hosts. It
provides user services such as data compression, file encryption etc. the presentation
layer ensures that information sent from the application layer of one system would be
readable by application layer of another system. Some examples of presentation layer
coding and conversion schemes include data representation format, common data
compression scheme, data encryption.
Conversion scheme are used to exchange information with systems by using different
texts and data representation such as ASCII and EBCDIC.
This is the 7th layer and it serves the user directly by providing information services to
support applications and to manage resources. Some of the applications expected at this
layer include: - file management
- file transfer
27
- Network management
This layer is the closest to the end user which implies that both the OSI application layer
and the user interact directly with the software application. The application layer
interacts with the software applications that implement a communicating component.
Such application programs fall outside the OSI model.
1. The model was developed to ensure smooth information flow between layers and
these information flow should be kept as minimum or as low as possible.
2. Each layer was created when a different function was needed thus each layer has a
unique function different form the other (abstraction).
4. Each layer has been developed to perform a well defined function within the
framework of communication.
The OSI Model has provided numerous benefits to networks since it has allowed
for networks to communicate between each other with no regard to restrictions in
terms of protocols or manufacturers preference of network hardware.
28
5. It has enabled for easier upgrades of networks since it allows administrators OSI
model rather than the whole software.
6. OSI has provided for a cost effective network platform by allowing network
equipments and equivalent products from different vendors to communicate
freely.
7. OSI model has enabled more efficient data transmission across networks and
achieves and tries to display data in the same format it was sent.
Use of controls
- Passwords
- Fire waves
29
NETWORKING
Categories of Networks
An alternative way of classifying networks is by its scale. They are divided into Local
Area (LAN), Metropolitan Area Network (MAN) and Wide Area Networks (WAN).
LAN is usually privately owned and links the devices in a single office, building or
campus. These are used to share resources (may be hardware or software resources) and
to exchange information. LANs are distinguished from other kinds of networks by three
categories: their size, transmission technology and topology. The most common LAN
topologies are bus, ring and star.
MAN is designed to extend over the entire city. It may be a single network as a cable TV
network or it may be means of connecting a number of LANs into a larger network so
that the resources may be shared. For example, a company can use a MAN to connect the
LANs in all its offices in a city. MAN is wholly owned and operated by a private
company or may be a service provided by a public company.
WAN provides long-distance transmission of data, voice, image and information over
large geographical areas that may comprise a country, continent or even the whole world.
In contrast to LANs, WANs may utilize public, leased or private communication devices,
usually in combinations, and can therefore span an unlimited number of miles. A WAN
that is wholly owned and used by a single company is often referred to as enterprise
network.
File Sharing: The major advantage of a computer network is that is allows file
sharing and remote file access. A person sitting at one workstation of a network can
easily see the files present on the other workstation, provided he is authorized to do
so. It saves the time which is wasted in copying a file from one system to another, by
using a storage device. In addition to that, many people can access or update the
information stored in a database, making it up-to-date and accurate.
Resource Sharing: Resource sharing is also an important benefit of a computer
network. For example, if there are four people in a family, each having their own
30
computer, they will require four modems (for the Internet connection) and four
printers, if they want to use the resources at the same time. A computer network, on
the other hand, provides a cheaper alternative by the provision of resource sharing. In
this way, all the four computers can be interconnected; using a network, and just one
modem and printer can efficiently provide the services to all four members. The
facility of shared folders can also be availed by family members.
Increased Storage Capacity: As there is more than one computer on a network
which can easily share files, the issue of storage capacity gets resolved to a great
extent. A standalone computer might fall short of storage memory, but when many
computers are on a network, memory of different computers can be used in such case.
One can also design a storage server on the network in order to have a huge storage
capacity.
Increased Cost Efficiency: There are many types of software available in the market
which are costly and take time for installation. Computer networks resolve this issue
as the software can be stored or installed on a system or a server and can be used by
the different workstations.
31
We should always be well acquainted with the advantages and disadvantages of computer
networks, before setting one up our personal or office use. Knowledge of the pros and
cons of computer networks can help us in designing a useful system for oneself.
A network is a communication system that enables computer users to share resources e.g.
memory, files, electronic documents, data programs, modems, printers etc.
In peer to peer communication each computer is able to ‘talk’ directly with any other
computer on the network. Networks heavily rely on services to enhance sharing of
resources.
This is a computer with an operating system that enables multiple users to access data
and information and share the software applications and data files in a networks.
Networks have made it possible for printer sharing and printout distribution. Printer
sharing is accomplished by installing print servers at key locations on the network where
users can access. A print server is normally a computer (or a server) where the network
printer is attached which in turn allows various users in the network to print on one
shared printer.
These provide connection to the PC’s modems, printers and other terminals in the
network.
32
A single communication server usually has multiple serial nodes available for use and
each port is connected to the network e.g. the mail server.
An application is loaded on networks from a file server onto the client operations of these
applications will be done from the client to the server via the networks. Data can be
stored in two or more clients within a network with the network O/S providing the
security to determine access to each work station. Network operating systems have the
following functions:-
3. Providing security measures for network resources, hardware and software files.
NOTE
Various network operating system exist today but each operating system has its own
capabilities and features.
Revision question
(i) Ms Dos
(ii) Windows NT
(iii) UNIX
(iv) LINUX
33
FACTORS TO CONSIDER IN THE CHOICE OF NETWORK OPERATING
SYSTEM INCLUDE:-
34
NETWORK TOPOLOGIES
LECTURE SEVEN
7.1 INTRODUCTION
Topology stems from pure mathematics which means the study of shapes in networks.
Topology is commonly used to discuss the properties of various types of network. It
refers to the design layout of the network. Networks have shapes and the shapes of a
network have much to do with the way it functions. When selecting a topology a
topology one needs to consider the following:-
(c) The flow of messages and how the nodes see the messages.
35
Physical topologies show the physical appearance/layout of the cabling skill used on a
network. To implement the physical topology, the logical topology is used. Logical
topology concerns itself with the flow of data logically through the physical network
layout. The logical topology is closely related to the mechanism used to manage the way
stations access the network.
File server/Hub
workstation
In this topology each device connects to a central point via a point to point link. It has
roots in the mainframe computer where one machine form a host to which all other nodes
are connected to. The machines on the peripherals (nodes) are connected to the host
(server) and not to each other.
FEATURES
36
(4) All messages are directed to the central node.
ADVANTAGES
(1) Network control is centralized at one point. Intelligence of the network is limited.
DISADVANTAGES
(3) Workstations can only communicate with each other, through the host.
(4) The central station has limitations to the number of connections it can hold.
This is a physical closed loop consisting of point to point links. Each node acts as a
repeater and receives transmission from the previous node and sends it to the next. Flow
of message or data is one direction only.
Node
FEATURES
(1) None of the computers is viewed as a host.
(2) Failure of one computer does not affect other computer in the network.
37
(4) Duplication of resources is possible.
Examples
Token Ring
ADVANTAGES
DISADVANTAGES
(1) Response speed of the network decreases wit the increase in the size of the
network.
7.3..3 FDDI
This is a standard developed in the mid eighties to provide high speed data
communication. It enables a significant data throughput on busy networks. The data
assessment is by token passing which is sometimes timed. FDDI supports real time
applications, voice and video.
38
7.3.4 BUS TOPOLOGY
Here all devices are attached to the same transmission medium. The medium has a
physical beginning and end. All buses are implemented using electrical cables usually
coaxial and the ends of the cable must be terminated with terminating resistor knows as a
terminator. In this topology all data signals are broadcasted through the backbone. It is
important to have an addressing mechanism so that each node understands which it
should ignore. The cable can be connected from one workstation to another using a T-
connector.
Bus
Nodes
FEATURES
ADVANTAGES
(2) The loss of one workstation does not affect the functionality of the network.
39
DISADVANTAGES
(3) Failure of the backbone communication medium renders the whole network
useless.
This is implemented at the data link layer of OSI model. It provides for channel access
methods where several nodes are sharing the same channel. Media access control is
achieved through the following:-
(1) Contention
7.3 .1 CONTENTION
Networks carrier multiple access with collision detector (CD) and carrier sense Multiple
Access with Collision Avoidance (CA) are used.
Multiple Access (MA) means that several nodes are contended to transmit the shared bus
channel. Carrier sense (CS) means that every node wishing to transmit must first ‘listen’
to the bus before sending. Collision detector (CD) means that nodes ‘listen’ to the bus
when sending to detect frame collision.
ADVANTAGES
40
(2) The actual user data throughput is rather high at low traffic levels.
DISADVANTAGES
(1) Channel access is probabilistic rather than deterministic thus equipment that can not
tolerate delay cannot use this method.
(2) Number of nodes that can be connected is limited since an increase in the number of
nodes increases number of collisions in the bandwidth.
FUNCTIONS OF MAC
(3) Resides in the data link layer where it detects errors before transmission.
ADVANTAGES
(a) it offers the highest data throughput and a high traffic conditions.
(b) It is deterministic and thus each station is guaranteed an opportunity each time the
token travels round the ring.
(c) Some token passing system enables you to set priorities for devices that need control
access to the token.
41
DISADVANTAGES
(1) Token passing involves complicated protocols for managing the network and
recovering from errors.
(3) All devices require complicated software that need to be modified whenever
station is added or removed.
It is an IEEE standard 802.2 sharing a ring topology initiated for a standard of fixed
number of slots of fixed sizes with each slot being able to hold data mini-packet. Each
data mini packet each slot of packet contains a bit field that indicates whether a slot is full
or empty.
42
NETWORK SECURITY
LECTURE EIGHT
8.1 INTRODUCTION
Providing and maintaining security is critical to the management of networks and the
information system infrastructure in general. The user dependence on the network is so
high so much so that networks have become priorities in so many organizations. These
therefore means that costly losses are incurred incase of data loss.
Security of networks will minimize the down time and data loss as a result of human
interferences and natural hazards.
(2) Encryption
- Network manager decides file type and size to be sent or received on the
network.
43
(8) Disaster recovery
8.3.1 PASSWORDS
Since many systems require many passwords e.g. screen, power on passwords etc. a
condition often referred to as password “overload”.
Biometric systems attempt to arrest this situation by using natural features. These
features may use finger prints, eye retina etc to access the system.
Different accounts should have different passwords leading to different work group
situations. Ideal situation in work group account may include:-
Work group administrator account may have authority to create new accounts for
workgroup and perform other administration functions.
User accounts are mainly concerned with profile given to individual user normally with
the same privilege and controls.
8.3.2 ENCRYPTION
This is a digital code or password that must be known to both the sending and receiving
terminal. Cryptography ensures that any data wrongly accesses (illegally) cannot be read.
44
Data is vulnerable when being transmitted across networks and therefore encryption is
almost a necessity.
Encryption involves scrubbing of the data so that it makes no sense at all and would only
be sensible after it has been decoded. Encryption normally uses special combination of
code to scrabble the data. The authorized receiver normally has the decoding key.
8.3.3 POWER
Reliable power is necessary for network equipment. Power surges and spikes are power
fluctuations that may damage the network hardware. Power quotation therefore adapts
equipment like power fitters and UPS (un-interrupted power supply) to protect networks.
Power filters protects the system from surges (voltage faults). Such protections block
power spikes but does not prevent low power situations.
The UPS is a box of rechargeable batteries that supply power during power outrage.
There are some equipments that combine the power filters and the Ups in one box. UPS
are mainly of two types:-
(a) Online Ups where the Ups gets power from the switch ad stores the power in itself
and then continues supplying power to the units.
(b) Off-line: here the Ups provide the power straight to the computers while backing up
some power in itself so when the power goes off the Ups supplies power to the
computer.
Back-ups have to be carried out with respect to file back-ups, system back-ups and back-
up facilities should be instituted in bridges, routers, switches etc. This is to facilitate
consistency and continuity in case of device failure.
45
This is mainly a physical method of network security and it involves physically
recovering the hardware equipment when it is subjected to risks. Disaster recovery will
thus entail recovering as much as possible after a disaster strikes. It will therefore
consider using fire proof saves, proper drainage in places where computers reside and fire
fighting equipment.
8.3.6 VIRUS
This is perhaps the most dangerous vulnerability to information systems. Virus are
software programs that affect the general performance of the network and come virus
software are known to destroy the very executed files. To be safe, anti-virus software’s
are employed in an attempt to arrest these problems.
Viruses have the ability of multiplying themselves and attaching themselves to different
files. This causes the network to be very and in some cases virus can totally ground the
network to a halt.
Activities in the database cause increment in the volume of data stored. For this reason,
databases must be managed and monitored to ensure that the response time is maintained
at a high rate. The response time I the time taken to obtain after a request has been made.
Although the network administrator has given authorized access to different users
through passwords, these users have different roles, responsibilities and job description.
This means that what a manager can carry out in the system is different from what a clerk
is capable of doing. This is achieved by assigning different roles and privileges to
different password holders.
Fault tolerance involves designing systems that can withstand hardware and software
failures. Some of these techniques in fault tolerance include disk mirroring through
46
(RAID) Redundancy Array of Independent Inexpensive Disks. This occurs through a
sewer in layering method such that one data record is stored in different redundant disks.
47
48
NETWORK MANAGEMENT
LECTURE NINE
9.1 INRODUCTION
Most network management architecture use basic structures and set of relationships
workstations or nodes in the network and other nodes run software that enable then send
alerts when they recognize problems. Upon receiving these alerts management entities
are programmed to react by executing one or several actions including:-
Management entities can also poll end stations to check the values of certain variables.
ISO has provided for standards to carry out network management.
49
(iv) Security management
The goal is to measure and make available various aspects of network performance so
that internet working can be maintained at an acceptance level.
- Network throughput
- Line utilization
- Configuration management
The goal is to monitor network and system configuration information so that the effects
on network operation on various versions of hardware and software elements can be
tracked and managed.
The goal is to measure network utilization parameters so that individuals or group of user
on the network can be regulated appropriately.
The goal is to detect, log, notify users and automatically fix network problems to keep the
network running effectively. Due to the effect caused in fault of devices or network, fault
management is perhaps the most widely implemented of the ISO network management
elements.
50
FUNCTIONS/DUTIES
- Network maintenance
Making back-ups
51
9.3.5 BAND WIDTH MANAGEMENT
BANDWIDTH
Bandwidth is the amount of information that can flow through a network. Consider the
analogy of how traffic flows along in a highway. The cars on the highway represent the
data you are trying to move between end points and the lanes represent the bandwidth
available to move the data. The more lanes (bandwidth) the highway has, the larger the
number of cars (data) can drive between the end points over a given period of time.
Networks function in a similar manner. When high volume applications consume large
amounts of bandwidth or viruses flood the network, bandwidth becomes congested.
When this occurs, used report slow response times or even loss of service. This event is
comparable to what happens to many urban highways during rush hour. The end result is
that all cars move slower down the highway because there are so many of them. It then
takes much longer for the driver to reach his or her destination.
BANDWIDTH MANAGEMENT
INFORMATION PORTALS
Get information from local or remote data sources, e.g.) from databases, or remote web
sites.
53
Portals provide access to information, applications, processes and people. Typically,
portals get information from local or remote data sources, e.g. from databases transaction
systems, syndicated content providers, or remote websites they render and aggregate this
information into composite pages to provide information to users in a compact and easily
consumable form.
54