SlideShare a Scribd company logo
1 of 100
UNIT 4: UNDERSTANDING THE
NETWORK ARCHITECTURE
OUTLINE
ā€¢ Ethernet
ā€¢ Performance considerations
ā€¢ Segmentation
ā€¢ Network operating systems or Ethernets
ā€¢ Token ring
ā€¢ Apple talk and arcnet
Network Architecture - Protocols
ā€¢ Physical: Actual signal transmission
ā€¢ Data-Link: Framing / Error Detection
ā€¢ Network: Routing / Addressing
ā€¢ Transport: Congestion / Flow Control
ā€¢ Application: Specific to user needs
Layered Protocols ā€“ (HTTP)
Data Link Layer - Ethernet
ā€¢ Invented in 1973 @ Xerox. (IEEE 802.3)
ā€¢ Originally a LAN technology ā€“ extended to MAN / WAN.
ā€¢ Same frame format, different wiring schemes, data rates across generations.
ā€¢ Most common version (10BaseT) ā€“ 1990.
Ethernet Generations
ā€¢ Original Ethernet:
ā€¢ Coaxial cable (10Base5)
ā€¢ Thicknet.
ā€¢ Next Generation:
ā€¢ Thin coax cable (10Base2)
ā€¢ Thinnet.
ā€¢ Modern Ethernet:
ā€¢ Twisted pair ethernet
(10BaseT)
ā€¢ Uses hub: physical star but
logical bus.
Ethernet Components
ā€¢ NIC ā€“ Network Interface Card
ā€¢ Integrated Tx/Rx ā€“ direct interface to medium.
ā€¢ MAU ā€“ Media Attachment Unit
ā€¢ Attaches network interface to the medium (integrated into NIC).
ā€¢ AUI ā€“ Attachment Unit Interface
ā€¢ Decouple physical layer -reuse MAC design with different media.
ā€¢ MII ā€“ Media Independent Interface
ā€¢ Like AUI for gigabit / faster ethernets.
Ethernet Addressing
ā€¢ 48-bit address
ā€¢ Address assigned when NIC card is manufactured.
ā€¢ Packets can be sent to
ā€¢ Single address ā€“ Unicast
ā€¢ All stations on network ā€“ Broadcast (address = all 1s.)
ā€¢ Subset of stations ā€“ Multicast
ā€¢ Broadcast (address = all 1s.)
ā€¢ All receivers accepts unicast / broadcats.
ā€¢ Half addresses reserved for multicast (247)
ā€¢ NIC can accepts zero or more multicasts.
Ethernet Frame
Sender adds:
ā€¢ Senders address is source
ā€¢ Recipients address in destination
ā€¢ Type of data in frame type
ā€¢ Error check data (CRC)
Receiver NIC:
ā€¢ Gets transmitted frame.
ā€¢ Examines address and either accepts or rejects.
ā€¢ Passes frame to system software.
Media Access Control - MAC
ā€¢ Shared medium ā€“ stations take turns at sharing the medium.
ā€¢ Media access control ensures fairness.
CSMA / CD
ā€¢ Carrier Sense: wait till medium is idle before sending frame.
ā€¢ Multiple Access: multiple computers use the same shared media.
Each uses same access algorithm.
ā€¢ Collision Detection: Listen to medium ā€“ detect if another stationā€™s
signal interferes ā€“ back off and try again later.
CSMA / CD
ā€¢ If collision occurs: wait a random time t1 - 0< t1<d.
ā€¢ D depends on transmission speed ā€“ time for frame width or 512 bits.
ā€¢ If second collision occurs, wait a random time t2 - 0< t2<2d.
ā€¢ Double range for each succesive collision.
ā€¢ Exponential backoff
ā€¢ No acknowledgement like TCP.
ā€¢ CSMA/CA used in wireless networks where not all stations receive message.
ā€¢ Both sides send small message followed by data:
ā€¢ X is about to send to Y
ā€¢ Y is about to receive from X
ā€¢ Data frame sent from X to Y.
Recent Developments
ā€¢ 100Base-FX
ā€¢ LED light source / MMF / 2 km max distance.
ā€¢ Modal dispersion ā€“ limited bandwidth
ā€¢ 100Base-SX (IEEE 802.3z)
ā€¢ Short wavelength laser (850 nm)
ā€¢ Max distance = 5 km.
ā€¢ 100Base-LX
ā€¢ Long wavelength laser (1310 nm)
ā€¢ Max distance = 5 km.
Beyond Gigabit Ethernet
ā€¢ 10 Gb/s Ethernet
ā€¢ No CSMS/CD, same frame format.
ā€¢ Applications
ā€¢ Upgrade LANs / Backbone.
ā€¢ MAN applications.
Segmentation
ā€¢ Segmentation divides a computer network into smaller parts. The
purpose is to improve network performance and security.
ā€¢ Other terms that often mean the same thing are network
segregation, network partitioning, and network isolation.
How does segmentation work?
ā€¢ Segmentation works by controlling how traffic flows among the parts.
ā€¢ You could choose to stop all traffic in one part from reaching another,
or you can limit the flow by traffic type, source, destination, and
many other options.
ā€¢ How you decide to segment your network is called a segmentation
policy.
What is an example of segmentation?
ā€¢ Imagine a large bank with several branch offices.
ā€¢ The bank's security policy restricts branch employees from accessing
its financial reporting system.
ā€¢ Network segmentation can enforce the security policy by preventing
all branch traffic from reaching the financial system.
ā€¢ And by reducing overall network traffic, the financial system will work
better for the financial analysts who use it.
What enforces segmentation policy?
ā€¢ Some traditional technologies for segmentation included:
ā€¢ internal firewalls, and Access Control List (ACL) and Virtual Local Area
Network (VLAN) configurations on networking equipment. However, these
approaches are costly and difficult.
ā€¢ Today, software-defined access technology simplifies segmentation by
grouping and tagging network traffic.
ā€¢ It then uses traffic tags to enforce segmentation policy directly on the
network equipment, yet without the complexity of traditional approaches.
Firewall segmentation
ā€¢ Firewalls are deployed inside a network or data center to create
internal zones to segment functional areas from each other in order
to limit attack surfaces, thereby preventing threats from spreading
beyond a zone.
Segmentation with SDN
ā€¢ Software-defined networking (SDN) is relied on for greater network
automation and programmability through centralized controllers that
are abstracted from the physical hardware of the network.
Micro-segmentation
Micro-segmentationā€¦
ā€¢ Micro-segmentation creates secure zones across cloud and data
center environments to isolate application workloads from one
another and secure them individually.
ā€¢ Micro-segmentation, firewall policies limit east-west traffic between
workloads based on a zero-trust security approach to reduce attack
surfaces, prevent the lateral movement of threats to contain
breaches, and strengthen regulatory compliance.
ā€¢ Micro-segmentation is also referred to as application segmentation or
east-west segmentation in a multicloud data center.
Benefits of network segmentation
ā€¢ Improve operational performance
ā€¢ Segmentation reduces network congestion. For example, a hospital's medical devices can be
segmented from its visitor network so that medical devices are unaffected by web browsing.
ā€¢ Limit cyberattack damage
ā€¢ Segmentation improves cybersecurity by limiting how far an attack can spread. For example,
segmentation keeps a malware outbreak in one section from affecting systems in another.
ā€¢ Protect vulnerable devices
ā€¢ Segmentation can stop harmful traffic from reaching devices that are unable to protect
themselves from attack. For example, a hospital's connected infusion pumps may not be
designed with advanced security defences. Network segmentation can stop harmful Internet
traffic from ever reaching them.
ā€¢ Reduce the scope of compliance
ā€¢ Segmentation reduces the costs associated with regulatory compliance by limiting the
number of in-scope systems. For example, segmentation separates the systems that process
payments from those that don't. That way, the expensive compliance requirements and audit
processes apply only to the in-scope systems, not the entire network.
NOS Architectures
ā€¢ Peer-to-peer
ā€¢ Client/server
Peer to Peer and Client- Server NOS
Overview
ā€¢ A network operating system (NOS) provides services to
clients over a network.
ā€¢ Both the client/server and peer-to-peer networking
models use network operating systems
ā€¢ NOSs must be able to handle typical network duties.
25
Major Tools of NOS
1. Providing access to remote printers, managing which
users are using which printers when, managing how
print jobs are queued, and recognizing when devices
aren't available to the network
2. Enabling and managing access to files on remote
systems, and determining who can access whatā€”and
who can't
3. Granting access to remote applications and resources,
such as the Internet, and making those resources seem
like local resources to the user (the network is ideally
transparent to the user)
26
Major Tools of NOS
3. Providing routing services, including support for major
networking protocols, so that the operating system
knows what data to send where
4. Monitoring the system and security, so as to provide
proper security against viruses, hackers, and data
corruption.
5. Providing basic network administration utilities (such as
SNMP, or Simple Network Management Protocol),
enabling an administrator to perform tasks involving
managing network resources and users.
27
UNIX / Linux
ā€¢ UNIX, created originally by Bell Labs (under AT and T), is a
powerful server operating system that can be used in
peer-to-peer or client/server networks.
ā€¢ UNIX was the first operating system written in the C
programming language.
ā€¢ Linux was first developed in the late 1980s by a young
student at the University of Helsinki in Finland
named Linus Torvalds.
28
UNIX / Linux Features
ā€¢ UNIX (and Linux by extension) systems offer the
following features:
ā€¢ Fully protected multitasking: This means that UNIX can
easily switch between tasks without the operating system
crashing, because all UNIX processes are separate from
those of the operating system. Even if an application
crashes, unless it somehow manages to take down the X
Windows system with it (which does happen), the
operating system just keeps right on humming.
29
UNIX / Linux Features
ā€¢ High performance and stability : Many servers running UNIX or
Linux have run for years without crashing once. The multitasking
capabilities of UNIX, along with the rapid rate at which the operating
system matures (especially with Linux, which is free and can be
changed by anyone), make UNIX or Linux a powerful solution,
especially for server systems.
ā€¢ Multiuser capabilities : True multiuser systems enable different
users to be logged in to the same system simultaneously. In UNIX
and Linux, not only can a user log in to the same system at the same
time as other users, that user can log in multiple times on the same
system as the same user without the operating system batting an
eyelash (such things are often necessary when administrating a
network, particularly when managing users).
ā€¢
30
UNIX / Linux Features
ā€¢ Tons of high-quality software : From Apache Server (a Web server thatā€™s
used on a whopping 6 in 10 major Web servers on the Internet) to the long-
awaited Mozilla.org Mozilla 1.0 open source Web browser/e-mail software
(Mozilla is an open source version of the venerated Netscape Communicator)
to the powerful free Gimp graphics manipulation software, Linux is packed
with tons of free, high-quality software. The trick is that, with UNIX/Linux,
you give up compatibility with commercial software thatā€™s available only for
Windows and/or Macintosh, currently.
ā€¢ Easy customization : While other operating systems seem to offer less and
less choice to the user about which applications to install with the operating
system (Windows XP is this way), UNIX and especially Linux are the exact
counterpoint to that model. With UNIX or Linux, you can actually customize
your operating system kernel, stripping it down to just drivers and
networking or installing everything possible.
31
UNIX / Linux Features
ā€¢ Modular architecture : The modular architecture of UNIX (and especially Linux) is
directly responsible for how customizable UNIX is. Modular really means just what
it sounds like: The operating system is built with a kernel that attaches modules to
itself based on what the user needs.
ā€¢ POSIX compliance: With a free operating system like UNIX, the different
distributions (or flavors) of UNIX quickly became difficult to manage. Currently,
hundreds of different implementations of UNIX are available. To enable
programmers to have some idea of how to code their software such that it would
run on any version of UNIX, the Institute of Electrical and Electronics Engineers,
Inc. (IEEE) defined the Portable Operating System Interface (POSIX).
ā€¢ Use of TCP/IP as the standard protocol stack: UNIX overwhelmingly uses TCP/IP as
the protocol stack of choice. If you consider that the vast majority of the servers
that help make up the Internet are UNIX computers of one form or another, you
start to get the idea why TCP/IP is so popular.
ā€¢
32
UNIX / Linux Features
ā€¢ A shell interface: All versions of UNIX include a shell interface of some sort. If you
have ever seen your computer use a completely black screen with white words
written on it, thatā€™s a shell interface. You simply type in commands at the prompt
and hit Enter to execute those commands. The hard part in using these interfaces
is simply the effort it takes to learn all of those rather cryptic commands. Making
life even more difficult, UNIX is ultimately customizable and can use different
shells. The bash shell (likely the most popular shell in use today) and the tcsh
shell, for example, have different commands for the same action.
ā€¢ A graphical user interface: Although most versions of UNIX (such as Red Hat
Linux) include a graphical user interface (GUI) these days, this has not always been
the case. Historically, UNIX has been derided for its cryptic interface, and the
advent of the GUI into popular UNIX systems was a direct result of this. Popular
UNIX GUIs include KDE and GNOME. KDE is mostly used with Linux, but GNOME
has versions for the Sun Solaris operating system, and therefore crosses the
border from Linux into UNIX proper.
33
UNIX / Linux Features
ā€¢ Support for dumb terminals:
ā€¢ Traditionally, UNIX was used for dumb terminals, and just about all versions of
UNIX still include this capability. The traditional dumb terminal model involves one
central UNIX server that is used by remote terminals to execute applications.
Basically, a user logs in to a UNIX system via Telnet or some other remote
connectivity application and uses UNIX commands to tell the remote system what
functions to perform. In this way, users can download and check e-mail via a text-
based e-mail client such as Pine. The dumb terminal in this form isnā€™t used much
anymore; Web browsers are definitely more than just dumb terminalsā€” and Web
browsers are now the clients most often seen by UNIX servers (at least those that
make up the Internet). However, wireless devices such as cell phones and mobile
Internet e-mail clients such as AOLā€™s Mobile Communicator device are good
examples of modern dumb terminals. The devices have nearly no storage at all,
and donā€™t carry large e-mail clients on the device; the message is simply
transferred as text from one end to the other.
34
UNIX / Linux Features
ā€¢ Interoperability
Open source software such as SAMBA is used to provide Windows users with
Server Message Block (SMB) file sharing.
ā€¢ Authentication:-Centralized login authentication
ā€¢ File and Print Services
Network File System (NFS) is a distributed file system that allows users to access
files and directories located on remote computers and treat those files and
directories as if they were local.
LPR/LPD is the primary UNIX printing protocol used to submit jobs to the printer.
The LPR component initiates commands such as "print waiting jobs," "receive
job," and "send queue state," and the LPD component in the print server responds
to them.
ā€¢ Security
With most Unix operating systems, the network services can be individually
controlled to increase security.
ā€¢
35
MAC OS X Server
ā€¢ OS X Server, formerly Mac OS X Server, was a
separately sold Unix server operating
system from Apple Inc.
ā€¢ It is architecturally identical to its desktop
counterpart OS Xā€”with additional server programs
and management and administration tools.
36
MAC OS X Server
ā€¢ Client Support
TCP/IP file sharing with Macintosh clients using
Network File System (NFS), and File Transfer Apple
File Protocol 3.0
ā€¢ Interoperability
Mac OS X Server uses the Open Source SAMBA to
provide Windows users with Server Message Block
(SMB) file sharing. Network File System (NFS) lets you
make folders available to UNIX and Linux users.
37
MAC OS X Server
ā€¢ File and Print Services
Mac OS X Server provides support for native Macintosh, Windows, UNIX, and Linux
file sharing. Protocols supported include:
ā€¢ Apple file services (AFP 3.0) from any AppleShare client over TCP/IP
ā€¢ Windows (SMB/CIFS) file sharing using Samba
ā€¢ Network File System (NFS) for UNIX and Linux file access
ā€¢ Internet (FTP)
ā€¢ Built-in print services can spool files to any PostScript-capable printer over TCP/IP,
AppleTalk, or USB. Macintosh customers can use the LPR support in Print Center or
the Desktop Printer utility to connect to a shared printer. Windows users can use
their native SMB/CIFS protocol to connect to a shared printer.
ā€¢ Print services for OS X Server
ā€¢ Macintosh and UNIX (LPR/LPD)
ā€¢ Windows (SMB/CIFS)
38
MAC OS X Server
ā€¢ Security
ā€¢ Multiple-user architecture and user-level access
privileges.
ā€¢ Secure Sockets Layer (SSL) support provides
encrypted and authenticated client/server
communications.
ā€¢ Secure Shell (SSH) provides encryption and
authentication for secure remote administration.
ā€¢ Kerberos support for centralized login authentication.
39
NetWare
ā€¢ NetWare is a computer network operating
system developed by Novell, Inc. It initially
used cooperative multitasking to run various services
on a personal computer, using the IPX network
protocol.
ā€¢ NetWare has been a great LAN operating system for
years, but only recently (with NetWare 5.x has
NetWare moved beyond the LAN to where it can
easily be a part of larger networks. Until quite
recently, Novell NetWare used to be the single most-
used network operating system (NOS).
40
NetWare
ā€¢ However, first Windows NT, and Windows 2000 and
Linux, have steadily eaten into the NetWare market
share for network operating systems.
ā€¢ Currently, all three operating systems have a roughly
equal share of the network operating system market,
which means that NetWare is still used in at least one-
third of all server systems.
41
Netware Feature
ā€¢ NetWare offers the following features :
ā€¢ Multiprocessor kernel: This feature enables one NetWare
operating system to utilize multiple processors. This
process is called symmetric multiprocessing (SMP).
ā€¢ SMP enables processors to share memory and bus paths,
even coordinating the processing of a single application in
parallel.
ā€¢ NLMs: Where UNIX uses daemons and Windows uses
services, NetWare uses NetWare Loadable Modules (or
NLMs) to provide services from the server. NLMs are
programs that run in the background on the server to
provide consistent services to the network.
42
Netware Feature
ā€¢ PCI Hot Plug: This feature enables administrators to
dynamically configure PCI network components while the
system is running. You can replace, upgrade, or add new
cards with the Hot replace, Hot upgrade, and Hot
expansion features, respectively.
ā€¢ Client Support
NetWare 5 comes with Novell Client software for three client
platforms: DOS and Windows 3.1x, Windows 95/98, and
Windows NT.
ā€¢ Interoperability
You can set the Novell Clients for Windows 95/98 and
Windows NT to work with one of three network protocol
options: IP only, IP and IPX, or IPX only.
43
Netware Feature
ā€¢ Authentication
Centralized login authentication
ā€¢ File and Print Services
File Services NetWare offers two choices of mutually compatible file
services: Novell Storage Services (NSS) and the traditional NetWare File
System. Both kinds of file services let you store, organize, manage, access,
and retrieve data on the network. NSS gathers all unpartitioned free space
that exists on all the hard drives connected to your server, together with
any unused space in NetWare volumes, and places it into a storage pool.
You create NSS volumes from this storage pool during server installation or
later through NWCONFIG. Novell Distributed Print Services (NDPS) is the
default and preferred print system in NetWare. NDPS supports IP-based as
well as IPX-based printing.
ā€¢ Security
Novell has support for a public key infrastructure built into NetWare 5 using
a public certificate, developed by RSA Security.
44
Windows
ā€¢ Directory Services
A directory service is a database of user accounts and
other information that network administrators use to
control access to shared network resources. When users
connect to a network, they have to be authenticated
before they can access network resources. Authentication
is the process of checking the user's credentials (usually a
user name and a password) against the directory. Users
that supply the proper credentials are permitted access
according to the permissions specified by the network
administrator.
ā€¢
45
Windows
ā€¢ Client Support
Windows 3.x, Windows 95, Windows 98, and
Windows NT Workstation 4.0 Windows 2000
Professional, Xp Pro. Vista Ultimate, Vista Business.
ā€¢ Interoperability
Windows 2000,2003,2008 Server supports UNIX,
Novell NetWare, Windows NT Server 4.0, and
Macintosh.
46
Windows
ā€¢ Authentication
Successful user authentication in a Windows 2000,2003,2008
computing environment consists of separate processes:
interactive logon, which confirms the user's identification to
either a domain account or a local computer, and network
authentication, which confirms the user's identification to any
network service that the user attempts to access.
ā€¢ Types of authentication
Kerberos V5 is used with either a password or a smart card for
interactive logon. It is also the default method of network
authentication for services.The Kerberos V5 protocol verifies
both the identity of the user and network services Secure
Socket Layer/Transport Layer Security (SSL/TLS) authentication,
is used when a user attempts to access a secure Web server.
47
Windows
ā€¢ File and Print Services
You can add and maintain printers in Windows server using the
print administration wizard, and you can add file shares using
Active Directory management tools. Windows server also
offers Distributed File Services, which let you combine files on
more than one server into a single share.
48
Windows
ā€¢ Active Directory
After many years of anticipation, Microsoft introduced an
enterprise directory service in the Windows 2000 Server
product line, called Active Directory. It uses a hierarchical tree
design comprised of container and leaf objects. The
fundamental unit of organization in Active Directory directory
service is the domain, but; you can group domains together
into a tree, and even group multiple trees together into
a forest. Domains that are in the same tree automatically have
bidirectional trust relationships established between them,
which eliminates the need for administrators to create them
manually. The trust relationships are also transitive , meaning
that if Domain A trusts Domain B and Domain B trusts Domain
C, then Domain A trusts Domain C.
49
Windows
ā€¢ Security
User-level security protects shared network resources by requiring that a
security provider authenticate a userā€™s request to access resources. The
domain controller , grants access to the shared resource by verifying that
the user name and password are the same as those on the user account list
stored on the network security provider. Because the security provider
maintains a network-wide list of user accounts and passwords, each client
computer does not have to store a list of accounts. Share-level security
protects shared network resources on the computer with individually
assigned passwords. For example, you can assign a password to a folder or
a locally attached printer. If other users want to access it, they need to type
in the appropriate password. If you do not assign a password to a shared
resource, every user with access to the network can access that resource.
50
Token Ring
ā€¢ Token Ring protocol is a communication protocol used in Local Area
Network (LAN).
ā€¢ In a token ring protocol, the topology of the network is used to define
the order in which stations send.
ā€¢ The stations are connected to one another in a single ring. It uses a
special three-byte frame called a ā€œtokenā€ that travels around a ring.
ā€¢ It makes use of Token Passing controlled access mechanism.
ā€¢ Frames are also transmitted in the direction of the token.
ā€¢ This way they will circulate around the ring and reach the station
which is the destination.
Token Ring
How Does A Token Ring Work?
ā€¢ The frame or packet reaches the next station according to the
sequence of the ring.
ā€¢ Whether the frame contains a message addressed to them is
determined by the current node. If yes, then the message is removed
by the node from the frame. If not, then there is an empty frame(an
empty frame is called the token frame).
ā€¢ A Station that has the token frame, only has the access to transfer the
data. If it has data then insert that data into the token frame
otherwise release that token for the next station.
ā€¢ The next station picks up that token frame for further transmission.
Networks: Token Ring and FDDI
54
IEEE 802.5 and Token Ring
ā€¢ Proposed in 1969 and initially referred to as a
Newhall ring.
Token ring :: a number of stations connected by
transmission links in a ring topology. Information
flows in one direction along the ring from source
to destination and back to source.
Medium access control is provided by a small frame,
the token, that circulates around the ring when all
stations are idle. Only the station possessing the
token is allowed to transmit at any given time.
Advantages of token rings
ā€¢ Token rings reduce the chances of data collision.
ā€¢ Token passing performs better than bus topology under heavy traffic.
ā€¢ A server is not needed to control connectivity among the nodes.
Disadvantages of token rings
ā€¢ Data packets must pass through all the nodes, slowing routing.
ā€¢ It is susceptible to failures that may occur in the network.
ā€¢ Due to a fault in the ring, all network operation ceases.
AppleTalk
ā€¢ AppleTalk is a network operating system designed to connect Apple
computers. Its components are built on Macintosh operating systems.
ā€¢ The network topology is a bus or tree.
AppleTalkā€¦
ā€¢ AppleTalk is a network operating system designed to
connect Apple computers. Its components are built on
Macintosh operating systems. There are two main
versions of AppleTalk depending on how many years in
the past the network was implemented, Phase 1 and
Phase 2.
History
ā€¢ Just prior to its release in early 1985,AppleBus
was renamed AppleTalk.
ā€¢ The system had a number of limitations, including
a speed of only 230.4 Kbit/s ,a maximum distance
of 1000 feet from end to end , and only 32 nodes
per LAN.
Design
AppleTalk was designed with a transparent network interface
-that is, the interaction between Client computers and
network servers requires little interaction from the user.
Two versions of AppleTalk exist :
AppleTalk Phase 1 and AppleTalk Phase 2.
Network Components
AppleTalk Internetwork consists of a Hierarchy of Components
Sockets
ā€¢ An AppleTalk socket is a unique, addressable location in
an AppleTalk node. It is the logical point at which
upper-layer AppleTalk software processes and the
network layer Datagram Delivery Protocol (DDP)
interact.
Socket Clients Use Socket to Send and Receive Datagrams
Nodes
ā€¢ An AppleTalk node is a device that is
connected to an AppleTalk network.
ā€¢ This device might be a Macintosh computer,
a printer, an IBM PC, a router, or some other
similar device.
Networks
ā€¢ It consists of a single logical cable and multiple
attached nodes.
ā€¢ A single physical cable or multiple physical
cables interconnected by using bridges or
routers may be found.
Networksā€¦
ā€¢ Non extended Networks
It is a physical network segment that is assigned
only a single network number, which can range
between 1 and 1024.
ā€¢ Extended Networks
Also known as a cable range. It is a physical network
segment that can be assigned multiple network
numbers.
Zones
ā€¢ An AppleTalk zone is a logical group of nodes or
networks that is defined when the network
administrator configures the network.
ā€¢ The nodes or networks need not be physically
contiguous to belong to the same AppleTalk
zone.
Addressing in AppleTalk
ā€¢ Network Number :- 16 bit number.
ā€¢ Node Id :- 8 bit number identifies node on an AppleTalk network.
ā€¢ Socket Number :- unique 8 bit number that identifies a socket. A
maximum of 254 different socket number can be assigned in a
node.
ā€¢ Zone Name :- A name assigned to an arbitrary subset of node
within an AppleTalk Internet.
AppleTalk Manager
ļ‚§ Our Application accesses the Services of the AppleTalk
protocol through the AppleTalk manager.
ļ‚§ It is a collection of Application Programming Interface
to AppleTalk protocol.
Security
ā€¢ AppleTalk, like many network protocols, makes no
provisions for network security. The design of the
AppleTalk protocol architecture requires that security
measures be implemented at higher application levels.
Cisco supports AppleTalk distribution lists, allowing
control of routing updates on a per-interface basis.
This security feature is similar to those that Cisco
provides for other protocols.
Advantages
ā€¢ Apple automatically includes AppleTalk in the
Macintosh operating system.
ā€¢ Easy to implement and configure.
ā€¢ Setting up a small workgroup is simple and
inexpensive.
Disadvantages
ā€¢ It is not suitable for very large networks.
ā€¢ It is very slow compared to other LAN links at 230.4
Kbps.
ā€¢ It is unsuitable for bandwidth intensive
applications.
ā¦ Attached Resource Computer NETwork
ā¦ Token-Passing Local Area Network (LAN)
ā¦ Originally 2.5 Mbps data rate
ā¦ 255 Nodes or Stations
ā¦ Variable Packet Length
ā¦ Bus or Distributed Star Wiring
ā¦ Unicast or Broadcast Messages
ā¦ One to one or one to all
What is ARCNET?
ā¦ Coaxial, Fiber Optic, Twisted-pair Cabling
ā¦ Over 11 Million Installed Nodes
ā¦ Originally developed by Datapoint Corporation as an
office network
ā¦ Chip sets available from SMSC
ā¦ ANSI/ATA 878.1-1999 Standard
ā¦ Ideally suited for an industrial network
What is ARCNET?
ā¦ Broad Acceptance
ā¦ Large Installed Base
ā¦ Deterministic Performance
ā¦ Simple to Install
ā¦ Low Cost per Node
ā¦ Robust Design
ā¦ Multiple Cable Media Support
ā¦ Multi-master Communication
What are ARCNETā€™s Benefits?
ā¦ HVAC
ā¦ Motor Drives
ā¦ Power Generation
ā¦ Data Acquisition and Control
ā¦ Manufacturing Information Systems
ā¦ OfficeAutomation
ā¦ Shipboard Automation
Where is ARCNET Used?
ā¦ Printing Press Controls
ā¦ Telecommunications
ā¦ Gaming Machines
ā¦ Vehicular Navigation
ā¦ Security Systems
Where is ARCNET Used?
Any application where real-time performance, high
security and robust design is important.
ā¦ Distributed Star topology requires the use of hubs
How Does ARCNET Work?
NODE
NODE
NODE
NODE
NODE
NODE
NODE
NODE
NODE
HUB
HUB
HUB
Application
Presentation
Session
Transport
Network
Data Link
Physical
ā¦ OSI Reference Model
How Does ARCNET Work?
ARCNET defines the bottom two layers of the OSI
model
ā¦ Only Five Simple Commands
ā¦ ITT - Invitation to transmit
ā¦ FBE - Free buffer enquiry
ā¦ PAC - Packet
ā¦ ACK - Acknowledgement
ā¦ NAK - Negative acknowledgement
ARCNET Protocol
ā¦ Deterministic Token Passing
ā¦ Packet Flow Control
ā¦ Error Detection
ā¦ Auto Reconfiguration
ā¦ Variable Packet Size
ā¦ Supports Various Transceivers & Media
ā¦ Supports Various Software Drivers
ā¦ Up to 255 Nodes Per Network
ARCNET Protocol Features
ā¦ Token Passing - Transmitting on the network is only
permitted when a node has the token
ā¦ Every node can transmit once during each token rotation
āœÆBenefits:
ā¦ Every node has a guaranteed response time to transmit
ā¦ Deterministic behavior
ARCNET Protocol Features
ā¦ Auto-Reconfiguration - Network is automatically
reconfigured when a node joins or leaves the network
ā¦ Token pass is automatically reconfigured
ā¦ Typical time 20 - 30 ms
ā¦ Supports live node insertion and deletion
ā¦ Variable Packet Size
ā¦ From 1 to 507 bytes per packet
ARCNET Protocol Features
ā¦ Packet Flow Control - Transmitter checks receiver to
make sure it is ready to receive a packet
ā¦ Reduced software overhead
ā¦ Increased bandwidth
ā¦ No lost packets due to input buffer overruns
ARCNET Protocol Features
ā¦ Error Detection - 16 bit CRC checks each packet
ā¦ Corrupted packets automatically rejected
ā¦ Transmitter is aware of the error
ā¦ Reduced software overhead
ā¦ Better CPU utilization
ARCNET Protocol Features
ā¦ Token passes from low to high address
ARCNET Logical Ring
109
122
255
6
PAC = ALERT SOH SID DID DID CP DATA ... DATA CRC CRC
ARCNET Frames
Only PAC has a variable length frame
ITT =
FBE =
ALERT EOT DID DID
ALERT ENQ DID DID
ACK= ALERT ACK
NAK= ALERT NAK
Token Pass
Destination
Node
Source
Node
ITT
Packet Transmission
Destination
Node
Source
Node
FBE
PAC
ACK
ACK
Receiver Unavailable
Destination
Node
Source
Node
FBE
NAK
Failed Packet Transmission
Destination
Node
Source
Node
FBE
PAC
ACK
ā¦ ITT 15.6 (invitation to transmit)
ā¦ Tta 12.6 (turnaround time)
ā¦ FBE 15.6 (free buffer enquiry)
ā¦ Tta 12.6 (turnaround time)
ā¦ ACK 6.8 (acknowledge)
ā¦ Tta 12.6 (turnaround time)
ā¦ PAC 33.2 +4.4 ļ­sec/byte
ā¦ Tta 12.6 (turnaround time)
ā¦ ACK 6.8 (acknowledge)
ā¦ Tta 12.6 (turnaround time)
ARCNET Message Timing in Microseconds (2.5 Mbps)
141 ļ­sec + 4.4 ļ­sec/byte
Minimum Message: 141 Microseconds
If You Cut ARCNET...
...You Just Get Two ARCNETS Within Milliseconds
ā¦ Flexibility
ā¦ Distributed Star Topology Requiring Hubs
ā¦ Hub-less Bus Topology
ā¦ Coaxial Cable
ā¦ Twisted Pair
ā¦ Fiber Optics
ARCNET Cabling
ā¦ Coaxial Cable In a Star Topology
ā¦ Either a star or distributed star topology
ā¦ Utilize active or passive hubs
Traditional ARCNET
NODE NODE
NODE
NODE
NODE
NODE
NODE
NODE
NODE
HUB
HUB
HUB
ā¦ Coaxial Star
ā¦ Original method of communication
ā¦ RG-62/u coaxial cable
ā¦ BNC connectors
ā¦ Only two transceivers per segment
ā¦ Segment length up to 2,000 feet
ā¦ Requires the use of a hub to go beyond two stations
Traditional ARCNET
We call this ā€“CXS.
ā¦ Coaxial Bus
ā¦ Lower cost hub-less network
ā¦ RG-62/u coaxial cable
ā¦ Up to eight NIMs per bus segment
ā¦ Segment length limited to 1,000 feet
ā¦ BNC connectors and Tees
ā¦ Requires end of line terminators
Traditional ARCNET
We call this ā€“CXB.
ā¦ Twisted-Pair Star
ā¦ Requires active hubs for network expansion
ā¦ Only 328 foot segment length
ā¦ RJ-11 connectors
ā¦ Utilizes BALUNā€™s to convert from coaxial cable to twisted-pair
Traditional ARCNET
We call this ā€“TPS.
ā¦ Twisted-Pair Bus
ā¦ Modified circuitry of coaxial bus implementation
ā¦ Supports eight nodes
ā¦ Reduction in segment length to 400 feet
ā¦ RJ-11 or RJ-45 connectors
ā¦ Requires end of line terminators
Traditional ARCNET
We call this ā€“TPB when using RJ-11 connectors
and ā€“TB5 when using RJ-45 connectors.
ā¦ Fiber Optics
ā¦ 850 nm wavelength with ST connectors
ā¦ 62.5/125 duplex multimode fiber cable
ā¦ 6000 foot segment length
ā¦ Large networks can be achieved by cascading hubs
ā¦ ARCNET controller chips may need to be set to extended timeouts
Traditional ARCNET
We call this ā€“FOG.
ā¦ Fiber Optics
ā¦ 1300 nm wavelength with ST connectors
ā¦ 62.5/125 duplex multimode or duplex single-mode fiber cable
ā¦ 10,000 m multimode and 14,000 m single-mode
Traditional ARCNET
We call this ā€“FG3.

More Related Content

Similar to UNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptx

E-Management, Archival and Retrieval of documents/Office Networking System
E-Management, Archival and Retrieval of documents/Office Networking SystemE-Management, Archival and Retrieval of documents/Office Networking System
E-Management, Archival and Retrieval of documents/Office Networking SystemVaughan Olufemi ACIB, AICEN, ANIM
Ā 
Class work 2,computer_network_317
Class work 2,computer_network_317Class work 2,computer_network_317
Class work 2,computer_network_317Khondoker Sadia
Ā 
Computer networks
Computer networksComputer networks
Computer networksKeerty Smile
Ā 
CNE CHP1.pdf
CNE CHP1.pdfCNE CHP1.pdf
CNE CHP1.pdfNehaam3
Ā 
Unit1_COMPUTER_COMMUNICATIONSSlides.pptx
Unit1_COMPUTER_COMMUNICATIONSSlides.pptxUnit1_COMPUTER_COMMUNICATIONSSlides.pptx
Unit1_COMPUTER_COMMUNICATIONSSlides.pptxNANDIKHATHARANIKUMAR1
Ā 
Networkprotocolstructurescope 130719081246-phpapp01
Networkprotocolstructurescope 130719081246-phpapp01Networkprotocolstructurescope 130719081246-phpapp01
Networkprotocolstructurescope 130719081246-phpapp01Gaurav Goyal
Ā 
Network protocol structure scope
Network protocol structure scopeNetwork protocol structure scope
Network protocol structure scopeSanat Maharjan
Ā 
NW.pdf
NW.pdfNW.pdf
NW.pdfthinalost
Ā 
C/S archtecture including basic networking
C/S archtecture including basic networkingC/S archtecture including basic networking
C/S archtecture including basic networkingabhinav2727
Ā 
Lect 1 Distributed System.pptx
Lect 1 Distributed System.pptxLect 1 Distributed System.pptx
Lect 1 Distributed System.pptxPardonSamson
Ā 
Unit - 1.pptx
Unit - 1.pptxUnit - 1.pptx
Unit - 1.pptxKavinD11
Ā 
Introduction to Networks & Networking Concepts
Introduction to Networks & Networking ConceptsIntroduction to Networks & Networking Concepts
Introduction to Networks & Networking Conceptszaisahil
Ā 
Networking presentationNetworking presentation.pptNetworking presentation.ppt...
Networking presentationNetworking presentation.pptNetworking presentation.ppt...Networking presentationNetworking presentation.pptNetworking presentation.ppt...
Networking presentationNetworking presentation.pptNetworking presentation.ppt...nesarahmad37
Ā 
Net 02 03_lan
Net 02 03_lanNet 02 03_lan
Net 02 03_lanProtik Roy
Ā 
Introduction to computer networking chapter 2
Introduction to computer networking chapter 2Introduction to computer networking chapter 2
Introduction to computer networking chapter 2binakasehun2026
Ā 
IT6601 Mobile Computing Unit I
IT6601 Mobile Computing Unit IIT6601 Mobile Computing Unit I
IT6601 Mobile Computing Unit Ipkaviya
Ā 

Similar to UNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptx (20)

E-Management, Archival and Retrieval of documents/Office Networking System
E-Management, Archival and Retrieval of documents/Office Networking SystemE-Management, Archival and Retrieval of documents/Office Networking System
E-Management, Archival and Retrieval of documents/Office Networking System
Ā 
Class work 2,computer_network_317
Class work 2,computer_network_317Class work 2,computer_network_317
Class work 2,computer_network_317
Ā 
Computer networks
Computer networksComputer networks
Computer networks
Ā 
Unit 2B.pdf
Unit 2B.pdfUnit 2B.pdf
Unit 2B.pdf
Ā 
CNE CHP1.pdf
CNE CHP1.pdfCNE CHP1.pdf
CNE CHP1.pdf
Ā 
Unit1_COMPUTER_COMMUNICATIONSSlides.pptx
Unit1_COMPUTER_COMMUNICATIONSSlides.pptxUnit1_COMPUTER_COMMUNICATIONSSlides.pptx
Unit1_COMPUTER_COMMUNICATIONSSlides.pptx
Ā 
Networkprotocolstructurescope 130719081246-phpapp01
Networkprotocolstructurescope 130719081246-phpapp01Networkprotocolstructurescope 130719081246-phpapp01
Networkprotocolstructurescope 130719081246-phpapp01
Ā 
Network protocol structure scope
Network protocol structure scopeNetwork protocol structure scope
Network protocol structure scope
Ā 
NW.pdf
NW.pdfNW.pdf
NW.pdf
Ā 
C/S archtecture including basic networking
C/S archtecture including basic networkingC/S archtecture including basic networking
C/S archtecture including basic networking
Ā 
Lect 1 Distributed System.pptx
Lect 1 Distributed System.pptxLect 1 Distributed System.pptx
Lect 1 Distributed System.pptx
Ā 
Unit - 1.pptx
Unit - 1.pptxUnit - 1.pptx
Unit - 1.pptx
Ā 
Basic networking
Basic networkingBasic networking
Basic networking
Ā 
Introduction to Networks & Networking Concepts
Introduction to Networks & Networking ConceptsIntroduction to Networks & Networking Concepts
Introduction to Networks & Networking Concepts
Ā 
Networks Intro.ppt
Networks Intro.pptNetworks Intro.ppt
Networks Intro.ppt
Ā 
Networking presentationNetworking presentation.pptNetworking presentation.ppt...
Networking presentationNetworking presentation.pptNetworking presentation.ppt...Networking presentationNetworking presentation.pptNetworking presentation.ppt...
Networking presentationNetworking presentation.pptNetworking presentation.ppt...
Ā 
Net 02 03_lan
Net 02 03_lanNet 02 03_lan
Net 02 03_lan
Ā 
Networking
Networking Networking
Networking
Ā 
Introduction to computer networking chapter 2
Introduction to computer networking chapter 2Introduction to computer networking chapter 2
Introduction to computer networking chapter 2
Ā 
IT6601 Mobile Computing Unit I
IT6601 Mobile Computing Unit IIT6601 Mobile Computing Unit I
IT6601 Mobile Computing Unit I
Ā 

More from LeahRachael

UNIT 5-UNDERSTANDING THE OPERATION OF A NETWORK.pptx
UNIT 5-UNDERSTANDING THE OPERATION OF A NETWORK.pptxUNIT 5-UNDERSTANDING THE OPERATION OF A NETWORK.pptx
UNIT 5-UNDERSTANDING THE OPERATION OF A NETWORK.pptxLeahRachael
Ā 
UNIT 6-EXPLAINING THE ROLE OF THE NETWORK ADMINISTRATOR AND SUPPORT.pptx
UNIT 6-EXPLAINING THE ROLE OF THE NETWORK ADMINISTRATOR AND SUPPORT.pptxUNIT 6-EXPLAINING THE ROLE OF THE NETWORK ADMINISTRATOR AND SUPPORT.pptx
UNIT 6-EXPLAINING THE ROLE OF THE NETWORK ADMINISTRATOR AND SUPPORT.pptxLeahRachael
Ā 
UNIT 7-UNDERSTANDING LARGER NETWORKS.pptx
UNIT 7-UNDERSTANDING LARGER NETWORKS.pptxUNIT 7-UNDERSTANDING LARGER NETWORKS.pptx
UNIT 7-UNDERSTANDING LARGER NETWORKS.pptxLeahRachael
Ā 
UNIT 3-DEMONSTRATING A COMPREHENSIVE UNDERSTANDING OF SOFTWARE DESIGN.pptx
UNIT 3-DEMONSTRATING A COMPREHENSIVE UNDERSTANDING OF SOFTWARE DESIGN.pptxUNIT 3-DEMONSTRATING A COMPREHENSIVE UNDERSTANDING OF SOFTWARE DESIGN.pptx
UNIT 3-DEMONSTRATING A COMPREHENSIVE UNDERSTANDING OF SOFTWARE DESIGN.pptxLeahRachael
Ā 
UNIT 2- UNDERSTANDING DIGITAL SIGNALS PART 2
UNIT 2- UNDERSTANDING DIGITAL SIGNALS PART 2UNIT 2- UNDERSTANDING DIGITAL SIGNALS PART 2
UNIT 2- UNDERSTANDING DIGITAL SIGNALS PART 2LeahRachael
Ā 
UNIT 2-APPLYING THE SOFTWARE COST ESTIMATION.pptx
UNIT 2-APPLYING THE SOFTWARE COST ESTIMATION.pptxUNIT 2-APPLYING THE SOFTWARE COST ESTIMATION.pptx
UNIT 2-APPLYING THE SOFTWARE COST ESTIMATION.pptxLeahRachael
Ā 
UNIT 3 - EXPLAINING THE NEED OF COMPUTER NETWORK
UNIT 3 - EXPLAINING THE NEED OF COMPUTER NETWORKUNIT 3 - EXPLAINING THE NEED OF COMPUTER NETWORK
UNIT 3 - EXPLAINING THE NEED OF COMPUTER NETWORKLeahRachael
Ā 
Unit 4- State Machine in mobile programming
Unit 4- State Machine in mobile programmingUnit 4- State Machine in mobile programming
Unit 4- State Machine in mobile programmingLeahRachael
Ā 
UNIT 1-IDENTIFY THE NEED FOR SOFTWARE ENGINEERING DEVELOPMENT.pptx
UNIT 1-IDENTIFY THE NEED FOR SOFTWARE ENGINEERING DEVELOPMENT.pptxUNIT 1-IDENTIFY THE NEED FOR SOFTWARE ENGINEERING DEVELOPMENT.pptx
UNIT 1-IDENTIFY THE NEED FOR SOFTWARE ENGINEERING DEVELOPMENT.pptxLeahRachael
Ā 
Unit 1- PROGRAMMING IN C OPERATORS LECTURER NOTES
Unit 1- PROGRAMMING IN C OPERATORS LECTURER NOTESUnit 1- PROGRAMMING IN C OPERATORS LECTURER NOTES
Unit 1- PROGRAMMING IN C OPERATORS LECTURER NOTESLeahRachael
Ā 
UNIT 5- UNDERSTANDING THE SYSTEM DESIGN PROCESS.pptx
UNIT 5- UNDERSTANDING THE SYSTEM DESIGN PROCESS.pptxUNIT 5- UNDERSTANDING THE SYSTEM DESIGN PROCESS.pptx
UNIT 5- UNDERSTANDING THE SYSTEM DESIGN PROCESS.pptxLeahRachael
Ā 
UNIT 4-UNDERSTANDING VIRTUAL MEMORY.pptx
UNIT 4-UNDERSTANDING VIRTUAL MEMORY.pptxUNIT 4-UNDERSTANDING VIRTUAL MEMORY.pptx
UNIT 4-UNDERSTANDING VIRTUAL MEMORY.pptxLeahRachael
Ā 
UNIT 3-EXPLAINING THE MEMORY MANAGEMENT LOGICAL AND AND PHYSICAL DATA FLOW DI...
UNIT 3-EXPLAINING THE MEMORY MANAGEMENT LOGICAL AND AND PHYSICAL DATA FLOW DI...UNIT 3-EXPLAINING THE MEMORY MANAGEMENT LOGICAL AND AND PHYSICAL DATA FLOW DI...
UNIT 3-EXPLAINING THE MEMORY MANAGEMENT LOGICAL AND AND PHYSICAL DATA FLOW DI...LeahRachael
Ā 
UNIT 2-UNDERSTANDING THE SYNCHRONIZATION PROCESS.pptx
UNIT 2-UNDERSTANDING THE SYNCHRONIZATION PROCESS.pptxUNIT 2-UNDERSTANDING THE SYNCHRONIZATION PROCESS.pptx
UNIT 2-UNDERSTANDING THE SYNCHRONIZATION PROCESS.pptxLeahRachael
Ā 
UNIT 1 - UNDERSTANDINGTHE PRINCIPLES OF OPERATING SYSTEM.pptx
UNIT 1 - UNDERSTANDINGTHE PRINCIPLES OF OPERATING SYSTEM.pptxUNIT 1 - UNDERSTANDINGTHE PRINCIPLES OF OPERATING SYSTEM.pptx
UNIT 1 - UNDERSTANDINGTHE PRINCIPLES OF OPERATING SYSTEM.pptxLeahRachael
Ā 

More from LeahRachael (15)

UNIT 5-UNDERSTANDING THE OPERATION OF A NETWORK.pptx
UNIT 5-UNDERSTANDING THE OPERATION OF A NETWORK.pptxUNIT 5-UNDERSTANDING THE OPERATION OF A NETWORK.pptx
UNIT 5-UNDERSTANDING THE OPERATION OF A NETWORK.pptx
Ā 
UNIT 6-EXPLAINING THE ROLE OF THE NETWORK ADMINISTRATOR AND SUPPORT.pptx
UNIT 6-EXPLAINING THE ROLE OF THE NETWORK ADMINISTRATOR AND SUPPORT.pptxUNIT 6-EXPLAINING THE ROLE OF THE NETWORK ADMINISTRATOR AND SUPPORT.pptx
UNIT 6-EXPLAINING THE ROLE OF THE NETWORK ADMINISTRATOR AND SUPPORT.pptx
Ā 
UNIT 7-UNDERSTANDING LARGER NETWORKS.pptx
UNIT 7-UNDERSTANDING LARGER NETWORKS.pptxUNIT 7-UNDERSTANDING LARGER NETWORKS.pptx
UNIT 7-UNDERSTANDING LARGER NETWORKS.pptx
Ā 
UNIT 3-DEMONSTRATING A COMPREHENSIVE UNDERSTANDING OF SOFTWARE DESIGN.pptx
UNIT 3-DEMONSTRATING A COMPREHENSIVE UNDERSTANDING OF SOFTWARE DESIGN.pptxUNIT 3-DEMONSTRATING A COMPREHENSIVE UNDERSTANDING OF SOFTWARE DESIGN.pptx
UNIT 3-DEMONSTRATING A COMPREHENSIVE UNDERSTANDING OF SOFTWARE DESIGN.pptx
Ā 
UNIT 2- UNDERSTANDING DIGITAL SIGNALS PART 2
UNIT 2- UNDERSTANDING DIGITAL SIGNALS PART 2UNIT 2- UNDERSTANDING DIGITAL SIGNALS PART 2
UNIT 2- UNDERSTANDING DIGITAL SIGNALS PART 2
Ā 
UNIT 2-APPLYING THE SOFTWARE COST ESTIMATION.pptx
UNIT 2-APPLYING THE SOFTWARE COST ESTIMATION.pptxUNIT 2-APPLYING THE SOFTWARE COST ESTIMATION.pptx
UNIT 2-APPLYING THE SOFTWARE COST ESTIMATION.pptx
Ā 
UNIT 3 - EXPLAINING THE NEED OF COMPUTER NETWORK
UNIT 3 - EXPLAINING THE NEED OF COMPUTER NETWORKUNIT 3 - EXPLAINING THE NEED OF COMPUTER NETWORK
UNIT 3 - EXPLAINING THE NEED OF COMPUTER NETWORK
Ā 
Unit 4- State Machine in mobile programming
Unit 4- State Machine in mobile programmingUnit 4- State Machine in mobile programming
Unit 4- State Machine in mobile programming
Ā 
UNIT 1-IDENTIFY THE NEED FOR SOFTWARE ENGINEERING DEVELOPMENT.pptx
UNIT 1-IDENTIFY THE NEED FOR SOFTWARE ENGINEERING DEVELOPMENT.pptxUNIT 1-IDENTIFY THE NEED FOR SOFTWARE ENGINEERING DEVELOPMENT.pptx
UNIT 1-IDENTIFY THE NEED FOR SOFTWARE ENGINEERING DEVELOPMENT.pptx
Ā 
Unit 1- PROGRAMMING IN C OPERATORS LECTURER NOTES
Unit 1- PROGRAMMING IN C OPERATORS LECTURER NOTESUnit 1- PROGRAMMING IN C OPERATORS LECTURER NOTES
Unit 1- PROGRAMMING IN C OPERATORS LECTURER NOTES
Ā 
UNIT 5- UNDERSTANDING THE SYSTEM DESIGN PROCESS.pptx
UNIT 5- UNDERSTANDING THE SYSTEM DESIGN PROCESS.pptxUNIT 5- UNDERSTANDING THE SYSTEM DESIGN PROCESS.pptx
UNIT 5- UNDERSTANDING THE SYSTEM DESIGN PROCESS.pptx
Ā 
UNIT 4-UNDERSTANDING VIRTUAL MEMORY.pptx
UNIT 4-UNDERSTANDING VIRTUAL MEMORY.pptxUNIT 4-UNDERSTANDING VIRTUAL MEMORY.pptx
UNIT 4-UNDERSTANDING VIRTUAL MEMORY.pptx
Ā 
UNIT 3-EXPLAINING THE MEMORY MANAGEMENT LOGICAL AND AND PHYSICAL DATA FLOW DI...
UNIT 3-EXPLAINING THE MEMORY MANAGEMENT LOGICAL AND AND PHYSICAL DATA FLOW DI...UNIT 3-EXPLAINING THE MEMORY MANAGEMENT LOGICAL AND AND PHYSICAL DATA FLOW DI...
UNIT 3-EXPLAINING THE MEMORY MANAGEMENT LOGICAL AND AND PHYSICAL DATA FLOW DI...
Ā 
UNIT 2-UNDERSTANDING THE SYNCHRONIZATION PROCESS.pptx
UNIT 2-UNDERSTANDING THE SYNCHRONIZATION PROCESS.pptxUNIT 2-UNDERSTANDING THE SYNCHRONIZATION PROCESS.pptx
UNIT 2-UNDERSTANDING THE SYNCHRONIZATION PROCESS.pptx
Ā 
UNIT 1 - UNDERSTANDINGTHE PRINCIPLES OF OPERATING SYSTEM.pptx
UNIT 1 - UNDERSTANDINGTHE PRINCIPLES OF OPERATING SYSTEM.pptxUNIT 1 - UNDERSTANDINGTHE PRINCIPLES OF OPERATING SYSTEM.pptx
UNIT 1 - UNDERSTANDINGTHE PRINCIPLES OF OPERATING SYSTEM.pptx
Ā 

Recently uploaded

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
Ā 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
Ā 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
Ā 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
Ā 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
Ā 
FULL ENJOY šŸ” 8264348440 šŸ” Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY šŸ” 8264348440 šŸ” Call Girls in Diplomatic Enclave | DelhiFULL ENJOY šŸ” 8264348440 šŸ” Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY šŸ” 8264348440 šŸ” Call Girls in Diplomatic Enclave | Delhisoniya singh
Ā 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
Ā 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
Ā 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
Ā 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
Ā 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
Ā 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
Ā 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
Ā 
Swan(sea) Song ā€“ personal research during my six years at Swansea ... and bey...
Swan(sea) Song ā€“ personal research during my six years at Swansea ... and bey...Swan(sea) Song ā€“ personal research during my six years at Swansea ... and bey...
Swan(sea) Song ā€“ personal research during my six years at Swansea ... and bey...Alan Dix
Ā 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
Ā 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
Ā 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
Ā 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
Ā 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
Ā 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
Ā 

Recently uploaded (20)

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
Ā 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Ā 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
Ā 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Ā 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
Ā 
FULL ENJOY šŸ” 8264348440 šŸ” Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY šŸ” 8264348440 šŸ” Call Girls in Diplomatic Enclave | DelhiFULL ENJOY šŸ” 8264348440 šŸ” Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY šŸ” 8264348440 šŸ” Call Girls in Diplomatic Enclave | Delhi
Ā 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Ā 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
Ā 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
Ā 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Ā 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
Ā 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
Ā 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
Ā 
Swan(sea) Song ā€“ personal research during my six years at Swansea ... and bey...
Swan(sea) Song ā€“ personal research during my six years at Swansea ... and bey...Swan(sea) Song ā€“ personal research during my six years at Swansea ... and bey...
Swan(sea) Song ā€“ personal research during my six years at Swansea ... and bey...
Ā 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
Ā 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
Ā 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
Ā 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Ā 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Ā 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
Ā 

UNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptx

  • 1. UNIT 4: UNDERSTANDING THE NETWORK ARCHITECTURE
  • 2. OUTLINE ā€¢ Ethernet ā€¢ Performance considerations ā€¢ Segmentation ā€¢ Network operating systems or Ethernets ā€¢ Token ring ā€¢ Apple talk and arcnet
  • 3. Network Architecture - Protocols ā€¢ Physical: Actual signal transmission ā€¢ Data-Link: Framing / Error Detection ā€¢ Network: Routing / Addressing ā€¢ Transport: Congestion / Flow Control ā€¢ Application: Specific to user needs
  • 5. Data Link Layer - Ethernet ā€¢ Invented in 1973 @ Xerox. (IEEE 802.3) ā€¢ Originally a LAN technology ā€“ extended to MAN / WAN. ā€¢ Same frame format, different wiring schemes, data rates across generations. ā€¢ Most common version (10BaseT) ā€“ 1990.
  • 6. Ethernet Generations ā€¢ Original Ethernet: ā€¢ Coaxial cable (10Base5) ā€¢ Thicknet. ā€¢ Next Generation: ā€¢ Thin coax cable (10Base2) ā€¢ Thinnet. ā€¢ Modern Ethernet: ā€¢ Twisted pair ethernet (10BaseT) ā€¢ Uses hub: physical star but logical bus.
  • 7. Ethernet Components ā€¢ NIC ā€“ Network Interface Card ā€¢ Integrated Tx/Rx ā€“ direct interface to medium. ā€¢ MAU ā€“ Media Attachment Unit ā€¢ Attaches network interface to the medium (integrated into NIC). ā€¢ AUI ā€“ Attachment Unit Interface ā€¢ Decouple physical layer -reuse MAC design with different media. ā€¢ MII ā€“ Media Independent Interface ā€¢ Like AUI for gigabit / faster ethernets.
  • 8. Ethernet Addressing ā€¢ 48-bit address ā€¢ Address assigned when NIC card is manufactured. ā€¢ Packets can be sent to ā€¢ Single address ā€“ Unicast ā€¢ All stations on network ā€“ Broadcast (address = all 1s.) ā€¢ Subset of stations ā€“ Multicast ā€¢ Broadcast (address = all 1s.) ā€¢ All receivers accepts unicast / broadcats. ā€¢ Half addresses reserved for multicast (247) ā€¢ NIC can accepts zero or more multicasts.
  • 9. Ethernet Frame Sender adds: ā€¢ Senders address is source ā€¢ Recipients address in destination ā€¢ Type of data in frame type ā€¢ Error check data (CRC) Receiver NIC: ā€¢ Gets transmitted frame. ā€¢ Examines address and either accepts or rejects. ā€¢ Passes frame to system software.
  • 10. Media Access Control - MAC ā€¢ Shared medium ā€“ stations take turns at sharing the medium. ā€¢ Media access control ensures fairness. CSMA / CD ā€¢ Carrier Sense: wait till medium is idle before sending frame. ā€¢ Multiple Access: multiple computers use the same shared media. Each uses same access algorithm. ā€¢ Collision Detection: Listen to medium ā€“ detect if another stationā€™s signal interferes ā€“ back off and try again later.
  • 11. CSMA / CD ā€¢ If collision occurs: wait a random time t1 - 0< t1<d. ā€¢ D depends on transmission speed ā€“ time for frame width or 512 bits. ā€¢ If second collision occurs, wait a random time t2 - 0< t2<2d. ā€¢ Double range for each succesive collision. ā€¢ Exponential backoff ā€¢ No acknowledgement like TCP. ā€¢ CSMA/CA used in wireless networks where not all stations receive message. ā€¢ Both sides send small message followed by data: ā€¢ X is about to send to Y ā€¢ Y is about to receive from X ā€¢ Data frame sent from X to Y.
  • 12. Recent Developments ā€¢ 100Base-FX ā€¢ LED light source / MMF / 2 km max distance. ā€¢ Modal dispersion ā€“ limited bandwidth ā€¢ 100Base-SX (IEEE 802.3z) ā€¢ Short wavelength laser (850 nm) ā€¢ Max distance = 5 km. ā€¢ 100Base-LX ā€¢ Long wavelength laser (1310 nm) ā€¢ Max distance = 5 km.
  • 13. Beyond Gigabit Ethernet ā€¢ 10 Gb/s Ethernet ā€¢ No CSMS/CD, same frame format. ā€¢ Applications ā€¢ Upgrade LANs / Backbone. ā€¢ MAN applications.
  • 14. Segmentation ā€¢ Segmentation divides a computer network into smaller parts. The purpose is to improve network performance and security. ā€¢ Other terms that often mean the same thing are network segregation, network partitioning, and network isolation.
  • 15. How does segmentation work? ā€¢ Segmentation works by controlling how traffic flows among the parts. ā€¢ You could choose to stop all traffic in one part from reaching another, or you can limit the flow by traffic type, source, destination, and many other options. ā€¢ How you decide to segment your network is called a segmentation policy.
  • 16. What is an example of segmentation? ā€¢ Imagine a large bank with several branch offices. ā€¢ The bank's security policy restricts branch employees from accessing its financial reporting system. ā€¢ Network segmentation can enforce the security policy by preventing all branch traffic from reaching the financial system. ā€¢ And by reducing overall network traffic, the financial system will work better for the financial analysts who use it.
  • 17. What enforces segmentation policy? ā€¢ Some traditional technologies for segmentation included: ā€¢ internal firewalls, and Access Control List (ACL) and Virtual Local Area Network (VLAN) configurations on networking equipment. However, these approaches are costly and difficult. ā€¢ Today, software-defined access technology simplifies segmentation by grouping and tagging network traffic. ā€¢ It then uses traffic tags to enforce segmentation policy directly on the network equipment, yet without the complexity of traditional approaches.
  • 18. Firewall segmentation ā€¢ Firewalls are deployed inside a network or data center to create internal zones to segment functional areas from each other in order to limit attack surfaces, thereby preventing threats from spreading beyond a zone.
  • 19. Segmentation with SDN ā€¢ Software-defined networking (SDN) is relied on for greater network automation and programmability through centralized controllers that are abstracted from the physical hardware of the network.
  • 21. Micro-segmentationā€¦ ā€¢ Micro-segmentation creates secure zones across cloud and data center environments to isolate application workloads from one another and secure them individually. ā€¢ Micro-segmentation, firewall policies limit east-west traffic between workloads based on a zero-trust security approach to reduce attack surfaces, prevent the lateral movement of threats to contain breaches, and strengthen regulatory compliance. ā€¢ Micro-segmentation is also referred to as application segmentation or east-west segmentation in a multicloud data center.
  • 22. Benefits of network segmentation ā€¢ Improve operational performance ā€¢ Segmentation reduces network congestion. For example, a hospital's medical devices can be segmented from its visitor network so that medical devices are unaffected by web browsing. ā€¢ Limit cyberattack damage ā€¢ Segmentation improves cybersecurity by limiting how far an attack can spread. For example, segmentation keeps a malware outbreak in one section from affecting systems in another. ā€¢ Protect vulnerable devices ā€¢ Segmentation can stop harmful traffic from reaching devices that are unable to protect themselves from attack. For example, a hospital's connected infusion pumps may not be designed with advanced security defences. Network segmentation can stop harmful Internet traffic from ever reaching them. ā€¢ Reduce the scope of compliance ā€¢ Segmentation reduces the costs associated with regulatory compliance by limiting the number of in-scope systems. For example, segmentation separates the systems that process payments from those that don't. That way, the expensive compliance requirements and audit processes apply only to the in-scope systems, not the entire network.
  • 24. Peer to Peer and Client- Server NOS
  • 25. Overview ā€¢ A network operating system (NOS) provides services to clients over a network. ā€¢ Both the client/server and peer-to-peer networking models use network operating systems ā€¢ NOSs must be able to handle typical network duties. 25
  • 26. Major Tools of NOS 1. Providing access to remote printers, managing which users are using which printers when, managing how print jobs are queued, and recognizing when devices aren't available to the network 2. Enabling and managing access to files on remote systems, and determining who can access whatā€”and who can't 3. Granting access to remote applications and resources, such as the Internet, and making those resources seem like local resources to the user (the network is ideally transparent to the user) 26
  • 27. Major Tools of NOS 3. Providing routing services, including support for major networking protocols, so that the operating system knows what data to send where 4. Monitoring the system and security, so as to provide proper security against viruses, hackers, and data corruption. 5. Providing basic network administration utilities (such as SNMP, or Simple Network Management Protocol), enabling an administrator to perform tasks involving managing network resources and users. 27
  • 28. UNIX / Linux ā€¢ UNIX, created originally by Bell Labs (under AT and T), is a powerful server operating system that can be used in peer-to-peer or client/server networks. ā€¢ UNIX was the first operating system written in the C programming language. ā€¢ Linux was first developed in the late 1980s by a young student at the University of Helsinki in Finland named Linus Torvalds. 28
  • 29. UNIX / Linux Features ā€¢ UNIX (and Linux by extension) systems offer the following features: ā€¢ Fully protected multitasking: This means that UNIX can easily switch between tasks without the operating system crashing, because all UNIX processes are separate from those of the operating system. Even if an application crashes, unless it somehow manages to take down the X Windows system with it (which does happen), the operating system just keeps right on humming. 29
  • 30. UNIX / Linux Features ā€¢ High performance and stability : Many servers running UNIX or Linux have run for years without crashing once. The multitasking capabilities of UNIX, along with the rapid rate at which the operating system matures (especially with Linux, which is free and can be changed by anyone), make UNIX or Linux a powerful solution, especially for server systems. ā€¢ Multiuser capabilities : True multiuser systems enable different users to be logged in to the same system simultaneously. In UNIX and Linux, not only can a user log in to the same system at the same time as other users, that user can log in multiple times on the same system as the same user without the operating system batting an eyelash (such things are often necessary when administrating a network, particularly when managing users). ā€¢ 30
  • 31. UNIX / Linux Features ā€¢ Tons of high-quality software : From Apache Server (a Web server thatā€™s used on a whopping 6 in 10 major Web servers on the Internet) to the long- awaited Mozilla.org Mozilla 1.0 open source Web browser/e-mail software (Mozilla is an open source version of the venerated Netscape Communicator) to the powerful free Gimp graphics manipulation software, Linux is packed with tons of free, high-quality software. The trick is that, with UNIX/Linux, you give up compatibility with commercial software thatā€™s available only for Windows and/or Macintosh, currently. ā€¢ Easy customization : While other operating systems seem to offer less and less choice to the user about which applications to install with the operating system (Windows XP is this way), UNIX and especially Linux are the exact counterpoint to that model. With UNIX or Linux, you can actually customize your operating system kernel, stripping it down to just drivers and networking or installing everything possible. 31
  • 32. UNIX / Linux Features ā€¢ Modular architecture : The modular architecture of UNIX (and especially Linux) is directly responsible for how customizable UNIX is. Modular really means just what it sounds like: The operating system is built with a kernel that attaches modules to itself based on what the user needs. ā€¢ POSIX compliance: With a free operating system like UNIX, the different distributions (or flavors) of UNIX quickly became difficult to manage. Currently, hundreds of different implementations of UNIX are available. To enable programmers to have some idea of how to code their software such that it would run on any version of UNIX, the Institute of Electrical and Electronics Engineers, Inc. (IEEE) defined the Portable Operating System Interface (POSIX). ā€¢ Use of TCP/IP as the standard protocol stack: UNIX overwhelmingly uses TCP/IP as the protocol stack of choice. If you consider that the vast majority of the servers that help make up the Internet are UNIX computers of one form or another, you start to get the idea why TCP/IP is so popular. ā€¢ 32
  • 33. UNIX / Linux Features ā€¢ A shell interface: All versions of UNIX include a shell interface of some sort. If you have ever seen your computer use a completely black screen with white words written on it, thatā€™s a shell interface. You simply type in commands at the prompt and hit Enter to execute those commands. The hard part in using these interfaces is simply the effort it takes to learn all of those rather cryptic commands. Making life even more difficult, UNIX is ultimately customizable and can use different shells. The bash shell (likely the most popular shell in use today) and the tcsh shell, for example, have different commands for the same action. ā€¢ A graphical user interface: Although most versions of UNIX (such as Red Hat Linux) include a graphical user interface (GUI) these days, this has not always been the case. Historically, UNIX has been derided for its cryptic interface, and the advent of the GUI into popular UNIX systems was a direct result of this. Popular UNIX GUIs include KDE and GNOME. KDE is mostly used with Linux, but GNOME has versions for the Sun Solaris operating system, and therefore crosses the border from Linux into UNIX proper. 33
  • 34. UNIX / Linux Features ā€¢ Support for dumb terminals: ā€¢ Traditionally, UNIX was used for dumb terminals, and just about all versions of UNIX still include this capability. The traditional dumb terminal model involves one central UNIX server that is used by remote terminals to execute applications. Basically, a user logs in to a UNIX system via Telnet or some other remote connectivity application and uses UNIX commands to tell the remote system what functions to perform. In this way, users can download and check e-mail via a text- based e-mail client such as Pine. The dumb terminal in this form isnā€™t used much anymore; Web browsers are definitely more than just dumb terminalsā€” and Web browsers are now the clients most often seen by UNIX servers (at least those that make up the Internet). However, wireless devices such as cell phones and mobile Internet e-mail clients such as AOLā€™s Mobile Communicator device are good examples of modern dumb terminals. The devices have nearly no storage at all, and donā€™t carry large e-mail clients on the device; the message is simply transferred as text from one end to the other. 34
  • 35. UNIX / Linux Features ā€¢ Interoperability Open source software such as SAMBA is used to provide Windows users with Server Message Block (SMB) file sharing. ā€¢ Authentication:-Centralized login authentication ā€¢ File and Print Services Network File System (NFS) is a distributed file system that allows users to access files and directories located on remote computers and treat those files and directories as if they were local. LPR/LPD is the primary UNIX printing protocol used to submit jobs to the printer. The LPR component initiates commands such as "print waiting jobs," "receive job," and "send queue state," and the LPD component in the print server responds to them. ā€¢ Security With most Unix operating systems, the network services can be individually controlled to increase security. ā€¢ 35
  • 36. MAC OS X Server ā€¢ OS X Server, formerly Mac OS X Server, was a separately sold Unix server operating system from Apple Inc. ā€¢ It is architecturally identical to its desktop counterpart OS Xā€”with additional server programs and management and administration tools. 36
  • 37. MAC OS X Server ā€¢ Client Support TCP/IP file sharing with Macintosh clients using Network File System (NFS), and File Transfer Apple File Protocol 3.0 ā€¢ Interoperability Mac OS X Server uses the Open Source SAMBA to provide Windows users with Server Message Block (SMB) file sharing. Network File System (NFS) lets you make folders available to UNIX and Linux users. 37
  • 38. MAC OS X Server ā€¢ File and Print Services Mac OS X Server provides support for native Macintosh, Windows, UNIX, and Linux file sharing. Protocols supported include: ā€¢ Apple file services (AFP 3.0) from any AppleShare client over TCP/IP ā€¢ Windows (SMB/CIFS) file sharing using Samba ā€¢ Network File System (NFS) for UNIX and Linux file access ā€¢ Internet (FTP) ā€¢ Built-in print services can spool files to any PostScript-capable printer over TCP/IP, AppleTalk, or USB. Macintosh customers can use the LPR support in Print Center or the Desktop Printer utility to connect to a shared printer. Windows users can use their native SMB/CIFS protocol to connect to a shared printer. ā€¢ Print services for OS X Server ā€¢ Macintosh and UNIX (LPR/LPD) ā€¢ Windows (SMB/CIFS) 38
  • 39. MAC OS X Server ā€¢ Security ā€¢ Multiple-user architecture and user-level access privileges. ā€¢ Secure Sockets Layer (SSL) support provides encrypted and authenticated client/server communications. ā€¢ Secure Shell (SSH) provides encryption and authentication for secure remote administration. ā€¢ Kerberos support for centralized login authentication. 39
  • 40. NetWare ā€¢ NetWare is a computer network operating system developed by Novell, Inc. It initially used cooperative multitasking to run various services on a personal computer, using the IPX network protocol. ā€¢ NetWare has been a great LAN operating system for years, but only recently (with NetWare 5.x has NetWare moved beyond the LAN to where it can easily be a part of larger networks. Until quite recently, Novell NetWare used to be the single most- used network operating system (NOS). 40
  • 41. NetWare ā€¢ However, first Windows NT, and Windows 2000 and Linux, have steadily eaten into the NetWare market share for network operating systems. ā€¢ Currently, all three operating systems have a roughly equal share of the network operating system market, which means that NetWare is still used in at least one- third of all server systems. 41
  • 42. Netware Feature ā€¢ NetWare offers the following features : ā€¢ Multiprocessor kernel: This feature enables one NetWare operating system to utilize multiple processors. This process is called symmetric multiprocessing (SMP). ā€¢ SMP enables processors to share memory and bus paths, even coordinating the processing of a single application in parallel. ā€¢ NLMs: Where UNIX uses daemons and Windows uses services, NetWare uses NetWare Loadable Modules (or NLMs) to provide services from the server. NLMs are programs that run in the background on the server to provide consistent services to the network. 42
  • 43. Netware Feature ā€¢ PCI Hot Plug: This feature enables administrators to dynamically configure PCI network components while the system is running. You can replace, upgrade, or add new cards with the Hot replace, Hot upgrade, and Hot expansion features, respectively. ā€¢ Client Support NetWare 5 comes with Novell Client software for three client platforms: DOS and Windows 3.1x, Windows 95/98, and Windows NT. ā€¢ Interoperability You can set the Novell Clients for Windows 95/98 and Windows NT to work with one of three network protocol options: IP only, IP and IPX, or IPX only. 43
  • 44. Netware Feature ā€¢ Authentication Centralized login authentication ā€¢ File and Print Services File Services NetWare offers two choices of mutually compatible file services: Novell Storage Services (NSS) and the traditional NetWare File System. Both kinds of file services let you store, organize, manage, access, and retrieve data on the network. NSS gathers all unpartitioned free space that exists on all the hard drives connected to your server, together with any unused space in NetWare volumes, and places it into a storage pool. You create NSS volumes from this storage pool during server installation or later through NWCONFIG. Novell Distributed Print Services (NDPS) is the default and preferred print system in NetWare. NDPS supports IP-based as well as IPX-based printing. ā€¢ Security Novell has support for a public key infrastructure built into NetWare 5 using a public certificate, developed by RSA Security. 44
  • 45. Windows ā€¢ Directory Services A directory service is a database of user accounts and other information that network administrators use to control access to shared network resources. When users connect to a network, they have to be authenticated before they can access network resources. Authentication is the process of checking the user's credentials (usually a user name and a password) against the directory. Users that supply the proper credentials are permitted access according to the permissions specified by the network administrator. ā€¢ 45
  • 46. Windows ā€¢ Client Support Windows 3.x, Windows 95, Windows 98, and Windows NT Workstation 4.0 Windows 2000 Professional, Xp Pro. Vista Ultimate, Vista Business. ā€¢ Interoperability Windows 2000,2003,2008 Server supports UNIX, Novell NetWare, Windows NT Server 4.0, and Macintosh. 46
  • 47. Windows ā€¢ Authentication Successful user authentication in a Windows 2000,2003,2008 computing environment consists of separate processes: interactive logon, which confirms the user's identification to either a domain account or a local computer, and network authentication, which confirms the user's identification to any network service that the user attempts to access. ā€¢ Types of authentication Kerberos V5 is used with either a password or a smart card for interactive logon. It is also the default method of network authentication for services.The Kerberos V5 protocol verifies both the identity of the user and network services Secure Socket Layer/Transport Layer Security (SSL/TLS) authentication, is used when a user attempts to access a secure Web server. 47
  • 48. Windows ā€¢ File and Print Services You can add and maintain printers in Windows server using the print administration wizard, and you can add file shares using Active Directory management tools. Windows server also offers Distributed File Services, which let you combine files on more than one server into a single share. 48
  • 49. Windows ā€¢ Active Directory After many years of anticipation, Microsoft introduced an enterprise directory service in the Windows 2000 Server product line, called Active Directory. It uses a hierarchical tree design comprised of container and leaf objects. The fundamental unit of organization in Active Directory directory service is the domain, but; you can group domains together into a tree, and even group multiple trees together into a forest. Domains that are in the same tree automatically have bidirectional trust relationships established between them, which eliminates the need for administrators to create them manually. The trust relationships are also transitive , meaning that if Domain A trusts Domain B and Domain B trusts Domain C, then Domain A trusts Domain C. 49
  • 50. Windows ā€¢ Security User-level security protects shared network resources by requiring that a security provider authenticate a userā€™s request to access resources. The domain controller , grants access to the shared resource by verifying that the user name and password are the same as those on the user account list stored on the network security provider. Because the security provider maintains a network-wide list of user accounts and passwords, each client computer does not have to store a list of accounts. Share-level security protects shared network resources on the computer with individually assigned passwords. For example, you can assign a password to a folder or a locally attached printer. If other users want to access it, they need to type in the appropriate password. If you do not assign a password to a shared resource, every user with access to the network can access that resource. 50
  • 51. Token Ring ā€¢ Token Ring protocol is a communication protocol used in Local Area Network (LAN). ā€¢ In a token ring protocol, the topology of the network is used to define the order in which stations send. ā€¢ The stations are connected to one another in a single ring. It uses a special three-byte frame called a ā€œtokenā€ that travels around a ring. ā€¢ It makes use of Token Passing controlled access mechanism. ā€¢ Frames are also transmitted in the direction of the token. ā€¢ This way they will circulate around the ring and reach the station which is the destination.
  • 53. How Does A Token Ring Work? ā€¢ The frame or packet reaches the next station according to the sequence of the ring. ā€¢ Whether the frame contains a message addressed to them is determined by the current node. If yes, then the message is removed by the node from the frame. If not, then there is an empty frame(an empty frame is called the token frame). ā€¢ A Station that has the token frame, only has the access to transfer the data. If it has data then insert that data into the token frame otherwise release that token for the next station. ā€¢ The next station picks up that token frame for further transmission.
  • 54. Networks: Token Ring and FDDI 54 IEEE 802.5 and Token Ring ā€¢ Proposed in 1969 and initially referred to as a Newhall ring. Token ring :: a number of stations connected by transmission links in a ring topology. Information flows in one direction along the ring from source to destination and back to source. Medium access control is provided by a small frame, the token, that circulates around the ring when all stations are idle. Only the station possessing the token is allowed to transmit at any given time.
  • 55. Advantages of token rings ā€¢ Token rings reduce the chances of data collision. ā€¢ Token passing performs better than bus topology under heavy traffic. ā€¢ A server is not needed to control connectivity among the nodes.
  • 56. Disadvantages of token rings ā€¢ Data packets must pass through all the nodes, slowing routing. ā€¢ It is susceptible to failures that may occur in the network. ā€¢ Due to a fault in the ring, all network operation ceases.
  • 57. AppleTalk ā€¢ AppleTalk is a network operating system designed to connect Apple computers. Its components are built on Macintosh operating systems. ā€¢ The network topology is a bus or tree.
  • 58. AppleTalkā€¦ ā€¢ AppleTalk is a network operating system designed to connect Apple computers. Its components are built on Macintosh operating systems. There are two main versions of AppleTalk depending on how many years in the past the network was implemented, Phase 1 and Phase 2.
  • 59. History ā€¢ Just prior to its release in early 1985,AppleBus was renamed AppleTalk. ā€¢ The system had a number of limitations, including a speed of only 230.4 Kbit/s ,a maximum distance of 1000 feet from end to end , and only 32 nodes per LAN.
  • 60. Design AppleTalk was designed with a transparent network interface -that is, the interaction between Client computers and network servers requires little interaction from the user. Two versions of AppleTalk exist : AppleTalk Phase 1 and AppleTalk Phase 2.
  • 61. Network Components AppleTalk Internetwork consists of a Hierarchy of Components
  • 62. Sockets ā€¢ An AppleTalk socket is a unique, addressable location in an AppleTalk node. It is the logical point at which upper-layer AppleTalk software processes and the network layer Datagram Delivery Protocol (DDP) interact. Socket Clients Use Socket to Send and Receive Datagrams
  • 63. Nodes ā€¢ An AppleTalk node is a device that is connected to an AppleTalk network. ā€¢ This device might be a Macintosh computer, a printer, an IBM PC, a router, or some other similar device.
  • 64. Networks ā€¢ It consists of a single logical cable and multiple attached nodes. ā€¢ A single physical cable or multiple physical cables interconnected by using bridges or routers may be found.
  • 65. Networksā€¦ ā€¢ Non extended Networks It is a physical network segment that is assigned only a single network number, which can range between 1 and 1024. ā€¢ Extended Networks Also known as a cable range. It is a physical network segment that can be assigned multiple network numbers.
  • 66. Zones ā€¢ An AppleTalk zone is a logical group of nodes or networks that is defined when the network administrator configures the network. ā€¢ The nodes or networks need not be physically contiguous to belong to the same AppleTalk zone.
  • 67. Addressing in AppleTalk ā€¢ Network Number :- 16 bit number. ā€¢ Node Id :- 8 bit number identifies node on an AppleTalk network. ā€¢ Socket Number :- unique 8 bit number that identifies a socket. A maximum of 254 different socket number can be assigned in a node. ā€¢ Zone Name :- A name assigned to an arbitrary subset of node within an AppleTalk Internet.
  • 68. AppleTalk Manager ļ‚§ Our Application accesses the Services of the AppleTalk protocol through the AppleTalk manager. ļ‚§ It is a collection of Application Programming Interface to AppleTalk protocol.
  • 69. Security ā€¢ AppleTalk, like many network protocols, makes no provisions for network security. The design of the AppleTalk protocol architecture requires that security measures be implemented at higher application levels. Cisco supports AppleTalk distribution lists, allowing control of routing updates on a per-interface basis. This security feature is similar to those that Cisco provides for other protocols.
  • 70. Advantages ā€¢ Apple automatically includes AppleTalk in the Macintosh operating system. ā€¢ Easy to implement and configure. ā€¢ Setting up a small workgroup is simple and inexpensive.
  • 71. Disadvantages ā€¢ It is not suitable for very large networks. ā€¢ It is very slow compared to other LAN links at 230.4 Kbps. ā€¢ It is unsuitable for bandwidth intensive applications.
  • 72. ā¦ Attached Resource Computer NETwork ā¦ Token-Passing Local Area Network (LAN) ā¦ Originally 2.5 Mbps data rate ā¦ 255 Nodes or Stations ā¦ Variable Packet Length ā¦ Bus or Distributed Star Wiring ā¦ Unicast or Broadcast Messages ā¦ One to one or one to all What is ARCNET?
  • 73. ā¦ Coaxial, Fiber Optic, Twisted-pair Cabling ā¦ Over 11 Million Installed Nodes ā¦ Originally developed by Datapoint Corporation as an office network ā¦ Chip sets available from SMSC ā¦ ANSI/ATA 878.1-1999 Standard ā¦ Ideally suited for an industrial network What is ARCNET?
  • 74. ā¦ Broad Acceptance ā¦ Large Installed Base ā¦ Deterministic Performance ā¦ Simple to Install ā¦ Low Cost per Node ā¦ Robust Design ā¦ Multiple Cable Media Support ā¦ Multi-master Communication What are ARCNETā€™s Benefits?
  • 75. ā¦ HVAC ā¦ Motor Drives ā¦ Power Generation ā¦ Data Acquisition and Control ā¦ Manufacturing Information Systems ā¦ OfficeAutomation ā¦ Shipboard Automation Where is ARCNET Used?
  • 76. ā¦ Printing Press Controls ā¦ Telecommunications ā¦ Gaming Machines ā¦ Vehicular Navigation ā¦ Security Systems Where is ARCNET Used? Any application where real-time performance, high security and robust design is important.
  • 77. ā¦ Distributed Star topology requires the use of hubs How Does ARCNET Work? NODE NODE NODE NODE NODE NODE NODE NODE NODE HUB HUB HUB
  • 78. Application Presentation Session Transport Network Data Link Physical ā¦ OSI Reference Model How Does ARCNET Work? ARCNET defines the bottom two layers of the OSI model
  • 79. ā¦ Only Five Simple Commands ā¦ ITT - Invitation to transmit ā¦ FBE - Free buffer enquiry ā¦ PAC - Packet ā¦ ACK - Acknowledgement ā¦ NAK - Negative acknowledgement ARCNET Protocol
  • 80. ā¦ Deterministic Token Passing ā¦ Packet Flow Control ā¦ Error Detection ā¦ Auto Reconfiguration ā¦ Variable Packet Size ā¦ Supports Various Transceivers & Media ā¦ Supports Various Software Drivers ā¦ Up to 255 Nodes Per Network ARCNET Protocol Features
  • 81. ā¦ Token Passing - Transmitting on the network is only permitted when a node has the token ā¦ Every node can transmit once during each token rotation āœÆBenefits: ā¦ Every node has a guaranteed response time to transmit ā¦ Deterministic behavior ARCNET Protocol Features
  • 82. ā¦ Auto-Reconfiguration - Network is automatically reconfigured when a node joins or leaves the network ā¦ Token pass is automatically reconfigured ā¦ Typical time 20 - 30 ms ā¦ Supports live node insertion and deletion ā¦ Variable Packet Size ā¦ From 1 to 507 bytes per packet ARCNET Protocol Features
  • 83. ā¦ Packet Flow Control - Transmitter checks receiver to make sure it is ready to receive a packet ā¦ Reduced software overhead ā¦ Increased bandwidth ā¦ No lost packets due to input buffer overruns ARCNET Protocol Features
  • 84. ā¦ Error Detection - 16 bit CRC checks each packet ā¦ Corrupted packets automatically rejected ā¦ Transmitter is aware of the error ā¦ Reduced software overhead ā¦ Better CPU utilization ARCNET Protocol Features
  • 85. ā¦ Token passes from low to high address ARCNET Logical Ring 109 122 255 6
  • 86. PAC = ALERT SOH SID DID DID CP DATA ... DATA CRC CRC ARCNET Frames Only PAC has a variable length frame ITT = FBE = ALERT EOT DID DID ALERT ENQ DID DID ACK= ALERT ACK NAK= ALERT NAK
  • 91. ā¦ ITT 15.6 (invitation to transmit) ā¦ Tta 12.6 (turnaround time) ā¦ FBE 15.6 (free buffer enquiry) ā¦ Tta 12.6 (turnaround time) ā¦ ACK 6.8 (acknowledge) ā¦ Tta 12.6 (turnaround time) ā¦ PAC 33.2 +4.4 ļ­sec/byte ā¦ Tta 12.6 (turnaround time) ā¦ ACK 6.8 (acknowledge) ā¦ Tta 12.6 (turnaround time) ARCNET Message Timing in Microseconds (2.5 Mbps) 141 ļ­sec + 4.4 ļ­sec/byte Minimum Message: 141 Microseconds
  • 92. If You Cut ARCNET... ...You Just Get Two ARCNETS Within Milliseconds
  • 93. ā¦ Flexibility ā¦ Distributed Star Topology Requiring Hubs ā¦ Hub-less Bus Topology ā¦ Coaxial Cable ā¦ Twisted Pair ā¦ Fiber Optics ARCNET Cabling
  • 94. ā¦ Coaxial Cable In a Star Topology ā¦ Either a star or distributed star topology ā¦ Utilize active or passive hubs Traditional ARCNET NODE NODE NODE NODE NODE NODE NODE NODE NODE HUB HUB HUB
  • 95. ā¦ Coaxial Star ā¦ Original method of communication ā¦ RG-62/u coaxial cable ā¦ BNC connectors ā¦ Only two transceivers per segment ā¦ Segment length up to 2,000 feet ā¦ Requires the use of a hub to go beyond two stations Traditional ARCNET We call this ā€“CXS.
  • 96. ā¦ Coaxial Bus ā¦ Lower cost hub-less network ā¦ RG-62/u coaxial cable ā¦ Up to eight NIMs per bus segment ā¦ Segment length limited to 1,000 feet ā¦ BNC connectors and Tees ā¦ Requires end of line terminators Traditional ARCNET We call this ā€“CXB.
  • 97. ā¦ Twisted-Pair Star ā¦ Requires active hubs for network expansion ā¦ Only 328 foot segment length ā¦ RJ-11 connectors ā¦ Utilizes BALUNā€™s to convert from coaxial cable to twisted-pair Traditional ARCNET We call this ā€“TPS.
  • 98. ā¦ Twisted-Pair Bus ā¦ Modified circuitry of coaxial bus implementation ā¦ Supports eight nodes ā¦ Reduction in segment length to 400 feet ā¦ RJ-11 or RJ-45 connectors ā¦ Requires end of line terminators Traditional ARCNET We call this ā€“TPB when using RJ-11 connectors and ā€“TB5 when using RJ-45 connectors.
  • 99. ā¦ Fiber Optics ā¦ 850 nm wavelength with ST connectors ā¦ 62.5/125 duplex multimode fiber cable ā¦ 6000 foot segment length ā¦ Large networks can be achieved by cascading hubs ā¦ ARCNET controller chips may need to be set to extended timeouts Traditional ARCNET We call this ā€“FOG.
  • 100. ā¦ Fiber Optics ā¦ 1300 nm wavelength with ST connectors ā¦ 62.5/125 duplex multimode or duplex single-mode fiber cable ā¦ 10,000 m multimode and 14,000 m single-mode Traditional ARCNET We call this ā€“FG3.

Editor's Notes

  1. Short forĀ lineĀ printerĀ daemon/lineĀ printerĀ remote, a printerĀ protocolthat usesĀ TCP/IPĀ to establish connections between printers andworkstationsĀ on aĀ network. The technology was developed originally for BSDĀ UNIXĀ and has since become theĀ de factoĀ cross-platformprinting protocol.
  2. IPX (Internetwork Packet Exchange) is a networking protocol from Novell that interconnects networks that use Novell's NetWare clients and servers.