Networks

Networks allow computer users to connect computers together and share resources such as files and printers. Networking also allows better management of data, security, and resources in large companies where hundreds of employees work on computers. In this section, we will cover some basic fundamentals of computer networks, installation of networks, and common troubleshooting methods.

A computer network refers to two or more computers linked together to share files, printers, and other resources. The network may be as small as just two or more computers linked together at home or in an office, or as big as a corporate network at multiple locations spanned across the globe.

Tip

Chapter 8 covers a detailed study of computer networks.

Networking models can be divided into the following two categories:

In a centralized computing network model, all processing is done on a central computer. This computer provides data storage as well as controls to all peripherals including the clients, which are called dumb terminals. A client/server network is based on the centralized computing model. A centralized server holds control of all system and network resources located across the network. These include network services, storage, data backup, security management, and access control. The network consists of dedicated servers and desktops (clients). Servers run network operating systems such as Windows Server 2000/2003, Unix/Linux, etc., and the desktops run client operating systems such as Windows XP or Windows 2000. The following are some features of client/server computing:

In a decentralized computing network model, all processing and resources are distributed among several computers, thereby increasing performance. All systems can run independent of each other. A peer-to-peer (P2P) network or a workgroup is based on a decentralized computing model. Every computer is responsible for processing applications, storage of data, and controlling access to its resources. The following are some features of a peer-to-peer networking model:

A topology refers to the physical layout of a network. It describes how networking devices such as servers, desktops, printers, and network devices are connected together.

Star topology

In a star topology, computers (or nodes) connect to each other through a central device, called a hub or a switch. Since each device is connected independently to the central device using a separate cable, the star network can be expanded at any time without affecting the operation of the network. Failure of one or more nodes also does not affect the network operation. The central device becomes the single point of failure because all nodes are connected to it.

Bus topology

In a bus topology, all computers are connected to a single cable called a backbone using T-connectors. Both ends of the backbone use terminators in order to prevent reflection of signals. If the terminator is missing or is deliberately removed, the data transmissions are disrupted.

Mesh topology

In a mesh topology, each computer makes a point-to-point connection to every other computer. This makes the network highly fault-tolerant and reliable because a break in the cable or a faulty computer does not effect network operation. Data can travel from one computer to another using a number of paths.

Ring topology

In a ring topology, each computer is connected to its neighboring computer to form a logical ring. If one of the computers in the ring fails or if the cable is broken, the entire network becomes inaccessible. Addition or removal of computers also disrupts network transmissions. A Multi-Station Access Unit (MSAU) or Media Access Unit (MAU) acts as the central device.

Wireless topology

In a wireless topology, computers connect to each other using radio frequencies. Wireless networks can be either Ad-hoc or Infrastructure topology-based. In an ad-hoc wireless network, two or more computers directly communicate to each other without using a central device. There is no central device (hub), and these networks can be created anywhere almost spontaneously. In an Infrastructure network, a central wireless device known as the Access Point (AP) is used to authenticate and configure wireless clients that fall within its range. A special identifier known as the Service Set Identifier (SSID) must be configured on the AP and each wireless client. The AP can further be connected to the wired LAN so that wireless clients can access the wired LAN also.

The cables used for computer networks fall into three main categories: coaxial (thin and thick), twisted pair (unshielded and shielded), and fiber optic (single-mode and multi-mode). Each of the cable types has its own merits and demerits in terms of their cost, installation, maintenance, and susceptibility to interferences. Coaxial cables are not covered in the A+ Essentials exam as these are rarely used these days.

Twisted pair cables use pairs of insulated cables bundled inside a plastic sheath. The twists in cables are used to prevent electromagnetic interference, which results in crosstalk among cables. Twisted pair cables are easy to install and lower in cost than coaxial and fiber optic cables. These cables are identified by their category numbers, denoted as CAT-1, CAT-2, CAT-3, CAT-5, etc. Figure 2-15 shows a piece of a twisted pair cable.

Table 2-11 lists some of the popular UTP and STP categories.

Connectors are used for terminating cables and provide an interface to connect the cables to devices. It is not possible to connect a cable to a device without first terminating it with a suitable connector. Each connector has two variations: a male and a female. The following is a brief description of connectors used for computer networking:

Registered Jack-11 (RJ-11)

The RJ-11 connector is mainly used for terminating telephone wires. It has a capacity of three telephone lines (six pins) but only four pins are commonly used. A single telephone line uses only two pins. but four pins are used for a Digital Subscriber Line (DSL).

Registered Jack-45 (RJ-45)

The RJ-45 is an 8-pin connector that is used for terminating twisted pair cables. It is the most common type of connector used in computer networks. Cables can be wired in either a straight or crossover fashion.

Subscriber/Standard Connector (SC)

An SC connector is used to terminate fiber optic cables. It uses the push-pull mechanism to make the connection.

Straight Tip (ST)

An ST connector is an older type of fiber optic connector. It uses the "twist-on/twist-off" bayonet mechanism to make the connection.

Lucent (LC)

An LC connector is also used for fiber optic cables with a push-pull mechanism. It has a small flange on top that secures the connection in place.

Mechanical Transfer-Registered Jack (MT-RJ)

An MT-RJ connector resembles RJ type connectors. They always hold two fiber cables to allow full-duplex communications.

Universal Serial Bus (USB)

USB connectors are available in a variety of sizes and shapes, but the two most popular types are USB Type A and USB Type B. The Type A connector is mainly used on computers, and the Type B connectors are usually used for peripherals.

IEEE 1394

An IEEE 1394 connector is also known as Firewire connector. These connectors are mainly used for digital video and portable storage devices. The IEEE 1394 connectors come in 6-pin and 4-pin configurations.

Tip

Refer to Chapter 8, which shows figures of different types of network connectors.

Like a hub, a switch is also the central device that connects multiple nodes in a network segment using UTP or STP cables. But unlike the hub that sends the received signal to every port, a switch sends the signal only to the destination node. A switch is an intelligent device that learns the hardware address or Media Access Control (MAC) address of the destination from the data packet and sends the packet only to the intended node. This results data direct communication between two nodes, improved network performance, and a reduced number of collisions.

Switches can work in a full-duplex mode, a mode that enables nodes to transmit and receive data simultaneously. Thus a 100 Mbps switch working in a full-duplex mode can provide 200 Mbps data transfer speed. Switches are preferred in large networks where hubs can become a bottleneck for network performance.

Networking protocols allow computers to communicate to each other through the networking media. Some of these protocols are common to all operating systems while others are platform-dependent. This section covers a brief description of the commonly used protocols TCP/IP, IPX/SPX, and NetBEUI.

TCP/IP is a set of several protocols. It is the most widely used protocol suite in private networks as well as on the Internet. TCP/IP is not proprietary to any organization but is a public protocol suite. It is a fully routable protocol and is supported by all major network and desktop operating systems. Some of the well-known TCP/IP protocols and their functions are listed in Table 2-12.

Table 2-12. TCP/IP protocols and their functions

Protocol

Function

Internet Protocol (IP)

IP is a connection-less protocol that provides IP addressing and routing functions.

Transmission Control Protocol (TCP)

TCP is a connection-oriented protocol that guarantees delivery, flow control, error detection, error correction, and packet sequencing.

User Datagram Protocol (UDP)

UDP is a connection-less transport protocol. It does not provide guaranteed delivery of data.

File Transfer Protocol (FTP)

FTP is a client/server application used for file transfers between remote computers.

Trivial File Transfer Protocol (TFTP)

TFTP is also used to transfer files between two remote computers. It is faster but less reliable than FTP.

Simple Mail Transfer Protocol (SMTP)

SMTP is used to transport messages between remote email servers.

HyperText Transfer Protocol (HTTP)

HTTP allows text, images, and multimedia to be downloaded from web sites.

HTTP Secure (HTTPS)

HTTPS is the secure version of the HTTP protocol that authenticates web servers and clients before the communication session starts.

Post Office Protocol 3 (POP3)

POP3 is used to download or retrieve email messages from mail servers running the SMTP protocol.

Internet Message Access Protocol 4 (IMAP4)

IMAP4 is also used to securely retrieve email from mail servers.

Telnet

Telnet allows connections to remote hosts such as network devices for administrative and maintenance purposes.

Internet Control Message Protocol (ICMP)

ICMP provides error checking and reporting functions.

Address Resolution Protocol (ARP)

ARP is used to resolve IP addresses to MAC addresses.

Network News Transfer Protocol (NNTP)

NNTP provides newsgroup services such as posting and retrieving messages on discussion forums.

Line Printer Remote (LPR)

LPR provides client connectivity to printers in network operating systems such as Unix, Linux, and Windows.

IPX/SPX is a full protocol suite used in Novell NetWare networks. The IPX/SPX protocol suite is fully routable, but due to the increasing popularity and extended features of the TCP/IP protocol suite, the usage of IPX/SPX has reduced significantly. Both Microsoft and Novell have made TCP/IP their default protocol in recent versions of operating systems. Different protocols in this suite are listed in Table 2-13.

When discussing the IPX/SPX protocol suite, it is important to include the frame types used in NetWare networks. If there is some connectivity problem between two systems using different versions, it is a good idea to check the frame types used on the network. NetWare uses the following types of frames for encapsulating data at the Data Link layer:

Network hosts or computers are identified either by their names or their addresses. The term network addressing refers to the method of identifying networks and hosts located in a particular network. Different networking protocols employ different methods for addressing networks and hosts, as described in the following sections.

Hosts in a TCP/IP network follow IP addressing schemes. The IP address consists of 32 bits composed of 4 sets of 8 bytes (octet) each. It is expressed as decimal numbers separated by a period known as dotted decimal notation. 192.168.2.10 is an example of an IP address. IP addresses can further be divided into public (registered) or private (unregistered) addresses. Organizations using public addresses can be connected to the Internet while the private IP addresses can only be used internally.

IP addresses are classified into classes A, B, C, D, and E. Only addresses from the classes A, B and C are assigned to organizations and are known as Classful IP Addresses. The first byte of an IP address identifies the class of IP addresses used in the network. For example, a host with an IP address 92.137.0.10 is using a class A IP address and a host with an IP address 192.170.200.10 is using a class C IP address.

A second 32-bit number, known as subnet mask, is used to identify the network address from the host address. When converted to a binary number, the network part is assigned a binary value of 1 and the host part is assigned a value of 0 in the subnet mask. For example, if the subnet mask is 255.255.0.0, the first 16 bits of the IP address would represent the network address and the last 16 bits would represent the host address.

Table 2-14 summarizes the main classes of IP addresses, the number of networks and hosts in each class, and the default subnet masks.

Tip

Notice from Table 2-14 that the network ID 127 is not included in any of the classes. This is because the IP address 127.0.0.1 is reserved as a loopback address for troubleshooting TCP/IP configuration of the computer.

Ethernet networking and cabling technologies are defined in IEEE 802.3 standards. There are several variations in this standard, depending on speed, length, topology, and cabling used in implementing networks. The following sections provide a brief summary of the standards tested on the A+ exam.

A wide area network (WAN) consists of two or more interconnected connect local area networks (LANs). Usually a third party—a telephone company or an ISP—is involved in providing a connectivity solution to the organization that needs to set up a WAN. A WAN can be set up using a dial-up telephone line for low bandwidth requirements, or it may be set up using a high-bandwidth dedicated line. It is also possible to tunnel the WAN connection through the Internet. The following sections describe various technologies used for WAN connectivity.

ISDN is a packet-switched network that allows transmission of data and voice over telephone lines. This results in better quality and higher data transfer speeds than regular dial-up connections. ISDN requires dedicated telephone lines or leased lines and hence is expensive. When the two ends need to communicate, one dials the specified ISDN number and the connection is set up. When the communication between the two nodes is over, the user hangs up and the ISDN line becomes free. Computers using the ISDN line need a special network interface known as an ISDN adapter or terminal adapter.

ISDN communications use two types of channels: a bearer channel (B channel) used for data (or voice), and a delta channel (D channel) used for control signals. The two main implementations of ISDN as follows:

Table 2-18 summarizes the two ISDN implementations.

DSL is a family of technologies that uses ordinary analog telephone lines to provide digital data transmissions. It uses different frequencies for voice and data signals, and the same telephone line can simultaneously be used for phone and data transfer. It is commonly used for high-speed Internet access from homes and offices. Different DSL technologies are collectively noted as xDSL and support data transfer speeds from 128 Kbps to 24 Mbps, as given in the following list:

Table 2-19 provides a summary of different DSL variations and their data transfer speeds.

Wireless networks rely on radio frequencies to communicate instead of network cabling used for normal computer networks. Radio frequencies create electromagnetic (EM) fields, which become the medium to transfer signals from one computer to another. As you go away from the hub, or the main equipment generating the radio frequency of the wireless network, the strength of the EM field reduces and the signal becomes weak.

Wireless networks defined in IEEE 802.11 standards use radio frequencies with spread spectrum technology. The two spread spectrum technologies are as follows:

The most popular of the IEEE 802.11 wireless network standards are 802.11b, 802.11a, and 802.11g. Table 2-20 gives a brief comparison of the characteristics of different 802.11 standards.

Infrared technology uses electromagnetic radiations using wavelengths that are longer than the visible light but shorter than radio frequency. Common examples of Infrared devices are the remote controls used in TVs and audio systems. The following are some of the key characteristics of IrDA wireless communication technology:

As a computer technician, you must be able to install and configure a network adapter. Most new computer motherboards have an integrated network interface. In case you are required to install an additional network adapter or install it on a nonintegrated motherboard, you must know how to complete the required tasks such as obtaining the network connection and configuring the properties of networking protocol. This section covers a brief study of network related exam objectives.

Most new desktops come equipped with built-in network adapters. In newer computers, the network interface is integrated with the motherboard. But you might have to install, replace, or upgrade network adapters in some old desktops. For example, you might be asked to replace a 10 Mbps network adapter with a 10/100 Mbps fast network adapter.

The following sections cover some of the common network problems and basic troubleshooting techniques.