Topic1基本概念

1.why computer networks are important



most computer applications are network-relater(e-mail\social\media\wwww\etc)

digital divided

internet-on-things(IOT)


2.Analog、Binary、and Digital Transmission

Telephone Modems

before 1980 ,telephone produces an analogous electrical signal.

Digital signals change abruptly between states

If there are two states ,this is binary transmission.

If there are serveral  states ,this is digital transmission.

Binary     2  states

Digital     A few   states   2,4,8,16……


Transmission Speed

3.Network Topology

Network topology is the layout of how elements(links,nodes,etc.) of a networkucommunicates of a network communicates with other devices.

Physical  topology—Mostly applies

to hardware and describes how computers, other devices, and cables fir together

to form the physical network

Logical topology—Has to do with software and describes how access to the network is controlled

How users and programs initially gain access to the network

Network  operating system(NOS)—Controls access

to the entire network

Required  by client-server models

Types   of Physical Topology

Wired  Topology

Ring  Topology

Bus  Topology

Star  Topology

Mesh  Topology

Wireless  Topology

lInfrastructure  Topology

A  combination of Wired and Wireless devices

Ad  hoc Topology

Mesh   Topology

4.peer-to-peer newwork model

- The OS of  each computer on the network is responsible for controlling access to its  resources.

Computers, called nodes or hosts, form a logical group of computers and users

May share resources

May prevent access to resources

Each computer user has a Windows local account

Works only on that one computer


Advantages

Simple configuration

Less expensive

Compared to other network models

Disadvantages

Not scalable

Not necessarily secure

Not practical for large installations

5.Client-Server Network Model

Resources are managed by the network operating system (NOS) via a centralized directory database

Windows domain—A logical group of computers that a Windows Server can control

Active Directory (AD)—The centralized directory database that contains user account information and security for the entire group of computers

A user can sign on to the network from any computer on the network and gain access to the resources that AD allows

This process is managed by Active Directory Domain Services (ADDS)

Client---A computer making a request from another

Clients don’t share their resources directly with each other

Access is controlled by entries in the centralized domain database

Client computers access resources on another computer by way of the servers controlling the domain database


The NOS is responsible for the following activities:

Manages client data, resources

Ensures authorized user access

Controls user file access

Restricts user network access

Dictates computer communication rules

Supplies application to clients

(Server examples

Windows Server 2016, Ubuntu Server, or Red Hat Enterprise Linux)

Servers that have a NOS installed require:

More memory, processing, and storage capacity

Equipped with special hardware

Provides network management functions

Advantages relative to peer-to-peer networks

User credential assigned from one place

Multiple shared resource access centrally controlled

Central problem monitoring, diagnostics, and correction capabilities

More scalable



Terminal-Hos  vs Client/Server

6.Client-Server   Applications

Network services—The resources a network makes available to its users

Includes applications and the data provided by these applications

In client-server applications

A client computer requests data or a service from a second computer, called the server

Protocols

Methods and rules for communication between networked devices

Two primary protocols:

TCP (Transmission Control Protocol)

IP (Internet Protocol)

TCP/IP suite of protocols is used by OSs for communication on a network

(List of several popular client-server applications:

Web service

Email services

F T P service

Telnet service

Remote applications

Remote Desktop)

7.Network Hardware

Local area network (LAN)—Usually contained in a small space

Such as an office or building

Switch—Receives incoming data from one of its ports and redirects it to another port or multiple ports

Will send the data to its intended destination

Star topology—All devices connect to one central device (usually a switch)

Network interface card (N I C)—A network port used to attach a device to a network

A LAN can have several switches

Backbone—A central conduit that connects the segments (pieces) of a network

Might use higher transmission speeds and different cabling than network cables connected to computers

Three switches daisy-chained together in a single line is said to use a bus topology

However, each switch is connected to computers via a star topology, making it a star-bus topology

A topology that combines topologies is known as a hybrid topology

Router—A device that manages traffic between two or more networks

Can help find the best path for traffic to get from one network to another

Routers can be used in small home networks to connect the home LAN to the Internet

Called a SOHO (small office-home office) network

Industrial-grade routers can have several network ports, one for each network it connects to

Difference between router and switch:

Router is like a gateway between networks and belongs to two or more local networks

Switch belongs only to its local network



8.MANsand WANs

Metropolitan area network (MAN)—A group of connected LANs in the same geographical area

Also known as a campus area network (CAN)

WAN (wide area network)—A group of LANs that spread over a wide geographical area

Internet is the largest and most varied WAN

MANs and WANs often use different transmission methods and media than LANs

PAN (personal area network)—Smallest network

A network of personal devices such as your smartphone and your computer



8.Major Standards Architectures

In networking, standards agencies first create standards architectures that define the categories of standards to be developed.

They define categories in terms of layers.

They then design standards for the individual categories.

There are two major standards architectures.

1.  Open Systems Interconnection model (OSI)

Beginning in 1977, the International Organization for Standardization (ISO) conducted a program to develop general standards and methods of networking.

A similar process evolved at the International Telegraph and Telephone Consultative Committee (ITU-T). Both bodies developed documents that defined similar networking models.

The OSI model was first defined in raw form in Washington, DC in February 1978 by Hubert Zimmermann of France and the refined but still draft standard was published by the ISO in 1980.

ISO (the International Organization for Standardization) is a computer standards agency.

The ITU-T is the International Telecommunications Union—Transmission Standards Agency.

Don’t confuse ISO the organization with OSI the architecture.

2. TCP/IP

This is the standards architecture for the Internet and many corporate internets.

Its standards agency is the Internet Engineering Task Force (IETF).

Most of its documents are called requests for comment (RFCs).

Some (but not all) RFCs are official Internet standards.


OSI divided application communication into three layers.

Session (5) creates a managed session between applications. If there is a break in communication, the communication only has to go back to the last roll-back point.

Presentation (6) was designed to translate between data formats on different computers. In practice, it is used as a category for file format standards, such as jpg and mp3.

Application (7) handles other details of application communication.




9.Birth of the Internet

Forerunner of the Internet

Funded by the Advanced Research Projects Agency (ARPA) of the United States Department of Defense

Now the Defense Advanced Research Projects Agency (DARPA)

To explore packet switching

To give researchers access to ARPA-funded software on hosts computers in distant cities

First four nodes began operation in 1969

Called their standards Requests for Comment (RFCs)

Did not feel that they had the authority to create standards, so they used the weaker term RFC

The NWG evolved into today’s standards body for the Internet, the Internet Engineering Task Force (IETF)

Internet standards today are still called RFCs

DARPA needed a way for researchers on one network to be able to use resources on another network.

Packets would have to travel across multiple networks.

It came up with the idea of connecting multiple networks by devices called routers.

(The original name was gateways.)

Generically, networks of networks are internets.

TCP/IP standards evolved in the 1970s.

Hosts could run either TCP/IP or NCP standards.

1983

All hosts were required to run TCP/IP.

NSFNET

In the 1980s, the NSFNET funded by NSF was the core of the Internet.

NSF had an Acceptable Use Policy barring commercial activity such as e-commerce.

1995

NSFNET replaced by commercial ISPs.

No longer was e-commerce forbidden.

The e-commerce revolution began.

The World Wide Web became popular just before that.

Internet2 is a not-for-profit United States computer networking consortium led by members from the research and education communities, industry, and government.[2]

The Internet2 consortium administrative headquarters are located in Ann Arbor, Michigan, with offices in Washington, D.C. and Emeryville, California

Internet2 operates the Internet2 Network, an Internet Protocol network using optical fiber that delivers network services for research and education, and provides a secure network testing and research environment.

In late 2007, Internet2 began operating its newest dynamic circuit network (the Internet2 DCN) an advanced technology that allows user-based allocation of data circuits over the fiber-optic network.



你可能感兴趣的:(Topic1基本概念)