Experiment # 1 Introduction To Networks Topologies & Components
Experiment # 1 Introduction To Networks Topologies & Components
Experiment # 1 Introduction To Networks Topologies & Components
2-1 : Introduction
A computer network can be small and consist of only two computers, or it can be a
worldwide network such as the Internet. Due to today's high-speed electronics,
communicating with a computer on the other side of the planet can be virtually as fast as
communicating with a computer just down the street. Now let's take a look at the smaller,
interoffice-type networks called LANs (Local Area Networks).
2-2 : Objectives
At the end of this experiment, you will be able to:
• Describe what a Local Area Network is.
• Describe the different types of LANs.
• Describe some of the key components of a network system.
• State some of the benefits LAN technology offers to system users.
LANs are geographically local, but a LAN may function in a fairly large area (such as a
university campus or among government buildings). The important thing to remember is that
any single point in the network can communicate with any other point, allowing independent
devices to communicate with each other.
8
2-4 : LAN Terminology
Packets : Packets are data units, pieces of data, that are acted upon by the network. They pass
through various layers in the network architecture and are used to send information through
the network.
Personal computer (PC) : Another name for a microcomputer. The term PC has come to
mean a machine running the DOS operating system, but PCs are not limited to that operating
system. A PC is a computer that is self-contained, but limited in storage space and speed. It is
typically used by one person at a workplace.
Protocol : A protocol is the predefined standard or set of rules by which a function or service
is performed.
Server : a personal computer or specialized device that provides and manages access to
shared network resources, such as hard disks and printers.
Terminal : A device that allows input and output of data to a computer. The term is most
frequently used to describe a device that has a keyboard for data entry and either a printer or a
monitor for displaying data.
9
information. Communication between the central computer and the client machine is
accomplished by a direct line, RF (radio frequency), infrared, or through a modem.
The users may never know which type of network they are connected to. Often, the only
knowledge the user has of the system is the interface they use (the screen they are looking at).
The following sections describe different LAN types: single node, star, ring, bus, and
hierarchical.
A terminal can access files and applications from the host, work on them, and return them to
the host. However, some terminals do contain their own applications and files. In this case,
they may use the central computer only for backing up files on its hard drive or using its
printer or other peripheral device.
A dumb terminal is the cheapest computer device to use on a network since you don't have to
pay for the processing power of a stand-alone computer, but a dumb terminal relies on the
resources of the central computer.
The central computer (host) need not be a large computer. In fact, it may be a very small
computer (microcomputer) such as the one you would find on a desk or in someone's home.
In many cases, however, the central computer is larger (mini computer to mainframe), and
capable of hosting hundreds of terminals.
10
2-5-2 : STAR ARCHITECTURE
The star architecture, shown in Figure 2-2, has a central hub to which all of the nodes
are attached, usually by copper cable or fiber optics.
The hub is the focal point of the star configuration, and all network traffic must pass through
the hub. In this configuration, multiple nodes are attached to the central computer, rather than
just two nodes, as shown in Figure 2-2. The star network represents a cost-effective way to
share information among many users. Typical uses include airline reservation counters, or
small business offices in which several people must have access to common applications and
files.
These days, many or all of the nodes on the network have their own intelligence, though
they can be dumb terminals with all of the power kept in the central computer. If the nodes
have their own intelligence, there is little need for a central computer and the intelligence can
be spread out across the nodes.
Connections are accomplished as in the single node example that uses direct lines or modem
connections. The way in which they are connected may also vary. Each node is usually
connected to the central computer.
11
small message, is continually passed from node to node around the ring. Although the token
passes through every node on the network, it can travel the entire ring very quickly because
very little processing of the token occurs at each node. Because of the use of the token,
networks with ring topologies are often called Token-Rings.
To transmit on a Token-Ring network, a node waits to receive the token without any message
attached to it. The node then appends its message to the token which makes its way around
the ring as just described.
12
rather popular. IBM's Token-Ring can operate at either 4 Mbps (million bits per second) or 16
Mbps.
13
Figure 2-4 : A bus structure network
14
CAN : Campus Area Network covers an area of 5 to 100 km and are privately owned.
MAN : Metropolitan Area Networks are from 2 to 100 km.
WAN : Wide Area Networks span more than 100 km and can encompass the entire world.
Example: If you will be using fiber optic cable, then the NIC must have fiber optic
connectors on it. Figure 2-7 shows a NIC with an RJ45 connector and a BNC connector, but
many Ethernet cards have only one connector or up to three connectors to choose from.
15