The Fundamentals of Network Communication
The Fundamentals of Network Communication
The Fundamentals of Network Communication
• 1. The NIC card on the server receives signals from the network
medium and converts them into message data, which is read by
the NIC driver.
• 2. The NIC driver passes the message to the network protocol.
• 3. The network protocol determines which server software the
message is targeting and passes the message to this designated
software.
• 4. The server software receives the message and responds by
sending the requested data to the client computer, using the four
steps outlined previously.
Layers of the Network Communication Process
• Each step of a client accessing network resources is often referred to
as a “layer” in the network communication process.
• Each layer has a specific function to accomplish, and all the layers
work together.
Cont.
How Two Computers Communicate on a LAN:
• TCP/IP provides
name server functions
through its Domain Name
System
Network Terms
• LANs, Internetworks, WANs, and MANs
• An internetwork is a networked collection of LANs tied together by
devices such as routers, hubs, or switch.
LAN
• A small network, limited to a single collection of machines
and connected by one or more interconnecting devices in
a small geographic area, is called a local area network
(LAN).
Internetworks
• Internetworks are usually created for these reasons:
• 1. Two or more groups of users and their computers should be
logically separated on the network yet still allow the groups to
communicate.
• 2. The number of computers in a single LAN has grown to the point
that network communication is no longer efficient.
• The pause allows the receiving computer to process received data, such as
writing it to disk.
• The pause allows the receiving computer to receive data from other
computers at the same time.
• The pause gives the sending computer an opportunity to receive data from
other computers and perform other processing tasks.
• If an error occurs during transmission of a large file, only the chunks of data
involved in the error have to be sent again, not the entire file.
Cont.
• Frames have an error-checking code added to the back end of the packet,
which is why they’re called frames.
• Frames are essentially the final state of data before it gets placed on the
network medium as bits.
Cont.
• The process of adding IP addresses and then MAC
addresses to chunks of data is called encapsulation.
• Header
• Trailer
Clients and Servers
• Client A client, in networking terms, can be a workstation
running a client OS, such as Windows 7.
• Network computer – Network server
• Any user can share resources on his or her computer with any other user’s
computer.
• Each user can determine what level of access other users have to his or her
shared resources.
Cont.
• Disadvantages:
• 1. complexity of having to remember multiple sets of credentials to
access resources spread out over several computers.
• 2. more users try to access resources from a particular machine
and endure a performance reduction.
• 3. data organization (keeping track of information).
• 4. each machine must be backed up to protect shared data.
Cont.
• Advantages for small organization:
• 1. easiest and most inexpensive to install.
• 2. can share information immediately.
• 3. client computers are less expensive than server.
• 4. easy to use and don’t require extensive staff training.
• 5. loss of a single machine means loss of only information on it
• Servers are dedicated to running network services only (no user applications).
Cont.
• A domain is a collection of users and computers whose accounts are
managed by Windows servers called domain controllers.
• Disadvantages:
• 1. additional overhead of operating a server-based network.
• 2. Server-based networks require one or more dedicated computers to
run the server OS.
• 3. hardware is costly.
Network Servers
• Network Servers are used as the central repository of data and
various programs that are shared by users in a network.
• File servers are used to store data in a central location, so they must
be kept secure to ensure that only those who are authorized are able
to use the files.
• Client computers access the shared data by contacting the servers via the
usual method, and the servers retrieve the requested data from the SAN
devices and pass it along to the client computer.
Cont.
• 2. Wireless Personal Area Networks (WPAN). A wireless personal area
network (WPAN) is a short-range networking technology designed to connect
personal devices to exchange information.