Professional Documents
Culture Documents
Computer networks.
Present by:
Edison Alexander Taborda Rueda.
Nikol Dayanna Castao Zuluaga.
Richar Fabin Zuluaga Lpez.
Lizet Natalia Vlez Villa.
Instructor:
Andrs Mauricio Clavijo.
Grade:
10-
La Unin Valle.
November 04th 2015
Content:
1. Computer networks.
1.1 Basic components of the networks.
1.2.1 Software
1.2.2 Hardware
1.2.3 End-user devices.
2. Servers.
2.1 Servidor file.
2.2 Servidor print.
2.3 Servidor email.
2.4 Servidor fax.
2.5 Servidor telephony.
2.6 Servidor proxy.
2.7 Servidor remote access.
2.8 Service web.
2.9 Service streaming.
2.10 Service booking.
2.11 Service authentication.
2.13 For network services.
2.14 Servitor database.
2.15 Servitor application.
2.16 Services monitoring and management.
3 networked storage.
4. Networking protocols.
5. Classification of RESDES.
5.1. Medios guided.
5.1.1. Cable twisted pair.
5.1.2. Coaxial cable.
5.1.3. Optic fiber.
5.2. Medios unguided.
5.2.1 Red radio.
5.2.2 Infrared network.
5.2.3 Microwave network.
5.3 functional relationships.
5.4 technologies.
5.5. for physical topology.
5.6. for directionality of data.
5.7 For degree of authentication.
5.8. by degree of diffusion.
5.9. for service or function.
6. PAN network.
7. Red WPAN.
8. Red LAN.
9. Red WLAN.
10. CAN network.
11. MAN network.
12. WAN.
13. Red SAN.
14. VLAN.
Introduction:
The next job is to publicize the computer networks and everything about them. Information
you need to know to be part of the mode of institution.
Computer networks.
Software:
Network operating system: allows the interconnection of computers to access services and
resources. Like a computer can not work without an operating system, a computer network
can not function without a network operating system. In many cases the network operating
system is part of the system of servers and clients.
Application Software: ultimately, all the elements are used for the user of each season, to
use its programs and specific files. This software can be as wide as needed and may
include processors, integrated packages, administrative accounting systems and related
areas, specialized systems, emails, etc. The right software in the network operating
system chosen and the necessary protocols allow servers to create services that are
needed.
Hardware:
To achieve the link between computers and transmission media (cable network or physical
means for wired and infrared or radio networks to wireless networks), the intervention of a
network card (NIC Network Interface Card) is needed with which can send and receive
data packets to and from other computers, using a communication protocol for converting
that data to a format that can be transmitted in the middle (bits, zeros and ones). Note that
each network card is assigned a unique identifier by its manufacturer, known as MAC
(Media Access Control), which consists of 48 bits (6 bytes) direction. This identifier allows
traffic route network data from sender to receiver proper.
The work of the network adapter is to convert electrical signals traveling through the cable
(eg Ethernet) or radio waves (eg Wi-Fi) in a signal that the computer can interpret.
These adapters are some PCI cards that plug into the expansion slots of the computer. In
the case of laptops, these cards come in PCMCIA or similar format. In the twenty-first
century computers, both desktops and laptops, these cards are already integrated into the
motherboard.
Network adapter is the generic name given to the devices that perform the conversion.
This means that these adapters may be either Ethernet, wireless as well as other types
such as optical fiber, coaxial, etc. Also available speeds vary with the type of adapter;
these may be, Ethernet, 10, 100, 1000 or 10000 Mbps, and wireless mainly 11, 54, 300
Mbps.
End-user devices.
Personal computers: are the usual working places of the networks. Within the category of
computers, personal computers, and more specifically, it is gathered all used for different
functions, according to the work they do. They range from the powerful work for editing
video, for example, to light portable computers known as netbooks, whose primary
function is to browse the Internet. The tablets became popular at the end of the first
decade of the century, especially by the success of Apple's iPad.
Terminal: many networks use this type of equipment instead of jobs for data entry. These
data are displayed only or introduced. Such terminals, working together with a server,
which is who actually processes the data and sends data screens to terminals.
Household Electronics: network cards began to be integrated, as usual, from the first
decade of the century, in many common household items: televisions, multimedia
computers, projectors, game consoles, cell phones, e-books, etc. and even in appliances
such as refrigerators, making parts of the networks with computers traditions.
Printers: Many of these devices are able to act as part of a computer network without any
other element, such as a print server acting as an intermediary between the printer and the
device is requesting a print job to be finished. The means of connectivity of these devices
can be wired or wireless, within the latter can be via Ethernet, Wi-Fi, infrared or bluetooth.
In some cases they are integrated into the printer and others through external converters.
Other elements: scanners, CD-ROM.
Servers
Computers are available to customers different services. The following list are some
common types of servers and their purposes:
File server: stores various types of file and distributed to other clients on the
network. They can be served in different format according to the service provided
and the average FTP, HTTP, etc.
Print Server: controlling one or more printers and accepts print jobs from other
clients on the network, queuing print jobs (though you can also change the priority
of different prints), and performing most or all other functions on a workstation
would be made to achieve a print job if the printer was directly connected to the
printer port of the workstation.
Mail Server: stores, sends, receives, en route and perform other operations related
to e-mail (e-mail) for network clients.
Fax Server: stores, sends, receive, en route and perform other functions necessary
for the transmission, reception and appropriate distribution of faxes to and / or from
a computer or a physical fax device.
Telephony Server: Performs functions related to the phone, as is voicemail,
performing the functions of an interactive system for voice response, storing voice
messages, routing calls and also controlling the network or Internet, etc. They can
operate with analog or IP telephony.
Proxy: takes a certain type of functions on behalf of other clients on the network to
increase the performance of certain operations (eg Prefetching and upload
documents or other data requested very often.). Also "serves" security; that is, it
has a firewall (firewall). It enables you to manage Internet access in a computer
network allowing or denying access to different Web sites based on content, origin /
destination, user, schedule, etc.
Remote Access Server (Remote Access Service, RAS) modem control lines or
other communication channels to network requests a remote location connected to
the network answer incoming phone calls or acknowledge the request of the
network and perform the necessary safety checks and other procedures required to
register a user on the network. Their inputs to establish virtual private networks
(VPN).
Web Server: stores HTML documents, images, text files, scripts, and other web
material composed of data (usually called content), and distributing content to
customers who ask on the network.
Streaming server: distributed multimedia servers continuously avoiding the user to
wait for the complete download the file. This will be distributed within content type,
video, etc. in real time and without delay.
Backup Server (standby server): is the backup software of the installed network
and has large amounts of network storage on hard drives or other storage available
to be used in order to ensure that the loss a main server does not affect the
network.
Authentication Server: is responsible for verifying that a user can connect to the
network at any point of access, either wired or wireless, based on the 802.1x
standard can be a RADIUS server type.
Servers for network services: These teams manage those services necessary own
network without which they could not interconnect, at least easily.
Network Storage
In the medium and large networks of primary data storage it does not occur on the
servers themselves but external, known devices such as disk arrays (disk arrays)
interconnected, usually SAN or network-attached storage (NAS) type networks are
used. These means to centralize information, better management of space,
redundant systems and high availability.
The backup media are often included in the same network where the storage
media mentioned above are housed, thus transferring data between them, both
when backing as possible restorations are produced within this network without
affect customer traffic to servers or between them.
Network Devices:
The computer equipment described in need of a technology that forms the network
in question. Depending on requirements must select the right elements to complete
the system. For example, if we want to join teams including an office must connect
through a switch or hub, if there are also several laptops with network cards Wi-Fi
must connect a wireless access point to pick up their signals and can send that
apply to them, turn the access point is connected to the switch by a cable. If they
all should have access to Internet, to interconnect via a router, it could be ADSL,
Ethernet over fiber, broadband, etc.
The elements of the electronic network most common are:
Network switch.
Router.
Network Bridge.
Bridge and router network.
Wireless Access Point Wireless Access Point (WAP).
Network Protocols
There are various protocols, standards and models that determine the overall
operation of the networks. Highlights include the OSI model and TCP / IP. Each
model structure of a network operating differently. The OSI model has seven layers
very defined and differentiated functions and the TCP / IP with four distinct layers
but combine existing functions in the seven layers of the model OSI.3 protocols are
distributed by the different layers but are not defined as part of the model itself but
as different entities of international regulations, so that the OSI model can not be
considered architecture red.
OSI Model
The OSI (Open Systems Interconnection) was created by the ISO and is
responsible for the connection between open systems, that is, open to
communication with other systems. The principles on which it based its creation
were: a better definition of the functions of each layer, avoid grouping different
functions in the same layer and further simplification in the operation of the model
in general.
This model divides network functions into seven distinct layers:
7.
layers
application layer
exchange unit
APDU
6.
presentation layer
PPDU
5.
Session Layer
SPDU
4.
Transport Layer
TPDU
3.
Network layer
network packet
2.
Network Frame
1.
physical layer
Bit
TCP / IP model
This model is currently implemented globally: it was first used in ARPANET and is currently
used in global Internet and local networks. Its name derives from the union of the names of
the two main protocols that comprise TCP at the transport layer and IP layer red.
other standards
There are other standards, More specifically, defining the mode of operation of various
data transmission technologies. The following list is not complete, only shows some
examples:
Tecnology
Ethernet
standard
IEEE 802.3
1983
other details
Token Ring
IEEE 802.5
19706
WLAN
IEEE 802.11
19977
Bluetooth
IEEE 802.15
20028
FDDI
ISO 9314-x
1987
PPP
RFC 1661
19949
Classification of networks:
A network may receive different denominations classification based on different
taxonomies: range, connection type, technology, etc.
By connection type
Guided media
Twisted pair: a form of connection in which two insulated electrical conductors are
intertwined to have lower noise and increased power and reduce crosstalk from adjacent
cables. Depending on the network can be used, one, two, four or more twisted pairs.
Coaxial cable: used to transport electromagnetic high frequency signals, which has a
solid core (usually copper) or yarn, coated with a dielectric material and a mesh or
shielding used to block or shield the information signal against interference or noise
outside.
Fiber Optics: is a transmission medium routinely used in data networks; a very thin
thread of a transparent material, glass or plastics, whereby light pulses that represent data
to be transmitted is sent.
Media unguided
Network radio is one that employs radiofrequency connecting means of the various
stations of the network.
Red IR (Infrared Data Association, IrDA), allowing communication between two nodes,
using a series of infrared networks for it. They are transmitters / receivers of infrared
waves between the two devices, each device needs the other for communication so it is
little use to large scale. Do not have powerful and require visibility between devices.
Red microwave, is a type of wireless network that uses microwaves as transmission
medium. The most common protocols are: IEEE 802.11b transmits at 2.4 GHz, reaching
speeds of 11 Mbps (megabits per second); the range of 5.4 to 5.7 GHz for IEEE 802.11a
protocol; IEEE 802.11nque allows speeds up to 600 Mbps; etc.
By functional relationship
Client-server architecture is that basically consists of a client making requests to another
program (the server) that gives answer.
Peer-to-peer network or peer computer network is one in which all or some aspects work
without fixed customers or servers, but a series of nodes that behave as equal.
By technology
point to point network is one in which there is a multitude of connections between
individual pairs of machines. This type of network requires, in some cases, intermediate
systems establish routes for data packets can be transmitted. The usual electronic means
for interconnection is the switch or switch.
Broadcasting Network (broadcast) is characterized by transmitting data over a single
communication channel shared by all machines on the network. In this case, the packet
sent is received by all machines on the network but only the recipient can process. The
teams joined by a hub, forming networks of this kind.
multipoint network, has a line or media whose use is shared by all terminals in the
network. Information flows bidirectional. The terminals can be geographically separated.
By directionality of data
Simplex or unidirectional data terminal equipment transmits and the other receives.
Half-duplex or half-duplex: the method or protocol for sending information is bidirectional
but not full duplex, only one device transmits at a time.
Full-duplex or duplex: the two teams involved in the communication can simultaneously
transmit and receive.
By degree of authentication
Private Network: a network that can only be used by some people and that is configured
with personal password.
Public Access Network: a public network is defined as a network that anyone can use
and not as networks that are configured with personal password. It is a network of
interconnected computers able to share information and allows users to communicate
regardless of their geographical location.
By degree of dissemination
An intranet is a private computer network that uses Internet technology to share in an
organization of their information systems and operational systems.
The Internet is a decentralized set of interconnected communications networks that use
the family of TCP / IP protocols, ensuring that the heterogeneous physical networks that
compose function as a single logical network, worldwide.
Personal area network (PAN) is a computer network used for communication between
devices in computer information technologies and different about a person. BREAD
represents the concept of people-centered networks, and that allow these people to
communicate with their personal devices (eg, PDAs, electronic boards of navigation,
PDAs, laptops) so as to enable a wireless connection to the world external. Some
examples of devices that are used in a PAN are personal computers, printers, fax
machines, phones, PDAs, scanners and video game consoles.
The PAN may include wired and wireless devices.
The reach of a PAN typically extends to 10 meters.
A wired PAN is usually constructed with USB and Fire wire connections while technologies
such as Bluetooth and infrared communication typically form a wireless PAN.
Keywords: personal area network (PAN), PAN personal area networks, identifying common
threats to wireless security, bread personal area network, computer network bread, bread
scope of the network, which is the scope of a pan network.
WPAN network
Wireless Personal Area Network (WPAN), Wireless Personal Area Network or Wireless
Personal Area Network is a computer network for communication between different
devices (computers, internet access points, cell phones, PDAs, audio devices, printers )
close to the access point.
These networks are typically a few meters and for personal use.
The basis of the concept of network for personal space came from ideas that emerged in
1995 from the Massachusetts Institute of Technology (MIT) come to use electrical signals
or electrical impulses from the human body, so we can communicate the same with
attached devices. This was accepted first by IBM Research Labs and then had many
variations developed by the various institutions and research companies. PAN different
solutions include:
Project Oxygen (MIT);
Pico-radius;
Infrared Data Association (IrDA);
Bluetooth;
The concept of Bluetooth, originally developed to replace cables, is being accepted
worldwide, and some of these ideas are incorporated into the IEEE 802.15 standard
related to the NAPs.
It is a group of computers that belong to the same organization and are linked within a
small geographic area through a network, usually with the same technology (the most he
used is Ethernet).
A local area network is a network in its simplest form. The speed of data transfer in a local
area network can reach 10 Mbps (for example, an Ethernet network) and 1 Gbps (for
example, FDDI, or Gigabit Ethernet). A local area network may contain 100 or even 1000,
users.
By extending the definition of a LAN to the services provided, you can define two different
operating modes:
In a network "peer to peer" (abbreviated P2P) communication takes place from one
computer to another without a central computer and each team has the same function.
In an environment "client / server", a central computer provides network services to
users.
WLAN network
A Wireless LAN, also known as WLAN (wireless local area network of), is a flexible
wireless communication, widely used as an alternative to wired LANs, or as an extension
thereof. Using radio frequency technology that allows greater mobility to users by
minimizing wired connections. These networks are gaining importance in many fields, such
as warehouses or manufacturing, where the information in real time to a central terminal is
transmitted. They are also very popular in nightclubs to share Internet access among
multiple computers.
Performance:
Radio waves are used to carry information from one point to another without physical
media guide. Speaking of radio waves we usually refer to radio carriers, on which the
information is going, and which function to bring energy to a remote receiver. Data to be
transmitted are superimposed on the radio carrier and thus can be accurately extracted at
the receiver end.
This process is called modulation of the carrier by the information being transmitted. If the
waves are transmitted at different radio frequencies, several carriers can exist in the same
time and space without interfering with each other. To extract the data receiver is at a given
frequency, carrier frequency, ignoring the rest. In a typical configuration of LAN (wired)
access points (transceiver) connect the wired network from a fixed location using standard
cabling. The access point receives the information, stores and transmits between the
WLAN and the wired LAN. A single access point can support a small group of users and
can function in a range of at least thirty meters up to several hundred. The access point (or
antenna connected to the access point) is normally placed in high but could be placed
anywhere in the desired radio coverage is obtained. The end user accesses the network
via WLAN adapters. They provide an interface between the operating system client
network (NOS: Network Operating System) and waves through an antenna.
The nature of the wireless connection is transparent to the client layer.
CAN network:
A campus network (CAN) is a computer network that connects LANs via a limited
geographical area such as a campus universitario, or a military base. It can be considered
as a metropolitan area network that specifically applies to a university environment.
Therefore a campus network is larger than a local area network but smaller than a wide
area network.
In a CAN, university buildings are connected using the same type of computer and
network technologies that would be used on a LAN. Moreover, all components, including
switches, routers, wiring, and others belong to the same organization.
A CAN is a geographically dispersed collection of LANs within a campus (university,
government offices, or marquises industries) belonging to the same entity in a defined
area in kilometers.
A CAN commonly used technologies such as FDDI and Gigabit Ethernet connectivity
through media such as fiber optics and spread spectrum.
MAN network.
A metropolitan area network (MAN, English acronym Metropolitan Area Network) is a
network of high-speed (broadband) that covers a large geographic area, providing ability to
integrate multiple services by transmitting data, voice and Video on transmission media
such as fiber optic and twisted pair (MAN LOOP), the copper pair technology is positioned
as the world's largest network an excellent alternative to the creation of metropolitan
networks, low latency
(between 1 and 50 ms), high stability and lack of radio interference LOOP MAN networks
offer speeds of 10 Mbit / s or 20 Mbit / s over copper pairs and 100 Mbit / s, 1 Gbit / s and
10 Gbit / s by optical fiber.
Networks MAN loop Bonding technologies are based on so that the links are formed by
multiple pairs of copper in order to provide the required bandwidth.
Furthermore, this technology guarantees 99.999 SLASH'S, thanks to the links are formed
by multiple pairs of copper and is materially impossible for 4, 8 or 16 threads
simultaneously they break down.
The metropolitan area networks have many and varied applications, the main ones:
Deployment of VoIP (Voice over IP), in the metropolitan area, allowing remove "obsolete"
traditional analog lines or ISDN telephony, eliminating the current expenditure of these
lines.
interconnection of local area networks (LAN).
Deployment of Wifi Zones without wireless backhaul (Femtocell) releasing all wireless
channels to access, in practice this is more than 60% improvement in connecting wireless
users.
Interconnection computer to computer.
municipal video surveillance systems.
Transmission CAD / CAM.
Gateways for wide area networks (WAN).
They also allow the transmission of voice traffic, data and video with high latency
guarantees, reasons why the installation of a metropolitan area network at the corporate
level, for corporations with multiple offices in the capital area is necessary.
WAN network:
A broad network, or WAN area (Wide Area Network), is a computer network that spans
multiple physical locations, providing service to a region, a country, even several
continents. It is any network that connects multiple local networks, LAN calls, so that its
members are not all in the same physical location. Many WANs are built by organizations
or companies for private use, others are installed by Internet service providers (ISP) to
provide connection to its customers.
Today, the Internet provides high-speed connections, so that a high percentage of WAN
networks are based in that environment, reducing the need for private networks WAN
while virtual private networks using encryption and other techniques to generate a
dedicated communications network on the Internet, continuously increase.
Characteristics:
It has engaged in the execution of user programs (hosts) machines.
A subnet, which connect multiple hosts.
Division between transmission lines and switching elements (routers).
A system of interconnection of geographically dispersed computers, which may be even
on different continents. The connection system for these networks to public networks
typically involves transmission of data.
WAN Types
Several types of WAN, and three of them are grouped under the classification of switched
network (physical, switching consists in changing the destiny of a signal or an electric
current)
Circuit For communication, this type of WAN requires that a call is made and the
connection only when each user has made a direct link.
By message:
Its switches are usually computers that meet the task to accept traffic from each terminal
that is connected to them. These teams evaluate the address listed in the header of the
message and can store it for later use. It is worth mentioning that you can delete, redirect
messages and respond automatically.
Packet:
Every message sent by users is fractionated and transformed into a number of small parts
called packets, which are reassembled once they arrive at the destination computer to
reconstruct the initial data. These packets move through the network independently, and
this has a positive effect on traffic and facilitates error correction, because in case of failure
only affected parties should forward.
SAN network:
A storage area network, English Storage Area Network (SAN) is a complete
storage network. It is a complete architecture that groups together the following
elements:
A network of high-speed Fiber Channel or iSCSI.
A dedicated interconnection equipment (switches, bridges, etc.).
Network storage elements (hard drives).
A SAN is a network dedicated to storage that is connected to the communication
networks of a company. In addition to traditional network interfaces, computers with
access to the SAN have a specific network interface that connects to the SAN.
SAN performance is directly related to the type of network used. In the case of a
Fiber Channel network, the bandwidth is approximately 100 megabytes / second
(1,000 megabits / second) and can be extended by increasing the amount of
access connections.
SAN capacity can be extended almost limitlessly and can reach hundreds and
even thousands of terabytes.
A SAN can share data among multiple computers on the network without affecting
performance because SAN traffic is completely separate from user traffic. Are
application servers that act as an interface between the data network (usually fiber
channel) and the user network (at general Ethernet).
Esquema.
SANs provide connectivity E / S via the host computers and storage devices combining the
benefits of Fibre Channel technologies and network architectures thus providing a more
robust, flexible and sophisticated approach that overcomes the limitations of DAS using
the SCSI same logic interface to access the storage.
VLAN:
A VLAN stands for Virtual LAN (virtual local area network) is a method for creating
independent logical networks within a single network fsica.1 Several VLANs can coexist
on a single physical switch or on a single physical network. They are useful to reduce the
size of the broadcast domain and help in network administration by separating logical
segments of a local area network (departments of a company, for example) that should not
exchange data using the local network (although they could make it through a router or a
switch layer 3 and 4).
A VLAN consists of two or more networks of computers that behave as if connected to the
same PCI, even if they are physically connected to different segments of a local area
network (LAN). Network administrators configure VLANs through software rather than
hardware, which make them extremely strong.
Classification:
But the most common are the port-based VLAN (level 1), the virtual local area networks
can be classified into four types depending on the level of the OSI hierarchy in which they
operate:
Level 1 VLAN (per port). Also known as "port switching". Why switch ports belong to the
specified VLAN, VLAN members that are connecting to these ports. It does not allow user
mobility; we should reconfigure the VLAN if the user physically moves. It is the most
common and explained in detail in this article.
VLAN Layer 2 MAC addresses. Hosts assigned to a VLAN based on their MAC address.
It has the advantage that there is no need to reconfigure the switching device if the user
changes their location, ie connected to another port of the same or another device. The
main disadvantage is that if there are hundreds of users would have to appoint the
members one by one.
VLAN level 2 protocol type. The VLAN is determined by the contents of the protocol type
field of the MAC frame. For example, you would associate the IPv4 protocol VLAN 1,
VLAN 2 to IPv6, VLAN 3 to AppleTalk, IPX VLAN 4 to...
Level 3 VLAN subnet addresses (virtual subnet). The head of level 3 is used to map the
VLAN to which it belongs. In this type of VLAN packets are, not the stations, who belong to
the VLAN. Stations with multiple network protocols (level 3) will be in multiple VLAN.
VLAN higher levels. VLAN is created for each application: FTP, streaming media, email ...
Belonging to a VLAN can be based on a combination of factors such as ports, MAC
address, subnet, time of day, form of access, security conditions equipment.
VLAN designs:
Early network designers used to configure VLANs in order to reduce the size of a collision
domain Ethernet segment and improve performance. When the switches accomplished
this, because each port is a collision domain, its priority was to reduce the size of the
broadcast domain. Because, if the number of terminals increases traffic distribution and
consumption of CPU processing unwanted broadcast traffic. One of the most efficient
ways to achieve reducing the broadcast domain is the division of a large network in
multiple VLANs.