1 / 21

IST 126

IST 126. Computer Networks Day 2. Server Security. Only one password needed to access network Associated with the account is permission to access certain files and not others The access level you have for each file can be specified

Télécharger la présentation

IST 126

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. IST 126 Computer Networks Day 2

  2. Server Security • Only one password needed to access network • Associated with the account is permission to access certain files and not others • The access level you have for each file can be specified • This security applies even if you have access to the server machine itself

  3. Types of Servers • File Server – Allows network users to share files • Print Server – Manages printing in a network • Application Server – Holds application software and is available to clients. The way this works differs considerably • Message Server – Provides e-mail and work group applications. Example – Coordination of approval of a requisition from all necessary individuals and in the correct order • Database Server – Provides powerful database capabilities to network

  4. Classification of LANs • LANs are classified into broad categories according to the shape of the network cables • The primary topologies used in LANs are: bus, ring, star. • Each topology has advantages and disadvantages

  5. Physical Network Topologiesfor LANs • Bus topology • Star Topology • Ring Topology

  6. Bus Topology • Consists of a single cable with devices connected to it along its length • When one computer sends a signal, all computers on the cable receive the information but only one accepts it • Only one computer at a time can transmit • The end of the bus must be terminated so that the signal does not bounce back and travel back up the wire • Ethernet 10Base2 (thinnet Ethernet) is a network based on a physical bus topology

  7. Advantages of Bus Topology • Simple and easy to use • Requires the least amount of cable • Easy to extend a bus with an appropriate connector

  8. Disadvantages of a Bus Topology • Heavy network traffic can cause a bus to slow considerably • Each connector weakens the signal • Difficult to troubleshoot a bus • A cable break or a loose connector will cause reflections and bring down the whole network

  9. Star Topology • All cables run from the computers to a central location where a hub is located • The hub either resends the message to all the computers (broadcast star network) or only to the destination computer (switched star network) • We use a star topology here at Mercer in our labs

  10. Advantages of Star Topology • Easy to modify and add new computers • Single computer failure does not bring down whole network • Can use several cable types • Is the most flexible and the easiest to diagnose when there is a problem

  11. Disadvantages of the Star Topology • If the central hub fails, the whole network fails • It cost more to cable a star network

  12. Ring Topology • Each computer is connected to the next computer • The last computer is connected to the first • The IEEE 802.5 standard defines the token ring network

  13. Advantages of Ring • No one computer can monopolize the network if you are using a token ring • The network degrades gracefully as the load increases • The network will continue to function in a useful manner rather than fail all at one time

  14. Disadvantages of Ring • Failure of one computer on the ring can affect the whole network • Difficult to troublshoot a ring • Adding or removing computers disrupts the network

  15. Ethernet • Most popular LAN technology • Uses bus and star topologies • Several versions of Ethernet have been defined • thick Ethernet uses thick coaxial cable • Thin Ethernet uses thin coaxial cable • Gigabit Ethernet uses CAT 5 twisted pair

  16. Ethernet uses Manchester Encoding • All data is encoded using binary Manchester encoding • 0 – Represented by a transition in the middle of the bit time from high-to-low voltage • 1- Represented by a transition in the middle of the bit time from low-to-high voltage

  17. Ethernet Sharing • Ethernet requires multiple computers to share access to a single medium • A sender transmits a signal which propagates over the whole LAN • Only one frame of information can be sent at a time – other computers have to wait to send • After one frame is transmitted, the shared cable becomes available for another computer to use

  18. How are Transmissions Coordinated on Ethernet LAN? • There is not centralized controller telling each computer when it is their turn to trnamit • All computers use a scheme called Carrier Sense Multiple Access (CSMA) • Explain how CSMA works

  19. CSMA Operation • When no computer is sending a frame the network does not contain an electrical signal (called a carrier signal) • A computer wishing to transmit can check cable for a carrier signal • If no carrier is detected, the computer is allowed to transmit • If carrier is present, the computer must wait until transmission is completed.

  20. Collisions in Ethernet • Two computers can check for a carrier at the same time • Finding none they both can begin to transmit at the same time • This causes a collision between the two signals • This produces a garbled transmission

  21. Collision Detection • The two computers can detect the collision • Each sending station immediately stops transmitting • The computers must wait for the cable to become idle again before transmitting • Ethernet requires that the computers wait a random amount of time before trying to transmit again.

More Related