Chapter 3 Network
Chapter 3 Network
Can you think of other ways people use networks and the Internet in their daily lives?
Networking media: it provides connections between hosts and network devices. Network media can be wired, such as copper and fiber optic or use wireless technologies.
The network components that people are most familiar with are hosts and shared peripherals. Hosts are devices that send and receive messages directly across the network. Shared peripherals are not directly connected to the network, but instead are connected to hosts. The host is then responsible for sharing the peripheral across the network. Hosts have computer software configured to enable people on the network to use the attached peripheral devices. The network devices, as well as networking media, are used to interconnect hosts. Some devices can play more than one role, depending on how they are connected. For example, a printer directly connected to a host (local printer) is a peripheral. A printer directly connected to a network device and participates directly in network communications is a host.
A computer with server software can provide services simultaneously to one or many clients. Additionally, a single computer can run multiple types of server software. In a home or small business, it may be necessary for one computer to act as a file server, a web server, and an email server. A single computer can also run multiple types of client software. There must be client software for every service required. With multiple clients installed, a host can connect to multiple servers at the same time. For example, a user can check email and view a web page while instant messaging and listening to Internet radio.
Can be used for simple tasks such as trasferring files and sharing printers
The disadvantages of peer-to-peer networking: No centralized administration Not as secure Not scalable All devices may acts as both clients and servers which can slow their performance
Imagine what would happen if no protocols or rules existed to govern how people communicate with each other. Would you be able to understand them? Are you able to read the paragraph that does not follow commonly accepted protocols? Protocols are specific to the characteristics of the source, channel and destination of the message. The rules used to communicate over one medium, like a telephone call, are not necessarily the same as communication using another medium, such as a letter. Protocols define the details of how the message is transmitted, and delivered. This includes issues of: Message format Message size Timing Encapsulation Encoding Standard message pattern
Many of the concepts and rules that make human communication reliable and understandable also apply to computer communication.
words. The words are spoken into the telephone using the sounds and inflections of spoken language that convey the message. On the other end of the telephone line, the person listening to the description, receives and decodes the sounds in order to visualize the image of the sunset described by the sender. Encoding also occurs in computer communication. Encoding between hosts must be in an appropriate form for the medium. Messages sent across the network are first converted into bits by the sending host. Each bit is encoded into a pattern of sounds, light waves, or electrical impulses depending on the network media over which the bits are transmitted. The destination host receives and decodes the signals in order to interpret the message.
In addition to having the correct format, most personal letters must also be enclosed, or encapsulated, in an envelope for delivery. The envelope has the address of the sender and receiver on it, each located at the proper place on the envelope. If the destination address and formatting are not correct, the letter is not delivered. The process of placing one message format (the letter) inside another message format (the envelope) is called encapsulation. De-encapsulation occurs when the process is reversed by the recipient and the letter is removed from the envelope. A letter writer uses an accepted format to ensure that the letter is delivered and understood by the recipient. In the same way, a message that is sent over a computer network follows specific format rules for it to be delivered and processed. Just as a letter is encapsulated in an envelope for delivery, so computer messages are encapsulated. Each computer message is encapsulated in a specific format, called a frame, before it is sent over the network. A frame is logical grouping of information sent over a trasmission medium as a data link layer unit. Often refers to the header and trailer, used for synchronization and error control, that surround the user data contained in the unit. A frame acts like an envelope; it provides the address of the intended destination and the address of the source host. The format and contents of a frame are determined by the type of message being sent and the channel over which it is communicated. Messages that are not correctly formatted are not successfully delivered to or processed by the destination host.
There is no official local networking standard protocol, but over time, one technology, Ethernet, has become more common than the others. It has become a de facto standard. A de facto standard is a format, language or protocol that becomes a standard because it is widely used. De jure standard, in contrast, is one that exists because of approval by an official standard body.
The Institute of Electrical and Electronic Engineers, or IEEE (pronounced eye-triple-e), maintains the networking standards, including Ethernet and wireless standards. IEEE committees are responsible for approving and maintaining the standards for connections, media requirements and communications protocols. Each technology standard is assigned a number that refers to the committee that is responsible for approving and maintaining the standard. The committee responsible for the Ethernet standards is 802.3. Since the creation of Ethernet in 1973, standards have evolved for specifying faster and more flexible versions of the technology. This ability for Ethernet to improve over time is one of the main reasons that it has become so popular. Each version of Ethernet has an associated standard. For example, 802.3 100BASE-T represents the 100 Megabit Ethernet using twisted pair cable standards. The standard notation translates as: 100 is the speed in Mbps BASE stands for baseband transmission T stands for the type of cable, in this case, twisted pair.
A baseband is a trasmission medium through which digitals signals are sent without complicated frequency shifting. In general, only one communication channel is available at any given time. Ethernet is an example of a baseband network. Early versions of Ethernet were relatively slow at 10 Mbps. The latest versions of Ethernet operate at 10 Gigabits per second and faster. Imagine how much faster these new versions are than the original Ethernet networks.
1973 Ethernet: invented by Dr. Robert Metcalf of Xerox Corp. 1980 DIX Standard: Digital Equipment Corp, Intel and Xerox (DIX) release a standard for 10 Mbps Ethernet over coaxial cable 1983 IEEE 802.3 10 BASE-5: 10 Mbps Ethernet over thick coaxial cable 1985 IEEE 802.3a 10 BASE-2: 10 Mbps Ethernet over thin coaxial cable 1990 IEEE 802.3i 10 BASE-T: 10 Mbps Ethernet over twisted pair (TP) 1993 IEEE 802.3j 10 BASE-F: 10 Mbps Ethernet over fiber optic 1995 IEEE 802.3u 100 BASE-xx: Fast Ehernet, 100 Mbps Ethernet over twisted pair (TP) and fiber (various standards) 1998 IEEE 802.3z 1000 BASE-X: Gigabit Ethernet over fiber optic 1999 IEEE 802.3ab 1000 BASE-T: Gigabit Ethernet over twisted pair 2002 IEEE 802.3ae 10G BASE-xx: 10 Gigabit Ethernet over fiber (various standards) 2006 IEEE 802.3an 10G BASE-T: 10 Gigabit Ethernet over twisted pair (TP)
Ethernet networks are cable based, meaning that a copper or fiber optic cable connects hosts and networking devices. This is the channel used for communications between the hosts. When a host on an Ethernet network communicates, it sends frames containing its own MAC address as the source and the MAC address of the intended recipient. Any hosts that receive the frame will decode the frame and read the destination MAC address. If the destination MAC address matches the address configured on the NIC, it will process the message and store it for the host application to use. If the destination MAC address does not match the host MAC address, the NIC will ignore the message.
The size of Ethernet frames is limited to a maximum of 1518 bytes and a minimum size of 64 bytes from the Destination MAC Address field through the Frame Check Sequence. Frames that do not match these limits are not processed by the receiving hosts. In addition to the frame formats, sizes and timing, Ethernet standards define how the bits making up the frames are encoded onto the channel. Bits are transmitted as either electrical impulses over copper cable or as light impulses over fiber optic cable.
Preamble: defined pattern of alternating 1 and 0 bits used to synchronize timing Start of Frame Delimiter (SFD): marks the end of the timing information and start of the frame Destination MAC Address: contains the destination MAC address (receiver). It can be unicast (a specific host), multicast (a gruop of hosts), or broadcast (all hosts on the local network) Source MAC Address: contains the source MAC address (sender). This is the unicast address of the Ethernet nod that trasmitted the frame Lenght/Type: supports two different uses. A type value indicates which protocol will receive the data. The lenght indicates the number of bytes of data that follow this fields Encapsulated Data: contains the packet of information being sent. Ethernet requires each frame to be between 64 amd 1518 bytes FCS: contains a 4-byte value that is create by the device that sends data and is recalculated by the destination device to check for damaged frames
The Preamble and SFD fields are not included in the maxinum/minimum Ethernet frame byte counts
Access Layer to provide connections to hosts in a local Ethernet network. Distribution Layer to interconnect the smaller local networks. Core Layer a high-speed connection between distribution layer devices.
With this new hierarchical design, there is a need for a logical addressing scheme that can identify the location of a host. This is the Internet Protocol (IP) addressing scheme.
Both the physical MAC and logical IP addresses are required for a computer to communicate on a hierarchical network, just like both the name and address of a person are required to send a letter.
to-point cable. These cables are manufactured to meet specific Ethernet standards. Each cable is plugged into a host NIC and then into a port on the networking device. There are several types of networking devices that can be used to connect hosts at the Access Layer, including Ethernet hubs and switches.
Sometimes, it is necessary to connect another networking device, like a hub, to a switch port. This is done to increase the number of hosts that can be connected to the network. When a hub is connected to a switch port, the switch associates the MAC addresses of all hosts connected to that hub with the single port on the switch. Occasionally, one host on the attached hub sends a message to another host attached to the same hub. In this case, the switch receives the frame and checks the table to see where the destination host is located. If both the source and destination hosts are located on the same port, the switch discards the message. When a hub is connected to a switch port, collisions can occur on the hub. The hub forwards to all ports the damaged messages resulting from a collision. The switch receives the garbled message, but, unlike a hub, a switch does not forward the damaged messages caused by collisions. As a result, every switch port creates a separate collision domain. This is a good thing. The fewer hosts contained in a collision domain, the less likely it is that a collision will occur.
Once the sending host has the MAC address of the destination host in its ARP table, it can send frames directly to the destination without doing an ARP request.
The Distribution Layer connects these independent local networks and controls the traffic flowing between them. It is responsible for ensuring that traffic between hosts on the local network stays local. Only traffic that is destined for other networks is passed on. The Distribution Layer can also filter incoming and outgoing traffic for security and traffic management. Networking devices that make up the Distribution Layer are designed to interconnect networks, not individual hosts. Individual hosts are connected to the network via Access Layer devices, such as hubs and switches. The Access Layer devices are connected to each other via the Distribution Layer device, such as routers. Functions of the routers in distribution layer:
Broadcast Containment: they can limit broadcast to the local network where they need to be heard. Although broadcast are necessary, too many hosts connected on the same local network can generate excessive broadcast traffic and slow down the network. Security: they can separate and protect certain groups of computers where confidential information resides. Routers can also hide the addresses of internal computers from the outside world to help prevent attacks, and control who can get into or out of the local network. Locations: they can be used to interconnect local networks at various locations of an organization that are geographically separated. Logical Grouping: they can be used to logically group users, such as departments within a company, who have common need or for access to resources.
How does the router determine what path to send the message to get to the destination network? Each port, or interface, on a router connects to a different local network. Every router contains a table of all locallyconnected networks and the interfaces that connect to them. These routing tables can also contain information about the routes, or paths, that the router uses to reach other remote networks that are not locally attached. When a router receives a frame, it decodes the frame to get to the packet containing the destination IP address. It matches the address of the destination to all of the networks that are contained in the routing table. If the destination network address is in the table, the router encapsulates the packet in a new frame in order to send it out. It forwards the new frame out of the interface associated with the path, to the destination network. The process of forwarding the packets toward their destination network is called routing. Router interfaces do not forward messages that are addressed to the local network broadcast IP address. As a result, local network broadcasts are not sent across routers to other local networks.
It is important that the correct default gateway be configured on each host on the local network. If no default gateway is configured in the host TCP/IP settings, or if the wrong default gateway is specified, messages addressed to hosts on remote networks cannot be delivered.
A router forwards a frame to one of two places: a directly connected network containing the actual destination host, or to another router on the path to reach the destination host. When a router encapsulates the frame to forward it out of an Ethernet interface, it must include a destination MAC address. This is the MAC address of the actual destination host, if the destination host is part of a network locally connected to the router. If the router must forward the packet to another router, it will use the MAC address of the connected router. Routers obtain these MAC addresses from ARP tables. Each router interface is part of the local network to which it is attached and maintains its own ARP table for that network. The ARP tables contain the MAC addresses and IP addresses of all of the individual hosts on that network.
Disadvantages: All hosts are in one broadcast domain which causes more traffic on the segment and may slow network performance
Placing Hosts in Remote Network Segments Advantages: More appropriate for larger, more complex networks Splits up broadcast domains and decreases traffic Can improve performance on each segments Can provide increased securiy Can improve network organization
Disadvantages: Requires the use of routing (distribution layer) Route can slow traffic between segments More complexity and expense (requires router)
Reliability and uptime expectations Connectivity requirements including, wired and wireless
Information Gathering Number and type of hosts Where are the end users located? What type of hardware are they using? Where are the servers, printers and other network devices located? Applications What type of applications are running on the network? Data and devices to be shared Who requires access to which files and network resources such as printers? Bandwidth requirements (speed) What is an acceptable speed for the end users? Do all users require the same throughput? What affect will the applications have on the throughput? Security Is the data being moved on the network of a personal or sensitive nature? Could unauthorized access to this information cause harm to anyone? Reliability How important is the network? Does it need to be available 100% of the time (this is known as uptime)? How much down time can be tolerated? Requirement for wireless Do any or all of the end users require wireless connectivity? There are many considerations that must be taken into account when planning for a network installation. The logical and physical topology maps of the network need to be designed and documented before the networking equipment is purchased and the hosts are connected. Some things to consider include: Physical environment where the network will be installed: Temperature control: all devices have specific ranges of temperature and humidity requirements for proper operation Availability and placement of power outlets
Physical configuration of the network: Physical location of devices such as routers, switches, and hosts How all devices are interconnected Location and length of all cable runs Hardware configuration of end devices such as hosts and servers
Logical configuration of the network: Location and size of broadcast and collision domains IP addressing scheme Naming scheme Sharing configuration Permissions
3.6.2 Prototypes
Once the network requirements are documented, and the physical and logical topology maps created, the next step in the implementation process is to test the network design. One of the ways to test a network design is to create a working model, or prototype, of the network. Prototyping is essential as networks grow in size and complexity. A prototype allows a network administrator to test whether or not the planned network will operate as expected, before money is spent on equipment and installation. Documentation should be maintained on all aspects of the prototyping process. Prototyping is the process of putting togrther a working model to test design aspects, demonstrate features, and gather feedback. Prototyping can help reduce project risk and cost. Various tools and techniques are available for network prototyping; this includes real equipment set up in a lab environment, modeling and simulation tools. Packet Tracer is one example of a simulation and modeling tool that can be used for prototyping.
Front View
The Linksys is a simplified, low-cost device that carries out the functionality of multiple network devices (switch, router, wireless access point). Light emitting diodes (LED) indicate the connection status of each port. LED Descriprions: Power LED indicates the presence of power to the device; solid green LED WLAN LED indicates status of wireless connections 1-4 LEDs indicates status of the Internet connection Internet LED indicates status of the Internet connection
Color Status of LEDs: Green indicates a connection is made with an end device Red or Yellow usually indicates a problem with the connection Blinking indicates activity on the port
Rear View
When connecting a local network using a multifunction device it is important that all local devices are connected to the switch ports. 1. Internet Port: a single port that is connected to the router portion of the multifunction device. Tgis is used to connect the device to another network such as the Internet. The router portion of a multifunction device maintains routing tables. There is an internal connection from the routing portion of the multifuncion device to the switch portion. The Internet port is connected to a different network than the Ethernet ports. 2. Ethernet Ports: multile ports that are connected to the internal switch portion of the multifunction device. These are usually labeled Ethernet. All devices connected to the switch ports are on the same local network. There is also an internal connection form the switch port to the router port (Internet Port).
All devices connected to the switch ports should be in the same broadcast domain. This means that all devices must have an IP address from the same network. Any device that has a different network portion within the IP address will not be able to communicate. Additionally, Microsoft Windows makes use of computer names to identify other devices on the network. It is important to use these names as well as all IP address information in the planning and documentation to assist in future troubleshooting. To display the current IP configuration in Microsoft Windows, use the command ipconfig. More detailed information, including host name, is available with the ipconfig /all. Document all information from the connection and configuration process. Once hosts are communicating across the network, it is important to document network performance. This is known as determining the baseline for the network, and is used as an indication of normal operations. When comparing future network performance with the baseline, it can indicate if possible issues exist. Baseline is a quantitative expression of planned costs, schedules, and technical requirements for a defined project. A baseline is established to describe the normal status of network or computer system performance. The status can then be compared with the baseline at any point to resume the variation from the normal operation condition.
When a user accesses a file on a remote device, Windows Explorer allows the user to map a drive to a remote folder or resource. This maps a specific drive letter, for example M:, to the remote resource. This enables the user to treat the resource as though it was locally connected.