Welcome to graduate2professional.blogspot.com

Sunday, April 22, 2012

Ad-Hoc Vs Infrastructure topology

Wireless networks typically work in one of two configurations: Ad-Hoc or Infrastructure.

Ad-Hoc are the networks which are basically created for the group of workstations which communicate directly witch each other to exchange information without the need for a wireless access point.
Connections using a peer-to-peer mode called ad hoc mode, also referred to as Independent Basic Service Set (IBSS) configuration.

Here are some benefits of an Ad-Hoc network are:-
a) The possibilities with Ad-Hoc network are quite endless.
b) Ad-Hoc networks are simple to set up.
c) Ad-Hoc networks are inexpensive.
d) Ad-Hoc networks are fast.

Disadvantages of an Ad-Hoc network are as follows:-
a) No central administration, and weak encryption.
b) It needs more technology to support their reliability.
c) As the network increases its speed slows down considerably.

In Infrastructure mode, network includes an Wireless access point(WAP) when the wireless clients connect to an access point, which in turn bridges to a network.
Infrastructure network can pass information through a central information hub which can be both, hardware or software device on a computer.

The WAP centrally controls access and authentication to the wireless network and provides access to rest of your network. More than one WAP can exist on a wireless network to service large numbers of wireless clients.


An infrastructure network enables you to:-
a)  Can connect to a wired network.
b) Extends your wireless network’s range.
c) Utilize roaming ability.

Disadvantages for Infrastructure network are:-
a). In this you do not have to control over the path your data takes.
b).Use of more wireless access points.
c). This increases the cost of implementing a wireless network solution.

Client–Server Vs Peer to Peer Net work architecture:


There are essentially two types of network architectures—
1.       Client-Server and
2.       Peer-to-peer.
In the client-server scheme, a central server handles all security and file transactions;
In peer-to-peer networks, each machine shares its own resources and handles its own security.
Client-server is the more expensive of the two to implement because such networks require a central file server. Although you can use many types of computers as your file server, you'll get the best results if you use a dedicated, high-end machine.
The other disadvantage to client-server networks is the cost of the server software. For example, you can expect to pay about $700 for a copy of NT Server. The core software package authorizes you to connect five PCs to your server, and then it requires you to pay a client license fee of around $70 for each additional PC that you connect to your network.
In fact, client-server networks are so expensive to set up that you may be wondering why anyone would ever choose this option. The answer is that this network structure offers a wide range of powerful administrative tools, which are particularly useful in an environment where security is an issue.
In a client-server environment, the dedicated file server controls the level of access that client PCs have to shared resources. This means that you can control network security from a central location through a utility such as Windows NT Server's User Manager or NetWare's NWADMIN.
Peer-to-peer networks aren't nearly as expensive to create, since you don't need a dedicated machine, server software, or special client licenses. In fact, all the software you need comes with Windows 95. This affordability often makes peer-to-peer networks ideal for small businesses or home users.
However, the main disadvantage of using this type of network is that you sacrifice security by placing network control in the hands of end users. Therefore, this network strategy is obviously inappropriate for high-security environments.

Sunday, April 8, 2012

Ethernet Basics


Ethernet :
In the OSI model, Ethernet technology operates at the physical and data link layers - Layers One and Two respectively. Ethernet supports all popular network and higher-level protocols, principally IP.
Traditional Ethernet supports data transfers at the rate of 10 Megabits per second (Mbps). Over time, as the performance needs of LANs have increased, the industry created additional Ethernet specifications for Fast Ethernet and Gigabit Ethernet.

Fast Ethernet extends traditional Ethernet performance up to 100 Mbps and Gigabit Ethernet up to 1000 Mbps speeds. Although products aren't yet abvailable to the average consumer, 10 Gigabit Ethernet (10000 Mbps) also remains an active area of research.

To connect Ethernet cables to a computer, a person normally uses a network adapter, also known as a network interface card (NIC). Ethernet adapters interfaces directly with a computer's system bus. The cables, in turn, utilize connectors that in many cases look like the RJ-45 connector used with modern telephones.

Ethernet Topologies and Protocols:
Traditional Ethernet employs a bus topology, meaning that all devices or hosts on the network use the same shared communication line. Each device possesses an Ethernet address, also known as MAC address. Sending devices use Ethernet addresses to specify the intended recipient of messages.

Data sent over the Ethernet exists in the forms of frames. An Ethernet frame contains a header, a data section, and a footer having a combined length of no more than 1518 bytes. The Ethernet header contains the addresses of both the intended recipient and the sender.

Data sent over the Ethernet is automatically broadcast to all devices on the network. By comparing their Ethernet address against the address in the frame header, each Ethernet device tests each frame to determine if it was intended for them and reads or discards the frame as appropriate. Network adapters incorporate this function into their hardware.

Devices wanting to transmit on the Ethernet first perform a preliminary check to determine whether the medium is available or whether a transmission is currently in progress. If the Ethernet is available, the sending device transmits onto the wire. It's possible, however, that two devices will perform this test at approximately the same time and both transmit simultaneously.
In traditional Ethernet, this protocol for broadcasting, listening, and detecting collisions is known as CSMA/CD (Carrier Sense Multiple Access / Collision Detection). Some newer forms of Ethernet do not use CSMA/CD. Instead, they use the so-called full duplex Ethernet protocol, which supports point-to-point simulatenous sends and receives with no listening required.

Ethernet Devices:
As mentioned earlier, Ethernet cables are limited in their reach, and these distances (as short as 100 meters) are insufficient to cover medium-sized and large network installations.
A repeater in Ethernet networking is a device that allows multiple cables to be joined and greater distances to be spanned.
A bridge device can join an Ethernet to another network of a different type, such as a wireless network.
One popular type of repeater device is an Ethernet hub. Other devices sometimes confused with hubs are switches and routers.

Sunday, April 1, 2012

What is MAC Address?

MAC, Media Access Control, address is a globally unique identifier assigned to network devices, and therefore it is often referred to as hardware or physical address. MAC addresses are 6-byte (48-bits) in length, and are written in MM:MM:MM:SS:SS:SS format. The first 3-bytes are ID number of the manufacturer, which is assigned by an Internet standards body. The second 3-bytes are serial number assigned by the manufacturer.

MAC layer represents layer 2 of the TCP/IP (adopted from OSI Reference Model), where IP represents layer 3. MAC address can be thought of as supporting hardware implementation whereas IP address supports software implementation. MAC addresses are permanently burned into hardware by hardware manufacturer, but IP addresses are assigned to the network devices by a network adminstrator. DHCP relies on MAC address to assign IP addresses to network devices.