Monday, March 22, 2010
Thursday, March 11, 2010
Network Orientation
Network Orientation
Section 1
Peer to Peer Networks
• No dedicated server or hierarchy, also called a workgroup.
• Usually 10 or fewer workstations.
• Users act as their own administrator and security.
• Computers are in same general area.
• Limited growth.
Server Based Networks
• 10 or more users.
• Employs specialized servers.
1. File and Print
2. Application
3. Mail
4. Fax
5. Communications (gateways)
• Central administration.
• Greater security.
• Centralized backup.
• Data Redundancy.
• Supports many users
Combination Networks
• Combines the features of both Peer to Peer and Server based networks
• Users can share resources among themselves as well as access server-based resources.
Network Topologies
There are 4 basic topologies with variations
Bus Topology
• Bus consists of a single linear cable called a trunk.
• Data is sent to all computers on the trunk. Each computer examines EVERY packet on the wire to determine who the packet is for and accepts only messages addressed to them.
• Bus is a passive topology.
• Performance degrades as more computers are added to the bus.
• Signal bounce is eliminated by a terminator at each end of the bus.
• Barrel connectors can be used to lengthen cable.
• Repeaters can be used to regenerate signals.
• Usually uses Thinnet or Thicknet
o both of these require 50 ohm terminator
• good for a temporary, small (fewer than 10 people) network
• But its difficult to isolate malfunctions and if the backbone goes down, the entire network goes down.
Star Topology
• Computers are connected by cable segments to a centralized hub.
• Signal travels through the hub to all other computers.
• Requires more cable.
• If hub goes down, entire network goes down.
• If a computer goes down, the network functions normally.
• most scalable and reconfigurable of all topologies
Ring Topology
• Computers are connected on a single circle of cable.
• usually seen in a Token Ring or FDDI (fiber optic) network
• Each computer acts as a repeater and keeps the signal strong => no need for repeaters on a ring topology
• No termination required => because its a ring
• Token passing is used in Token Ring networks. The token is passed from one computer to the next, only the computer with the token can transmit. The receiving computer strips the data from the token and sends the token back to the sending computer with an acknowledgment. After verification, the token is regenerated.
• relatively easy to install, requiring ;minimal hardware
Mesh
• The mesh topology connects each computer on the network to the others
• Meshes use a significantly larger amount of network cabling than do the other network topologies, which makes it more expensive.
• The mesh topology is highly fault tolerant.
o Every computer has multiple possible connection paths to the other computers on the network, so a single cable break will not stop network communications between any two computers.
Star Bus Topology
• Several star topologies linked with a linear bus.
• No single computer can take the whole network down. If a single hub fails, only the computers and hubs connected to that hub are affected.
Star Ring Topology
• Also known as star wired ring because the hub itself is wired as a ring. This means it's a physical star, but a logical ring.
• This topology is popular for Token Ring networks because it is easier to implement than a physical ring, but it still provides the token passing capabilities of a physical ring inside the hub.
• Just like in the ring topology, computers are given equal access to the network media through
• the passing of the token.
• A single computer failure cannot stop the entire network, but if the hub fails, the ring that the hub controls also fails.
Hybrid Mesh
• most important aspect is that a mesh is fault tolerant
• a true mesh is expensive because of all the wire needed
• another option is to mesh only the servers that contain information that everyone has to get to. This way the servers (not all the workstations) have fault tolerance at the cabling level.
________________________________________
Connecting Network Components
Primary Cable Types
• Coaxial Cable
• Twisted-pair
o UTP - Unshielded Twisted Pair
o STP - Shielded Twisted Pair
• Fiber-optic
Coaxial Cable
• Consists of a solid or stranded copper core surrounded by insulation, a braided shield and an insulating jacket.
• Braided shield prevents noise and crosstalk.
• More resistant to interference and attenuation than twisted pair cabling.
• Both thin and thick cables can use (see pp. 80-81 for pics)
o BNC cable connectors,
o BNC barrel connectors
o BNC T connectors
o BNC terminators.
• Plenum (fire resistant) graded cable can be used in false ceilings of office space or under the floor.
• Can transmit data, voice and video.
• Offers moderate security ----> better than UTP/STP
Thinnet - RG-58 cable
• called
• 0.25" thick.
• Uses
o BNC twist connector,
o BNC barrel connectors
o BNC T connectors
o 50 ohm terminators
• Can carry signals 185 meters or 607 feet.
• Types: (pics on page 78)
Coaxial Cable Types
RG-8 and RG-11 Thicknet (50 ohms)
RG-58 Family
RG-58 /U Solid copper (50 ohms)
RG-58 A/U Thinnet, Stranded copper (50 ohms)
RG-58 C/U Thinnet, Military grade (50 ohms)
RG-59 Broadband/Cable TV (75 ohm) video cable
RG-62 A/U ARCnet cable (93 ohm)
RG-62 A/U is the standard ARCnet cable, but ARCnet can use fiber optic or twisted pair.
• each cable must have a terminator whose impedance matches the cable type
• impedance = current resistance measured in ohms
• terminators are resistors that prevent signal bounce or echo.
Here are some limitations of 10Base2 Ethernet:
• Length of trunk segment may be up to 607 feet.
• A maximum of 30 workstations is allowed per trunk.
• There may be no more than 1024 workstations per network.
• Entire network trunk length can't exceed 3035 feet (925 meters)
• The minimum cable length between workstations is 20 inches.
• The Ethernet 5-4-3 Rule for connecting segments is 5 trunk segments can be connected, with 4 repeaters or concentrators, with no more than 3 populated segments (on coaxial cable).
Thicknet - RG-8 and RG-11 coaxial cable
• 0.5" thick
• used for 10Base5 networks, linear bus topology
• transmits at 10 Mbps
• Uses DIX or AUI (Attachment Unit Interface) connector - also known as DB-15 connector to connect to external transceivers.
• Vampire taps are used to attach a transceiver to the thicknet trunk.
• Can carry signals 500 meters or 1640 feet.
• much less flexible and far more bulky and harder to install than thinnet
• better security than thinnet
• better resistance to electrical interference than thinnet.
• MORE expensive than thinnet.
Twisted-Pair Cable
• Consists of two insulated copper wires twisted around each other.
• Twisting cancels out electrical noise from adjacent pairs (crosstalk) and external sources.
• Uses RJ-45 telephone-type connectors (larger than telephone and consists of eight wires vs. Telephone's 4 wires).
• Generally inexpensive.
• Easy to install.
Unshielded Twisted Pair (UTP)
• Maximum cable length is 100 meters or 328 feet (10BaseT).
• Types:
1. Cat 1 Voice grade telephone cable.
2. Cat 2 Data grade up to 4 Mbps, four twisted pairs.
Category 3 and above is needed for Ethernet networks. Cat 3, 4, and 5 use RJ-45 connectors
3. Cat 3 Data grade up to 10 Mbps, four pairs w/3 twists/ft.
4. Cat 4 Data grade up to 16 Mbps, four twisted pairs.
5. Cat 5 Data grade up to 100 Mbps, four twisted pairs.
This is the cheapest cable to put in. Exam questions ALWAYS take this as a given.
Here are some limitations of 10BaseT Ethernet:
• Workstations may be no more than 328 feet from the concentrator port.
• 1,023 stations are allowed on a segment without bridging.
• The minimum cable length between workstations is 8 feet.
Other Drawbacks
• UTP is particularly susceptible to crosstalk, which is when signals from one line get mixed up with signals from another.
• easily tapped (because there is no shielding)
• 100 meters is shortest distance => attenuation is the biggest problem here.
Shielded Twisted Pair (STP)
• Uses a woven copper braid jacket and a higher quality protective jacket. Also uses foil wrap between and around the wire pairs.
• Much less susceptible to interference and supports higher transmission rates than UTP.
• Shielding makes it somewhat harder to install.
• same 100 meter limit as UTP.
• harder to tap
• used in AppleTalk and Token Ring networks
Fiber Optic Cable
• Consists of a small core of glass or plastic surrounded by a cladding layer and jacket.
• Fibers are unidirectional (light only travels in one direction) so two fibers are used, one for sending and one for receiving. Kelvar fibres are placed between the two fibres for strength.
• Good for very high speed, long distance data transmission.
• NOT subject to electrical interference.
• Cable can't be tapped and data stolen => high security
• Most expensive and difficult to work with.
• Immune to tapping.
• can transmit at 100 Mbps and way up to 2 Gbps
• up to 2000 meters without a repeater.
• Supports data, voice and video.
• needs specialized knowledge to install => expensive all round.
Cable Type Comparisons
Type Speed Distance Installation Interference Cost # of nodes per segment # of nodes per network
10BaseT 10 Mbps 100 meters Easy Highly susceptible Least expensive 1 computer
100BaseT 100 Mbps 100 meters Easy Highly susceptible More expensive than 10BaseT
STP 16 to 155 Mbps 100 meters Moderately Easy Somewhat resistant More expensive than Thinnet or UTP
10Base2 10 Mbps 185 meters Medium Difficulty Somewhat resistant Inexpensive 30 1024
10Base5 10 Mbps 500 meters More difficult than Thinnet More resistant than most cable More expensive than most cable 100 300
Fiber Optic 100 Mbps to
2 Gbps 2000 meters Most difficult Not susceptible to electronic interference Most expensive type of cable
Signal Transmission
Baseband Transmission -- Digital
• Baseband transmission uses digital signaling over a single frequency.
• Entire communication channel is used to transmit a single signal.
• Flow is bi-directional. Some can transmit and receive at the same time.
• Baseband systems use repeaters to strengthen attenuated signals.
Broadband Transmission -- Analog
• Broadband uses analog signaling over a range of frequencies.
• Signals are continuous and non-discrete.
• Flow is uni-directional and so two frequency channels or two separate cables must be used.
o if enough bandwidth is available, multiple analog transmission systems such as cable TV AND network transmissions can be on the same cable at the same time.
o if this is the case, ALL devices must be tuned to use only certain frequencies
• Uses amplifiers for signal regeneration.
Helpful mnemonic to remember the difference:
Baseband is "BEDR"
Bidirectional
Entire channel taken up
Digital
Repeaters used to strengthen signal
IBM Cabling
• Uses AWG standard wire size.
• Connected with proprietary IBM unisex connectors.
• Defines cables as types
Type 1 STP
(Shielded twisted-pair) • used for computers and MAU's.
• 101 m These three cable types can be used in Token Ring Networks • 16 Mbps
• 260 computer limit
Type 2 STP, Voice and data • 100 m
Type 3 UTP; Voice grade • 45 m
• Most common Token Ring Cable • 4 Mbps
• 72 computer limit
Type 5 Fiber-optic • industry standard
Type 6 STP; Data patch • used to connect MSAU's together
• used to extend Type 3 cables from one computer to the MSAU
Type 8 STP Flat; Carpet grade • Limited to 1/2 the distance of Type 1 cable
Type 9 STP; Plenum grade • used under floors or in ceiling space
Important Cabling Considerations
Installation Logistics
• How easy is the cable to work with?
Shielding
• Is the area "noisy"?
• Do you need plenum grade cable => more expensive
Crosstalk
• Where data security is important this is a problem
• Power lines, motors relays and radio transmitters cause crosstalk
Transmission Speed (part of the bandwidth)
• Transmission rates are measured in Mbps
• 10 Mbps is common
• 100 Mbps is becoming common
• Fiber can go well over 100 Mbps but costs and requires experts to install.
Cost
• Distance costs you money
Attenuation
• Different cables can only transmit so far without causing too many errors
Wireless Local Area Networks
• Used where cable isn't possible - remote sites; also when mobility is important.
• Use transceivers or access points to send and receive signals between the wired and wireless network.
There are 4 techniques for transmitting data
• Infrared transmission consists of four types;
1. Line of sight
2. Scatter: good within 100 ft.
3. Reflective
4. Broadband optical telepoint: used for multimedia requirements; as good as cable.
• Laser requires direct line-of-sight.
• Narrow-band (single frequency) radio
o Cannot go through steel or load-bearing walls.
o Requires a service handler.
o Limited to 4.8 Mbps
Spread-Spectrum Radio
o Signals over a range of frequencies.
o Uses hop timing for a predetermined length of time.
o Coded for data protection.
o Quite slow; Limited to 250 Kbps.
Point to Point Transmission
• Transfers data directly from PC to PC (NOT through cable or other peripherals)
• Uses a point to point link for fast error-free transmission.
• Penetrates objects.
• Supports data rates from 1.2 to 38.4 Kbps up to
o 200 feet indoors or
o 1/3 of a mile with line of site transmission.
• Also communicates with printers, bar code readers, etc.
Multipoint Wireless Bridge
• Provides a data path between two buildings.
• Uses spread-spectrum radio to create a wireless backbone up to three miles.
Long-Range Wireless Bridge
• Uses spread-spectrum technology to provide Ethernet and Token-Ring bridging for up to 25 miles.
• This costs less than T1, but T1 will transmit at 1.544 Mbps
Mobile Computing
• Uses wireless public carriers to transmit and receive using;
o Packet-radio communication.
Uplinked to satellite, broadcast only to device which has correct address.
o Cellular networks.
CDPD same as phone, subsecond delays only, real time transmission, can tie into cabled network.
o Satellite stations.
Microwave, most common in USA, 2 X directional antennas, building to building, building to satellite
• Slow transmission rate: 8 Kbps - 19.2 Kbps
Network Adapter Cards
The roles of the network Adapter card it to:
• Prepare data from the computer for the network cable
• Send the data to another computer
• Control the flow of data between the computer and the cabling system
NIC's contain hardware and firmware (software routines in ROM) programming that implements the
• Logical Link Control and
• Media Access Control
Functions of the Data Link layer of the OSI
Preparing Data
• Data moves along paths in the computer called a BUS - can be 8, 16, 32 bits wide.
• On network cable, data must travel in a single bit stream in what's called a serial transmission (b/c on bit follows the next).
• The transceiver is the component responsible for translating parallel (8, 16, 32-bit wide) into a 1 bit wide serial path.
• A unique network address or MAC address is coded into chips in the card
• card uses DMA (Direct Memory Access) where the computer assigns memory space to the NIC
o if the the card can't move data fast enough, the card's buffer RAM holds it temporarily during transmission or reception of data
Sending and Controlling Data
The NICs of the two computers exchanging data agree on the following:
1. Maximum size of the groups of data being sent
2. The amount of data to be sent before confirmation
3. The time intervals between send data chunks
4. The amount of time to wait before confirmation is sent
5. How much data each card can hold before it overflows
6. The speed of the data transmission
Network Card Configuration
• IRQ: a unique setting that requests service from the processor.
IRQ # Common Use I/O Address
IRQ 1 Keyboard
IRQ 2(9) Video Card
IRQ 3 Com2, Com4 2F0 to 2FF
IRQ 4 Com1, Com3 3F0 to 3FF
IRQ 5 Available (Normally LPT2 or sound card )
IRQ 6 Floppy Disk Controller
IRQ 7 Parallel Port (LPT1)
IRQ 8 Real-time clock
IRQ 9 Redirected IRQ2 370 - 37F
IRQ 10 Available (maybe primary SCSI controller)
IRQ 11 Available (maybe secondary SCSI controller)
IRQ 12 PS/2 Mouse
IRQ 13 Math Coprocessor
IRQ 14 Primary Hard Disk Controller
IRQ 15 Available (maybe secondary hard disk controller)
• Base I/O port: Channel between CPU and hardware
o specifies a channel through which information flows between the computer's adapter card and the CPU. Ex. 300 to 30F.
o Each hardware device must have a different base I/O port
• Base Memory address: Memory in RAM used for buffer area
o identifies a location in the computer's RAM to act as a buffer area to store incoming and outgoing data frames. Ex. D8000 is the base memory address for the NIC.
o each device needs its own unique address.
o some cards allow you to specify the size of the buffer ( 16 or 32 k, for example)
• Transceiver:
o sometimes selected as on-board or external. External usually will use the AUI/DIX connector: Thicknet, for example
o Use jumpers on the card to select which to use
Data Bus Architecture
The NIC must
• match the computer's internal bus architecture and
• have the right cable connector for the cable being used
• ISA (Industry Standard Architecture): original 8-bit and later 16-bit bus of the IBM-PC.
• EISA (Extended Industry Standard Architecture): Introduced by consortium of manufacturers and offers a 32-bit data path.
• Micro-Channel Architecture (MCA): Introduced by IBM in its PS/2 line. Functions as either 16 or 32 bit.
• PCI (Peripheral Component Interconnect): 32-bit bus used by Pentium and Apple Power-PC's. Employs plug and play.
Improving Network Card Performance
• Direct Memory Access (DMA):
o data is moved directly from the network adapter card's buffer to computer memory.
• Shared Adapter Memory:
o network adapter card contains memory which is shared with the computer.
o The computer identifies RAM on the card as if it were actually installed on the computer
• Shared System Memory:
o the network adapter selects a portion of the computer's memory for its use.
o MOST common
• Bus Mastering:
o the adapter card takes temporary control of the computer's bus, freeing the CPU for other tasks.
o moves data directly to the computer's system memory
o Available on EISA and MCA
o can improve network performance by 20% to 70%
• RAM buffering:
o Ram on the adapter card acts as a buffer that holds data until the CPU can process it.
o this keeps the card from being a bottleneck
• On-board microprocessor:
o enables the adapter card to process its own data without the need of the CPU
Wireless Adapter Cards
• Used to create an all-wireless LAN
• Add wireless stations to a cabled LAN
• uses a wireless concentrator, which acts as a transceiver to send and receive signals
Remote-Boot PROMS (Programmable Read Only Memory)
• Enables diskless workstations to boot and connect to a network.
• Used where security is important.
Networking Essentials Notes - Section 2
Section Titles:
The OSI Model | Drivers | Packets | Protocols | Putting data on the Cable
How a Network Functions
The OSI Model
• International Standards Organization (ISO) specifications for network architecture.
• Called the Open Systems Interconnect or OSI model.
• Seven layered model, higher layers have more complex tasks.
• Each layer provides services for the next higher layer.
• Each layer communicates logically with its associated layer on the other computer.
• Packets are sent from one layer to another in the order of the layers, from top to bottom on the sending computer and then in reverse order on the receiving computer.
OSI Layers (Check out the OSI Model Summary Page)
• Application
• Presentation
• Session
• Transport
• Network
• Data Link
• Physical
Application Layer
• Serves as a window for applications to access network services.
• Handles general network access, flow control and error recovery.
Presentation Layer
• Determines the format used to exchange data among the networked computers.
• Translates data from a format from the Application layer into an intermediate format.
• Responsible for protocol conversion, data translation, data encryption, data compression, character conversion, and graphics expansion.
• Redirector operates at this level.
Session Layer
• Allows two applications running on different computers to establish use and end a connection called a Session.
• Performs name recognition and security.
• Provides synchronization by placing checkpoints in the data stream.
• Implements dialog control between communicating processes.
Transport Layer
• Responsible for packet creation.
• Provides an additional connection level beneath the Session layer.
• Ensures that packets are delivered error free, in sequence with no losses or duplications.
• Unpacks, reassembles and sends receipt of messages at the receiving end.
• Provides flow control, error handling, and solves transmission problems.
Network Layer
• Responsible for addressing messages and translating logical addresses and names into physical addresses.
• Determines the route from the source to the destination computer.
• Manages traffic such as packet switching, routing and controlling the congestion of data.
Data Link Layer
• Sends data frames from the Network layer to the Physical layer.
• Packages raw bits into frames for the Network layer at the receiving end.
• Responsible for providing error free transmission of frames through the Physical layer.
Physical Layer
• Transmits the unstructured raw bit stream over a physical medium.
• Relates the electrical, optical mechanical and functional interfaces to the cable.
• Defines how the cable is attached to the network adapter card.
• Defines data encoding and bit synchronization.
Top of page
The 802 Project Model
• Defines Standards for the Data Link and Physical Layers.
• Network Adapter Cards
• WAN components
• Components used to create twisted-pair and coaxial cable networks.
• A crazy mnemonic for this table, but it works :-)
I Like Changing Boxers Rarely. My Butt Feels Very Sexy With Denim
802.1 Internet working
802.2 Division of Data Link Layer into sublayers
• LLC (Logical Link Control)
• Media Access Control (MAC)
802.3 CSMA/CD - Ethernet
802.4 Token Bus LAN (ARCnet)
802.5 Token Ring LAN
802.6 MAN (Metropolitan Area Network)
802.7 Broadband Technical Advisory Group
802.8 Fiber-Optic Technical Advisory Group
802.9 Integrated Voice/Data Networks
802.10 Network Security
802.11 Wireless Networks
802.12 Demand Priority Access Lan, 100 Base VG - AnyLAN
OSI Model Enhancements
The bottom two layers - Data Link and Physical - define how multiple computers can simultaneously use the network without interfering with each other.
• Divides the Data-link layer in to the Logical Link Control and Media Access Control sublayers.
• Logical Link Control
o manages error and flow control and
o defines logical interface points called Service Access Points (SAP's). These SAP's are used to transfer information to upper layers
• Media Access Control
o communicates directly with the network adapter card and
o is responsible for delivering error-free data between two computers.
o Categories
802.3
802.4
802.5 and
802.12 define standards for both this sublayer and the Physical layer
Top of page
Drivers
• a device driver is software that tells the computer how to drive or work with the device so that the device performs the job it's supposed to.
• Drivers are called
Network Drivers,
MAC drivers,
NIC drivers.
• Provide communication between a network adapter card and the redirector in the computer.
• Resides in the Media Access Control sublayer of the Data Link layer. Therefore, the NIC driver ensures direct communication between the computer and the NIC
• the Media Access Control driver is another name for the network card device driver
• When installing a driver, you need to know these things
o IRQ
o I/O Port Address
o Memory Mapped (Base Memory Address)
o Transceiver Type
Packets
• Data is broken down into smaller more manageable pieces called packets.
• Special control information is added in order to:
o disassemble packets
o reassemble packets
o check for errors
Types of data sent includes
• Can contain information such as messages or files.
• Computer control data and commands and requests.
• Session control codes such as error correction and retransmission requests.
• Original block of data is converted to a packet at the Transport layer.
Packet Components
• Header
1. Alert signal to indicate packet is being transmitted
2. Source address.
3. Destination address.
4. Clock synchronization information.
• Data
1. Contains actual data being sent.
2. Varies from 512 to 4096 bytes (4K), depending on the network
• Trailer
1. Content varies by protocol.
2. Usually contains a CRC.
Packet Creation
• Look at the example on pp. 201 - 204
• Begins at the Application layer where data is generated.
• Each layer subsequently adds information to the packet; the corresponding layer on the receiving machine reads the information.
• Transport layer breaks the data into packets and adds sequencing information needed to reassemble data at the other end => the structure of the packets is defined by the common protocol being used between the two computers.
• Data is passed through the Physical layer to the cable.
Packet Addressing
• every NIC sees all packets sent on its cable segment but only interrupts the computer if the packet address matches the computer's address
• a broadcast type address gets attention of all computers on the network
Top of page
Protocols
• Protocols are rules and procedures for communication.
How Protocols Work
The Sending Computer
• Breaks data into packets.
• Adds addressing information to the packet
• Prepares the data for transmission.
The Receiving Computer (same steps in reverse)
• Takes the packet off the cable.
• Strips the data from the packet.
• Copies the data to a buffer for reassembly.
• Passes the reassembled data to the application.
Protocol Stacks (or Suites)
• A combination of protocols, each layer performing a function of the communication process.
• Ensure that data is prepared, transferred, received and acted upon.
The Binding Process
• Allows more than one protocol to function on a single network adapter card. (e.g. both TCP/IP and IPX/SPX can be bound to the came card
• Binding order dictates which protocol the operating systems uses first.
• binding also happens with the Operating System architecture: for example, TCP/IP may be bound to the NetBIOS session layer above and network card driver below it. The NIC device driver is in turn bound to the NIC.
Standard Stacks
• ISO/OSI
• IBM SNA (Systems Network Architecture)
• Digital DECnet
• Novell NetWare
• Apple AppleTalk
• TCP/IP
Protocol types map roughly to the OSI Model into three layers:
Application Level Service Users
Application Layer
Presentation Layer
Session Layer
Transport Services
Transport Layer
Network Services
Network Layer
Data Link Layer
Physical Layer
Application Protocols
Work at the upper layer of the OSI model and provide application to application interaction and data exchange.
Examples:
• APPC-IBM's peer to peer SNA protocol used on AS400's
• FTAM: an OSI file access protocol.
• X.400: international e-mail transmissions.
• X.500: file and directory services across systems.
• SMTP: Internet e-mail.
• FTP: Internet file transfer
• SNMP: Internet network management protocol.
• Telnet: Internet protocol for logging on to remote hosts.
• Microsoft SMB: client shells and redirectors.
• NCP: Novell client shells or redirectors.
• AppleTalk and AppleShare: Apple's protocol suite.
• AFP: Apple's protocol for remote file access.
• DAP (data access protocol): DECnet file access protocol.
Transport Protocols
These protocols provide communication sessions between computers and ensure data is moved reliably between computers.
Examples:
• TCP (transmission control protocol): internet protocol for guaranteed delivery of sequenced data.
• SPX (sequenced packet exchange): Novell protocol suite.
• NWLink: Microsoft implementation of IPX/SPX.
• NetBEUI: establishes communications sessions between computers and provides the underlying data transport services.
• ATP, NBP: Apple's communication session and transport protocols.
Network Protocols
These provide link services
They also
• handle
o addressing and routing,
o error checking and
o retransmission requests.
• Define rules for Ethernet or Token Ring.
Examples:
• IP (Internet Protocol): packet forwarding and routing.
• IPX: (Internetwork Packet Exchange): Novell's protocol for packet forwarding and routing.
• NWLink: Microsoft implementation of IPX/SPX.
• NetBEUI: Transport for NetBIOS sessions and applications.
• DDP (datagram delivery protocol): An AppleTalk data transport protocol.
Top of page
The IEEE protocols at the Physical Layer
802.3 (CSMA /CD - Ethernet)
• logical bus network
• can transmit at 10 Mbps
• data is transmitted on the wire to every computer but only those meant to receive respond
• CSMA /CD protocol listens and allows transmission when the wire is clear
802.4 (Token Passing)
• bus layout that used token passing
• every computer receives all of the data but only the addressed computers respond
• token determines which computer can send
802.5 (Token Ring)
• logical ring network; physical set up as star network
• transmits at 4 Mbps or 16 Mbps
• token determines which computer can send
Important Protocols
TCP/IP
• Provides communications in a heterogeneous environment.
• Routable, defacto standard for internetworking.
• SMTP, FTP, SNMP are protocols written for TCP/IP
• Disadvantages are size and speed.
NetBEUI
• NetBIOS extended user interface.
• Originally, NetBIOS and NetBEUI were tightly tied together but, NetBIOS has been separated out to be used with other routable protocols. NetBIOS acts as a tool to allow applications to interface with the network; by establishing a session with another program over the network
• NetBIOS operates at the Session layer.
• Small, fast and efficient.
• Compatible with most Microsoft networks.
• Not routable and compatible only with Microsoft networks.
X.25
• Protocols incorporated in a packet switching network of switching services.
• Originally established to connect remote terminals to mainframe hosts.
XNS
• Xerox Network System.
• Developed for Ethernet LANs but has been replaced by TCP/IP.
• Large, slow and produces a lot of broadcasts.
IPX/SPX and NWLink
• Used for Novell networks.
• Small and fast.
• Routable.
APPC
• Advanced Program to Program Communication
• Developed by IBM to support SNA.
• designed to enable application programs running on different computers to communicate and exchange data directly.
AppleTalk
• Apple's proprietary protocol stack for Macintosh networks.
OSI Protocol Suite
• each protocol maps directly to a single layer of the OSI model
DECnet
• Digital Equipment's proprietary protocol stack
• Defines communications over Ethernet, FDDI MAN's and WAN's.
• DECnet can also use TCP/IP and OSI protocols as well as its own protocols
• Routable.
Top of page
Putting data on the Cable
Access Methods
The 4 major methods
• Carrier Sense Multiple Access Methods
1. with collision detection (CSMA/CD)
2. with collision avoidance (CSMA/CA)
• Token passing that allows only a singe opportunity to send data
• A Demand Priority method
• Carrier Sense Multiple Access with Collision Detection. (CSMA/CD)
1. Computer senses that the cable is free.
2. Data is sent.
3. If data is on the cable, no other computer can transmit until the cable is free again.
4. If a collision occurs, the computers wait a random period of time and retransmit.
o Known as a contention method because computers compete for the opportunity to send data. (Database apps cause more traffic than other apps)
o This can be a slow method
o More computers cause the network traffic to increase and performance to degrade.
o The ability to "listen" extends to a 2,500 meter cable length => segments can't sense signals beyond that distance.
Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)
o in CSMA/CA, the computer actually broadcasts a warning packet before it begins transmitting on the wire. This packet eliminates almost all collisions on the network because each computer on the network does not attempt to broadcast when another computer sends the warning packet.
o All other computers wait until the data is sent.
o The major drawback of trying to avoid network collisions is that the network traffic is high due to the broadcasting of the intent to send a message.
Token Passing
o Special packet is passed from computer to computer.
o A computer that wants to transmit must wait for a free token.
o Computer takes control of the token and transmits data. Only this computer is allowed to transmit; others must wait for control of the token.
o Receiving computer strips the data from the token and sends an acknowledgment.
o Original sending computer receives the acknowledgment and sends the token on.
o the token comes from the Nearest Active Upstream Neighbor and when the computer is finished, it goes to the Nearest Active Downstream Neighbor
o uses "beaconing" to detect faults => this method is fault tolerant
o NO contention => equal access to all computers on the network
o NO collisions
Demand Priority
0. 100 Mbps standard called 100VG-AnyLAN. "Hub- based".
1. Repeaters manage network access by performing cyclical searches for requests to send from all nodes on the network. The repeater or HUB is responsible for noting all addresses, links and end nodes and verifying if they are all functioning. An "end node" can be a computer, bridge, router or switch.
2. Certain types of data are given priority if data reaches the repeater simultaneously. If two have the same priority, BOTH are serviced by alternating between the two.
Advantages over CSMA/CD
1. Computers Uses four pairs of wires which can send and receive simultaneously.
2. Transmissions are through the HUB and are not broadcast to all other computers on the network.
3. There is only communication between the sending computer, the hub and the destination computer.
Top of page
Other methods
Appletalk
• The cabling system for an AppleTalk network is called LocalTalk.
• LocalTalk uses CSMA/CA
• AppleTalk has a dynamic network addressing scheme.
o During bootup, the AppleTalk card broadcasts a random number on the network as its card address. If no other computer has claimed that address, the broadcasting computer configures the address as its own. If there is a conflict with another computer, the computer will try to use different IP combinations until it finds a working configuration.
ARCNet
• ARCNet uses a token passing method in a logical ring similar to Token Ring networks.
• However, the computers in an ARCNet network do not have to be connected in any particular fashion.
o ARCNet can utilize a star, bus, or star bus topology.
• Data transmissions are broadcast throughout the entire network, which is similar to Ethernet.
• However, a token is used to allow computers to speak in turn.
o The token is not passed in a logical ring order because ARCNet does not use the ring topology; instead the token is passed to the next highest numerical station
o Use DIP switches to set the number (the Station Identifier) of the workstations, which you want to be beside each other so the token is passed to the next computer efficiently.
• ARCNet isn't popular anymore => ARCNet speeds are a mere 2.5 Mbps.
Most important ARCNet facts for you to know:
• ARCNet uses RG-62 (93 ohms) cabling;
• it can be wired as a star, bus, or star bus; and
• it uses a logical-ring media access method.
Summary Chart
Feature or Function CSMA/CD CSMA/CA Token Passing Demand Priority
Type of Communication Broadcast-based Broadcast-based Token-based Hub-based
Type of Access Method Contention Contention Non-contention Contention
Type of Network Ethernet LocalTalk Token Ring
ARCnet 100VG-AnyLAN
Networking Essentials Notes - Section 3
Section Titles:
Network Architectures | Ethernet Topologies | 10 Mbps Topologies
100 Mbps Topologies | Token Ring | AppleTalk | ARCnet
Network Architectures
Ethernet
• Baseband signaling.
• Linear or star-bus topology.
• Usually transmits at 10 Mbps with 100 Mbps possible.
• Uses CSMA/CD for traffic regulation.
• IEEE specification 802.3.
• Uses thicknet, thinnet or UTP cabling
• Media is passive => it draws power from the computer
Ethernet Frames
Ethernet breaks data into frames. A frame can be from 64 to 1,518 bytes long in total. The ethernet frame itself takes up 18 bytes, so the actual data can be from 46 to 1,500 bytes.
• Preamble: marks the start of a frame.
• Destination and Source: addressing information.
• Type: Identifies network layer protocol.
• CRC: error checking data.
Top of page
Ethernet Topologies
10 Mbps Topologies
10Base-T
o (10 = 10 Mbps; Base= Baseband; T = Twisted Pair)
o 10 Mbps, baseband over UTP.
o Usually wired in a physical star with a hub or multiport repeater. Internally it uses a bus signaling system like other Ethernet configurations
o Maximum segment length 100 meters (328 feet).
o Minimum between computers 2.5 meters (8 feet).
o 1024 nodes maximum on the LAN
o Category 3, 4 or 5 UTP.
o RJ-45 connectors, 4 twisted pair.
o Coaxial or Fiber backbone for larger LAN's
10BaseT UTP NETWORK LAYOUT
Limitations
• maximum segment length of 100 Meters
• Hub to Hub or repeater to repeater links limited to 100 Meters
Rules
• star topology
• 4 repeater/5 segment rule of 10Base5 is retained
• only two nodes per segment are allowed
Cabling
• RJ-45 Connectors
• Category 3 UTP minimum, preferably Category 5
________________________________________
10Base-2
o (10 = 10 Mbps; Base= Baseband; 2 = 2x 100 meters)
o 10 Mbps, baseband over thinnet.
o Uses bus topology.
o Maximum segment length 185 meters (607 feet).
o Minimum between computers 0.5 meters (20 inches).
o Maximum of 30 computers per segment.
o Obeys 5-4-3 rule: Five segments, joined by four repeaters, 3 populated giving a total length of 925 meters (3035 feet).
Physical Bus Cable Limits
10Base2 THIN ETHERNET NETWORK LAYOUT
Limitations
• maximum number of trunk segments = 5
• maximum trunk segment length = 607 feet (185 meters)
• maximum network trunk cable = 3035 feet (925 meters)
• maximum number of stations on a trunk segment = 30
• minimum distance between T connectors = 1.5 feet (0.5 meters)
Rules
• each end of the trunk segment is terminated in 50-ohms
• one of the terminators is grounded
• connector splices are kept to a minimum
Cabling
• BNC-T type connectors
• RG58-AU 50-ohm cable, 0.2"
• Note that you can't mix RG58 /AU and RG58 /U cable on the same network.
________________________________________
10Base-5
o (10 = 10 Mbps; Base= Baseband; 5 = 5 x 100 meters)
o 10 Mbps, baseband over thicknet.
o Also called Standard Ethernet
o Designed to support a backbone for a large department or building. Transceivers attach to the thicknet cable and the cable AUI connector plugs into a repeater . The branching segments of thinnet plug into the repeater and connect to the computers on the network.
o Uses bus topology.
o Maximum segment length 500 meters.
o Minimum between transceivers 2.5 meters (8 feet)
o 100 computers per segment, 300 per network.
o Obeys 5-4-3 rule: maximum distance can be extended to 2500 meters (8200 ft) using 4 repeaters and 3 populated segments.
o Transceiver is attached to main segment with a vampire tap.
o DIX or AUI connector is used to attach the transceiver to the network card. Maximum computer to transceiver distance is 50 meters. This distance is not included in the 5-4-3 calculation.
10Base-5 Summary
Maximum segment length • 500m (1640 ft)
• Typically used as backbone to connect Thinnet-based network.
Speed 10 Mbps
Maximum taps 100
Maximum segments • 5
Maximum repeaters • 4
Maximum segment with nodes • 3
• Due to attenuation, only 3 of 5 segments can actually contain network connection. Other 2 segments can be used to connect the network over long distance.
Maximum nodes per segment 100
Maximum nodes for network 300
Minimum distance between nodes 2.5m (8 ft)
Maximum overall length with repeaters 2.5 km
Maximum AUI drop cable length 50m
1. 10Base-F?
o (10 = 10 Mbps; Base= Baseband; FL =fibre optic)
o Allows long cable runs between repeaters, like between buildings
o Maximum segment length 2000 meters.
o 10BaseFL - Used for linking computers in a LAN environment.
o 10BaseFP - Used for linking computers with passive hubs from maximum cable distance up to 500m
o 10BaseFB - Used as a backbone between hubs.
o Baseband signal over a fiber-optic cable.
o Need concentrator (fiber-optic hub) ® Star wired (star topology) . Either active or passive
o Long distance.
o Very expensive. Difficult to install.
Maximum segment length - 2000m
Maximum segments- 1024
Maximum segment with nodes- 1024
Maximum nodes per segment- 1
Maximum nodes per network- 1024
Maximum hubs in a chain- 4
Top of page
100 Mbps Topologies
• 100VG-AnyLAN (IEEE 802.12)
o 100 Mbps data rate.
o Star topology over Category 3, 4 and 5 UTP.
o Uses demand priority access.
o Combines element of traditional Ethernet and Token Ring and supports Ethernet and token ring packets.
o Faster than Ethernet
o Demand priority access method => two priority levels, low and high
o Intelligent hubs can filter individually addressed frames for enhanced privacy.
o Expensive
o Uses RJ-45.
o Cable - require 4 pairs wire
Categories 3, 4 UTP- 100m
Category 5 UTP - 150m
Fiber-optic- 2000m
o Uses star topology and defines how child hub can be connected to a parent hub to extend the network.
Minimum length between nodes - 2.5m
Maximum segments- 1024
Maximum nodes per segment- 1
Maximum nodes for network- 1024
• 100BaseT? (Fast Ethernet)
o Uses CSMA/CD on a star-wired bus.
o There are 3 specifications:
100BaseT4: Uses pair category 3, 4 or 5 UTP.
100BaseTX: Uses 2-pair category 5 UTP or STP.
100BaseFX: Uses 2-strand fiber-optic.
Ethernet Frame types
Ethernet 802.2 - NetWare 3.12 and 4.x - IEEE 802.3 standard compliance.
Includes field in Ethernet 802.3 and LLC (Logical Link Control)
Ethernet 802.3 - NetWare 3.11 and before
Includes CRC
Ethernet SNAP (SubNetwork Address Protocol) - AppleTalk
Ethernet II - TCP/IP
Segmentation
• Can be performed with bridges or routers.
• Reduces traffic on network segments to increase performance.
Top of page
Token Ring
• IEEE 802.5 specification.
• Star wired ring topology (logical ring)
• Uses token passing access method.
• Can have higher transmission speeds than Ethernet
• It has larger frames than Ethernet => more can get transferred over the wire in any given time.
• Uses IBM STP Types 1, 2 and 3 cabling. (Can be UTP)
• Transmits at 4 and 16 Mbps. (16 Mbps cards will slow down to 4 Mbps if put on that kind of network, but the 4 Mbps cards can't speed up.
• Baseband transmission
• Data travels in one direction only
• Each computer acts as a unidirectional repeater
• Deterministic method of cable access. Computers cannot use the cable unless they have the token. Therefore, computers can't force their way onto the network like CSMA/CD (Ethernet)
• First computer online is assigned to monitor network activity.
Token Ring Components
• Multistation Access Units (MAU's)
• Multistation Access Units (MSAU's)
• Smart Multistation Access Units (SMAU's)
• Computers attach directly to the MSAU in a physical star to form a logical ring.
• Each MSAU has 10 connection ports ==> can support 8 clients with 2 ports for ring in and ring out.
• Each ring can have as many as 33 MSAU's
o 70 computers with UTP
o 260 computers with STP.
• Up to 12 MSAU's can connect to each other
• The MSAU can sense if a computer is down and then disconnect it from the ring => built-in fault tolerance
• Cabling
o Most token ring systems use IBM type 3 cabling.
o STP or UTP to a hub, IBM type 1,2,3 cable
Type 1: 101m from MSAU to PC
STP: 100m from MSAU to PC
UTP: 45m from MSAU to PC
Type 3: 150 feet from MSAU to PC
o Token ring networks are well suited to fiber optic cable: data travels in only one direction in it.
Here are some limitations of Token Ring:
• The maximum number of workstations is 260 on Type 1 or fiber optic cable at 16 Mbps.
• The maximum number of workstations is 72 on Type 3 cable at 4 Mbps.
• The distance between MSAUs (Multistation Access Units) is 100 meters (Type 1 cabling) to 45 meters (Type 2 cabling).
• Each ring can have up to 33 MSAUs.
• Maximum distance of the ring is 4 kilometers with fiber optic cable.
Token Ring and Ethernet Comparison
Token Ring
• can have higher transmission speeds than Ethernet
• supports more computers on a single segment (up to 260)
• more expensive than Ethernet
• harder to install than Ethernet
• is more fault tolerant because of the beaconing process
Top of page
AppleTalk
• local talk
o CSMA/CA access method
o 3 things happen when devices attached
1. device assigns itself an address randomly
2. device broadcasts the address to see if it's used
3. if not, the device will use it the next time it's online again
o bus or tree
o STP
o max. 32 devices
• Apple share
o file server on an AppleTalk network
o divided into zones
• EtherTalk
o 802.3
o allows protocols to run on ethernet coaxial cable
• TokenTalk
o 802.5
o allows Macintosh to connect to token ring network
ARCnet
• IEEE 802.4 specification - almost
• Cable
o Uses RG-62 (93 ohm) (most common)or
o RG-59 (75ohm) coaxial cable.
o Can also use UTP.
• Uses token passing on a star-bus topology.
• Token moves from computer to computer in numerical order.
• Transmits at 2.5 Mbps.
• ArcNet plus - 20 Mbps
• connected by cable to hub
o 93 ohm RG-62 A/U - 610m max., star
o 93 ohm RG-62 A/U - 305m max., bus <= notice less distance on hub
o RJ-11, RJ-45 UTP - max. 244m on star or bus
• Hubs can be
o Passive => merely relay signal
o Active => regenerate and relay signal
o Smart => add diagnostic features, such as reconfiguration detection
Here are some limitations of ARCNet:
• Bus segment length for coaxial cable is a maximum of 1000 feet, with a limit of 8 workstations per coaxial segment.
• Bus segment length for twisted pair is a maximum of 400 feet, with a limit of 10 workstations per twisted-pair segment.
• There is a maximum of 255 workstations per network.
• Workstations can be located up to 600 feet from the active hub.
• The maximum distance from passive hubs to active hubs is 100 feet; the maximum distance between two active hubs is 2000 feet.
• The maximum distance allowed between workstations is 20,000 feet.
• There can be no more than four workstations on a passive hub, no more than 100 feet from a hub.
• Passive hubs cannot be connected to other passive hubs.
Networking Essentials Notes - Section 4
Section Titles:
Network Operations | Networking Printing | E-mail | Multivendor Environments | Client/Server Computing
Network Operations
Network O/S setup
• 2 Major Types of Multitasking
1. Preemptive - O/S can take control of the processor without the task's cooperation
Advantage of preemptive multitasking: CPU activity can be switched from local tasks to a network task
2. Non-preemptive (Cooperative)
the task itself decides when to give up the processor
no other program can run until the non-preemptive program gives up the control of the processor
• A Network O/S
o ties together all the PCs and peripherals in the network
o coordinates the functions of all PCs and peripherals in a network
o provide security for and access to database and peripherals in a network
Client Software
o redirector
process of forwarding requests is done by a redirector
intercepts requests in the PC
determines if they should be left alone to continue in the local PC's bus or redirected out to the network to another server
o designator
a piece of software that manages the assignment of drive letters to both local and remote network resources or shared drives
e.g. share drive in other PC, alphabet as a designator, such as G:
when an association is made between a network resource and a local drive letter (mapping a drive), the designator takes care of remembering the path to the network resource.
when users or applications access the drive, the designator substitutes the resource's network address for the drive letter before the request is sent to the redirector.
o peripherals
redirectors can send requests to either computers or peripherals (e.g. LPT1: or Com1 can refer to local OR network printers. Just give these ports a path to the network device.
Server Software
o makes it possible to SHARE resources (data, printers, modems, etc.) with workstations
o provides network security as well
o makes sure two users don't use the same resources at the same time.
o managing users - create, privileges, remove users
o network management tools to track network behaviour
o The server also
Provides logon authentication for users
Manages users and groups
Stores management, control, and auditing tools for network administration
Provides fault tolerance for protection of network integrity
Windows NT Server
o When installing you must
name the domain or workgroup
name the server
o the 1st server installed in a domain must be installed as the primary domain controller (PDC), every domain is required to have one and only one PDC
o a backup domain controller
keeps a copy of the domain's directory database
authenticates logons
can be an application server
o Configuring the network adapter card - default protocol for NT server is TCP/IP
o TCP/IP installation
IP address
logical 32-bit address to identity a TCP/IP host
has two parts: network ID and host ID
subnet mask - is used to mask a portion of the IP address so that TCP/IP can distinguish the network ID from the host ID - 255.255.0.0
default gateway - (gateway = ROUTER) - For communication with a host on another network, an IP host must be configured with a route to the destination network otherwise only communication on the local segment
manual install - assign IP address, subnet mask and the default gateway
automatic install - DHCP (Dynamic Host Configuration Protocol) service,
when a DHCP server is configured on the network, clients that support DHCP (NT W/S & NT Server) can request TCP/IP configuration info (IP address, subnet mask, default gateway and so forth) from the DHCP server
Top of page
Networking Printing
• Here's the remote printing process:
1. the PC's redirector put the print job onto the network cable
2. print server's network software takes the print job from the cable and send it into a queue with other items waiting from access to the shared printer
• UNC syntax: \\print_server_name\printer_share_name
• network uses a spool (simultaneous peripheral operation on line)
• a spooler is a memory buffer in the print server's ram that holds print jobs If there are too many print jobs to fit into RAM, the overflow wait to print on the print server's hard drive.
• To share a printer you must:
o load printer drivers so the printer will print correctly
o Create a share name for the printer
o identify a port so the redirector will know where to send the print job
o set the information and output parameters so the network operating system will know how to handle and format the print job.
PDL - (Printer Description Language)
o the printer uses the PDL to construct text and graphics to create the page image
o PDLs are like blueprints
You can manage the printer remotely
E-mail
E-mail system components
X.400 Components
o X.400 defines a whole range of protocols for transferring mail between e-mail servers.
o The Three main components are:
UA=> user agents
MTA => Message Transfer Agent
MTS => Message Transfer System
o E-mail Client (UA, User Agent) responsible for all user interaction such as
reading and composing messages. It runs on the
o MTA (Message Transfer Agent) responsible for transferring messages from
one user's mailbox to another or to other MTAs for delivery.
o MTS
Responsible for transferring messages of all types for the UA that creates the message to the destination UA
o Directory services Personal Address Book, Global Address List.
X.500
o is a set of directory services developed to help users in distributed networks locate users on other networks to whom they want to send messages
o Post Office (Information store, Message store) location of all user messages.
E-mail protocols
Transport/Delivery protocols
• POP3 (Post Office Protocol) and IMAP4 (Internet Mail Access Protocol)
o describes how e-mail client interact with email server.
• SMTP (Simple Mail Transport Protocol)
o describes how e-mail servers transfer email message to their intended recipients.
o SMTP works with other e-mail programs to provide both a client and a server the function to send and receive e-mail messages.
o used on the Internet, UNIX and in the TCP/IP stack
• MIME (Multipurpose Internet Mail Extension)
o defines the method in which files are attached to SMTP messages.
• MHS (Message Handling Service) within NetWare
o similar to X.400 => one computer on the network is the MHS sever and it translates messages between computers that may be using different e-mail systems
Directory Services
• LDAP (Lightweight Directory Access Protocol)
• X.500 (see above)
Messaging APIs
• MAPI (Message Application Programming Interface)
o MS standard and incorporated throughout all of its office products.
• VIM (Vendor-Independent Messaging) from Lotus
• Scheduling
Groupware
• eg. BBS, Internet news, Interactive conferences, MS Exchange, Lotus Notes.
o Group discussions
o Workflow automation.
o Help Desk
o Collective document creation.
o Internal publishing
Top of page
Networks in a Multivendor Environments
• server's O/S, the client's O/S & the redirector have to be compatible
• Different clients have to be able to understand each other to communicate. How can you get this done?
o the client solution
implement the appropriate redirector on the client, the redirector forwards your request to the appropriate destination
use multiple redirectors to communicate with different clients
o the server solution
install a service on the service
E.g. to let MAC clients share network resources, add Service for Macintosh; Add FPNW for NetWare clients
Top of page
Client/Server Computing
• Centralized Computing
o Here the application operates on the server and all clients interact with the central application through client side interface terminals - dumb terminals
o when a client requests data from a database, the system moves all the data across the network to the client
o this causes the network to slow down for other clients
• Client/Server Computing
o the client computer makes a request and a computer acting as the server fulfills the request
o the client software uses the structured query language (SQL) to translate what the user sees into a request that the database can understand. Therefore portions of the application reside on the client and some on the server.
o Here's an example using SQL:
The client requests the data
The request is translated into SQL
The SQL request is sent over the network to the server
The database server carries out a search on the computer where the data exists
The requested records are returned to the client
The data is presented to the user
o The application (MS Access for example) is the client, or FRONT END
o The database server (SQL Server) is the server or BACK END
• The Client
o The front end client runs an application that
presents an interface to the user (this doesn't reside on the server at all)
formats requests for data
displays data it receives from the server
o The user uses an on-screen form, called a search key to specify search requests
o the data can be presented to the user in various ways - different users access the same database to present information in a way that suits them
o Front End Tools
query tools
user applications
e.g. Excel provides front end access to back end databases
program development tools
Visual Basic is used to develop front end tools to access backend data.
• The Server
o usually dedicated to STORING and MANAGING data
o most of the database activity happens on the server
sorting
data updates, additions, deletions, and protection
o Stored procedures
short, pre-written data-processing routines used by client applications
stored on the server and can be used by any client
one stored process can be called by any number of client applications instead of having to incorporate the same routine into the code of each program
this means
processing is done on the server instead of the client
network traffic is reduced because one request begins a series of stored procedures on the server instead of many different requests
security controls can prevent unauthorized use of some procedures
• Client / Server Architecture
o single server
o multiple servers with special tasks
distributed server arrangements
servers across a WAN link synchronized to endure they all have the same data in common
Data Warehouse. One server stores large amounts of data and forwards the most sought after data to intermediate servers that format the data. This off loads some of the processing from the intermediate servers that care contacted by clients (pic. p.409).
Advantages of the Client / Server Environment
3. Less network traffic => only results of query are sent over the network
4. The server is more powerful that the client and does most of the processing
5. More RAM and storage space on server means you don't have to spend as much MONEY on each client
6. Back end data is more easily secured and BACKED UP
Networking Essentials Notes - Section 5
Network Support and Administration
Section Titles:
Managing Network Accounts | Managing Network Performance | Avoiding Data Loss
• Five management areas
1. user administration
2. resource management
3. configuration management
4. performance management
5. maintenance
Managing Network Accounts
User Administration
Profiles
• used to structure a network environment for certain users
• this may be for security
• can also control the user's logon environment
• profiles include network connections and program items that appear when the user logs on. These can include:
o printer connections
o window sizes and positions
o icons
o mouse settings
o the screen arrangement of colors
o screen savers
Rights apply to the system as a whole; permissions apply to a certain object.
Types of Groups
• Local Groups => things
• Global Groups => People
• Special Groups => internal system access -- Interactive, Network
• Built-In Groups => Administrator, Users, Operators Groups, Guests
________________________________________
Administrator Responsibilities
• Creating and Managing Accounts
• Security
• Training and supporting users
• Updating and implementing new software
• Archiving and data backup
• Preventing data loss
• Monitoring and regulating server storage space.
• Tuning the network
• Virus protection
• Troubleshooting
• Upgrading and replacing hardware
• Adding new computers
Security Models
Two different security models have evolved:
• Password-protected shares (share-level): each resource has a password
o there are 2 levels of passwords: Read access and Full Control Access
• Access permissions (user level): Rights are assign on a user by user basis. More secure than the share level method.
Other Methods of Network Security
• Auditing
o audit records show the users that have accessed or attempted to access specific resources in security log
• Diskless computers
• Data Encryption
o data can't be stolen from the cable. When the data gets to the proper PC, a key, the code for deciphering encrypted data, decode the bits into understandable info.
o DES data encryption standard
o CCEP commercial COMSEC endorsement program
• Virus protection
o The 4 standard measures to take when protecting against viruses:
Passwords to reduce the chance of unauthorized access
Well planned access and privilege assignments for all users
Profiles to structure the network environment
a policy determining what software can be loaded
Managing Network Performance
• Bottlenecks
o one device uses noticeably more CPU time than the others
o these devices tend to become bottlenecks:
CPU,
memory,
network card,
disk controllers,
network media
• Windows NT Performance Monitor
o view operations in both real time and recorded time for: processors, HDD, memory, network utilization, network as a whole
o can record the performance data
o send an alert to the network manager
o run utility that can adjust the system back into acceptable ranges
o establish a baseline of system management
• Simple Network Management Protocol (SNMP) - in a SNMP environment, programs called agents are loaded onto each managed device. The agents monitor network traffic and behaviour in these key network components in order to gather statistical data. This data is stored in a management information base (MIB)
• SNMP components include: hubs, servers, interface cards, routers and bridges
• The MIB collects data and the management program
o presents the information in the form of graphs or charts AND/OR
o sends the information to database program for analysis
Total System Management
• Microsoft System Management Server (SMS)
o centralized administration of computers in a WAN
o Inventory Management - collects and maintains an inventory of hardware and software for each computer and stored in a SQL server database, info. like RAM, CPU, HDD size...
o Shared Application Management - shared application can also distributed to a server for client's access
o Software Distribution
SMS can install and configure new software or upgrade previously installed software
Also, it can run commands on the client such as virus scans
o Remote Control and Network Monitor - provide help desk and diagnostics utilities to control remote client directly and access to remote client
Avoiding Data Loss
Tape Backup
Method Description
Full Backup backs up and marks selected files, whether or not they have changed since the last backup
Copy backs up selected files without marking them as backed up
Incremental Backup backs up and marks selected files only if they have changed since the last backup
Differential Backup backs up selected files only if they have changed since the last backup w/o marking them as backed up
The difference between Incremental and Differential
IF => Incremental Fast to backup; Slow to Restore => Marks files as backed up
=> Differential Slow to backup; Fast to Restore
UPS
power source to run the server for s short time
safe shutdown management service
prevent any more users from accessing the server
send an alert message to the network admin.
power is restored while UPS is active, the UPS will notify users that the power has returned
Fault Tolerant Systems - Windows NT supports Raid 0,1 and 5. For the exam, worry only about them.
RAID 0 - disk striping
disk striping divides data into 64k block and spreads it equally in a fixed rate and order among all disks in an array
NOT FAULT TOLERANT
RAID 1 -
disk mirroring - actually duplicates a partition and moves the duplication onto another physical disk
disk duplexing - is a mirrored pair of disks with an addition disk controller on the second drive
The only RAID solution that can house the system files in the Boot partition
RAID 4 - disk guarding
one drive is a dedicated parity drive, data is striped to multiple drives and then its parity sum is calculated, which is written to the dedicated parity drive
works best for large block operations
RAID 5 - striping with parity
data is striped across multiple drives and then its parity sum is calculated, which is also striped across multiple drives (not a dedicated parity drive)
sector sparing - hot fixing
automatically adds sector - recovery capabilities to the file system while the computer is running
if bad sectors are found during disk I/O, the fault tolerance driver will attempt to move the data to good sector and map out the bad sector - only for SCSI, not ESDI or IDE
Networking Essentials Notes - Section 6
Section Titles:
Modems | Repeaters | Bridges | Routers | Brouters | Hubs | Gateways
Larger Networks
Some components can be installed which will increase the size of the network within the confines of the limitations set by the topology. These components can:
• Segment existing LANs so that each segment becomes its own LAN.
• Join two separate LANs.
• Connect to other LANs and computing environments to join them into a larger comprehensive network.
Modems
• Modems share these characteristics
o a serial (RS-232) interface
o an RJ-11C telephone line connector
• telephones use analog signal; computers use digital signal. A modem translates between the two
• BAUD refers to the speed of the oscillation of the sound wave on which a bit of data is carried over the telephone wire
• the BPS can be greater than the baud rate due to compression and encode data so that each modulation of sound can carry more than one bit of data is carried over the telephone line. For example, a modem that modulates at 28,000 baud can actually send at 115,200 bps => bps is the most important parameter when looking at throughput.
• There are 2 types of modems
Asynchronous Communications (Async)
• use common phone lines
• data is transmitted in a serial stream
• not synchronized, no clocking device => no timing
• both sending and receiving devices must agree on a start and stop bit sequence
• error control
o a parity bit is used in an error checking and correction scheme called parity checking
o It checks to see if the # of bits sent = # of bits received
o the receiving computer checks to make sure that the received data matches what was sent.
o 25 % of the data traffic in async communications consists of data control and coordination
o MNP (Microcom Network Protocol) has become the standard for error control
o Later LAPM (Link Access Procedure for Modems) is used in V.42 modems (57,600 baud).
It uses MNP Class 4.
LAPM is used between two modems that are V.42 compliant
If one or the other modems is MNP 4 - compliant, the correct protocol would be MNP Class 4
• Communication performance depends on
1. signaling or channel speed - how fast the bits are encoded onto the communications channel
2. throughput - amount of useful information going across the channel
you can double the throughput by using compression. One current data compression standard is the MNP Class 5 compression protocol
V.42 bis is even faster because of compression.
bis => second modification
terbo => third, the bis standard was modified
This is a good combination:
0. V.32 signaling
1. V.42 error control
2. V.42bis compression
Standard BPS
V.22 bis 2400
V.32 9600
V.32bis 14,400
V.32terbo 19,200
V.FastClass (V.FC) 28,800
V.34 28,800
V.42 57,600
Synchronous Communication
• relies on a timing scheme coordinated between two devices to separate groups of bits and transmit them in blocks known as frames
• NO start and stop bits =. a continuous stream of data because both know when the data starts and stops.
• if there's error, the data is retransmitted
• some synchronous protocol perform the following that asynchronous protocols don't:
1. format data into blocks
2. add control info
3. check the info to provide error control
• the primary protocols in synchronous communication are:
1. Synchronous data link control (SDLC)
2. High-level data link control (HDLC)
3. binary synchronous communication protocol (bisync)
• Synchronous communications are used in almost all digital and network communications
• 2 types of telephone lines:
1. public dial network lines (dial-up lines) - manually dial up to make a connection
2. leased (dedicated) lines - full time connection that do not go through a series of switches, 56 Kbps to 45 Mbps
Top of page
Repeaters
• Repeaters
o EXTEND the network segment by REGENERATING the signal from one segment to the next
o Repeaters regenerate BASEBAND, digital signals
o don't translate or filter anything
o is the least expensive alternative
o work at the Physical layer of OSI
• Both segments being connected must use the same access method e.g. an 802.3 CSMA/CD (Ethernet) LAN segment can't be joined to a 802.5 (Token Ring) LAN segment. Another way of saying this is the Logical Link Protocols must be the same in order to send a signal.
• BUT repeaters CAN move packets from one physical medium to another: for example can take an Ethernet packet from a thinnet coax and pass it on to a fiber-optic segment. Same access method is being used on both segments, just a different medium to deliver the signal
• They send every bit of data on => NO FILTERING, so they can pass a broadcast storm along from on segment to the next and back. So you want to use a repeater when there isn't much traffic on either segment you are connecting.
• There are limits on the number of repeaters which can be used. The repeater counts as a single node in the maximum node count associated with the Ethernet standard [30 for thin coax].
• Repeaters also allow isolation of segments in the event of failures or fault conditions. Disconnecting one side of a repeater effectively isolates the associated segments from the network.
• Using repeaters simply allows you to extend your network distance limitations. It does not give you any more bandwidth or allow you to transmit data faster.
• Why only so many repeaters are allowed on a single network: "propagation delay". In cases where there are multiple repeaters on the same network, the brief time each repeater takes to clean up and amplify the signal, multiplied by the number of repeaters can cause a noticeable delay in network transmissions.
• It should be noted that in the above diagram, the network number assigned to the main network segment and the network number assigned to the other side of the repeater are the same.
• In addition, the traffic generated on one segment is propagated onto the other segment. This causes a rise in the total amount of traffic, so if the network segments are already heavily loaded, it's not a good idea to use a repeater.
• A repeater works at the Physical Layer by simply repeating all data from one segment to another.
Summary of Repeater features
o increase traffic on segments
o limitations on the number that can be used
o propagate errors in the network
o cannot be administered or controlled via remote access
o no traffic isolation or filtering
Summary:
A repeater
o Connects two segments of similar or dissimilar media
o Regenerates the signal to increase the distance transmitted
o Functions in the Physical Layer of the OSI model
o Passes ALL TRAFFIC in both directions
• Use a repeater to improve performance by dividing the network segments, thus reducing the number of computers per segment (This is what it says in the book, but it doesn't make sense to me)
• Do NOT use a repeater when:
o There is heavy network traffic
o Segments are using different access methods
o You need any kind of data filtering.
Amplifiers are just like repeaters, but generate a BROADBAND, analog signal. That analog signal can have different frequencies and carry both voice and data.
Top of page
Bridges
• have all the abilities of a repeater
• Bridges can
o take an overloaded network and split it into two networks, therefore they can divide the network to isolate traffic or problems and reduce the traffic on both segments
o expand the distance of a segment
o link UNLIKE PHYSICAL MEDIA such as twisted-pair (10Base T) and coaxial Ethernet (10Base2)
o VERY IMPORTANT: they can link UNLIKE ACCESS CONTROL METHODS, on different segments such as Ethernet and Token Ring and forward packets between them. Exam Cram says this is a Translation Bridge that can do this - not all bridges - but my observation is questions don't necessarily mention the distinction.
• Bridges work at the Data Link Layer of the OSI model => they don't distinguish one protocol from the next and simply pass protocols along the network. (use a bridge to pass NetBEUI, a non-routable protocol, along the network)
• Bridges actually work at the MEDIA ACCESS CONTROL (MAC) sublayer. In fact they are sometimes called Media Access Control layer bridges. Here's how they deal with traffic:
o They listen to all traffic. Each time the bridge is presented with a frame, the source address is stored. The bridge builds up a table which identifies the segment to which the device is located on. This internal table is then used to determine which segment incoming frames should be forwarded to. The size of this table is important, especially if the network has a large number of workstations/servers.
o they check the source and destination address of each PACKET
o They build a routing table based on the SOURCE ADDRESSES. Soon they know which computers are on which segment
o Bridges are intelligent enough to do some routing:
if the destination address is on the routing table and is on the SAME SEGMENT, the packet isn't forwarded. Therefore, the bridge can SEGMENT network traffic
If the destination address is the routing table, and on a remote segment, the bridge forwards the packet to the correct segment
if the destination address ISN'T on the routing table, the bridge forwards the packet to ALL segments.
BRIDGES SIMPLY PASS ON BROADCAST MESSAGES, SO they too contribute to broadcast storms and don't help to reduce broadcast traffic
• Remote Bridges
o two segments are joined by a bridge on each side, each connected to a synchronous modem and a telephone line
o there is a possibility that data might get into a continuous loop between LANs
o The SPANNING TREE ALGORITHM (STA)
senses the existence of more than one route
determines which is the most efficient and
configures the bridge to use that route
this route can be altered if it becomes unusable.
Transparent bridges (also known as spanning tree, IEEE 802.1 D) make all routing decisions. The bridge is said to be transparent (invisible) to the workstations. The bridge will automatically initialize itself and configure its own routing information after it has been enabled.
• Comparison of Bridges and Repeaters
o Bridges
regenerate data at the packet level
accommodate more nodes than repeaters
provide better network performance than repeaters because they segment the network
• Implementing a Bridge
o it can be an external, stand-alone piece of equipment
o or be installed on a server
• Summary from MOC:
o Bridges have all the features of a repeater
o They connect two segments and regenerate the signal at the packet level
o They function at the Data Link layer of the OSI model
o Bridges are not suited to WANs slower than 56k
o They cannot take advantage of multiple paths simultaneously
o They pass all broadcasts, possibly creating broadcast storms
o Bridges read the source and destination of each packet
o they PASS packets with unknown destinations
o Use Bridges to:
Connect two segments to expand the length or number of nodes on the network
reduce traffic by segmenting the network
Connect
unlike MEDIA ( e.g. 10BaseT and 10Base2)
unlike ACCESS CONTROL METHODS (Ethernet and Token Ring)
The advantages of bridges are
o increase the number of attached workstations and network segments
o since bridges buffer frames, it is possible to interconnect different segments which use different MAC protocols
o since bridges work at the MAC layer, they are transparent to higher level protocols
o by subdividing the LAN into smaller segments, overall reliability is increased and the network becomes easier to maintain
o used for non routable protocols like NetBEUI which must be bridged
o help localize network traffic by only forwarding data onto other segments as required (unlike repeaters)
The disadvantages of bridges are
o the buffering of frames introduces network delays
o bridges may overload during periods of high traffic
o bridges which combine different MAC protocols require the frames to be modified before transmission onto the new segment. This causes delays
o in complex networks, data is not sent over redundant paths, and the shortest path is not always taken
o bridges pass on broadcasts, giving rise to broadcast storms on the network
Sample Question:
You want to connect an Ethernet network in one part of an office building to a Token-ring network down the hall. Both networks use NWLink IPX but must eliminate the IPX addressing and use only NetBEUI on both segments when they are joined. Which connectivity device do you choose which will allow the two networks to communicate, but at the same time reduce network levels.
device should you use?
1. repeater
2. bridge
3. router
4. gateway
B - they are testing here to see if you know what a translation bridge can do.
Some bridges can't connect different segments that use different media schemes, but a translation bridge can. A translation bridge will also reduce network traffic because it can analyze packets based on MAC address and if it finds them to be from the same segment as the originating they are simply discarded instead of being passed on to a non-local segment. The bridge can do this using address information stored in its bridging table.
Top of page
Routers
• Determine the best path for sending data and filtering broadcast traffic to the local segment. They DON'T pass on broadcast traffic
• work at the Network layer of OSI => they can switch and route packets across network segments
• They provide these functions of a bridge
o filtering and isolating traffic
o connecting network segments
• routing table contains
1. all known network addresses
2. how to connect to other networks
3. possible paths between those routers
4. costs of sending data over those paths
5. not only network addresses but also media access control sublayer addresses for each node
Routers
o REQUIRE specific addresses: they only understand network numbers which allow them to talk to other routers and local adapter card addresses
o only pass Packets to the network segment they are destined for.
o routers don't talk to remote computers, only to other routers
o they can segment large networks into smaller ones
o they act as a safety barrier (firewall) between segments
o they prohibit broadcast storms, because broadcasts and bad data aren't forwarded
o are slower than most bridges
o can join dissimilar access methods: a router can route a packet from a TCP/IP Ethernet network to a TCP/IP Token Ring network
Routers don't look at the destination computer address. They only look at the NETWORK address and they only pass on the data if the network address is known => less traffic
• Routable protocols:
o DECnet, IP, IPX, OSI, XNS, DDP (Apple)
o Routable protocols have Network layer addressing embedded
• Non-routable protocols:
o LAT, NetBEUI, DLC
o Non-routable protocols don't have network layer addressing
Choosing Paths
• routers can choose the best path for the data to follow
• routers can accommodate multiple active paths between LAN segments. To determine the best path, it takes these things into account:
o If one path is down, the data can be forwarded over on alternative route
o routers can listen and determine which parts of the network are busiest.
o it decides the path the data packet will follow by determining the number of hops between internetwork segments
• OSPF (Open Shortest Path First)
o is a link-state routing algorithm
o routes are calculated based on
# of hops
line speed
traffic
cost
o TCP/IP supports OSPF
• RIP (Routing Information Protocol)
o RIP is the protocol used to determine the # of hops to a distant segment.
o uses distance-vector algorithm to determine routes
o TCP/IP & IPX support RIP
• NLSP (NetWare Link Services Protocol)
o is a link-state algorithm for use with IPX
• There are 2 types of routers
o Static - manually setup and config the routing table and to specify each route
o Dynamic
automatic discovery of routers
use information from other routers
Distinguishing between Bridges and Routers
Both bridges and routers
o forward packets between networks
o send data across WAN links
• A Bridge
o recognizes the address of EACH computer on it's segment and forwards packets on the basis of the destination address
o either recognizes the address or it doesn't, and forwards the packet accordingly
o forwards all broadcast messages to all ports, except to the port from which the broadcast message came. Every computer on every segment receives this broadcast
• A Router
o works at the NETWORK layer and thus takes more information into account when determining what to forward and where to forward it to.
o Routers recognize the addresses of other routers and determine which packets to forward to which routers
Multiple Paths-- important
• Bridges recognize ONE PATH between networks
• Routers can search between multiple paths and determine the best path at the moment
The 4 KEY pieces of information that distinguish bridges and routers:
Bridges Routers
• recognize the MAC sublayer addresses (i.e. the addresses of the network cards on its own segment) • Routers recognize network addresses not individual computer addresses
• forwards everything it doesn't recognize and
• forwards all addresses it knows, but only out the appropriate port • routers filter addresses.
• It forwards particular protocols to particular addresses (other routers)
• if the router doesn't recognize a destination address, the packet is usually discarded
• works with all protocols • only works with routable protocols
• Non-Routable = NetBEUI, DLC, LAT
Because they make path choices and filter out packets the segment doesn't need to receive they
• help lessen network congestion
• conserve resources
• boost data throughput
• make data delivery more reliable
Because is works at the network layer, a router can connect networks that use
• Different architectures
• Different media access control methods -- for example, they can connect an Ethernet segment to a Token-Ring segment
Summary of Router features
• use dynamic routing
• operate at the protocol level
• remote administration and configuration via SNMP
• support complex networks
• the more filtering done, the lower the performance
• provides security
• segment networks logically
• broadcast storms can be isolated
• often provide bridge functions also
• more complex routing protocols used [such as RIP, IGRP, OSPF]
Top of page
Brouters
• Combine the best qualities of both bridges and routers
• First, a brouter checks to see if the protocol is routable or non-routable
• Route selected routable protocols.
• They can bridge non-routable protocols. Like a Bridge, they use the MAC address to forward to destination. They act like a router for one protocol and a bridge for all the others
• More cost effective than individual bridges and routers.
• SO, use a brouter when you have routable and non-routable protocols.
Hubs
There are many types of hubs:
• Passive hubs are don't require power and are simple splitters or combiners that group workstations into a single segment
• Active hubs require power and include a repeater function and are thus capable of supporting many more connections.
• Intelligent hubs provide
o packet switching
o traffic routing
Gateways
• The TRANSLATOR -- allows communications between dissimilar systems or environments
• A gateway is usually a computer running gateway software connecting two different segments. For example an Intel-based PC on one segment can both communicate and share resources with a Macintosh computer or an SNA mainframe. Use gateways when different environments need to communicate. One common use for gateways is to translate between personal computers and mainframes
• GSNW is a gateway to allow Microsoft clients using SMB to connect to a NetWare server using NCP.
• Gateways work at the Application --> Transport layer
• They make communication possible between different architectures and environments
• They perform protocol AND data conversion / translation.
• they takes the data from one environment, strip it, and re-package it in the protocol stack from the destination system
• they repackage and convert data going from one environment to another so that each environment can understand the other environment's data
• gateway links two systems don't use the same
1. protocols
2. data formatting structure
3. languages
4. architecture
• they are task specific in that they are dedicated to a specific type of conversion: e.g. "Windows NT Server -> SNA Server Gateway"
• usually one computer is designated as the gateway computer. This adds a lot of traffic to that segment
• Disadvantages
o They slow things down because of the work they do
o they are expensive
o difficult to configure
Remember, gateways can translate
o protocols e.g. IPX/SPX --> TCP/IP
o and data (PC --> Mac)
o e-mail standards --> an e-mail gateway that translates on e-mail format into another (such as SMTP) to route across the Internet.
Networking Essentials Notes - Section 7
Section Titles:
WAN Transmission:
Analog | Digital | T1 | T3 | Switched 56 | Packet Switching
Advanced WAN:
X.25 | ISDN | Frame Relay | ATM | FDDI | SONET | SMDS
Network Troubleshooting | Tools
WAN Transmission
Communication between LANs over a WAN link will involve one of these technologies
• Analog
o These use conventional telephone lines, with voice signaling (modem) technologies
• Digital
o These use digital grade telephone lines, with digital technologies all the way
• Packet Switching
o These use multiple sets of links between sender and receiver to move data
Analog
• dial-up line
o via public switched telephone network (PSTN)
o requires modems which are slow
o inconsistent quality of service
• dedicated line
o fast
o reliable
o expensive
o service provider can implement line conditioning (a service that reduces delay and noise on the line, allowing for better transmissions) can make the leased lines even more reliable,
Digital
• Digital Data Service (DDS) provide point-to-point synchronous communications at:
o 2.4 Kbps
o 4.8 Kbps
o 9.6 Kbps or
o 56 Kbps
• guarantees full-duplex bandwidth by setting up a permanent link from each endpoint
• 99% error free
• doesn't requires modem, requires bridge or router through a device called a CSU/DSU. This device translates standard digital signals a computer generates into bipolar digital signals used by synchronous communications
• Available in several forms:
# of T channels Speed
DDS
T1 1 1.544 Mbps
T3 28 45 Mbps
T4 168 274.7 Mbps
Switched 56 56 Kbps
T1
• Point to point transmission => no switching
• uses two-wire pairs (1 pair to send, 1 to receive)
• full-duplex signal at 1.544 Mbps
• Used to transmit digital, voice, data and video signals
• multiplexing - signals from different source are collected into a component called a multiplexer and fed into one cable 8,000 times a second
• a T1 divides into 24 64 Kbps channels. Subscribers can lease one 64 Kbps channel known as a Fractional T-1.
o each channel can transmit at 64 Kbps. This is called a DS-0
o the whole 1.544 Mbps is known as DS-1
• Connecting a T1 line to your network is similar to a connecting a DDS or frame relay line. You will need a T1-compatible CSU/DSU, and a bridge or router. To distribute the T1’s bandwidth between voice and data traffic, you will need a multiplexer/demultiplexer to combine voice and data signals for transmission, and separate them upon reception.
T3
• equivalent to 28 T-1 lines
• T3 and Fractional T-3 leased line service provides voice and data service from 6 Mbps to 45 Mbps
• REALLY expensive
• T-1 uses copper wire, while T-3 uses fiber optic cables or microwave transmission equipment.
Switched 56
• In reality, a Switched 56 line is nothing more than a circuit-switched version of a standard 56 Kbps DDS leased line. As customers pay only for connection time, resulting costs are usually significantly lower than those of a dedicated line.
• is a LAN to LAN digital dial-up service
• 56 Kbps
• used on demand => not dedicated => less expensive.
• Both ends must be equipped with a Switched 56 compatible CSU/DSU to dial-up another switched 56 site.
Packet Switching
o Switching (as in switched connections) refers to finding a path for data transmission across a number of potential links between sender and receiver. On the other hand, analog and digital connections require a fixed connection to exist, at least for the duration of each communication session. Switching methods include both circuit switching and packet switching. Essentially, when data is received on an incoming line, the switching device must find an appropriate outgoing line on which to forward it. These switching devices are usually called routers, based on the functions they perform.
o data package is broken into packers and each package is tagged with a destination address and other info.
o relayed through stations in a computer network
o data paths for individual packets depend on the best route at any given instant. The main point is that the small, individual packets are all take their own route to the destination, and an error in any one of them is easier to correct than a huge chunk of data
o These networks are sometimes called "any to any networks"
o Can use a virtual circuit
logical connection between the sending computer and the receiving computer
not actual cable, but bandwidth used on demand
Can use a Switched Virtual Circuit to establish a connection over a specific route.
Permanent Virtual Circuits allow the customer to pay for only the time that the line is used.
Top of page
Advanced WAN
X.25
o speed peaks at 64 Kbps - Newer versions can be up to 2 Mbps
o a set of protocols incorporated in a packet-switching network
o uses switches circuits and routes as available to provide the best routing at any particular time. The situation is always changing.
o uses telephone lines - slow - MUCH error checking => this is a major disadvantage
o synchronous packet-mode host or other device and the public data network (PDN) over a dedicated or leased-line circuit
o DTC/DCE interface
o a PAD is also needed - Packet Assembler / Disassembler
o And X.25 gateway is needed between the LAN and the Public Data Network
o See pic on p. 595.
ISDN
o Basic Rate (BRI) is 3 data channels
2 for 64 Kbps - 64 Kbps channels are known as B (Bearer) channels, carry voice, data or image
1 for 16 Kbps - the 16 Kbps channel is D channel which carries signaling and link management data
This makes a total of 144 Kbps of bandwidth.
basic rate is called 2B+D
The two B channels can be used together for 128 Kbps data stream
o Primary Rate (PRI) ISDN takes the entire bandwidth of a T1 link by providing
23 B Channels at 64 Kbps
1 D Channel at 64 Kbps
o ISDN is a dial-up service, not dedicated, not bandwidth on demand
o Right now, ISDN is about 5 times as fast as the fastest modem
o You can transmit voice and data with ISDN
Frame Relay
o Like X.25 Frame Relay is a packet-switching technology
o uses variable-length packets
o It establishes a logical path that's called a Permanent Virtual Circuit (PVC) between end-points. PVCs take fixed paths, so a PVC is the equiva-lent of a dedicated line in a packet-switched network. The path is fixed, so network nodes don't have to waste time calculating routes. Frame relay connections operate at speeds between 56 Kbps and 1.544 Mbps because they use PVCs, and there is no built-in error checking.
o again, the PVC transmits at Data Link Layer. Because Frame Relay uses a PVC, the entire path from end to end is known => faster because no fragmentation or reassembly or best path routing is needed
o can supply bandwidth on demand
o over digital leased-line
o Frame relay connections to a network require you to use a frame relay-compatible CSU/DSU to create the physical connection to the WAN, and a router or bridge to move traffic from the LAN to the WAN, and the WAN to the LAN, as needed.
o in summary, Frame relay costs less than a dedicated line or an ATM connection and provides data transmission rates of up to 1.544 Mbps over conventional or fiber optic media.
ATM
o fixed-sized packets over broadband and baseband LANs or WANs
o 155 Mbps to 622 Mbps or more
o ATM can accommodate voice, data, fax, realtime video, CD-quality audio, imaging, and multimegabit data transmission.
o ATM is like frame relay because it assumes noise-free lines and leaves error checking to devices at either end of a connection. Also, ATM creates a PVC between two points across an ATM network as part of setting up a communication session.
o ATM Technology
broadband cell relay method that transmit data in 53-byte cells rather than in variable-length frames. This uniform cell size is a big factor for speed => uniformity is easier to switch, route and buffer.
cell consists of 48 bytes of application info and 5 bytes of ATM header data => a consistent uniform package
o in theory, up to 1.2 Gigabits per second, but can transmit normally at 155 Mbps
o can be used in LANs and WANs
o hardware like routers, bridges have to be ATM compatible
o switches are multiport hubs
o Any media type is OK
media recommended
T3 (45 Mbps)
FDDI (100 Mbps)
fiber channel (155 Mbps)
OC3 SONET (155 Mbps)
o ATM can even interface with frame relay and X.25.
About Optical Carrier Levels, T-Carrier Rates, And More
The Optical Carrier rating level for standard ATM technologies is cus-tomarily abbreviated as OC-n, where n is a multiplier applied to the basic OC level 1 rate (OC-1) of 51.84 Mbps. OC-1 describes the basic transmission rate for SONET communications. Table 10.1 (seen later in this chapter) summarizes most of the WAN service types that we cover in this chapter, along with their common abbreviations, basic characteristics, maximum throughput rates, and associated transmission technologies. - Exam Cram p. 197
Top of page
Fiber Distributed Data Interface (FDDI)
• 100 Mbps token passed ring network that uses Fiber optic cable
• used for Metropolitan Area Networks (MAN) to connect within the same city so this isn't really a WAN technology
• 100 km (62 miles) max. length => not really a WAN technology
• FDDI uses fiber optic cable to serve as
o "backend network" that handle file transfer
o serve as a backbone for other low capacity LANs
o LANs that require large bandwidth
Video
CAD
CAM
• Token Passing
o not the same as token passing in 802.5
o here a computer can transmit as many frames as it can produce within a predetermined time before letting the token go. When it is finished transmitting, it lets the token go.
o Because the computer releases the token when it's finished, there may be several frames on the ring at once.
o FDDI is not like a regular Token Ring network because more than one computer at a time can transmit a token so that multiple tokens can circulate on the ring at any one time.
o This is why FDDI is faster than regular Token Ring 802.5 => 802.5 only allows one token at a time to transmit.
• Topology
o dual-ring
primary ring is for traffic; a redundant second ring for backup
when the primary ring breaks down, the secondary ring reconfigures itself and flows in the opposite direction
REDUNDANCY is one of the key features of this technology.
o 500 computers max.
o more than one computer can transmit at a time - they share the bandwidth; for example, when 10 computers transmit, each does so at 10 Mbps
o there must be a repeater every 2 Kms or less
o computers connected to both rings are CLASS A stations and help to reconfigure the network if the first ring fails. CLASS B stations are only connected to the one, primary ring.
o FDDI can have point-to-point links to a hub => it can be set up using a star ring topology
• Beaconing
o all computers on an FDDI network are responsible for monitoring faults in the network
o a computer that detects a fault sends a signal called a BEACON onto the network. If it sees it's upstream neighbour is sending a beacon it stops. This goes on until the only computer sending a beacon is the one directly downstream from the faulty computer. This process stops when a beaconing computer receives its own beacon => this means the beacon made it around the ring
• Media
o FDDI uses fiber-optic. This means
immune to electromagnetic interference
secure because fiber optic doesn't emit a signal that can be monitored and cannot be tapped
able to transmit long distances before needing a repeater
o FDDI on copper wire is called CDDI => can be done, but it has FAR less distance
Top of page
Synchronous Optical Network (SONET)
• SONET is a fiber optic WAN technology used to deliver voice, data, and video at speeds in multiples of 51.84 Mbps
• The basic OC-1 level specifies a data rate of 51.84 Mbps, and is based on the DS1 basic rate defined for SONET. The most common level is OC-3 or 3 x 51.84 Mbps or 155.52 Mbps. OC-3 is the most common SONET implementation in use today, even though the specification defines OC-48 at 2.48 Gbps.
• uses fiber-optic
• Summary: SONET is a fiber optic WAN technology used to deliver voice, data, and video at speeds up to 622 Mbps, and beyond.
Switched Multimegabit Data Service (SMDS)
• Switching service that provides data transmission in the range between 1.544 Mbps (T1 or DS1) to 45 Mbps (T3 or DS3).
• Connectionless service that, like ATM, uses fixed-length 53 bytes cells.
• Like ATM and frame relay, it provides no error checking, leaving that up to devices at the connection points.
• IEEE 802.6 (MAN) specification.
• is a dual bus topology that forms a ring that is not closed
Other WAN Tidbits:
• E1 (European Trunk Line) is the T-1 digital equivalent
• The transmission rate is 2.048 Mbps
• See table p. 199 Exam Cram for other tidbits, most of which have been noted here.
Top of page
Network Troubleshooting
Planning
• Prevention and a proactive program of preventative maintenance are the best approaches to avoid problems.
• Policies and procedures should be determined during the network planning stages and should include;
o Backing up the network.
o Planning security.
o Standardization of hardware and software.
o Upgrade maintenance.
o Documentation which may include;
map of the network
server information and backup schedules
software information
telephone numbers of vendors and tech support
copies of service agreements
record of problems and solutions
Network Utilities
• The ISO identifies five areas of network management;
1. Accounting management
2. Configuration management
3. Fault management
4. Performance management
5. Security management
• Network Monitoring
o Can be performed with Performance Monitor in NTServer.
o A baseline should be established under normal conditions for future reference.
Troubleshooting Methodology
1. Set the problem's priority.
2. Identify the problem's symptoms.
3. Develop a list of possible causes.
4. Test to isolate the cause.
5. Study the results of the test to identify a solution.
Tools
• Digital Volt Meter (DVM)
o another name is a Volt /Ohm Meter
o checks for resistance on cables, terminators and barrel connectors
cables and barrel connectors should provide 0 resistance
terminators in 10Base2 and 10Base5 networks should provide 50 ohms of resistance
o Use as a continuity checker for cables.
o a continuity check can reveal a short where:
two parts of the same cable are exposed and touching
part of cable is touching another conductor such as metal surface
• Time-Domain Reflectometer (TDR)
o Sends sonar-like pulses down the cable to identify any kind of a break, short or imperfection that might affect performance
o can locate a break within a few feet of the actual separation in the cable
• Advanced Cable Testers
o Work at OSI layers 2, 3, and 4 and can display more complex information.
o can indicate if a particular cable or NIC is causing problems
o Can display:
Message and error frame counts
Excess collisions
congestion errors
beaconing
• Oscilloscopes
o measures signal voltage per unit of time
o Can identify
breaks,
shorts,
bends
opens (breaks in the cable)
and attenuation data.
• Network Monitors
o Software that tracks all or part of network traffic.
• Protocol Analyzers
o Can perform packet capture, decoding and transmission in real-time.
o Most useful network analysis tool.
o They look inside the packet to identify problems
o They have a TDR in them
o they can
identify the most active computers
identify computers sending error-filled packets
identify, view and filter certain types of packets
help analyze network trends
check various components, connections by generating test packets
set up alerts like Performance Monitor
Support Resources
• Microsoft TechNet
• BBS's
• User Groups
• Periodicals
• Internet
• Microsoft Network
Common Troubleshooting Situations
• Cable and other physical layer problems.
• Power fluctuations.
• Upgrades
• Changes in client computer configuration.
• Server crashes.
• Poor network performance resulting from some change or user application.
Section 1
Peer to Peer Networks
• No dedicated server or hierarchy, also called a workgroup.
• Usually 10 or fewer workstations.
• Users act as their own administrator and security.
• Computers are in same general area.
• Limited growth.
Server Based Networks
• 10 or more users.
• Employs specialized servers.
1. File and Print
2. Application
3. Mail
4. Fax
5. Communications (gateways)
• Central administration.
• Greater security.
• Centralized backup.
• Data Redundancy.
• Supports many users
Combination Networks
• Combines the features of both Peer to Peer and Server based networks
• Users can share resources among themselves as well as access server-based resources.
Network Topologies
There are 4 basic topologies with variations
Bus Topology
• Bus consists of a single linear cable called a trunk.
• Data is sent to all computers on the trunk. Each computer examines EVERY packet on the wire to determine who the packet is for and accepts only messages addressed to them.
• Bus is a passive topology.
• Performance degrades as more computers are added to the bus.
• Signal bounce is eliminated by a terminator at each end of the bus.
• Barrel connectors can be used to lengthen cable.
• Repeaters can be used to regenerate signals.
• Usually uses Thinnet or Thicknet
o both of these require 50 ohm terminator
• good for a temporary, small (fewer than 10 people) network
• But its difficult to isolate malfunctions and if the backbone goes down, the entire network goes down.
Star Topology
• Computers are connected by cable segments to a centralized hub.
• Signal travels through the hub to all other computers.
• Requires more cable.
• If hub goes down, entire network goes down.
• If a computer goes down, the network functions normally.
• most scalable and reconfigurable of all topologies
Ring Topology
• Computers are connected on a single circle of cable.
• usually seen in a Token Ring or FDDI (fiber optic) network
• Each computer acts as a repeater and keeps the signal strong => no need for repeaters on a ring topology
• No termination required => because its a ring
• Token passing is used in Token Ring networks. The token is passed from one computer to the next, only the computer with the token can transmit. The receiving computer strips the data from the token and sends the token back to the sending computer with an acknowledgment. After verification, the token is regenerated.
• relatively easy to install, requiring ;minimal hardware
Mesh
• The mesh topology connects each computer on the network to the others
• Meshes use a significantly larger amount of network cabling than do the other network topologies, which makes it more expensive.
• The mesh topology is highly fault tolerant.
o Every computer has multiple possible connection paths to the other computers on the network, so a single cable break will not stop network communications between any two computers.
Star Bus Topology
• Several star topologies linked with a linear bus.
• No single computer can take the whole network down. If a single hub fails, only the computers and hubs connected to that hub are affected.
Star Ring Topology
• Also known as star wired ring because the hub itself is wired as a ring. This means it's a physical star, but a logical ring.
• This topology is popular for Token Ring networks because it is easier to implement than a physical ring, but it still provides the token passing capabilities of a physical ring inside the hub.
• Just like in the ring topology, computers are given equal access to the network media through
• the passing of the token.
• A single computer failure cannot stop the entire network, but if the hub fails, the ring that the hub controls also fails.
Hybrid Mesh
• most important aspect is that a mesh is fault tolerant
• a true mesh is expensive because of all the wire needed
• another option is to mesh only the servers that contain information that everyone has to get to. This way the servers (not all the workstations) have fault tolerance at the cabling level.
________________________________________
Connecting Network Components
Primary Cable Types
• Coaxial Cable
• Twisted-pair
o UTP - Unshielded Twisted Pair
o STP - Shielded Twisted Pair
• Fiber-optic
Coaxial Cable
• Consists of a solid or stranded copper core surrounded by insulation, a braided shield and an insulating jacket.
• Braided shield prevents noise and crosstalk.
• More resistant to interference and attenuation than twisted pair cabling.
• Both thin and thick cables can use (see pp. 80-81 for pics)
o BNC cable connectors,
o BNC barrel connectors
o BNC T connectors
o BNC terminators.
• Plenum (fire resistant) graded cable can be used in false ceilings of office space or under the floor.
• Can transmit data, voice and video.
• Offers moderate security ----> better than UTP/STP
Thinnet - RG-58 cable
• called
• 0.25" thick.
• Uses
o BNC twist connector,
o BNC barrel connectors
o BNC T connectors
o 50 ohm terminators
• Can carry signals 185 meters or 607 feet.
• Types: (pics on page 78)
Coaxial Cable Types
RG-8 and RG-11 Thicknet (50 ohms)
RG-58 Family
RG-58 /U Solid copper (50 ohms)
RG-58 A/U Thinnet, Stranded copper (50 ohms)
RG-58 C/U Thinnet, Military grade (50 ohms)
RG-59 Broadband/Cable TV (75 ohm) video cable
RG-62 A/U ARCnet cable (93 ohm)
RG-62 A/U is the standard ARCnet cable, but ARCnet can use fiber optic or twisted pair.
• each cable must have a terminator whose impedance matches the cable type
• impedance = current resistance measured in ohms
• terminators are resistors that prevent signal bounce or echo.
Here are some limitations of 10Base2 Ethernet:
• Length of trunk segment may be up to 607 feet.
• A maximum of 30 workstations is allowed per trunk.
• There may be no more than 1024 workstations per network.
• Entire network trunk length can't exceed 3035 feet (925 meters)
• The minimum cable length between workstations is 20 inches.
• The Ethernet 5-4-3 Rule for connecting segments is 5 trunk segments can be connected, with 4 repeaters or concentrators, with no more than 3 populated segments (on coaxial cable).
Thicknet - RG-8 and RG-11 coaxial cable
• 0.5" thick
• used for 10Base5 networks, linear bus topology
• transmits at 10 Mbps
• Uses DIX or AUI (Attachment Unit Interface) connector - also known as DB-15 connector to connect to external transceivers.
• Vampire taps are used to attach a transceiver to the thicknet trunk.
• Can carry signals 500 meters or 1640 feet.
• much less flexible and far more bulky and harder to install than thinnet
• better security than thinnet
• better resistance to electrical interference than thinnet.
• MORE expensive than thinnet.
Twisted-Pair Cable
• Consists of two insulated copper wires twisted around each other.
• Twisting cancels out electrical noise from adjacent pairs (crosstalk) and external sources.
• Uses RJ-45 telephone-type connectors (larger than telephone and consists of eight wires vs. Telephone's 4 wires).
• Generally inexpensive.
• Easy to install.
Unshielded Twisted Pair (UTP)
• Maximum cable length is 100 meters or 328 feet (10BaseT).
• Types:
1. Cat 1 Voice grade telephone cable.
2. Cat 2 Data grade up to 4 Mbps, four twisted pairs.
Category 3 and above is needed for Ethernet networks. Cat 3, 4, and 5 use RJ-45 connectors
3. Cat 3 Data grade up to 10 Mbps, four pairs w/3 twists/ft.
4. Cat 4 Data grade up to 16 Mbps, four twisted pairs.
5. Cat 5 Data grade up to 100 Mbps, four twisted pairs.
This is the cheapest cable to put in. Exam questions ALWAYS take this as a given.
Here are some limitations of 10BaseT Ethernet:
• Workstations may be no more than 328 feet from the concentrator port.
• 1,023 stations are allowed on a segment without bridging.
• The minimum cable length between workstations is 8 feet.
Other Drawbacks
• UTP is particularly susceptible to crosstalk, which is when signals from one line get mixed up with signals from another.
• easily tapped (because there is no shielding)
• 100 meters is shortest distance => attenuation is the biggest problem here.
Shielded Twisted Pair (STP)
• Uses a woven copper braid jacket and a higher quality protective jacket. Also uses foil wrap between and around the wire pairs.
• Much less susceptible to interference and supports higher transmission rates than UTP.
• Shielding makes it somewhat harder to install.
• same 100 meter limit as UTP.
• harder to tap
• used in AppleTalk and Token Ring networks
Fiber Optic Cable
• Consists of a small core of glass or plastic surrounded by a cladding layer and jacket.
• Fibers are unidirectional (light only travels in one direction) so two fibers are used, one for sending and one for receiving. Kelvar fibres are placed between the two fibres for strength.
• Good for very high speed, long distance data transmission.
• NOT subject to electrical interference.
• Cable can't be tapped and data stolen => high security
• Most expensive and difficult to work with.
• Immune to tapping.
• can transmit at 100 Mbps and way up to 2 Gbps
• up to 2000 meters without a repeater.
• Supports data, voice and video.
• needs specialized knowledge to install => expensive all round.
Cable Type Comparisons
Type Speed Distance Installation Interference Cost # of nodes per segment # of nodes per network
10BaseT 10 Mbps 100 meters Easy Highly susceptible Least expensive 1 computer
100BaseT 100 Mbps 100 meters Easy Highly susceptible More expensive than 10BaseT
STP 16 to 155 Mbps 100 meters Moderately Easy Somewhat resistant More expensive than Thinnet or UTP
10Base2 10 Mbps 185 meters Medium Difficulty Somewhat resistant Inexpensive 30 1024
10Base5 10 Mbps 500 meters More difficult than Thinnet More resistant than most cable More expensive than most cable 100 300
Fiber Optic 100 Mbps to
2 Gbps 2000 meters Most difficult Not susceptible to electronic interference Most expensive type of cable
Signal Transmission
Baseband Transmission -- Digital
• Baseband transmission uses digital signaling over a single frequency.
• Entire communication channel is used to transmit a single signal.
• Flow is bi-directional. Some can transmit and receive at the same time.
• Baseband systems use repeaters to strengthen attenuated signals.
Broadband Transmission -- Analog
• Broadband uses analog signaling over a range of frequencies.
• Signals are continuous and non-discrete.
• Flow is uni-directional and so two frequency channels or two separate cables must be used.
o if enough bandwidth is available, multiple analog transmission systems such as cable TV AND network transmissions can be on the same cable at the same time.
o if this is the case, ALL devices must be tuned to use only certain frequencies
• Uses amplifiers for signal regeneration.
Helpful mnemonic to remember the difference:
Baseband is "BEDR"
Bidirectional
Entire channel taken up
Digital
Repeaters used to strengthen signal
IBM Cabling
• Uses AWG standard wire size.
• Connected with proprietary IBM unisex connectors.
• Defines cables as types
Type 1 STP
(Shielded twisted-pair) • used for computers and MAU's.
• 101 m These three cable types can be used in Token Ring Networks • 16 Mbps
• 260 computer limit
Type 2 STP, Voice and data • 100 m
Type 3 UTP; Voice grade • 45 m
• Most common Token Ring Cable • 4 Mbps
• 72 computer limit
Type 5 Fiber-optic • industry standard
Type 6 STP; Data patch • used to connect MSAU's together
• used to extend Type 3 cables from one computer to the MSAU
Type 8 STP Flat; Carpet grade • Limited to 1/2 the distance of Type 1 cable
Type 9 STP; Plenum grade • used under floors or in ceiling space
Important Cabling Considerations
Installation Logistics
• How easy is the cable to work with?
Shielding
• Is the area "noisy"?
• Do you need plenum grade cable => more expensive
Crosstalk
• Where data security is important this is a problem
• Power lines, motors relays and radio transmitters cause crosstalk
Transmission Speed (part of the bandwidth)
• Transmission rates are measured in Mbps
• 10 Mbps is common
• 100 Mbps is becoming common
• Fiber can go well over 100 Mbps but costs and requires experts to install.
Cost
• Distance costs you money
Attenuation
• Different cables can only transmit so far without causing too many errors
Wireless Local Area Networks
• Used where cable isn't possible - remote sites; also when mobility is important.
• Use transceivers or access points to send and receive signals between the wired and wireless network.
There are 4 techniques for transmitting data
• Infrared transmission consists of four types;
1. Line of sight
2. Scatter: good within 100 ft.
3. Reflective
4. Broadband optical telepoint: used for multimedia requirements; as good as cable.
• Laser requires direct line-of-sight.
• Narrow-band (single frequency) radio
o Cannot go through steel or load-bearing walls.
o Requires a service handler.
o Limited to 4.8 Mbps
Spread-Spectrum Radio
o Signals over a range of frequencies.
o Uses hop timing for a predetermined length of time.
o Coded for data protection.
o Quite slow; Limited to 250 Kbps.
Point to Point Transmission
• Transfers data directly from PC to PC (NOT through cable or other peripherals)
• Uses a point to point link for fast error-free transmission.
• Penetrates objects.
• Supports data rates from 1.2 to 38.4 Kbps up to
o 200 feet indoors or
o 1/3 of a mile with line of site transmission.
• Also communicates with printers, bar code readers, etc.
Multipoint Wireless Bridge
• Provides a data path between two buildings.
• Uses spread-spectrum radio to create a wireless backbone up to three miles.
Long-Range Wireless Bridge
• Uses spread-spectrum technology to provide Ethernet and Token-Ring bridging for up to 25 miles.
• This costs less than T1, but T1 will transmit at 1.544 Mbps
Mobile Computing
• Uses wireless public carriers to transmit and receive using;
o Packet-radio communication.
Uplinked to satellite, broadcast only to device which has correct address.
o Cellular networks.
CDPD same as phone, subsecond delays only, real time transmission, can tie into cabled network.
o Satellite stations.
Microwave, most common in USA, 2 X directional antennas, building to building, building to satellite
• Slow transmission rate: 8 Kbps - 19.2 Kbps
Network Adapter Cards
The roles of the network Adapter card it to:
• Prepare data from the computer for the network cable
• Send the data to another computer
• Control the flow of data between the computer and the cabling system
NIC's contain hardware and firmware (software routines in ROM) programming that implements the
• Logical Link Control and
• Media Access Control
Functions of the Data Link layer of the OSI
Preparing Data
• Data moves along paths in the computer called a BUS - can be 8, 16, 32 bits wide.
• On network cable, data must travel in a single bit stream in what's called a serial transmission (b/c on bit follows the next).
• The transceiver is the component responsible for translating parallel (8, 16, 32-bit wide) into a 1 bit wide serial path.
• A unique network address or MAC address is coded into chips in the card
• card uses DMA (Direct Memory Access) where the computer assigns memory space to the NIC
o if the the card can't move data fast enough, the card's buffer RAM holds it temporarily during transmission or reception of data
Sending and Controlling Data
The NICs of the two computers exchanging data agree on the following:
1. Maximum size of the groups of data being sent
2. The amount of data to be sent before confirmation
3. The time intervals between send data chunks
4. The amount of time to wait before confirmation is sent
5. How much data each card can hold before it overflows
6. The speed of the data transmission
Network Card Configuration
• IRQ: a unique setting that requests service from the processor.
IRQ # Common Use I/O Address
IRQ 1 Keyboard
IRQ 2(9) Video Card
IRQ 3 Com2, Com4 2F0 to 2FF
IRQ 4 Com1, Com3 3F0 to 3FF
IRQ 5 Available (Normally LPT2 or sound card )
IRQ 6 Floppy Disk Controller
IRQ 7 Parallel Port (LPT1)
IRQ 8 Real-time clock
IRQ 9 Redirected IRQ2 370 - 37F
IRQ 10 Available (maybe primary SCSI controller)
IRQ 11 Available (maybe secondary SCSI controller)
IRQ 12 PS/2 Mouse
IRQ 13 Math Coprocessor
IRQ 14 Primary Hard Disk Controller
IRQ 15 Available (maybe secondary hard disk controller)
• Base I/O port: Channel between CPU and hardware
o specifies a channel through which information flows between the computer's adapter card and the CPU. Ex. 300 to 30F.
o Each hardware device must have a different base I/O port
• Base Memory address: Memory in RAM used for buffer area
o identifies a location in the computer's RAM to act as a buffer area to store incoming and outgoing data frames. Ex. D8000 is the base memory address for the NIC.
o each device needs its own unique address.
o some cards allow you to specify the size of the buffer ( 16 or 32 k, for example)
• Transceiver:
o sometimes selected as on-board or external. External usually will use the AUI/DIX connector: Thicknet, for example
o Use jumpers on the card to select which to use
Data Bus Architecture
The NIC must
• match the computer's internal bus architecture and
• have the right cable connector for the cable being used
• ISA (Industry Standard Architecture): original 8-bit and later 16-bit bus of the IBM-PC.
• EISA (Extended Industry Standard Architecture): Introduced by consortium of manufacturers and offers a 32-bit data path.
• Micro-Channel Architecture (MCA): Introduced by IBM in its PS/2 line. Functions as either 16 or 32 bit.
• PCI (Peripheral Component Interconnect): 32-bit bus used by Pentium and Apple Power-PC's. Employs plug and play.
Improving Network Card Performance
• Direct Memory Access (DMA):
o data is moved directly from the network adapter card's buffer to computer memory.
• Shared Adapter Memory:
o network adapter card contains memory which is shared with the computer.
o The computer identifies RAM on the card as if it were actually installed on the computer
• Shared System Memory:
o the network adapter selects a portion of the computer's memory for its use.
o MOST common
• Bus Mastering:
o the adapter card takes temporary control of the computer's bus, freeing the CPU for other tasks.
o moves data directly to the computer's system memory
o Available on EISA and MCA
o can improve network performance by 20% to 70%
• RAM buffering:
o Ram on the adapter card acts as a buffer that holds data until the CPU can process it.
o this keeps the card from being a bottleneck
• On-board microprocessor:
o enables the adapter card to process its own data without the need of the CPU
Wireless Adapter Cards
• Used to create an all-wireless LAN
• Add wireless stations to a cabled LAN
• uses a wireless concentrator, which acts as a transceiver to send and receive signals
Remote-Boot PROMS (Programmable Read Only Memory)
• Enables diskless workstations to boot and connect to a network.
• Used where security is important.
Networking Essentials Notes - Section 2
Section Titles:
The OSI Model | Drivers | Packets | Protocols | Putting data on the Cable
How a Network Functions
The OSI Model
• International Standards Organization (ISO) specifications for network architecture.
• Called the Open Systems Interconnect or OSI model.
• Seven layered model, higher layers have more complex tasks.
• Each layer provides services for the next higher layer.
• Each layer communicates logically with its associated layer on the other computer.
• Packets are sent from one layer to another in the order of the layers, from top to bottom on the sending computer and then in reverse order on the receiving computer.
OSI Layers (Check out the OSI Model Summary Page)
• Application
• Presentation
• Session
• Transport
• Network
• Data Link
• Physical
Application Layer
• Serves as a window for applications to access network services.
• Handles general network access, flow control and error recovery.
Presentation Layer
• Determines the format used to exchange data among the networked computers.
• Translates data from a format from the Application layer into an intermediate format.
• Responsible for protocol conversion, data translation, data encryption, data compression, character conversion, and graphics expansion.
• Redirector operates at this level.
Session Layer
• Allows two applications running on different computers to establish use and end a connection called a Session.
• Performs name recognition and security.
• Provides synchronization by placing checkpoints in the data stream.
• Implements dialog control between communicating processes.
Transport Layer
• Responsible for packet creation.
• Provides an additional connection level beneath the Session layer.
• Ensures that packets are delivered error free, in sequence with no losses or duplications.
• Unpacks, reassembles and sends receipt of messages at the receiving end.
• Provides flow control, error handling, and solves transmission problems.
Network Layer
• Responsible for addressing messages and translating logical addresses and names into physical addresses.
• Determines the route from the source to the destination computer.
• Manages traffic such as packet switching, routing and controlling the congestion of data.
Data Link Layer
• Sends data frames from the Network layer to the Physical layer.
• Packages raw bits into frames for the Network layer at the receiving end.
• Responsible for providing error free transmission of frames through the Physical layer.
Physical Layer
• Transmits the unstructured raw bit stream over a physical medium.
• Relates the electrical, optical mechanical and functional interfaces to the cable.
• Defines how the cable is attached to the network adapter card.
• Defines data encoding and bit synchronization.
Top of page
The 802 Project Model
• Defines Standards for the Data Link and Physical Layers.
• Network Adapter Cards
• WAN components
• Components used to create twisted-pair and coaxial cable networks.
• A crazy mnemonic for this table, but it works :-)
I Like Changing Boxers Rarely. My Butt Feels Very Sexy With Denim
802.1 Internet working
802.2 Division of Data Link Layer into sublayers
• LLC (Logical Link Control)
• Media Access Control (MAC)
802.3 CSMA/CD - Ethernet
802.4 Token Bus LAN (ARCnet)
802.5 Token Ring LAN
802.6 MAN (Metropolitan Area Network)
802.7 Broadband Technical Advisory Group
802.8 Fiber-Optic Technical Advisory Group
802.9 Integrated Voice/Data Networks
802.10 Network Security
802.11 Wireless Networks
802.12 Demand Priority Access Lan, 100 Base VG - AnyLAN
OSI Model Enhancements
The bottom two layers - Data Link and Physical - define how multiple computers can simultaneously use the network without interfering with each other.
• Divides the Data-link layer in to the Logical Link Control and Media Access Control sublayers.
• Logical Link Control
o manages error and flow control and
o defines logical interface points called Service Access Points (SAP's). These SAP's are used to transfer information to upper layers
• Media Access Control
o communicates directly with the network adapter card and
o is responsible for delivering error-free data between two computers.
o Categories
802.3
802.4
802.5 and
802.12 define standards for both this sublayer and the Physical layer
Top of page
Drivers
• a device driver is software that tells the computer how to drive or work with the device so that the device performs the job it's supposed to.
• Drivers are called
Network Drivers,
MAC drivers,
NIC drivers.
• Provide communication between a network adapter card and the redirector in the computer.
• Resides in the Media Access Control sublayer of the Data Link layer. Therefore, the NIC driver ensures direct communication between the computer and the NIC
• the Media Access Control driver is another name for the network card device driver
• When installing a driver, you need to know these things
o IRQ
o I/O Port Address
o Memory Mapped (Base Memory Address)
o Transceiver Type
Packets
• Data is broken down into smaller more manageable pieces called packets.
• Special control information is added in order to:
o disassemble packets
o reassemble packets
o check for errors
Types of data sent includes
• Can contain information such as messages or files.
• Computer control data and commands and requests.
• Session control codes such as error correction and retransmission requests.
• Original block of data is converted to a packet at the Transport layer.
Packet Components
• Header
1. Alert signal to indicate packet is being transmitted
2. Source address.
3. Destination address.
4. Clock synchronization information.
• Data
1. Contains actual data being sent.
2. Varies from 512 to 4096 bytes (4K), depending on the network
• Trailer
1. Content varies by protocol.
2. Usually contains a CRC.
Packet Creation
• Look at the example on pp. 201 - 204
• Begins at the Application layer where data is generated.
• Each layer subsequently adds information to the packet; the corresponding layer on the receiving machine reads the information.
• Transport layer breaks the data into packets and adds sequencing information needed to reassemble data at the other end => the structure of the packets is defined by the common protocol being used between the two computers.
• Data is passed through the Physical layer to the cable.
Packet Addressing
• every NIC sees all packets sent on its cable segment but only interrupts the computer if the packet address matches the computer's address
• a broadcast type address gets attention of all computers on the network
Top of page
Protocols
• Protocols are rules and procedures for communication.
How Protocols Work
The Sending Computer
• Breaks data into packets.
• Adds addressing information to the packet
• Prepares the data for transmission.
The Receiving Computer (same steps in reverse)
• Takes the packet off the cable.
• Strips the data from the packet.
• Copies the data to a buffer for reassembly.
• Passes the reassembled data to the application.
Protocol Stacks (or Suites)
• A combination of protocols, each layer performing a function of the communication process.
• Ensure that data is prepared, transferred, received and acted upon.
The Binding Process
• Allows more than one protocol to function on a single network adapter card. (e.g. both TCP/IP and IPX/SPX can be bound to the came card
• Binding order dictates which protocol the operating systems uses first.
• binding also happens with the Operating System architecture: for example, TCP/IP may be bound to the NetBIOS session layer above and network card driver below it. The NIC device driver is in turn bound to the NIC.
Standard Stacks
• ISO/OSI
• IBM SNA (Systems Network Architecture)
• Digital DECnet
• Novell NetWare
• Apple AppleTalk
• TCP/IP
Protocol types map roughly to the OSI Model into three layers:
Application Level Service Users
Application Layer
Presentation Layer
Session Layer
Transport Services
Transport Layer
Network Services
Network Layer
Data Link Layer
Physical Layer
Application Protocols
Work at the upper layer of the OSI model and provide application to application interaction and data exchange.
Examples:
• APPC-IBM's peer to peer SNA protocol used on AS400's
• FTAM: an OSI file access protocol.
• X.400: international e-mail transmissions.
• X.500: file and directory services across systems.
• SMTP: Internet e-mail.
• FTP: Internet file transfer
• SNMP: Internet network management protocol.
• Telnet: Internet protocol for logging on to remote hosts.
• Microsoft SMB: client shells and redirectors.
• NCP: Novell client shells or redirectors.
• AppleTalk and AppleShare: Apple's protocol suite.
• AFP: Apple's protocol for remote file access.
• DAP (data access protocol): DECnet file access protocol.
Transport Protocols
These protocols provide communication sessions between computers and ensure data is moved reliably between computers.
Examples:
• TCP (transmission control protocol): internet protocol for guaranteed delivery of sequenced data.
• SPX (sequenced packet exchange): Novell protocol suite.
• NWLink: Microsoft implementation of IPX/SPX.
• NetBEUI: establishes communications sessions between computers and provides the underlying data transport services.
• ATP, NBP: Apple's communication session and transport protocols.
Network Protocols
These provide link services
They also
• handle
o addressing and routing,
o error checking and
o retransmission requests.
• Define rules for Ethernet or Token Ring.
Examples:
• IP (Internet Protocol): packet forwarding and routing.
• IPX: (Internetwork Packet Exchange): Novell's protocol for packet forwarding and routing.
• NWLink: Microsoft implementation of IPX/SPX.
• NetBEUI: Transport for NetBIOS sessions and applications.
• DDP (datagram delivery protocol): An AppleTalk data transport protocol.
Top of page
The IEEE protocols at the Physical Layer
802.3 (CSMA /CD - Ethernet)
• logical bus network
• can transmit at 10 Mbps
• data is transmitted on the wire to every computer but only those meant to receive respond
• CSMA /CD protocol listens and allows transmission when the wire is clear
802.4 (Token Passing)
• bus layout that used token passing
• every computer receives all of the data but only the addressed computers respond
• token determines which computer can send
802.5 (Token Ring)
• logical ring network; physical set up as star network
• transmits at 4 Mbps or 16 Mbps
• token determines which computer can send
Important Protocols
TCP/IP
• Provides communications in a heterogeneous environment.
• Routable, defacto standard for internetworking.
• SMTP, FTP, SNMP are protocols written for TCP/IP
• Disadvantages are size and speed.
NetBEUI
• NetBIOS extended user interface.
• Originally, NetBIOS and NetBEUI were tightly tied together but, NetBIOS has been separated out to be used with other routable protocols. NetBIOS acts as a tool to allow applications to interface with the network; by establishing a session with another program over the network
• NetBIOS operates at the Session layer.
• Small, fast and efficient.
• Compatible with most Microsoft networks.
• Not routable and compatible only with Microsoft networks.
X.25
• Protocols incorporated in a packet switching network of switching services.
• Originally established to connect remote terminals to mainframe hosts.
XNS
• Xerox Network System.
• Developed for Ethernet LANs but has been replaced by TCP/IP.
• Large, slow and produces a lot of broadcasts.
IPX/SPX and NWLink
• Used for Novell networks.
• Small and fast.
• Routable.
APPC
• Advanced Program to Program Communication
• Developed by IBM to support SNA.
• designed to enable application programs running on different computers to communicate and exchange data directly.
AppleTalk
• Apple's proprietary protocol stack for Macintosh networks.
OSI Protocol Suite
• each protocol maps directly to a single layer of the OSI model
DECnet
• Digital Equipment's proprietary protocol stack
• Defines communications over Ethernet, FDDI MAN's and WAN's.
• DECnet can also use TCP/IP and OSI protocols as well as its own protocols
• Routable.
Top of page
Putting data on the Cable
Access Methods
The 4 major methods
• Carrier Sense Multiple Access Methods
1. with collision detection (CSMA/CD)
2. with collision avoidance (CSMA/CA)
• Token passing that allows only a singe opportunity to send data
• A Demand Priority method
• Carrier Sense Multiple Access with Collision Detection. (CSMA/CD)
1. Computer senses that the cable is free.
2. Data is sent.
3. If data is on the cable, no other computer can transmit until the cable is free again.
4. If a collision occurs, the computers wait a random period of time and retransmit.
o Known as a contention method because computers compete for the opportunity to send data. (Database apps cause more traffic than other apps)
o This can be a slow method
o More computers cause the network traffic to increase and performance to degrade.
o The ability to "listen" extends to a 2,500 meter cable length => segments can't sense signals beyond that distance.
Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)
o in CSMA/CA, the computer actually broadcasts a warning packet before it begins transmitting on the wire. This packet eliminates almost all collisions on the network because each computer on the network does not attempt to broadcast when another computer sends the warning packet.
o All other computers wait until the data is sent.
o The major drawback of trying to avoid network collisions is that the network traffic is high due to the broadcasting of the intent to send a message.
Token Passing
o Special packet is passed from computer to computer.
o A computer that wants to transmit must wait for a free token.
o Computer takes control of the token and transmits data. Only this computer is allowed to transmit; others must wait for control of the token.
o Receiving computer strips the data from the token and sends an acknowledgment.
o Original sending computer receives the acknowledgment and sends the token on.
o the token comes from the Nearest Active Upstream Neighbor and when the computer is finished, it goes to the Nearest Active Downstream Neighbor
o uses "beaconing" to detect faults => this method is fault tolerant
o NO contention => equal access to all computers on the network
o NO collisions
Demand Priority
0. 100 Mbps standard called 100VG-AnyLAN. "Hub- based".
1. Repeaters manage network access by performing cyclical searches for requests to send from all nodes on the network. The repeater or HUB is responsible for noting all addresses, links and end nodes and verifying if they are all functioning. An "end node" can be a computer, bridge, router or switch.
2. Certain types of data are given priority if data reaches the repeater simultaneously. If two have the same priority, BOTH are serviced by alternating between the two.
Advantages over CSMA/CD
1. Computers Uses four pairs of wires which can send and receive simultaneously.
2. Transmissions are through the HUB and are not broadcast to all other computers on the network.
3. There is only communication between the sending computer, the hub and the destination computer.
Top of page
Other methods
Appletalk
• The cabling system for an AppleTalk network is called LocalTalk.
• LocalTalk uses CSMA/CA
• AppleTalk has a dynamic network addressing scheme.
o During bootup, the AppleTalk card broadcasts a random number on the network as its card address. If no other computer has claimed that address, the broadcasting computer configures the address as its own. If there is a conflict with another computer, the computer will try to use different IP combinations until it finds a working configuration.
ARCNet
• ARCNet uses a token passing method in a logical ring similar to Token Ring networks.
• However, the computers in an ARCNet network do not have to be connected in any particular fashion.
o ARCNet can utilize a star, bus, or star bus topology.
• Data transmissions are broadcast throughout the entire network, which is similar to Ethernet.
• However, a token is used to allow computers to speak in turn.
o The token is not passed in a logical ring order because ARCNet does not use the ring topology; instead the token is passed to the next highest numerical station
o Use DIP switches to set the number (the Station Identifier) of the workstations, which you want to be beside each other so the token is passed to the next computer efficiently.
• ARCNet isn't popular anymore => ARCNet speeds are a mere 2.5 Mbps.
Most important ARCNet facts for you to know:
• ARCNet uses RG-62 (93 ohms) cabling;
• it can be wired as a star, bus, or star bus; and
• it uses a logical-ring media access method.
Summary Chart
Feature or Function CSMA/CD CSMA/CA Token Passing Demand Priority
Type of Communication Broadcast-based Broadcast-based Token-based Hub-based
Type of Access Method Contention Contention Non-contention Contention
Type of Network Ethernet LocalTalk Token Ring
ARCnet 100VG-AnyLAN
Networking Essentials Notes - Section 3
Section Titles:
Network Architectures | Ethernet Topologies | 10 Mbps Topologies
100 Mbps Topologies | Token Ring | AppleTalk | ARCnet
Network Architectures
Ethernet
• Baseband signaling.
• Linear or star-bus topology.
• Usually transmits at 10 Mbps with 100 Mbps possible.
• Uses CSMA/CD for traffic regulation.
• IEEE specification 802.3.
• Uses thicknet, thinnet or UTP cabling
• Media is passive => it draws power from the computer
Ethernet Frames
Ethernet breaks data into frames. A frame can be from 64 to 1,518 bytes long in total. The ethernet frame itself takes up 18 bytes, so the actual data can be from 46 to 1,500 bytes.
• Preamble: marks the start of a frame.
• Destination and Source: addressing information.
• Type: Identifies network layer protocol.
• CRC: error checking data.
Top of page
Ethernet Topologies
10 Mbps Topologies
10Base-T
o (10 = 10 Mbps; Base= Baseband; T = Twisted Pair)
o 10 Mbps, baseband over UTP.
o Usually wired in a physical star with a hub or multiport repeater. Internally it uses a bus signaling system like other Ethernet configurations
o Maximum segment length 100 meters (328 feet).
o Minimum between computers 2.5 meters (8 feet).
o 1024 nodes maximum on the LAN
o Category 3, 4 or 5 UTP.
o RJ-45 connectors, 4 twisted pair.
o Coaxial or Fiber backbone for larger LAN's
10BaseT UTP NETWORK LAYOUT
Limitations
• maximum segment length of 100 Meters
• Hub to Hub or repeater to repeater links limited to 100 Meters
Rules
• star topology
• 4 repeater/5 segment rule of 10Base5 is retained
• only two nodes per segment are allowed
Cabling
• RJ-45 Connectors
• Category 3 UTP minimum, preferably Category 5
________________________________________
10Base-2
o (10 = 10 Mbps; Base= Baseband; 2 = 2x 100 meters)
o 10 Mbps, baseband over thinnet.
o Uses bus topology.
o Maximum segment length 185 meters (607 feet).
o Minimum between computers 0.5 meters (20 inches).
o Maximum of 30 computers per segment.
o Obeys 5-4-3 rule: Five segments, joined by four repeaters, 3 populated giving a total length of 925 meters (3035 feet).
Physical Bus Cable Limits
10Base2 THIN ETHERNET NETWORK LAYOUT
Limitations
• maximum number of trunk segments = 5
• maximum trunk segment length = 607 feet (185 meters)
• maximum network trunk cable = 3035 feet (925 meters)
• maximum number of stations on a trunk segment = 30
• minimum distance between T connectors = 1.5 feet (0.5 meters)
Rules
• each end of the trunk segment is terminated in 50-ohms
• one of the terminators is grounded
• connector splices are kept to a minimum
Cabling
• BNC-T type connectors
• RG58-AU 50-ohm cable, 0.2"
• Note that you can't mix RG58 /AU and RG58 /U cable on the same network.
________________________________________
10Base-5
o (10 = 10 Mbps; Base= Baseband; 5 = 5 x 100 meters)
o 10 Mbps, baseband over thicknet.
o Also called Standard Ethernet
o Designed to support a backbone for a large department or building. Transceivers attach to the thicknet cable and the cable AUI connector plugs into a repeater . The branching segments of thinnet plug into the repeater and connect to the computers on the network.
o Uses bus topology.
o Maximum segment length 500 meters.
o Minimum between transceivers 2.5 meters (8 feet)
o 100 computers per segment, 300 per network.
o Obeys 5-4-3 rule: maximum distance can be extended to 2500 meters (8200 ft) using 4 repeaters and 3 populated segments.
o Transceiver is attached to main segment with a vampire tap.
o DIX or AUI connector is used to attach the transceiver to the network card. Maximum computer to transceiver distance is 50 meters. This distance is not included in the 5-4-3 calculation.
10Base-5 Summary
Maximum segment length • 500m (1640 ft)
• Typically used as backbone to connect Thinnet-based network.
Speed 10 Mbps
Maximum taps 100
Maximum segments • 5
Maximum repeaters • 4
Maximum segment with nodes • 3
• Due to attenuation, only 3 of 5 segments can actually contain network connection. Other 2 segments can be used to connect the network over long distance.
Maximum nodes per segment 100
Maximum nodes for network 300
Minimum distance between nodes 2.5m (8 ft)
Maximum overall length with repeaters 2.5 km
Maximum AUI drop cable length 50m
1. 10Base-F?
o (10 = 10 Mbps; Base= Baseband; FL =fibre optic)
o Allows long cable runs between repeaters, like between buildings
o Maximum segment length 2000 meters.
o 10BaseFL - Used for linking computers in a LAN environment.
o 10BaseFP - Used for linking computers with passive hubs from maximum cable distance up to 500m
o 10BaseFB - Used as a backbone between hubs.
o Baseband signal over a fiber-optic cable.
o Need concentrator (fiber-optic hub) ® Star wired (star topology) . Either active or passive
o Long distance.
o Very expensive. Difficult to install.
Maximum segment length - 2000m
Maximum segments- 1024
Maximum segment with nodes- 1024
Maximum nodes per segment- 1
Maximum nodes per network- 1024
Maximum hubs in a chain- 4
Top of page
100 Mbps Topologies
• 100VG-AnyLAN (IEEE 802.12)
o 100 Mbps data rate.
o Star topology over Category 3, 4 and 5 UTP.
o Uses demand priority access.
o Combines element of traditional Ethernet and Token Ring and supports Ethernet and token ring packets.
o Faster than Ethernet
o Demand priority access method => two priority levels, low and high
o Intelligent hubs can filter individually addressed frames for enhanced privacy.
o Expensive
o Uses RJ-45.
o Cable - require 4 pairs wire
Categories 3, 4 UTP- 100m
Category 5 UTP - 150m
Fiber-optic- 2000m
o Uses star topology and defines how child hub can be connected to a parent hub to extend the network.
Minimum length between nodes - 2.5m
Maximum segments- 1024
Maximum nodes per segment- 1
Maximum nodes for network- 1024
• 100BaseT? (Fast Ethernet)
o Uses CSMA/CD on a star-wired bus.
o There are 3 specifications:
100BaseT4: Uses pair category 3, 4 or 5 UTP.
100BaseTX: Uses 2-pair category 5 UTP or STP.
100BaseFX: Uses 2-strand fiber-optic.
Ethernet Frame types
Ethernet 802.2 - NetWare 3.12 and 4.x - IEEE 802.3 standard compliance.
Includes field in Ethernet 802.3 and LLC (Logical Link Control)
Ethernet 802.3 - NetWare 3.11 and before
Includes CRC
Ethernet SNAP (SubNetwork Address Protocol) - AppleTalk
Ethernet II - TCP/IP
Segmentation
• Can be performed with bridges or routers.
• Reduces traffic on network segments to increase performance.
Top of page
Token Ring
• IEEE 802.5 specification.
• Star wired ring topology (logical ring)
• Uses token passing access method.
• Can have higher transmission speeds than Ethernet
• It has larger frames than Ethernet => more can get transferred over the wire in any given time.
• Uses IBM STP Types 1, 2 and 3 cabling. (Can be UTP)
• Transmits at 4 and 16 Mbps. (16 Mbps cards will slow down to 4 Mbps if put on that kind of network, but the 4 Mbps cards can't speed up.
• Baseband transmission
• Data travels in one direction only
• Each computer acts as a unidirectional repeater
• Deterministic method of cable access. Computers cannot use the cable unless they have the token. Therefore, computers can't force their way onto the network like CSMA/CD (Ethernet)
• First computer online is assigned to monitor network activity.
Token Ring Components
• Multistation Access Units (MAU's)
• Multistation Access Units (MSAU's)
• Smart Multistation Access Units (SMAU's)
• Computers attach directly to the MSAU in a physical star to form a logical ring.
• Each MSAU has 10 connection ports ==> can support 8 clients with 2 ports for ring in and ring out.
• Each ring can have as many as 33 MSAU's
o 70 computers with UTP
o 260 computers with STP.
• Up to 12 MSAU's can connect to each other
• The MSAU can sense if a computer is down and then disconnect it from the ring => built-in fault tolerance
• Cabling
o Most token ring systems use IBM type 3 cabling.
o STP or UTP to a hub, IBM type 1,2,3 cable
Type 1: 101m from MSAU to PC
STP: 100m from MSAU to PC
UTP: 45m from MSAU to PC
Type 3: 150 feet from MSAU to PC
o Token ring networks are well suited to fiber optic cable: data travels in only one direction in it.
Here are some limitations of Token Ring:
• The maximum number of workstations is 260 on Type 1 or fiber optic cable at 16 Mbps.
• The maximum number of workstations is 72 on Type 3 cable at 4 Mbps.
• The distance between MSAUs (Multistation Access Units) is 100 meters (Type 1 cabling) to 45 meters (Type 2 cabling).
• Each ring can have up to 33 MSAUs.
• Maximum distance of the ring is 4 kilometers with fiber optic cable.
Token Ring and Ethernet Comparison
Token Ring
• can have higher transmission speeds than Ethernet
• supports more computers on a single segment (up to 260)
• more expensive than Ethernet
• harder to install than Ethernet
• is more fault tolerant because of the beaconing process
Top of page
AppleTalk
• local talk
o CSMA/CA access method
o 3 things happen when devices attached
1. device assigns itself an address randomly
2. device broadcasts the address to see if it's used
3. if not, the device will use it the next time it's online again
o bus or tree
o STP
o max. 32 devices
• Apple share
o file server on an AppleTalk network
o divided into zones
• EtherTalk
o 802.3
o allows protocols to run on ethernet coaxial cable
• TokenTalk
o 802.5
o allows Macintosh to connect to token ring network
ARCnet
• IEEE 802.4 specification - almost
• Cable
o Uses RG-62 (93 ohm) (most common)or
o RG-59 (75ohm) coaxial cable.
o Can also use UTP.
• Uses token passing on a star-bus topology.
• Token moves from computer to computer in numerical order.
• Transmits at 2.5 Mbps.
• ArcNet plus - 20 Mbps
• connected by cable to hub
o 93 ohm RG-62 A/U - 610m max., star
o 93 ohm RG-62 A/U - 305m max., bus <= notice less distance on hub
o RJ-11, RJ-45 UTP - max. 244m on star or bus
• Hubs can be
o Passive => merely relay signal
o Active => regenerate and relay signal
o Smart => add diagnostic features, such as reconfiguration detection
Here are some limitations of ARCNet:
• Bus segment length for coaxial cable is a maximum of 1000 feet, with a limit of 8 workstations per coaxial segment.
• Bus segment length for twisted pair is a maximum of 400 feet, with a limit of 10 workstations per twisted-pair segment.
• There is a maximum of 255 workstations per network.
• Workstations can be located up to 600 feet from the active hub.
• The maximum distance from passive hubs to active hubs is 100 feet; the maximum distance between two active hubs is 2000 feet.
• The maximum distance allowed between workstations is 20,000 feet.
• There can be no more than four workstations on a passive hub, no more than 100 feet from a hub.
• Passive hubs cannot be connected to other passive hubs.
Networking Essentials Notes - Section 4
Section Titles:
Network Operations | Networking Printing | E-mail | Multivendor Environments | Client/Server Computing
Network Operations
Network O/S setup
• 2 Major Types of Multitasking
1. Preemptive - O/S can take control of the processor without the task's cooperation
Advantage of preemptive multitasking: CPU activity can be switched from local tasks to a network task
2. Non-preemptive (Cooperative)
the task itself decides when to give up the processor
no other program can run until the non-preemptive program gives up the control of the processor
• A Network O/S
o ties together all the PCs and peripherals in the network
o coordinates the functions of all PCs and peripherals in a network
o provide security for and access to database and peripherals in a network
Client Software
o redirector
process of forwarding requests is done by a redirector
intercepts requests in the PC
determines if they should be left alone to continue in the local PC's bus or redirected out to the network to another server
o designator
a piece of software that manages the assignment of drive letters to both local and remote network resources or shared drives
e.g. share drive in other PC, alphabet as a designator, such as G:
when an association is made between a network resource and a local drive letter (mapping a drive), the designator takes care of remembering the path to the network resource.
when users or applications access the drive, the designator substitutes the resource's network address for the drive letter before the request is sent to the redirector.
o peripherals
redirectors can send requests to either computers or peripherals (e.g. LPT1: or Com1 can refer to local OR network printers. Just give these ports a path to the network device.
Server Software
o makes it possible to SHARE resources (data, printers, modems, etc.) with workstations
o provides network security as well
o makes sure two users don't use the same resources at the same time.
o managing users - create, privileges, remove users
o network management tools to track network behaviour
o The server also
Provides logon authentication for users
Manages users and groups
Stores management, control, and auditing tools for network administration
Provides fault tolerance for protection of network integrity
Windows NT Server
o When installing you must
name the domain or workgroup
name the server
o the 1st server installed in a domain must be installed as the primary domain controller (PDC), every domain is required to have one and only one PDC
o a backup domain controller
keeps a copy of the domain's directory database
authenticates logons
can be an application server
o Configuring the network adapter card - default protocol for NT server is TCP/IP
o TCP/IP installation
IP address
logical 32-bit address to identity a TCP/IP host
has two parts: network ID and host ID
subnet mask - is used to mask a portion of the IP address so that TCP/IP can distinguish the network ID from the host ID - 255.255.0.0
default gateway - (gateway = ROUTER) - For communication with a host on another network, an IP host must be configured with a route to the destination network otherwise only communication on the local segment
manual install - assign IP address, subnet mask and the default gateway
automatic install - DHCP (Dynamic Host Configuration Protocol) service,
when a DHCP server is configured on the network, clients that support DHCP (NT W/S & NT Server) can request TCP/IP configuration info (IP address, subnet mask, default gateway and so forth) from the DHCP server
Top of page
Networking Printing
• Here's the remote printing process:
1. the PC's redirector put the print job onto the network cable
2. print server's network software takes the print job from the cable and send it into a queue with other items waiting from access to the shared printer
• UNC syntax: \\print_server_name\printer_share_name
• network uses a spool (simultaneous peripheral operation on line)
• a spooler is a memory buffer in the print server's ram that holds print jobs If there are too many print jobs to fit into RAM, the overflow wait to print on the print server's hard drive.
• To share a printer you must:
o load printer drivers so the printer will print correctly
o Create a share name for the printer
o identify a port so the redirector will know where to send the print job
o set the information and output parameters so the network operating system will know how to handle and format the print job.
PDL - (Printer Description Language)
o the printer uses the PDL to construct text and graphics to create the page image
o PDLs are like blueprints
You can manage the printer remotely
E-mail system components
X.400 Components
o X.400 defines a whole range of protocols for transferring mail between e-mail servers.
o The Three main components are:
UA=> user agents
MTA => Message Transfer Agent
MTS => Message Transfer System
o E-mail Client (UA, User Agent) responsible for all user interaction such as
reading and composing messages. It runs on the
o MTA (Message Transfer Agent) responsible for transferring messages from
one user's mailbox to another or to other MTAs for delivery.
o MTS
Responsible for transferring messages of all types for the UA that creates the message to the destination UA
o Directory services Personal Address Book, Global Address List.
X.500
o is a set of directory services developed to help users in distributed networks locate users on other networks to whom they want to send messages
o Post Office (Information store, Message store) location of all user messages.
E-mail protocols
Transport/Delivery protocols
• POP3 (Post Office Protocol) and IMAP4 (Internet Mail Access Protocol)
o describes how e-mail client interact with email server.
• SMTP (Simple Mail Transport Protocol)
o describes how e-mail servers transfer email message to their intended recipients.
o SMTP works with other e-mail programs to provide both a client and a server the function to send and receive e-mail messages.
o used on the Internet, UNIX and in the TCP/IP stack
• MIME (Multipurpose Internet Mail Extension)
o defines the method in which files are attached to SMTP messages.
• MHS (Message Handling Service) within NetWare
o similar to X.400 => one computer on the network is the MHS sever and it translates messages between computers that may be using different e-mail systems
Directory Services
• LDAP (Lightweight Directory Access Protocol)
• X.500 (see above)
Messaging APIs
• MAPI (Message Application Programming Interface)
o MS standard and incorporated throughout all of its office products.
• VIM (Vendor-Independent Messaging) from Lotus
• Scheduling
Groupware
• eg. BBS, Internet news, Interactive conferences, MS Exchange, Lotus Notes.
o Group discussions
o Workflow automation.
o Help Desk
o Collective document creation.
o Internal publishing
Top of page
Networks in a Multivendor Environments
• server's O/S, the client's O/S & the redirector have to be compatible
• Different clients have to be able to understand each other to communicate. How can you get this done?
o the client solution
implement the appropriate redirector on the client, the redirector forwards your request to the appropriate destination
use multiple redirectors to communicate with different clients
o the server solution
install a service on the service
E.g. to let MAC clients share network resources, add Service for Macintosh; Add FPNW for NetWare clients
Top of page
Client/Server Computing
• Centralized Computing
o Here the application operates on the server and all clients interact with the central application through client side interface terminals - dumb terminals
o when a client requests data from a database, the system moves all the data across the network to the client
o this causes the network to slow down for other clients
• Client/Server Computing
o the client computer makes a request and a computer acting as the server fulfills the request
o the client software uses the structured query language (SQL) to translate what the user sees into a request that the database can understand. Therefore portions of the application reside on the client and some on the server.
o Here's an example using SQL:
The client requests the data
The request is translated into SQL
The SQL request is sent over the network to the server
The database server carries out a search on the computer where the data exists
The requested records are returned to the client
The data is presented to the user
o The application (MS Access for example) is the client, or FRONT END
o The database server (SQL Server) is the server or BACK END
• The Client
o The front end client runs an application that
presents an interface to the user (this doesn't reside on the server at all)
formats requests for data
displays data it receives from the server
o The user uses an on-screen form, called a search key to specify search requests
o the data can be presented to the user in various ways - different users access the same database to present information in a way that suits them
o Front End Tools
query tools
user applications
e.g. Excel provides front end access to back end databases
program development tools
Visual Basic is used to develop front end tools to access backend data.
• The Server
o usually dedicated to STORING and MANAGING data
o most of the database activity happens on the server
sorting
data updates, additions, deletions, and protection
o Stored procedures
short, pre-written data-processing routines used by client applications
stored on the server and can be used by any client
one stored process can be called by any number of client applications instead of having to incorporate the same routine into the code of each program
this means
processing is done on the server instead of the client
network traffic is reduced because one request begins a series of stored procedures on the server instead of many different requests
security controls can prevent unauthorized use of some procedures
• Client / Server Architecture
o single server
o multiple servers with special tasks
distributed server arrangements
servers across a WAN link synchronized to endure they all have the same data in common
Data Warehouse. One server stores large amounts of data and forwards the most sought after data to intermediate servers that format the data. This off loads some of the processing from the intermediate servers that care contacted by clients (pic. p.409).
Advantages of the Client / Server Environment
3. Less network traffic => only results of query are sent over the network
4. The server is more powerful that the client and does most of the processing
5. More RAM and storage space on server means you don't have to spend as much MONEY on each client
6. Back end data is more easily secured and BACKED UP
Networking Essentials Notes - Section 5
Network Support and Administration
Section Titles:
Managing Network Accounts | Managing Network Performance | Avoiding Data Loss
• Five management areas
1. user administration
2. resource management
3. configuration management
4. performance management
5. maintenance
Managing Network Accounts
User Administration
Profiles
• used to structure a network environment for certain users
• this may be for security
• can also control the user's logon environment
• profiles include network connections and program items that appear when the user logs on. These can include:
o printer connections
o window sizes and positions
o icons
o mouse settings
o the screen arrangement of colors
o screen savers
Rights apply to the system as a whole; permissions apply to a certain object.
Types of Groups
• Local Groups => things
• Global Groups => People
• Special Groups => internal system access -- Interactive, Network
• Built-In Groups => Administrator, Users, Operators Groups, Guests
________________________________________
Administrator Responsibilities
• Creating and Managing Accounts
• Security
• Training and supporting users
• Updating and implementing new software
• Archiving and data backup
• Preventing data loss
• Monitoring and regulating server storage space.
• Tuning the network
• Virus protection
• Troubleshooting
• Upgrading and replacing hardware
• Adding new computers
Security Models
Two different security models have evolved:
• Password-protected shares (share-level): each resource has a password
o there are 2 levels of passwords: Read access and Full Control Access
• Access permissions (user level): Rights are assign on a user by user basis. More secure than the share level method.
Other Methods of Network Security
• Auditing
o audit records show the users that have accessed or attempted to access specific resources in security log
• Diskless computers
• Data Encryption
o data can't be stolen from the cable. When the data gets to the proper PC, a key, the code for deciphering encrypted data, decode the bits into understandable info.
o DES data encryption standard
o CCEP commercial COMSEC endorsement program
• Virus protection
o The 4 standard measures to take when protecting against viruses:
Passwords to reduce the chance of unauthorized access
Well planned access and privilege assignments for all users
Profiles to structure the network environment
a policy determining what software can be loaded
Managing Network Performance
• Bottlenecks
o one device uses noticeably more CPU time than the others
o these devices tend to become bottlenecks:
CPU,
memory,
network card,
disk controllers,
network media
• Windows NT Performance Monitor
o view operations in both real time and recorded time for: processors, HDD, memory, network utilization, network as a whole
o can record the performance data
o send an alert to the network manager
o run utility that can adjust the system back into acceptable ranges
o establish a baseline of system management
• Simple Network Management Protocol (SNMP) - in a SNMP environment, programs called agents are loaded onto each managed device. The agents monitor network traffic and behaviour in these key network components in order to gather statistical data. This data is stored in a management information base (MIB)
• SNMP components include: hubs, servers, interface cards, routers and bridges
• The MIB collects data and the management program
o presents the information in the form of graphs or charts AND/OR
o sends the information to database program for analysis
Total System Management
• Microsoft System Management Server (SMS)
o centralized administration of computers in a WAN
o Inventory Management - collects and maintains an inventory of hardware and software for each computer and stored in a SQL server database, info. like RAM, CPU, HDD size...
o Shared Application Management - shared application can also distributed to a server for client's access
o Software Distribution
SMS can install and configure new software or upgrade previously installed software
Also, it can run commands on the client such as virus scans
o Remote Control and Network Monitor - provide help desk and diagnostics utilities to control remote client directly and access to remote client
Avoiding Data Loss
Tape Backup
Method Description
Full Backup backs up and marks selected files, whether or not they have changed since the last backup
Copy backs up selected files without marking them as backed up
Incremental Backup backs up and marks selected files only if they have changed since the last backup
Differential Backup backs up selected files only if they have changed since the last backup w/o marking them as backed up
The difference between Incremental and Differential
IF => Incremental Fast to backup; Slow to Restore => Marks files as backed up
=> Differential Slow to backup; Fast to Restore
UPS
power source to run the server for s short time
safe shutdown management service
prevent any more users from accessing the server
send an alert message to the network admin.
power is restored while UPS is active, the UPS will notify users that the power has returned
Fault Tolerant Systems - Windows NT supports Raid 0,1 and 5. For the exam, worry only about them.
RAID 0 - disk striping
disk striping divides data into 64k block and spreads it equally in a fixed rate and order among all disks in an array
NOT FAULT TOLERANT
RAID 1 -
disk mirroring - actually duplicates a partition and moves the duplication onto another physical disk
disk duplexing - is a mirrored pair of disks with an addition disk controller on the second drive
The only RAID solution that can house the system files in the Boot partition
RAID 4 - disk guarding
one drive is a dedicated parity drive, data is striped to multiple drives and then its parity sum is calculated, which is written to the dedicated parity drive
works best for large block operations
RAID 5 - striping with parity
data is striped across multiple drives and then its parity sum is calculated, which is also striped across multiple drives (not a dedicated parity drive)
sector sparing - hot fixing
automatically adds sector - recovery capabilities to the file system while the computer is running
if bad sectors are found during disk I/O, the fault tolerance driver will attempt to move the data to good sector and map out the bad sector - only for SCSI, not ESDI or IDE
Networking Essentials Notes - Section 6
Section Titles:
Modems | Repeaters | Bridges | Routers | Brouters | Hubs | Gateways
Larger Networks
Some components can be installed which will increase the size of the network within the confines of the limitations set by the topology. These components can:
• Segment existing LANs so that each segment becomes its own LAN.
• Join two separate LANs.
• Connect to other LANs and computing environments to join them into a larger comprehensive network.
Modems
• Modems share these characteristics
o a serial (RS-232) interface
o an RJ-11C telephone line connector
• telephones use analog signal; computers use digital signal. A modem translates between the two
• BAUD refers to the speed of the oscillation of the sound wave on which a bit of data is carried over the telephone wire
• the BPS can be greater than the baud rate due to compression and encode data so that each modulation of sound can carry more than one bit of data is carried over the telephone line. For example, a modem that modulates at 28,000 baud can actually send at 115,200 bps => bps is the most important parameter when looking at throughput.
• There are 2 types of modems
Asynchronous Communications (Async)
• use common phone lines
• data is transmitted in a serial stream
• not synchronized, no clocking device => no timing
• both sending and receiving devices must agree on a start and stop bit sequence
• error control
o a parity bit is used in an error checking and correction scheme called parity checking
o It checks to see if the # of bits sent = # of bits received
o the receiving computer checks to make sure that the received data matches what was sent.
o 25 % of the data traffic in async communications consists of data control and coordination
o MNP (Microcom Network Protocol) has become the standard for error control
o Later LAPM (Link Access Procedure for Modems) is used in V.42 modems (57,600 baud).
It uses MNP Class 4.
LAPM is used between two modems that are V.42 compliant
If one or the other modems is MNP 4 - compliant, the correct protocol would be MNP Class 4
• Communication performance depends on
1. signaling or channel speed - how fast the bits are encoded onto the communications channel
2. throughput - amount of useful information going across the channel
you can double the throughput by using compression. One current data compression standard is the MNP Class 5 compression protocol
V.42 bis is even faster because of compression.
bis => second modification
terbo => third, the bis standard was modified
This is a good combination:
0. V.32 signaling
1. V.42 error control
2. V.42bis compression
Standard BPS
V.22 bis 2400
V.32 9600
V.32bis 14,400
V.32terbo 19,200
V.FastClass (V.FC) 28,800
V.34 28,800
V.42 57,600
Synchronous Communication
• relies on a timing scheme coordinated between two devices to separate groups of bits and transmit them in blocks known as frames
• NO start and stop bits =. a continuous stream of data because both know when the data starts and stops.
• if there's error, the data is retransmitted
• some synchronous protocol perform the following that asynchronous protocols don't:
1. format data into blocks
2. add control info
3. check the info to provide error control
• the primary protocols in synchronous communication are:
1. Synchronous data link control (SDLC)
2. High-level data link control (HDLC)
3. binary synchronous communication protocol (bisync)
• Synchronous communications are used in almost all digital and network communications
• 2 types of telephone lines:
1. public dial network lines (dial-up lines) - manually dial up to make a connection
2. leased (dedicated) lines - full time connection that do not go through a series of switches, 56 Kbps to 45 Mbps
Top of page
Repeaters
• Repeaters
o EXTEND the network segment by REGENERATING the signal from one segment to the next
o Repeaters regenerate BASEBAND, digital signals
o don't translate or filter anything
o is the least expensive alternative
o work at the Physical layer of OSI
• Both segments being connected must use the same access method e.g. an 802.3 CSMA/CD (Ethernet) LAN segment can't be joined to a 802.5 (Token Ring) LAN segment. Another way of saying this is the Logical Link Protocols must be the same in order to send a signal.
• BUT repeaters CAN move packets from one physical medium to another: for example can take an Ethernet packet from a thinnet coax and pass it on to a fiber-optic segment. Same access method is being used on both segments, just a different medium to deliver the signal
• They send every bit of data on => NO FILTERING, so they can pass a broadcast storm along from on segment to the next and back. So you want to use a repeater when there isn't much traffic on either segment you are connecting.
• There are limits on the number of repeaters which can be used. The repeater counts as a single node in the maximum node count associated with the Ethernet standard [30 for thin coax].
• Repeaters also allow isolation of segments in the event of failures or fault conditions. Disconnecting one side of a repeater effectively isolates the associated segments from the network.
• Using repeaters simply allows you to extend your network distance limitations. It does not give you any more bandwidth or allow you to transmit data faster.
• Why only so many repeaters are allowed on a single network: "propagation delay". In cases where there are multiple repeaters on the same network, the brief time each repeater takes to clean up and amplify the signal, multiplied by the number of repeaters can cause a noticeable delay in network transmissions.
• It should be noted that in the above diagram, the network number assigned to the main network segment and the network number assigned to the other side of the repeater are the same.
• In addition, the traffic generated on one segment is propagated onto the other segment. This causes a rise in the total amount of traffic, so if the network segments are already heavily loaded, it's not a good idea to use a repeater.
• A repeater works at the Physical Layer by simply repeating all data from one segment to another.
Summary of Repeater features
o increase traffic on segments
o limitations on the number that can be used
o propagate errors in the network
o cannot be administered or controlled via remote access
o no traffic isolation or filtering
Summary:
A repeater
o Connects two segments of similar or dissimilar media
o Regenerates the signal to increase the distance transmitted
o Functions in the Physical Layer of the OSI model
o Passes ALL TRAFFIC in both directions
• Use a repeater to improve performance by dividing the network segments, thus reducing the number of computers per segment (This is what it says in the book, but it doesn't make sense to me)
• Do NOT use a repeater when:
o There is heavy network traffic
o Segments are using different access methods
o You need any kind of data filtering.
Amplifiers are just like repeaters, but generate a BROADBAND, analog signal. That analog signal can have different frequencies and carry both voice and data.
Top of page
Bridges
• have all the abilities of a repeater
• Bridges can
o take an overloaded network and split it into two networks, therefore they can divide the network to isolate traffic or problems and reduce the traffic on both segments
o expand the distance of a segment
o link UNLIKE PHYSICAL MEDIA such as twisted-pair (10Base T) and coaxial Ethernet (10Base2)
o VERY IMPORTANT: they can link UNLIKE ACCESS CONTROL METHODS, on different segments such as Ethernet and Token Ring and forward packets between them. Exam Cram says this is a Translation Bridge that can do this - not all bridges - but my observation is questions don't necessarily mention the distinction.
• Bridges work at the Data Link Layer of the OSI model => they don't distinguish one protocol from the next and simply pass protocols along the network. (use a bridge to pass NetBEUI, a non-routable protocol, along the network)
• Bridges actually work at the MEDIA ACCESS CONTROL (MAC) sublayer. In fact they are sometimes called Media Access Control layer bridges. Here's how they deal with traffic:
o They listen to all traffic. Each time the bridge is presented with a frame, the source address is stored. The bridge builds up a table which identifies the segment to which the device is located on. This internal table is then used to determine which segment incoming frames should be forwarded to. The size of this table is important, especially if the network has a large number of workstations/servers.
o they check the source and destination address of each PACKET
o They build a routing table based on the SOURCE ADDRESSES. Soon they know which computers are on which segment
o Bridges are intelligent enough to do some routing:
if the destination address is on the routing table and is on the SAME SEGMENT, the packet isn't forwarded. Therefore, the bridge can SEGMENT network traffic
If the destination address is the routing table, and on a remote segment, the bridge forwards the packet to the correct segment
if the destination address ISN'T on the routing table, the bridge forwards the packet to ALL segments.
BRIDGES SIMPLY PASS ON BROADCAST MESSAGES, SO they too contribute to broadcast storms and don't help to reduce broadcast traffic
• Remote Bridges
o two segments are joined by a bridge on each side, each connected to a synchronous modem and a telephone line
o there is a possibility that data might get into a continuous loop between LANs
o The SPANNING TREE ALGORITHM (STA)
senses the existence of more than one route
determines which is the most efficient and
configures the bridge to use that route
this route can be altered if it becomes unusable.
Transparent bridges (also known as spanning tree, IEEE 802.1 D) make all routing decisions. The bridge is said to be transparent (invisible) to the workstations. The bridge will automatically initialize itself and configure its own routing information after it has been enabled.
• Comparison of Bridges and Repeaters
o Bridges
regenerate data at the packet level
accommodate more nodes than repeaters
provide better network performance than repeaters because they segment the network
• Implementing a Bridge
o it can be an external, stand-alone piece of equipment
o or be installed on a server
• Summary from MOC:
o Bridges have all the features of a repeater
o They connect two segments and regenerate the signal at the packet level
o They function at the Data Link layer of the OSI model
o Bridges are not suited to WANs slower than 56k
o They cannot take advantage of multiple paths simultaneously
o They pass all broadcasts, possibly creating broadcast storms
o Bridges read the source and destination of each packet
o they PASS packets with unknown destinations
o Use Bridges to:
Connect two segments to expand the length or number of nodes on the network
reduce traffic by segmenting the network
Connect
unlike MEDIA ( e.g. 10BaseT and 10Base2)
unlike ACCESS CONTROL METHODS (Ethernet and Token Ring)
The advantages of bridges are
o increase the number of attached workstations and network segments
o since bridges buffer frames, it is possible to interconnect different segments which use different MAC protocols
o since bridges work at the MAC layer, they are transparent to higher level protocols
o by subdividing the LAN into smaller segments, overall reliability is increased and the network becomes easier to maintain
o used for non routable protocols like NetBEUI which must be bridged
o help localize network traffic by only forwarding data onto other segments as required (unlike repeaters)
The disadvantages of bridges are
o the buffering of frames introduces network delays
o bridges may overload during periods of high traffic
o bridges which combine different MAC protocols require the frames to be modified before transmission onto the new segment. This causes delays
o in complex networks, data is not sent over redundant paths, and the shortest path is not always taken
o bridges pass on broadcasts, giving rise to broadcast storms on the network
Sample Question:
You want to connect an Ethernet network in one part of an office building to a Token-ring network down the hall. Both networks use NWLink IPX but must eliminate the IPX addressing and use only NetBEUI on both segments when they are joined. Which connectivity device do you choose which will allow the two networks to communicate, but at the same time reduce network levels.
device should you use?
1. repeater
2. bridge
3. router
4. gateway
B - they are testing here to see if you know what a translation bridge can do.
Some bridges can't connect different segments that use different media schemes, but a translation bridge can. A translation bridge will also reduce network traffic because it can analyze packets based on MAC address and if it finds them to be from the same segment as the originating they are simply discarded instead of being passed on to a non-local segment. The bridge can do this using address information stored in its bridging table.
Top of page
Routers
• Determine the best path for sending data and filtering broadcast traffic to the local segment. They DON'T pass on broadcast traffic
• work at the Network layer of OSI => they can switch and route packets across network segments
• They provide these functions of a bridge
o filtering and isolating traffic
o connecting network segments
• routing table contains
1. all known network addresses
2. how to connect to other networks
3. possible paths between those routers
4. costs of sending data over those paths
5. not only network addresses but also media access control sublayer addresses for each node
Routers
o REQUIRE specific addresses: they only understand network numbers which allow them to talk to other routers and local adapter card addresses
o only pass Packets to the network segment they are destined for.
o routers don't talk to remote computers, only to other routers
o they can segment large networks into smaller ones
o they act as a safety barrier (firewall) between segments
o they prohibit broadcast storms, because broadcasts and bad data aren't forwarded
o are slower than most bridges
o can join dissimilar access methods: a router can route a packet from a TCP/IP Ethernet network to a TCP/IP Token Ring network
Routers don't look at the destination computer address. They only look at the NETWORK address and they only pass on the data if the network address is known => less traffic
• Routable protocols:
o DECnet, IP, IPX, OSI, XNS, DDP (Apple)
o Routable protocols have Network layer addressing embedded
• Non-routable protocols:
o LAT, NetBEUI, DLC
o Non-routable protocols don't have network layer addressing
Choosing Paths
• routers can choose the best path for the data to follow
• routers can accommodate multiple active paths between LAN segments. To determine the best path, it takes these things into account:
o If one path is down, the data can be forwarded over on alternative route
o routers can listen and determine which parts of the network are busiest.
o it decides the path the data packet will follow by determining the number of hops between internetwork segments
• OSPF (Open Shortest Path First)
o is a link-state routing algorithm
o routes are calculated based on
# of hops
line speed
traffic
cost
o TCP/IP supports OSPF
• RIP (Routing Information Protocol)
o RIP is the protocol used to determine the # of hops to a distant segment.
o uses distance-vector algorithm to determine routes
o TCP/IP & IPX support RIP
• NLSP (NetWare Link Services Protocol)
o is a link-state algorithm for use with IPX
• There are 2 types of routers
o Static - manually setup and config the routing table and to specify each route
o Dynamic
automatic discovery of routers
use information from other routers
Distinguishing between Bridges and Routers
Both bridges and routers
o forward packets between networks
o send data across WAN links
• A Bridge
o recognizes the address of EACH computer on it's segment and forwards packets on the basis of the destination address
o either recognizes the address or it doesn't, and forwards the packet accordingly
o forwards all broadcast messages to all ports, except to the port from which the broadcast message came. Every computer on every segment receives this broadcast
• A Router
o works at the NETWORK layer and thus takes more information into account when determining what to forward and where to forward it to.
o Routers recognize the addresses of other routers and determine which packets to forward to which routers
Multiple Paths-- important
• Bridges recognize ONE PATH between networks
• Routers can search between multiple paths and determine the best path at the moment
The 4 KEY pieces of information that distinguish bridges and routers:
Bridges Routers
• recognize the MAC sublayer addresses (i.e. the addresses of the network cards on its own segment) • Routers recognize network addresses not individual computer addresses
• forwards everything it doesn't recognize and
• forwards all addresses it knows, but only out the appropriate port • routers filter addresses.
• It forwards particular protocols to particular addresses (other routers)
• if the router doesn't recognize a destination address, the packet is usually discarded
• works with all protocols • only works with routable protocols
• Non-Routable = NetBEUI, DLC, LAT
Because they make path choices and filter out packets the segment doesn't need to receive they
• help lessen network congestion
• conserve resources
• boost data throughput
• make data delivery more reliable
Because is works at the network layer, a router can connect networks that use
• Different architectures
• Different media access control methods -- for example, they can connect an Ethernet segment to a Token-Ring segment
Summary of Router features
• use dynamic routing
• operate at the protocol level
• remote administration and configuration via SNMP
• support complex networks
• the more filtering done, the lower the performance
• provides security
• segment networks logically
• broadcast storms can be isolated
• often provide bridge functions also
• more complex routing protocols used [such as RIP, IGRP, OSPF]
Top of page
Brouters
• Combine the best qualities of both bridges and routers
• First, a brouter checks to see if the protocol is routable or non-routable
• Route selected routable protocols.
• They can bridge non-routable protocols. Like a Bridge, they use the MAC address to forward to destination. They act like a router for one protocol and a bridge for all the others
• More cost effective than individual bridges and routers.
• SO, use a brouter when you have routable and non-routable protocols.
Hubs
There are many types of hubs:
• Passive hubs are don't require power and are simple splitters or combiners that group workstations into a single segment
• Active hubs require power and include a repeater function and are thus capable of supporting many more connections.
• Intelligent hubs provide
o packet switching
o traffic routing
Gateways
• The TRANSLATOR -- allows communications between dissimilar systems or environments
• A gateway is usually a computer running gateway software connecting two different segments. For example an Intel-based PC on one segment can both communicate and share resources with a Macintosh computer or an SNA mainframe. Use gateways when different environments need to communicate. One common use for gateways is to translate between personal computers and mainframes
• GSNW is a gateway to allow Microsoft clients using SMB to connect to a NetWare server using NCP.
• Gateways work at the Application --> Transport layer
• They make communication possible between different architectures and environments
• They perform protocol AND data conversion / translation.
• they takes the data from one environment, strip it, and re-package it in the protocol stack from the destination system
• they repackage and convert data going from one environment to another so that each environment can understand the other environment's data
• gateway links two systems don't use the same
1. protocols
2. data formatting structure
3. languages
4. architecture
• they are task specific in that they are dedicated to a specific type of conversion: e.g. "Windows NT Server -> SNA Server Gateway"
• usually one computer is designated as the gateway computer. This adds a lot of traffic to that segment
• Disadvantages
o They slow things down because of the work they do
o they are expensive
o difficult to configure
Remember, gateways can translate
o protocols e.g. IPX/SPX --> TCP/IP
o and data (PC --> Mac)
o e-mail standards --> an e-mail gateway that translates on e-mail format into another (such as SMTP) to route across the Internet.
Networking Essentials Notes - Section 7
Section Titles:
WAN Transmission:
Analog | Digital | T1 | T3 | Switched 56 | Packet Switching
Advanced WAN:
X.25 | ISDN | Frame Relay | ATM | FDDI | SONET | SMDS
Network Troubleshooting | Tools
WAN Transmission
Communication between LANs over a WAN link will involve one of these technologies
• Analog
o These use conventional telephone lines, with voice signaling (modem) technologies
• Digital
o These use digital grade telephone lines, with digital technologies all the way
• Packet Switching
o These use multiple sets of links between sender and receiver to move data
Analog
• dial-up line
o via public switched telephone network (PSTN)
o requires modems which are slow
o inconsistent quality of service
• dedicated line
o fast
o reliable
o expensive
o service provider can implement line conditioning (a service that reduces delay and noise on the line, allowing for better transmissions) can make the leased lines even more reliable,
Digital
• Digital Data Service (DDS) provide point-to-point synchronous communications at:
o 2.4 Kbps
o 4.8 Kbps
o 9.6 Kbps or
o 56 Kbps
• guarantees full-duplex bandwidth by setting up a permanent link from each endpoint
• 99% error free
• doesn't requires modem, requires bridge or router through a device called a CSU/DSU. This device translates standard digital signals a computer generates into bipolar digital signals used by synchronous communications
• Available in several forms:
# of T channels Speed
DDS
T1 1 1.544 Mbps
T3 28 45 Mbps
T4 168 274.7 Mbps
Switched 56 56 Kbps
T1
• Point to point transmission => no switching
• uses two-wire pairs (1 pair to send, 1 to receive)
• full-duplex signal at 1.544 Mbps
• Used to transmit digital, voice, data and video signals
• multiplexing - signals from different source are collected into a component called a multiplexer and fed into one cable 8,000 times a second
• a T1 divides into 24 64 Kbps channels. Subscribers can lease one 64 Kbps channel known as a Fractional T-1.
o each channel can transmit at 64 Kbps. This is called a DS-0
o the whole 1.544 Mbps is known as DS-1
• Connecting a T1 line to your network is similar to a connecting a DDS or frame relay line. You will need a T1-compatible CSU/DSU, and a bridge or router. To distribute the T1’s bandwidth between voice and data traffic, you will need a multiplexer/demultiplexer to combine voice and data signals for transmission, and separate them upon reception.
T3
• equivalent to 28 T-1 lines
• T3 and Fractional T-3 leased line service provides voice and data service from 6 Mbps to 45 Mbps
• REALLY expensive
• T-1 uses copper wire, while T-3 uses fiber optic cables or microwave transmission equipment.
Switched 56
• In reality, a Switched 56 line is nothing more than a circuit-switched version of a standard 56 Kbps DDS leased line. As customers pay only for connection time, resulting costs are usually significantly lower than those of a dedicated line.
• is a LAN to LAN digital dial-up service
• 56 Kbps
• used on demand => not dedicated => less expensive.
• Both ends must be equipped with a Switched 56 compatible CSU/DSU to dial-up another switched 56 site.
Packet Switching
o Switching (as in switched connections) refers to finding a path for data transmission across a number of potential links between sender and receiver. On the other hand, analog and digital connections require a fixed connection to exist, at least for the duration of each communication session. Switching methods include both circuit switching and packet switching. Essentially, when data is received on an incoming line, the switching device must find an appropriate outgoing line on which to forward it. These switching devices are usually called routers, based on the functions they perform.
o data package is broken into packers and each package is tagged with a destination address and other info.
o relayed through stations in a computer network
o data paths for individual packets depend on the best route at any given instant. The main point is that the small, individual packets are all take their own route to the destination, and an error in any one of them is easier to correct than a huge chunk of data
o These networks are sometimes called "any to any networks"
o Can use a virtual circuit
logical connection between the sending computer and the receiving computer
not actual cable, but bandwidth used on demand
Can use a Switched Virtual Circuit to establish a connection over a specific route.
Permanent Virtual Circuits allow the customer to pay for only the time that the line is used.
Top of page
Advanced WAN
X.25
o speed peaks at 64 Kbps - Newer versions can be up to 2 Mbps
o a set of protocols incorporated in a packet-switching network
o uses switches circuits and routes as available to provide the best routing at any particular time. The situation is always changing.
o uses telephone lines - slow - MUCH error checking => this is a major disadvantage
o synchronous packet-mode host or other device and the public data network (PDN) over a dedicated or leased-line circuit
o DTC/DCE interface
o a PAD is also needed - Packet Assembler / Disassembler
o And X.25 gateway is needed between the LAN and the Public Data Network
o See pic on p. 595.
ISDN
o Basic Rate (BRI) is 3 data channels
2 for 64 Kbps - 64 Kbps channels are known as B (Bearer) channels, carry voice, data or image
1 for 16 Kbps - the 16 Kbps channel is D channel which carries signaling and link management data
This makes a total of 144 Kbps of bandwidth.
basic rate is called 2B+D
The two B channels can be used together for 128 Kbps data stream
o Primary Rate (PRI) ISDN takes the entire bandwidth of a T1 link by providing
23 B Channels at 64 Kbps
1 D Channel at 64 Kbps
o ISDN is a dial-up service, not dedicated, not bandwidth on demand
o Right now, ISDN is about 5 times as fast as the fastest modem
o You can transmit voice and data with ISDN
Frame Relay
o Like X.25 Frame Relay is a packet-switching technology
o uses variable-length packets
o It establishes a logical path that's called a Permanent Virtual Circuit (PVC) between end-points. PVCs take fixed paths, so a PVC is the equiva-lent of a dedicated line in a packet-switched network. The path is fixed, so network nodes don't have to waste time calculating routes. Frame relay connections operate at speeds between 56 Kbps and 1.544 Mbps because they use PVCs, and there is no built-in error checking.
o again, the PVC transmits at Data Link Layer. Because Frame Relay uses a PVC, the entire path from end to end is known => faster because no fragmentation or reassembly or best path routing is needed
o can supply bandwidth on demand
o over digital leased-line
o Frame relay connections to a network require you to use a frame relay-compatible CSU/DSU to create the physical connection to the WAN, and a router or bridge to move traffic from the LAN to the WAN, and the WAN to the LAN, as needed.
o in summary, Frame relay costs less than a dedicated line or an ATM connection and provides data transmission rates of up to 1.544 Mbps over conventional or fiber optic media.
ATM
o fixed-sized packets over broadband and baseband LANs or WANs
o 155 Mbps to 622 Mbps or more
o ATM can accommodate voice, data, fax, realtime video, CD-quality audio, imaging, and multimegabit data transmission.
o ATM is like frame relay because it assumes noise-free lines and leaves error checking to devices at either end of a connection. Also, ATM creates a PVC between two points across an ATM network as part of setting up a communication session.
o ATM Technology
broadband cell relay method that transmit data in 53-byte cells rather than in variable-length frames. This uniform cell size is a big factor for speed => uniformity is easier to switch, route and buffer.
cell consists of 48 bytes of application info and 5 bytes of ATM header data => a consistent uniform package
o in theory, up to 1.2 Gigabits per second, but can transmit normally at 155 Mbps
o can be used in LANs and WANs
o hardware like routers, bridges have to be ATM compatible
o switches are multiport hubs
o Any media type is OK
media recommended
T3 (45 Mbps)
FDDI (100 Mbps)
fiber channel (155 Mbps)
OC3 SONET (155 Mbps)
o ATM can even interface with frame relay and X.25.
About Optical Carrier Levels, T-Carrier Rates, And More
The Optical Carrier rating level for standard ATM technologies is cus-tomarily abbreviated as OC-n, where n is a multiplier applied to the basic OC level 1 rate (OC-1) of 51.84 Mbps. OC-1 describes the basic transmission rate for SONET communications. Table 10.1 (seen later in this chapter) summarizes most of the WAN service types that we cover in this chapter, along with their common abbreviations, basic characteristics, maximum throughput rates, and associated transmission technologies. - Exam Cram p. 197
Top of page
Fiber Distributed Data Interface (FDDI)
• 100 Mbps token passed ring network that uses Fiber optic cable
• used for Metropolitan Area Networks (MAN) to connect within the same city so this isn't really a WAN technology
• 100 km (62 miles) max. length => not really a WAN technology
• FDDI uses fiber optic cable to serve as
o "backend network" that handle file transfer
o serve as a backbone for other low capacity LANs
o LANs that require large bandwidth
Video
CAD
CAM
• Token Passing
o not the same as token passing in 802.5
o here a computer can transmit as many frames as it can produce within a predetermined time before letting the token go. When it is finished transmitting, it lets the token go.
o Because the computer releases the token when it's finished, there may be several frames on the ring at once.
o FDDI is not like a regular Token Ring network because more than one computer at a time can transmit a token so that multiple tokens can circulate on the ring at any one time.
o This is why FDDI is faster than regular Token Ring 802.5 => 802.5 only allows one token at a time to transmit.
• Topology
o dual-ring
primary ring is for traffic; a redundant second ring for backup
when the primary ring breaks down, the secondary ring reconfigures itself and flows in the opposite direction
REDUNDANCY is one of the key features of this technology.
o 500 computers max.
o more than one computer can transmit at a time - they share the bandwidth; for example, when 10 computers transmit, each does so at 10 Mbps
o there must be a repeater every 2 Kms or less
o computers connected to both rings are CLASS A stations and help to reconfigure the network if the first ring fails. CLASS B stations are only connected to the one, primary ring.
o FDDI can have point-to-point links to a hub => it can be set up using a star ring topology
• Beaconing
o all computers on an FDDI network are responsible for monitoring faults in the network
o a computer that detects a fault sends a signal called a BEACON onto the network. If it sees it's upstream neighbour is sending a beacon it stops. This goes on until the only computer sending a beacon is the one directly downstream from the faulty computer. This process stops when a beaconing computer receives its own beacon => this means the beacon made it around the ring
• Media
o FDDI uses fiber-optic. This means
immune to electromagnetic interference
secure because fiber optic doesn't emit a signal that can be monitored and cannot be tapped
able to transmit long distances before needing a repeater
o FDDI on copper wire is called CDDI => can be done, but it has FAR less distance
Top of page
Synchronous Optical Network (SONET)
• SONET is a fiber optic WAN technology used to deliver voice, data, and video at speeds in multiples of 51.84 Mbps
• The basic OC-1 level specifies a data rate of 51.84 Mbps, and is based on the DS1 basic rate defined for SONET. The most common level is OC-3 or 3 x 51.84 Mbps or 155.52 Mbps. OC-3 is the most common SONET implementation in use today, even though the specification defines OC-48 at 2.48 Gbps.
• uses fiber-optic
• Summary: SONET is a fiber optic WAN technology used to deliver voice, data, and video at speeds up to 622 Mbps, and beyond.
Switched Multimegabit Data Service (SMDS)
• Switching service that provides data transmission in the range between 1.544 Mbps (T1 or DS1) to 45 Mbps (T3 or DS3).
• Connectionless service that, like ATM, uses fixed-length 53 bytes cells.
• Like ATM and frame relay, it provides no error checking, leaving that up to devices at the connection points.
• IEEE 802.6 (MAN) specification.
• is a dual bus topology that forms a ring that is not closed
Other WAN Tidbits:
• E1 (European Trunk Line) is the T-1 digital equivalent
• The transmission rate is 2.048 Mbps
• See table p. 199 Exam Cram for other tidbits, most of which have been noted here.
Top of page
Network Troubleshooting
Planning
• Prevention and a proactive program of preventative maintenance are the best approaches to avoid problems.
• Policies and procedures should be determined during the network planning stages and should include;
o Backing up the network.
o Planning security.
o Standardization of hardware and software.
o Upgrade maintenance.
o Documentation which may include;
map of the network
server information and backup schedules
software information
telephone numbers of vendors and tech support
copies of service agreements
record of problems and solutions
Network Utilities
• The ISO identifies five areas of network management;
1. Accounting management
2. Configuration management
3. Fault management
4. Performance management
5. Security management
• Network Monitoring
o Can be performed with Performance Monitor in NTServer.
o A baseline should be established under normal conditions for future reference.
Troubleshooting Methodology
1. Set the problem's priority.
2. Identify the problem's symptoms.
3. Develop a list of possible causes.
4. Test to isolate the cause.
5. Study the results of the test to identify a solution.
Tools
• Digital Volt Meter (DVM)
o another name is a Volt /Ohm Meter
o checks for resistance on cables, terminators and barrel connectors
cables and barrel connectors should provide 0 resistance
terminators in 10Base2 and 10Base5 networks should provide 50 ohms of resistance
o Use as a continuity checker for cables.
o a continuity check can reveal a short where:
two parts of the same cable are exposed and touching
part of cable is touching another conductor such as metal surface
• Time-Domain Reflectometer (TDR)
o Sends sonar-like pulses down the cable to identify any kind of a break, short or imperfection that might affect performance
o can locate a break within a few feet of the actual separation in the cable
• Advanced Cable Testers
o Work at OSI layers 2, 3, and 4 and can display more complex information.
o can indicate if a particular cable or NIC is causing problems
o Can display:
Message and error frame counts
Excess collisions
congestion errors
beaconing
• Oscilloscopes
o measures signal voltage per unit of time
o Can identify
breaks,
shorts,
bends
opens (breaks in the cable)
and attenuation data.
• Network Monitors
o Software that tracks all or part of network traffic.
• Protocol Analyzers
o Can perform packet capture, decoding and transmission in real-time.
o Most useful network analysis tool.
o They look inside the packet to identify problems
o They have a TDR in them
o they can
identify the most active computers
identify computers sending error-filled packets
identify, view and filter certain types of packets
help analyze network trends
check various components, connections by generating test packets
set up alerts like Performance Monitor
Support Resources
• Microsoft TechNet
• BBS's
• User Groups
• Periodicals
• Internet
• Microsoft Network
Common Troubleshooting Situations
• Cable and other physical layer problems.
• Power fluctuations.
• Upgrades
• Changes in client computer configuration.
• Server crashes.
• Poor network performance resulting from some change or user application.
Subscribe to:
Posts (Atom)