AVU Data Communication & Networking Course
AVU Data Communication & Networking Course
BY L. CHINYAMA
Table of Contents
Preface 1
Chapter 1 2
Computer Networks 2
Advantages of networking 2
The concept of networking 2
Network Types 3
Local Area Network 3
Metropolitan Area Network 3
Wide Area Network 3
Network Categories 3
Peer-to-peer 3
Server – based 3
Chapter 2 6
Network Topologies 6
The Bus Topology 6
Star Topology 8
Ring Topology 9
Mesh Topology 10
Hybrid Topologies 11
The Star bus Topology 11
The Star ring Topology 11
Chapter 3 12
Media Access Methods 12
CSMA/CD (Carrier-Sense Multiple Access With Collision Detection) 12
CSMA/CA (Carrier-Sense Multiple Access With Collision Avoidance) 13
Token Passing 13
Demand Priority 13
Chapter 4 14
Network Architecture 14
Ethernet and IEEE 802.3 15
Fast Ethernet (IEEE 802.3u 16
Gigabit Ethernet (IEEE 802.3z and 802.3ab) 18
Wireless (IEEE 802.11) 19
100VG-AnyLAN (IEEE 802.12) 19
Token Ring (IEEE 802.5) 20
Other Network Standards 20
Fibre Distributed Data Interface (FDDI) 20
Apple LocalTalk 20
Chapter 5 21
Transmission Media 211
Thinnet (Thin Ethernet) 222
Thicknet (Thick Ethernet) 24
Unshielded Twisted Pair (UTP) 25
Shielded Twisted Pair (STP) 25
Wiring Standards for Twisted Pair cables 28
T-568A Standard 30
T-568B Standard 31
Fiber Optic Cable 36
Chapter 6 43
Signal Transmission 43
Baseband Transmission 43
Broadband Transmission 43
Chapter 7 44
Wireless Media 44
Infrared 45
Laser 45
Radio 45
Chapter 8 46
Network Adapter Cards 46
NIC Performance 49
NIC speed 49
Network Adapter Card addresses 50
How ARP resolves media access control addresses for local traffic 51
How ARP resolves media access control addresses for remote traffic 52
ARP Cache 53
Plug and Play (PnP) Technology 53
Chapter 9 54
Network Operating Systems 54
Interoperatibility 54
Chapter 10 55
The OSI (Open System interconnection) model 55
How the layers interact 60
Chapter 11 61
Protocols 61
Protocol Suite or stack 61
TCP Well-Known Ports 65
Registered Ports 65
Chapter 13 86
Ethernet Frame 86
Chapter 14 88
Switching Methods 88
Packet switching 88
Circuit switching 89
Message switching 90
Chapter 15 91
Internet Protocol (IP) Addresses 91
Subnet Mask 92
IP Address Classes 92
IP Address Rules 93
Finding the Network ID 94
Determining the Maximum number of hosts per subnet 95
Subnetting 96
Chapter 16 105
DHCP Server 105
Using multiple DHCP servers 106
How a Client Computer obtains an IP Address from A DHCP server 107
DHCP Lease Renewal 108
Chapter 17 109
Network Management 109
Account Management 109
Performance Management 110
Security Management 111
Fault Management 111
Configuration Management 113
Network Management Tools 114
Hardware 114
Digital Voltmeter (DVM 114
Data Communications and Networking Copyright © 2005, African Virtual University iii
Oscilloscope 114
Advanced Cable Testers 114
Time Domain Reflectometer (TDR) 114
Protocol Analyser 115
Software 116
Simple Network Management Protocol (SNMP) 116
Chapter 18 117
WAN Transmission 117
T1 118
Switched 56 118
Packet- switched Networks 118
X.25 119
ISDN (Integrated Service Digital Network) 122
Frame Relay 123
ATM (Asynchronous Transfer Mode) 123
Glossary 125
There is a lot of literature on Data Communications and Networking in the form of books
and on the Internet. A search on the Internet will present to you a lot of sites and tutorials,
some with indispensable information. However, the numerous literatures on broad a
subject, coupled with newer technologies being introduced by some vendors, tend to
create a lot of confusion; especially for beginners. This book clears all the confusion and
presents the subject in a straightforward and explicit way, giving valuable information
and detailed explanations. It also dispels the fears that most people have concerning this
subject.
Advantages of Networking
• It allows online communication (sending messages back and forth), e.g. email
communication, and video conferencing where virtual meetings can take place
between users in different locations
• It also allows scheduling. Scheduling is the act of setting dates for events,
activities and appointments so that every member of the organization is made
aware of upcoming events. Most scheduling utilities use an electronic calendar
and flash messages to users as a reminder of upcoming events.
At its most elementary level, a network consists of two computers connected to each
other by some communication medium so that they could share resources. All networking
no matter how sophisticated arose from this simple system.
This is a network that covers an entire city by interconnecting multiple LANs within a
city. It is larger than a LAN but smaller than a WAN.
This is a network covering a large geographical area such as across cities, states and
continents. This is accomplished by connecting different LANs using services such as
dedicated leased phone lines, dial-up phone lines (both synchronous and asynchronous),
satellite links, and data packet carrier services.
Network categories
Peer-to-Peer
Server – based
Each user has control over all their resources and decides how these resources get shared.
Security in a peer to peer is share-level. This means that a password is set on each shared
resource. Any user knowing the password can access the resource.
Peer-to-peer networks are good choices for the needs of small organizations where
the users are located in the same general area such as a small office, and where
security is not a major concern and where the projected future growth of the
network is limited.
Operating systems such as Microsoft Windows NT workstation, Windows 9x, etc, have
inbuilt peer-to-peer networking capabilities (no additional software is required to setup a
peer-to-peer networks when using them).
The servers are usually located in a separate room away from the client computers. Only
the Administrator and some authorized users have access to this location. This ensures
physical security of the servers and keeps the curious users from tempering with the
servers. Each user should give authentication information (identify yourself and verify
that you are authorized to use the network) by supplying a valid username and password
combination to connect to the network, and this logon determines access to shared
resources. This type of security where a username and password combination is required
to log on is called user-level security or Access permissions. User-level security is a more
extensive security model and provides a higher level of control over access to resources.
Specialised Servers
As the network increases in size and traffic, more than one server will be required on the
network to accommodate the expanding needs of users. Some tasks such as e-mail,
application serving and database can be resource-intensive. Each of these tasks often
requires its own server to provide acceptable performance. Spreading the load among
many servers ensures that each task is performed in the most efficient manner possible.
The different types of dedicated servers include the following:
• File and print server. It manages user access and the use of file and printer
resources.
• Application server. It provides user access to application programs.
• Mail server. It manages electronic messaging among network users.
Combination Networks
A combination network is one that combines peer-to-peer networking and server based
networking. This gives the users the benefit of both peer-to-peer and server based
networks in one network. In this type of network there are dedicated servers running
server operating systems, allowing client computers to access resources from them. The
workstations or client computers are running the client operating systems, and can still
share resources among themselves as in a peer-to-peer network.
Network Topologies
• Bus
• Star
• Ring
The bus topology is the simplest and most commonly used topology for networking
computers. It is also known as a linear bus because computers are attached or connected
to a single linear cable called a trunk or backbone. Computers on the bus network
communicate by sending packets of data to each other. A computer will send a packet of
data to all computers on the network (broadcast). Each computer listens and examines
every packet on the wire to determine if the packet is intended for it, and accepts only
packets addressed to it. The bus topology is a passive topology because computers on the
network are not actively involved in the movement of data. On an active topology
computers regenerate the data signals and pass the signals to the next computer on the
network. The number of computers on the network affects network performance.
Performance degrades as more computers are added to the bus network.
Fig 2-1
Because the electrical signal representing the data is broadcast to all computers on a bus
network, it will travel from one end of the cable to the other. If the signal is allowed to
continue uninterrupted, it would keep bouncing back and forth along the cable and
prevents other computers from putting data on the transmission medium. A terminator,
which is a resistor placed at each end of the cable provides electrical resistance to ensure
that network traffic does not echo back through network and be received again by the
computers when it reaches the end of the cable. One of the terminators should be
grounded by attaching a conductor such as a wire to a position of zero electrical potential.
Advantages
Disadvantages
Fig 2-2
Advantages
• Network expansion and reconfiguration are relatively simple. For instance, new
computers can be easily added to the network.
• Failure of one computer does not affect the rest of the network.
• Each computer is attached by its own cable segment to the central hub, which
makes it easy to isolate individual computers from the network by disconnecting
them from the wiring hub.
• Network management and monitoring can be centralized because all data goes
through a central device, which can be equipped with diagnostic features that
make it easy to troubleshoot network problems. For instance, a hub or switch may
also have extra features like LEDs that indicate activity and errors on each port,
making it even easier to isolate problems. Intelligent hubs can track network
activity such as the number of packets transferred and the occurrence of errors
within the packet.
• Can accommodate different wiring.
Disadvantages
• Uses a large amount of cable because each computer must have a separate cable
run from the central device.
• If the central device fails, the entire network fails.
On a ring topology, computers are connected one node to the other by a single cable
forming a circle. Computers on the ring network use a signal called a token to carry the
data from one computer to the other. The access method used by the computers to put
data on the communication medium is called token passing. Unlike the bus topology, the
ring topology is an active topology. Each computer on the ring acts as a repeater to boost
the signal and pass it to the next computer until it reaches the destination computer. The
receiving computer strips the data from the token and returns the token to the sending
computer with an acknowledgment. After verification, the token is regenerated and
release for use by any other computer requiring data transfer. While the token is in use by
one computer, other computers on the ring cannot transmit, because only the computer
with the token can transmit data. This ensures that there are no collisions and hence no
times spend waiting for computers to resend data after a collision.
Fig 2-3
Advantages
• All computers have equal access to data. During peak usage performance is even
for all users. Ring networks perform well with heavy network traffic.
• Each computer acts as a repeater and as a result there is little signal degradation.
Disadvantages
Apart from the three primary topologies, we also have the mesh topology. The mesh
topology connects each computer to every other computer on the network (each computer
has a point-to-point connection to every other computer on the network). Meshes use a
significantly larger amount of network cabling than the other network topologies, which
makes it more expensive. Every computer has multiple possible connection paths to the
other computers on the network for redundancy. As a result, a single cable break will not
stop network communications between any two computers.
Fig 2-4
The total number of connections required can be calculated using the following formula:
Advantage
• Reliability is increased because there are alternative routes by which data can be
transmitted in the event of one of the links failing.
Disadvantages
These are topologies made by combining the three primary topologies. Examples are the
Star-Bus and the Star-Ring topologies.
The Star-Bus
It is a combination of the bus and the star topologies. It consists of several star topology
networks linked together by a linear bus trunk.
The Star-Ring
The Star-Ring is a combination of the ring and star topologies. It is sometimes called a
star-wired ring. It contains a main hub that has a logical ring configuration internally. The
main hub is connected to other hubs that can have computers connected to them.
A network’s topology affects its capabilities. The choice of topology determines the
following:
Media access method refers to the manner in which a computer gains access to the
physical transmission medium. There are three access methods that are used by
computers to put data on the network cable:
• Token Passing
• Demand Priority
With Carrier Sense Multiple Access with Collision Detection (CSMA/CD), each
computer intending to send data to another computer on the network must first ‘sense’ or
check the network cable for traffic. If there is data on the cable, no computer can transmit
until the data has reached its destination and the cable is free of data. If there is no traffic
a computer can put data on the network cable. But there is a possibility that two or more
computers might have checked the cable at the same time and found it to be free. These
computers will go ahead and put data on the network cable, and a data collision occurs.
The computers involved in the collision enter a back-off phase in which they are given
random wait periods before they can attempt to retransmit again. This is necessary to
clear the collision or resolve the contention and makes sure that the computers will
attempt to access the network cable at different times when they start retransmission.
Although chances of collisions occurring are relatively small, collisions do take place and
cause network interruption each time they occur. CSMA/CD is a probabilistic method
because it is not always certain that data packets are delivered to their destination with no
collisions taking place. This method is also known as a contention method because
computers compete for the opportunity to send data.
Token Passing
It is the access method used on the ring topology. With Token Passing, a computer that
intends to send data has to get hold of the token first. When the computer is in possession
of the token, it adds the data to be send in the appropriate field on the token. It then
passes the token to the next computer, which will also pass the token on until it reaches
the destination computer. The destination computer strips the data from the token and
returns the token to the sending computer with an acknowledgement. The sending
computer releases the token for use by other computers after receiving the
acknowledgement. While the token is in use by one computer, no other computer can
transmit data, because a computer has to be in possession of the token for it to be able to
send data.
Demand Priority
It is a relatively new access method designed for a specific network type called 100VG-
AnyLAN that uses a smart hub to handle multiple transmission requests from computers
on the network. Stations must request permission from the hub before they can transmit.
Transmissions can be prioritized (e.g. time sensitive traffic such as video traffic is given
first priority). If a computer intends to transmit, it signals the hub. Such a signal is called
a demand. The hub returns a signal giving permission to transmit a packet of data.
When multiple computers intend to transmit, the hub cycles through each of the
requesting computers. The highest priority request is serviced first. If the requests are of
the same priority, the requests are serviced by alternating among them in a round-robin
fashion. Computers that have not signaled to the hub that they intend to transmit are
skipped and do not take part in the transmission cycle.
Network Architecture
It is a set of rules and design principles that specify the way in which media, hardware
and software are integrated to form a network.
The Institute for Electronic and Electrical Engineers (IEEE) created the 802 committee in
1980 to draft standards for local area networks (LANs). Within the 802 committee are
many sub-committees, each responsible for developing standards for specific LAN types
or managing a specific aspect of a LAN type. Some of the sub-committees and their
associated LAN types are as follows:
802.1: Spanning Tree standard for bridges used to interconnect similar LANs based on
the OSI Model.
802.3: Carrier Sense Multiple Access with Collision Detection (CSMA/CD). Bus
Network (Ethernet).
Ethernet is the de facto standard for Local Area Networks. It was originally developed by
Xerox Corporation in conjunction with Intel and Digital Equipment Corporation in the
1970’s. In 1980, when the IEEE Local Area Network committee was established to
standardize Local Area Networks, the IEEE 802.3 subcommittee adopted Ethernet and is
now responsible for the administration of Ethernet and IEEE 802.3. Ethernet and IEEE
802.3 are slightly different although they are supported together and used
interchangeably, Ethernet does not totally comply with the 802.2 standard.
The major difference between them exists in the data link layer, which is defined by
IEEE 802.2. IEEE 802.2 divides the data link layer into the Media Access Control
(MAC) sub-layer and the Logical Link Control (LLC) sub-layer. Ethernet does not divide
the data link layer or offer LLC services such as flow control.
The differences between IEEE 802.3 and Ethernet do not hinder hardware manufactures
because IEEE 802.3 and Ethernet both support MAC addresses and the same physical
layer. All networks that use Ethernet/IEEE 802.3(including IEEE802.3u, 802.3z and
802.3ab) use CSMA/CD as the access method.
The Ethernet/IEEE 802.3 standard defines a LAN that operates at 10Mbps using
baseband or broadband signal. This standard uses coaxial, twisted pair, or fibre optic, as
shown in the table above
It is a faster version of the IEEE 802.3. It was originally developed by vendors such as
3Com, Cabletron, Digital and Intel. The IEEE 802.3u is responsible for fast Ethernet.
Fast Ethernet defines a LAN that operates at 100Mbps using baseband signal. Vendors
support Ethernet 100BaseX cards that use both 10Mbps and 100Mbps data rates. This
standard uses either twisted pair or fibre optic cable as shown in table 4-2.
Gigabit Ethernet is the fastest 802.3 LAN technology and is used primarily for network
backbones. The gigabit Ethernet standard transfers data at 1000 Mbps using CSMA/CD
as the access method. The two types of gigabit Ethernet are IEEE 802.3z and 802.3ab.
The 802.3z standard is specified for copper wire and fibre optic cables. The 802.3ab
standard specifies gigabit Ethernet over Category 5 UTP cable.
The original version of the IEEE 802.11 released in 1997 specifies two data rates of
1Mbps and 2Mbps.The other versions offer better data transmission rates and
communication distances. For instance the 802.11b operates at 11Mbps across a
maximum range of 50-300 feet from each other. A wireless network uses a device called
a Wireless Access Point (sometimes referred to as a transceiver) to connect computers on
a cabled network to computer that are not connected by cables within a defined network
area. The Wireless Access Point allows the sending and receiving of signals between
cabled computers and those that are not connected by cables. The computers that are not
connected by cables are each equipped with a wireless Network Interface Card (NIC) and
an aerial or antenna for sending and receiving signals. A Wireless Access point has at
least one fixed Ethernet port to allow the wireless network to be bridged to a traditional
wired Ethernet network, allowing wireless and wired devices to coexist on the same
network.
The 100VG-AnyLAN proposal was originally developed by AT&T and HP, and is
managed by the IEEE 802.12 committee. It was developed to transport both Ethernet and
token ring frames. IEEE 802.12 is usually referred to as 100VG-AnyLAN. IT uses the
demand priority access method.100VG-AnyLAN can use many different cables (hence
the term “AnyLAN”), each with its own maximum segment length as shown in table 4-4.
100VG-AnyLAN Media
The token Ring network is specified in the IEEE 802.5 definition. IBM initially
developed token ring for its mainframe environment. The IEEE 802.5 standard complies
with the original IBM development. The standard uses data rates of 4Mbps and
16Mbps.It uses the token passing access method.
These are standards that are not included with the IEEE LAN standards. These standards
are either proprietary or standardized by other organizations. They are:
Apple LocalTalk
Media is the means by which signals travel from one network device to another. The
main categories of transmission media used in data communications networks are listed
below:
• Coaxial
• Twisted pair
• Fibre optics
• Wireless
Media can generally be classified as guided (e.g. copper and fibre) and unguided
(wireless) media. The media is responsible for carrying the signal in a network.
In guided communication media, the signal(s) are confined to the medium and do not
leave it (except for small leakage amounts), whereas in unguided communication media
the signal moves freely in the atmosphere.
Coaxial cable
Coaxial cable is more resistant to interference and attenuation than twisted pair cables.
Attenuation is the loss of signal strength, which takes place as the signal propagates along
the cable due to the resistance of the wire to signal flow. After traveling a certain distance
(which is different for each type of cable), the signal gets so weak that it can be wrongly
interpreted at the receiver end.
It is a flexible and easy to bend cable, being 0.25 inches in diameter. The IEEE
specification refers to this type of cable as 10Base2, referring to its main specification of
10 Mbps data rate, using baseband transmission and 185m (nearly 200m) maximum
segment length. It is also known as cheapernet because it is cheaper than the other types
of Ethernet cables. The cable between computers must be at least 0.5 metres (20 inches)
long. Networks that use this type of cable can support a maximum of 30 nodes per 185m-
cable segment. The 5-4-3 rule of thinnet allows for 5 cable segments of 185metres each,
connected using 4 repeaters, but only 3 of the segments can have some nodes attached.
The 5 cable segments allow the network to cover a total distance of 925m with a total of
90 nodes on the three segments that can take some nodes. Networks that use thinnet have
the cable connected to network adapter cards, hubs and other networking devices using
BNC connectors (British Naval connector or Bayonet –Concelman connector). Thinnet
coaxial cable can carry a signal to a distance of 185m before the signal suffers from
attenuation. Thinnet cable is classified in a group referred to as the RG-58 family and has
50-ohm impedance. Impedance is the resistance in ohms that the wire presents to
alternating current flow.
Cable Description
RG-58/U Solid copper wire core, 50 ohms. It is a thinnet cable used in 10Base2
Ethernet networks
RG-6 Larger in diameter and rated for higher frequencies than RG-59,
but used for broadband transmission as well. It can handle the full
Thicknet cable is also known as Standard Ethernet. It is a relatively rigid type of coaxial
cable, being 0.5 inches in diameter. IEEE specification refers to this type of cable as
10Base5, referring to its main specification of 10 Mbps data rate, using baseband
transmission, and 500m maximum segment length. Thicknet is generally used to provide
the network backbone. It has a thicker core than that of thinnet. The thicker the copper
core, the further the cable can carry the signal. This means that thicknet can carry signals
further than thinnet. Thicknet can carry a signal to a distance of 500m before the signal
suffers from attenuation. Therefore each thicknet cable segment should be up to 500m.To
transmit the signal further than 500m, a device known as a repeater is required.
When using thicknet, connection to the network adapter card is made using a device
known as an Attachment Unit Interface (AUI). The AUI connects to the thicknet cable
using a vampire tap, so called because it clamps onto the cable. The minimum cable
length between connections is 2.5 meters. It can support up to 100 nodes per segment
.The 5-4-3 rule applies to thicknet as well, giving a total length of 2500m and a total of
300 nodes supported. The Attachement Unit Interface connector is also referred to as a
DB15 connector. Because thicknet is a thicker cable, it is more difficult to work with. It
does not bend easily and is more expensive than thinnet cable. The major advantage of
thicknet over thinnet is that it can carry the signal further than what thinnet can do. The
outer covering or jacket for both thicknet and thinnet is made of pvc (polyvinyl chloride)
or Teflon.
Large networks often combine thicknet and thinnet cables. Thicknet cable is used for the
backbone to connect smaller thinnet-based networks because of its ability to support data
transfer over longer distances than thinnet. For instance on a star bus topology thicknet
forms the backbone while thinnet forms the branching segments that plug into repeaters
or hubs and connect to the computers.
In its simplest form, a twisted pair cable consists of a pair of insulated copper wires that
are twisted around each other and enclosed in a protective sheath called the outer jacket.
A number of twisted pairs are often grouped together and enclosed by the outer jacket.
The actual number of wire pairs in a twisted pair cable varies. Each pair is colour-coded
to differentiate it from the other pairs. There are two types of twisted pair cables:
The wires are twisted around each other to cancel out electrical noise (crosstalk) between
one pair and the other and to reduce electromagnetic interference (EMI) from external
sources. There are standards governing how many twists are required per foot of cable.
Fig 5-4 STP Cable Showing the Wire Pairs and the Shielding
When LANS were initially developed, STP cabling was primarily used. However, a
large degree of twists in UTP cables has the effect of canceling out EMI. This makes
UTP cable suitable for LAN connections despite the lack of a shielding. UTP cable is
also preferred for LAN connections because it is considerably less expensive than STP.
Twisted pair cable is now replacing coaxial cable.
UTP cable is rated by category according to its use and data transmission speed as shown
in table 5-2.
Category Description
The main limiting factor of twisted pair cables is the distance the signal can travel before
attenuation. This limitation is caused by a phenomenon known as the skin effect:
Current flowing in a wire tends to flow only on the outside surface of the wire, thus
using less of the available cross sectional area. This has the effect of increasing the
electrical resistance of the wire, which in turn causes the attenuation of the signal
after a short distance.
To increase the cable length beyond 100m, the 100m cable segments can be joined
together using repeaters.
Twisted pair cables use an RJ-45 telephone connector at each end of the cable to connect
to computers and Network devices. The RJ-45 connector takes 8 wires. It looks like the
RJ-11 telephone connector, but the RJ-45 is slightly larger than the RJ-11 connector and
it will not fit into the RJ-11 telephone jack (slot). The RJ-11 connector only takes 4 wires
whereas the RJ-45 takes 8 wires.
The EIA / TIA define two standards for wiring: The T-568A and the T-568B standards.
Cat 5 UTP cable is the de facto standard for LAN connections. It has 4 pairs of wires but
only two pairs are used. The orange pair is used for transmitting data (balanced
transmitter) and the green pair is used for receiving data (balanced receiver). The other
pairs are unused. A balanced line driver or transmitter is at one end of one of these lines
and a line receiver is at the other end.
Twisted-pair Ethernet employs two principle means for combating noise. The first is the
use of balanced transmitters and receivers. A signal pulse actually consists of two
simultaneous pulses relative to ground: A negative pulse on one line and a positive pulse
on the other. The receiver detects the total difference between these two pulses. Since a
pulse of noise (shown in red in the diagram) affects the two wires in a similar way,
effectively, it will not distort the desired signal. In other words, it will not affect the
difference in potential between the two wires. Also, the magnetic field surrounding one
wire from a signal pulse is a mirror of the one on the other wire. At a very short distance
from the two wires the magnetic fields are opposite and have a tendency to cancel the
effect of each other out.
The T-568A and T-568B standards only differ in pin assignment for the two pairs that
handle data. The pin assignments for the unused pairs are exactly the same for the two
standards.
White/Green
1 RX data +
Green
2 RX data -
White/Orange
3 TX data +
Blue
4 Unused
White/Blue
5 Unused
Fig 5-6
Orange
6 TX data - RJ-45 Connector pin-Numbering
And The T-568A wiring Standard
White/Brown
7 Unused
Brown
8 Unused
1 White/Orange TX data +
2 Orange TX data -
3 White/Green RX data +
4 Blue Unused
5 White/Blue Unused
6 Green RX data -
Fig 5-7
7 White/Brown Unused
RJ-45 Connector Pin-Numbering
8 Brown Unused And The T-568B wiring Standard
(Viewed with clip down and pins facing up)
NB. Odd pin numbers are striped while even pin numbers have solid coloured wires.
The T-568B standard is the most widely used for straight-through cables. A straight
through cable has identical ends. There is no functional difference which standard you
use for straight through cable, although the T-568B seems to be popular. Straight-through
cables are used for the following connections:
Crossover Cables
To make a crossover cable, wire one end using the T-568A and the other end using the T-
568B. You should use a crossover cable to connect units with identical interfaces. If you
use a straight through cable, one of the two units must, in effect perform the crossover
function. Crossover cables are used for the following connections:
• Switch to switch
• Hub to Hub
• Router to Router
• PC to PC
4) At this point,
recheck the wiring
sequence with the
diagram.
5) Optional: Make a
mark on the wires
at 1/2" from the end
of the cable jacket.
6) Hold the grouped 9) Push
(and sorted) wires moderately
together tightly, hard to
between the thumb, assure that
and the forefinger. all of the
wires have
7) Cut all of the reached the
wires at a perfect end of the
90-degree angle connector.
from the cable at Be sure that
1/2" from the end the cable
of the cable jacket. jacket goes
This is a very into the
critical step. If the back of the
The RJ-45 plugs are normally made for either solid conductors or stranded
conductors. It is very important to be sure that the plug that you use matches
the conductor type. It is extremely difficult to tell the difference between the
two by looking at them. When you buy these plugs, be sure to categorize, and
store them carefully. Using the wrong type can cause intermittent problems.
Some RJ-45, 8 Conductor Plugs that are sold are rated for both Solid and
Stranded cable.
Ordinarily, it would be taboo to untwist the pairs of any category 5 cable. The
one exception to this rule is when crimping on RJ-45 plugs. It would be
impossible to insert the wires into the channels without first untwisting and
straightening them. Be sure not to extend the un-twisting, past the skin point.
If you do it properly, you will wind up with no more than 1/2" of untwisted
conductors (up to 1/2" of untwist meets the CAT5 specification)
If the completed assembly does not pass continuity, you may have a problem
in one, or both ends. First try giving each end another crimp. If that does not
work, then carefully examine each end. Are the wires in the proper order? Do
all of the wires fully extend to the end of the connector? Are all of the pins
pushed down fully? Cut off the suspected bad connector, and re-terminate it.
If you still have a problem, then repeat the process, this time giving more
scrutiny to the end that was not replaced.
It is good to be prepared to make your own patch cables. There may be many
instances where you may fall short on supply, and making a cable will surely
get you out of a jam. However, there comes a point where the practicality
curve will lead you to factory made cables. Making several cables can be very
labour intense. Factory made cables typically have better tolerances, and
consequently have better quality than field made cables.
b)
Fig 5-10 Structure of a Fibre Optic cable (a), (b) shows different type of Fibre
Cable Available
Fibre optic cable consists of a thin cylinder (the core) of high-purity glass (pure silicon
dioxide) or plastic surrounded by a cladding or insulator. The core is responsible for
carrying the light. Plastic core is easy to install but cannot carry the signal pulse as far as
glass core can do. The purpose of the cladding or insulator is to trap the light inside the
core using a technique known as Total Internal Reflection. The insulator is covered on
top by a protective outer jacket of PVC or Teflon.
In fibre optic cables, digital data is converted to light pulses, usually by light emitting
diodes and appropriate circuit. Data transmission rates vary from 100 Mbps up to
2Gbps.The maximum distance that a signal can be transmitted without a repeater is 2000
metres.
Fibre optic cable acts as a wave-guide allowing light to propagate through it. It uses the
principle of reflection (Total Internal Reflection) for light to propagate through.
Refraction
When a light beam strikes the surface of a material and passes through the material with
its path bend as shown in the figure above, it is said to be refracted. The angle of
incidence ( 1) is the angle at which the light is projected onto the surface of the material.
It is measured from a line drawn perpendicular to the surface of the material. The angle
( 2) at which the light leaves the material is known as the angle of refraction.
When light is launched in the fibre optic core at a small angle of incidence ( 1) it is lost
(refracted) through the cladding at an angle ( 2). The relationship between the angle of
incidence ( 1) and the angle of refraction ( 2) is given by Snell’s Law:
(1)
Where n1 is the refractive index of the fibre core and n2 is the refractive index of the
cladding. By analyzing Snell’s Law, conditions could be established under which light
will not be refracted, but reflected:
If the angle of incidence is gradually increased, a point will be reached where light no
longer escape from the core of the cable, but remains in the core and propagates inside
the core. The smallest angle of incidence, at which light is first retained inside the core, is
called the critical angle ( c). At the critical angle, the light will travel horizontally inside
the core (θ2 = 90o). The value of the critical angle is found by rearranging equation (1)
Sin c = n2/n1
Any angle of incidence greater than the critical angle will allow total internal reflection.
All angles are measured with respect to the normal (a line drawn perpendicular to the
core and cladding)
Thus two conditions are required for Total Internal Reflection to take place in the fibre
core:
i) The refractive index of the core (n1) should be greater than that of the cladding (n2).
Typical values are1.47 for the cladding and 1.5 for the core.
The refractive index is a measure of the ease with which light travels through a material
and is different for different materials.
Fig 5-12 Light Propagating Along the Fibre Core by Total Internal Reflection
LED (Light Emitting Diodes) -LED is commonly used with mono-mode fibre. It is
relatively weak.
ILD (Injection Laser Diodes) – ILD emits a strong, intense, narrowly focused light beam.
It is commonly used with multi-mode fibre, which helps to counteract multi-mode’s
lower performance.
In fibre optic terminology, mode simply means the path that light will follow along the
fibre cable. If there is only one path for light to travel along the fibre, the cable is referred
to as a mono-mode fibre. If there is more than one path, the cable is referred to as multi-
mode fibre.
In mono-mode fibre, the core has a very small diameter typically 8-12µm. With this
exceedingly small core diameter, light entering the fibre will be restricted to travel along
one path and in a straight line. Mono-mode fibre has the advantage of lower modal
dispersion and can be used over longer distances without repeaters. Mono-mode fibre is
faster than multi-mode fibre because there is no separation of the light beam, which
causes the light pulses to arrive at the end of the cable at different times in multi-mode
fibre. However the exceedingly small core diameter makes the fibre very expensive and
difficult to work with, as a result, the majority of LAN applications use multi-mode fibre.
Multi-mode fibre has a relatively larger core diameter (typically 50µm) than mono-mode
fibre. This allows light to take more than one path when propagating along the core.
Multi-mode fibre has the disadvantage that the beam of light traveling in each mode will
travel a different distance. This is because the higher angle beam bounces from side to
side many more times than the lower angle beam. As a result two beams of light from the
same pulse, entering the fibre at the same time arrive at the end of the fibre separated in
time. This spreading of a pulse due to multiple rays traveling using different paths of
different distances and speed through a fibre is called modal dispersion (sometimes
referred to as Differential Mode Delay DMD)
Index Profile
The index profile is how the refractive index of a fibre optic cable behaves throughout the
cable. There are two types of index profiles:
Step Index
Step index fibre has a central core of uniform refractive index. The core is surrounded by
an insulator or cladding with a uniform refractive index which is less than that of the
central core. Step Index is so called because there is an abrupt change in refractive index
as we move from the cladding to the core of the fibre (the refractive index ‘steps’ up) as
shown below:
Fig 5-15
Graded Index
Graded Index fibre has a core of non-uniform refractive index. In this type of fibre, the
refractive index of the core is highest at the center of the core and gradually decreases
until it matches that of the cladding as we move away from the centre of the core. One
way of improving the operation of multi-mode fibre is to use graded index fibre instead
of step index fibre. The varying refractive index of the core across the diameter forces the
rays to travel a curved path as they move along the fibre. The rays that travel near the
outer edge of the fibre travel faster than those that stay near the middle, so that although
they travel a longer distance, they arrive at the same time. This means that light pulses are
not distorted in the same way that they would be in a step index fibre.
Fig 5-17
Fibre optic cables are unidirectional (light only travels in one direction) so two cables are
used, one for sending and another for receiving.
Signal Transmission
Two techniques are used to transmit data over a cable. These are baseband and broadband
transmissions.
Baseband Transmission
Broadband Transmission
In dual cable broadband, each computer is attached to two cables, one for transmitting
data and the other for receiving data.
The split system uses a single cable, but divides the bandwidth into two channels each
using different frequencies. One channel is used to transmit signals and the other is used
to receive signals. Broadband systems use amplifiers to regenerate the analogue signal at
its original strength.
Wireless Media
A wireless network is not completely free of cabling. It consists of wired devices that
communicate with devices on a traditional cabled network. A device called a wireless
access point (also called a Transceiver) is used to transmit and receive data between the
wireless devices and devices on the cabled network. Each computer in a wireless network
has a network card and an aerial. Wireless network adapter cards do not need to be
physically connected to a network cable, they use the aerial (antenna), which is omni
directional to transmit or receive data. The Wireless Access Point connector has at least
one fixed Ethernet port that connects it to a traditional (cabled Ethernet network) Ethernet
network at one end while receiving signals from wireless devices at the other end as
shown in fig 7-1.
Wireless networks are suitable for people or employees who move around frequently
within their working environments, such as sales people and doctors. For instance,
doctors and medical personnel could use notebook computers connected to a wireless
LAN as they visit patients it their rooms. In other words, a wireless network increases
mobility of the users.
Wireless networks allow users to extend their networks beyond the physical limitations of
cabling
The drawback of wireless LANS is that they do not have the data rate capabilities of
wired networks.
There are four techniques that are used to transmit data in wireless LANS:
Infrared (IR)
Infrared beam is used to transmit data between Devices. Infrared transmissions are
limited to 30m (100 feet). Within this range however, infrared is relatively fast. IR
technology is familiar to many people because of its use in TV and Radio remote control
units. IR is normally a line-of-sight technology, which means there must be no object
obstructing the path of the infrared light between the transmitting and receiving devices.
The need for this unobstructed pathway is a drawback for IR-based wireless
communications. It supports transmission speeds of up to 10Mbps.
Laser
Radio
Data transmission over radio can be implemented using broadcast in two ways:
• Narrowband radio
• Spread Spectrum radio
Narrowband radio is also called single frequency radio. Narrowband radio transmits data
in a similar way to radio stations. A transmitter sends a signal on a specified frequency
and a receiver tuned to that frequency picks up the signal. It can support data
transmissions up to 4.8 Mbps, but can broadcast a signal up to 5 kilometers. It does not
require a line-of-sight. The only important requirement is that both the sender and
receiver must be tuned to the same frequency for them to communicate. When data is
transmitted over narrowband radio, it is easy for an unauthorized listener to intercept the
signals. A more secure and more reliable radio technology originally developed by the
military is called spread spectrum.
Frequency Hopping Spread Spectrum (FHSS) – With FHSS, the transmitter hops from
one frequency to another, and the receiver must know the frequencies, the pattern and the
timing of the hops. This makes it difficult for an unauthorized person to intercept the
signal.
Direct Sequence Spread Spectrum (DSSS) – This technique uses special encoding
method that creates a redundant bit pattern for each bit of transmitted data. This provides
fault tolerance because if some bits are damaged during transmission, the original data
can still be recovered without need for retransmission
Spread Spectrum usually transmits at 250Kbps, but some implementations offer outdoor
transmission rates of 4Mbps.
A network adapter card is an add-in card that contains the circuitry required for
communication over a network. It acts as the physical interface between the computer
and the network cable. It is also called a Network Interface Card (NIC)
It also Control the flow of data between the computer and the cabling system to ensure
that the receiving computer is not overwhelmed by too much incoming data. A
component called a transceiver (Transmitter/Receiver) on the network adapter card
handles incoming data for the computer from the network cable, and output data from the
computer to the network cable.
a) b)
Fig 8-1 Network Adapter Card Types
The network adapter card fits into one of the slots on the computer’s motherboard called
a bus .The network adapter card is attached to the network cable by a connector. The
number of bits that the bus can transfer at a time gives a measure of the bus speed. For
example the older 8-bit buses could move 8-bits of data at a time. Buses were later
designed to handle 16-bits and 32-bits of data. The types of buses in the computer
determine the types of network adapter cards that can be used to connect to the network.
There are several types of buses, as shown in Table 8-1.
Although each network adapter card is designed to meet certain standards, some network
adapter cards provide features that increase the data transmission speed. Table8-2 shows
the features that can improve network adapter card performance.
Feature Description
Shared Adapter Memory Network Adapter cards contain RAM that is shared with
the computer
Shared system Memory The Network Adapter card selects a section of computer
memory used to process data
Bus Mastering The Network Adapter bypasses the CPU and assumes
control of the system bus and loads the data directly into
the system memory without interrupting the CPU. This
method is available only with certain buses that support
it (e.g. PCI)
RAM buffering RAM chips on the Network Adapter card create a buffer
to hold the data overflow. Data overflow occurs when
the Network Adapter card receives more data than it can
transmit to the computer across the bus at one time.
Onboard Microprocessor The Network Adapter card contains a microprocessor so
that it does not rely on the cpu to help data processing
Boot ROMs
Diskless computers boot from a network adapter card that has a special chip called a boot
Rom. This chip contains the boot program that connects the computer to the network
when the computer is switched on.
NIC Speed
Some Network adapter cards can operate at either 10 or 100Mbps and includes an auto-
negotiation capability that lets the adapter sense the speed of the network and adjust to
that speed without human intervention.
Each Network Adapter card has a unique physical address that is hard wired or burned
into its read-only memory (ROM) on the adapter card during the manufacture process.
This address is also called the Media Access Control (MAC) address. It is a 6-byte
address. An example of a MAC address is shown below:
40:8E:0A: 12:34:56
Each byte is separated from the other by a colon. The first three bytes identify the
manufacturer of the adapter card, and the last three bytes represent the unique address of
the adapter card. Authority and registration of media access control addresses are
overseen by the Institute of Electrical and Electronics Engineers (IEEE). Currently, the
IEEE registers and assigns unique numbers for the first three bytes of the media access
control address to individual manufacturers. Each manufacturer can then assign the last
three bytes of the media access control address to individual network adapters. MAC
addresses are called physical addresses as opposed to logical addresses (IP Addresses).
Logical addresses are found at the network layer (layer 3). They are used to send data
between hosts on different networks (remote network). Physical addresses are found at
the data link layer (layer2), and are used to send data between hosts on the same physical
network. In order to use MAC addresses to send data a protocol called Address
Resolution Protocol (ARP) resolves the IP Address of a machine to its MAC address.
Fig 8-2 How ARP Resolves Media Access Control Addresses For Local Traffic
In this example, two TCP/IP hosts, Hosts A and B, are both located on the same physical
network. Host A is assigned the IP address of 10.0.0.99 and Host B is assigned the IP
address of 10.0.0.100.
When Host A tries to communicate with Host B, the following steps resolve Host B's
IP address (10.0.0.100) to Host B's MAC address:
a) Host A checks its own local ARP cache for a matching hardware address (MAC
address) for Host B.
b) If Host A finds no mapping in the cache, it broadcasts an ARP request frame to all
hosts on the local network with the question "What is the MAC address for
10.0.0.100?" Both hardware and software addresses for the source (Host A), are
included in the ARP request.
Each host on the local network receives the ARP request and checks for a match
to its own IP address. If a host does not find a match, it discards the ARP request.
c) Host B determines that the IP address in the ARP request matches its own IP
address and adds a MAC address/IP address mapping for Host A to its local ARP
cache.
d) Host B sends an ARP reply message containing its MAC address directly back to
Host A.
e) When Host A receives the ARP reply message from Host B, it updates its ARP
cache with a MAC/ IP address mapping for Host B.
ARP is also used to forward IP datagrams to local routers for destinations that are not on
the local network. In this situation, ARP resolves the media access control address of a
router interface on the local network. The following illustration shows how ARP resolves
IP addresses to hardware addresses for two hosts on different physical networks
connected by a common router.
Fig 8-3 How ARP Resolves Media Access Control Addresses For Remote Traffic
When Host A tries to communicate with Host B, the following steps resolve Router
interface 1's IP address (10.0.0.1) to its MAC address:
a) Because the data being send by Host A is intended for a computer on a remote
network, IP (Internet Protocol) determines that the forwarding IP address to be
used to reach host B is 10.0.0.1 (the IP address of its default gateway). Host A
then checks its own local ARP cache for a matching hardware address for
10.0.0.1.
b) If Host A finds no mapping in the cache, it broadcasts an ARP request frame to all
hosts on the local network with the question "What is the MAC address for
Each host on the local network receives the ARP request and checks for a match to its
own IP address. If a host does not find a match, it discards the ARP request.
c) The router determines that the IP address in the ARP request matches its own IP
address and adds a hardware/software address mapping for Host A to its local
ARP cache.
d) The router then sends an ARP reply message containing its MAC address directly
back to Host A.
e) When Host A receives the ARP reply message from the router, it updates its ARP
cache with a MAC/IP address mapping for 10.0.0.1.
Once the media access control address for Router interface 1 has been determined,
Host A can send IP traffic to Router interface 1 by addressing it to the Router interface 1
MAC address. The router then forwards the traffic to Host B through the same ARP
process.
ARP Cache
To reduce the number of address requests, a client normally caches resolved addresses for
a short period of time and store them in a part of the computer memory known as a cache.
Machines with ARP caches search their caches before sending a request. By using a
cache, a machine can accommodate new additions to the network dynamically. Without
the ARP cache, the resulting ARP request and replies would generate additional network
traffic, which would impact on network performance.
Most computer hardware (including network adapter cards) can now be automatically
configured on a system using Plug and Play technology. Plug and Play is a mechanism by
which a computer automatically configures hardware devices added to it. It uses the
computer BIOS, Operating System, device drivers and system resources for the automatic
configuration. Each device manufacture is responsible for assigning the PnP ID for each
product and storing it in the hardware. Each Plug and Play device must:
• Be uniquely identified by a Plug and Play device ID number in order to allow the
operating system to recognize the device.
• State the services it provides and resources it requires.
• Identify the driver that support it so that the operating system can load the
appropriate driver and configure it.
After installing a PnP device, it should work when you start up your computer.
Plug and Play eliminates the need to set jumpers, and it also makes
installation of devices quick and easy.
A network operating system (NOS) is system software that controls the network and
allows multiple users to access network resources. A network operating system has all the
features of a stand-alone operating system but offers many more facilities in a complex
environment. Some of the functions of a network operating system include managing
multiple users on the network, providing access to file and print servers and
implementing network security. Examples of Network operating systems are Novell
Netware, Microsoft Windows NT /2000/xp Linux and UNIX.
• Client software
• Server software
The client software is the software that is installed on the client computers. Examples of
client operating systems are Windows 9x, Windows NT workstation, Windows 2000
professional, etc. The client software consists of a component called a redirector that does
the following:
An example of a local request is a request for a directory listing on the local computer
hard drive. A request that cannot be satisfied locally (remote request) can be a request for
a resource on a mapped network drive.
The sever software is the software that is installed on the server. It enables the server to
share its resources such as data, printers, fax machines and disk drives with other
computers on the network. It also allows the level of sharing to be determined to allow
different users different levels of access to shared resources. It also provides the means
for the Network Manager or system administrator to manage users. Some Network
operating systems provide network management tools that enable the administrator to
track network behaviour and performance.
Interoperatibility
It also breaks down the networking process into seven fundamentally different layers.
The breaking down of the networking process into the seven layers makes it easy to
understand the networking process. Each of the seven layers represents a different stage
and type of processing that occurs when data is to be transmitted from one computer to
the other. In other words, each of the seven layers tries to deal with specific aspects of the
networking process.
Data from the sending station Descends through the OSI layers from the Application
layer to the Physical Layer. At each layer the data is formatted using some protocols that
work at that particular layer so that it can be successfully passed on to the next layer.
When the data reaches the target station, it moves up the layers in reverse order until it
reaches the physical layer of the target station. At each layer the formatting information
that was added at the sending station is removed, when the data reaches the application
layer of the receiving station, all the formatting information has been removed and the
data is now in human readable form.
Application Application
Presentation Presentation
Session Session
Transport Transport
Network Network
Physical Physical
Transmission Medium
Fig 10-1 Movement of Data Form the Sending Computer to the Receiving
Computer
Each layer communicates and works with layers immediately above and below it and its
peer layer in the other station as shown in the following diagram:
For example, the data link layer in computer A, communicates with the network and
physical layers of computer A, and the data link layer of computer B
Protocols
A protocol is a set of rules and procedures governing the format of data and the orderly
exchange of data over a network.
The protocol defines how computers identify one another on a network, the form that
data should take in transit, and how the data is processed once it reaches its final
destination.
There are many different protocols that work at the different layers of the OSI reference
model. Each protocol implements the functions of the OSI layer(s) at which it works.
It is a set of protocols that are typically used together at some or all the seven layers of
the OSI reference Model. Examples of protocol stacks are TCP/IP, AppleTalk and IBM’s
Systems Network Architecture (SNA)
TCP/IP is a protocol suite that comprises more than 100 different protocols that work
together to provide a set of network functions at the different layers of the OSI reference
Model. The name TCP/IP is derived from two of its protocols (TCP and IP) although it
comprises many protocols.
In order to come up with this network, there was need for a protocol that was efficient,
reliable, that has low overheads and that is routable. This led to the development of
TCP/IP. Some top minds worked in collaboration in the development of TCP/IP. These
were affiliated with major Universities in the USA.
Reliable.TCP/IP has been in use for more than 20 years and has proven to be a stable and
robust protocol suite. It guarantees the transfer of data packets from one host to
the other by offering failure recovery and the ability to handle high error rates.
Routability. TCP/IP is a routable protocol that allows data to be moved from one
network to the other through different communication paths (routes)
Low Overhead. TCP/IP has minimal amount of extra bits that function as packaging
bits for the data being transmitted.
Each TCP/IP layer corresponds roughly to the functionality of the equivalent layer in the
OSI model. Table 11-1 identifies the relationship between the two. The TCP/IP model is
also referred to as the Department of Defense (DoD) reference model.
OSI TCP/IP
7 Application 4 Application
6 Presentation
5 Session
4 Transport 3 Transport
3 Network 2 Internet
2 Data Link 1 Network Interface
1 Physical
The Transport layer is similar to the OSI transport layer, but with elements of the OSI
session layer functionality. Two protocols found at this layer are TCP and UDP.
The Internet layer is responsible for the routing of data packets across networks. It
corresponds to the Network layer of the OSI model. IP and ARP are both found at the
Internet layer.
The Network Interface layer combines the data link and physical layers of the OSI
reference model. It deals with physical and mechanical specifications for the media and
connectors, as well as electrical specifications for signals and access methods.
The following are some of the core protocols that make up TCP/IP:
Telnet (Terminal Emulation over a Network). It is a protocol that is used for remote login
(allowing remote terminal sessions to be created on one computer from another)
FTP (File Transfer Protocol). It enables the sending and receiving of files from one
TCP/IP host to another.
SMTP (Simple Mail Transfer Protocol). It is used for the transfer of mail messages
(email messages) between Internet hosts.
TCP (Transmission Control Protocol). A connection oriented protocol that guarantees the
delivery of data packets from one station to the other without errors.
UDP (User Datagram Protocol). It is a connectionless protocol (i.e. it does not guarantee
the delivery of data packets). There is no logical connection to be established
during communication when using this protocol. This means no
acknowledgement or handshaking takes place between stations when using this
protocol. As a result, data can be transmitted with some errors. The advantages to
be realized from UDP are that data transmission is faster since no time is wasted
in handshaking and the UDP header is smaller compared to the TCP header. This
implies that UDP has very little overhead compared to TCP
The decision whether to use TCP or UDP lies in the application. Some
applications are designed to use TCP and others are designed to use UDP
Port Numbers
TCP and UDP protocols communicate using ports. A port is a number that an application
uses as a sending and receiving address for data. An applications listens to its appropriate
port so that it can access and process data appropriately. Each port is used by a specific
application or service. Each port number is a 16-bit integer value. A port is assigned a
number between 0 and 65535, which is coded into the TCP or UDP protocol header. TCP
or UDP port numbers between 0 and 1024(ports ranging from 1 to 1023) are the well-
known ports (also called reserved ports). They are the ports to which standard
applications listen for services that a host can provide.
23 Telnet
79 Finger
The IP address, type of port (UDP or TCP) and the application port number are usually
combined into one functional unit called a socket. An example of a socket is as follows:
131.107.2.200:TCP:80
The ICANN does not control registered port numbers, which range from 1024 to 65535
and are considered non-privileged. Therefore, any process can use them.
IPX It performs the functions of the network layer on the OSI reference model, that of
forwarding and routing data packets.
SPX It is a transport layer protocol that is responsible for numbering data packets and
guaranteeing the delivery of the packets to their destination and in sequence.
Although IPX/SPX is owned by Novell, it is also used and supplied with
Microsoft products. Nwlink IPX/SPX is Microsoft’s version of Novell Netware
IPX/SPX.
SNA (Systems Network Architecture) It is IBM’s protocol suite. It was one of the
pioneering protocols. It was developed in the 1960s for the mainframe computers
and the AS400 computers.
AppleTalk It is a set of protocols that perform most of the functions of the seven
layers of the OSI reference model. It was developed by Apple Computer
Company to network its Macintosh computers in the Apple
Network Architecture.
NETBIOS (Network Basic Input/Output System) It is a session layer protocol. It has the
disadvantage that it is non-routable. However, it is very easy to work with.
It was developed by the International Standards Organization (ISO). It has become the
most widely accepted data link protocol. It offers a high level of flexibility, adaptability,
reliability and efficiency of operation for data communication needs. HDLC operates at
the Data link layer of the OSI reference model. It supports both half duplex and full
duplex communication modes in point-to-point networks.
Fig 11-1
The beginning and end of an HDLC frame are marked by flag character sequence
(01111110 in binary or 7E in Hexadecimal delimits the frame)
The header of the HDLC frame consists of the address and control fields. The address
field always contains the address of a secondary station. When the primary station
transmits, it is the receiving secondary station's address, if it is a secondary station
responding, it is its own address. The control field identifies the type of frame and is also
used to control the communication process using commands and responses and sequence
numbers to maintain the flow of data.
The trailer consists of a 16-bit Cyclic Redundancy Check (CRC), which detects any
errors during transmission by allowing integrity of the transmitted frame data to be
checked.
Normal Response Mode (NRM), also known as Synchronous Data Link Control (SDLC)
• Primary station
• Secondary station
• Combined station
A primary station is a station that controls all the other connected stations on the link. It is
also responsible for the organization of data flow on the link
A secondary is a station under the control of the primary station. It has no ability or direct
responsibility for controlling the link. It only sends response frames when requested by
the primary station.
A combined station is a station that incorporates the functions of the primary and
secondary stations. All combined stations are able to send and receive commands and
responses without any permission from any other station on the link.
Data after zero insertion 0111011111011 (zero bit added after five consecutive ones)
At the receiver end, upon seeing five consecutive 1s followed by a zero, the receiver
assumes that the zero was stuffed and removes it. The actual flag pattern is not subject to
bit stuffing so as to distinguish when the flag sequence represents flag information and
when it represents data. Bit stuffing only occurs when the flag sequence is used to
represent data.
The time between frame transmissions is called the inter-frame fill. During the inter-
frame fill, continuous flags are transmitted on the link to keep the link active.
Connectivity device is a general term that refers to the simple and complex devices that
are used to connect cable segments and network segments together.
BNC T– Connector. It connects two cable segments and also offers a connection to the
NIC. If only one cable is to be connected to the BNC T-connector, a terminator must be
connected to the other side of the T-connector.
BNC Barrel Connector. This is a straight cylindrical unit to which a cable attaches at
each end, thus enabling you to join two pieces of cable to extend the total cable length.
Warning. The use of barrel connectors should be kept to a minimum because of signal
loss that can occur at each connection point.
RJ Connectors
RJ (Registered Jack) connectors are so called because they are registered with the Federal
Communication Commission (FCC). The RJ connectors consist of a plug and a
receptacle (also called the Jack).
RJ-11 connectors are used on telephone cables while RJ-45 connectors are used on
computer networks.
Simple connectivity devices merely connect cables and devices, but complex
connectivity devices do a lot more on top of that. Some of the complex connectivity
devices are as follows:
Repeaters
A Repeater works at the physical layer of the OSI reference model. It is the least
expensive and most common device used to extend the length of the network cable by
joining two segments of cables and regenerating or boosting the signal from one segment
before passing it on to the next segment. The two segments to be joined must use the
same media access method, protocol, and transmission technique. For example an 802.3
CSMA/CD (Ethernet) LAN segment cannot be joined to an 802.5 (Token Ring) LAN
segment
However, a repeater does not give any more bandwidth or allow data to be transmitted
faster. In other words, a repeater cannot be used to enlarge a network beyond the
capabilities of its underlying architecture.
Repeaters can connect different physical media, e.g. thinnet and fibre optic. Repeaters
offer no filtering; they send every packet of data from one cable segment to the other
even if the data consists of malformed packets. Broadcast storms also pass through the
repeater from one segment to the other. A broadcast storm is a condition or phenomenon
that occurs in networks when some of the computers on the network send broadcast
packets that flood the whole network causing network overload by saturating the capacity
of the network or bandwidth.
Repeaters also allow isolation of segments in the event of failures or fault conditions.
Disconnecting one side of a repeater effectively isolates the associated segments from the
network. Using repeaters simply allows you to extend your network distance limitations
and to regenerate signals.
Hubs
A hub is a central device through which all network traffic must pass through. There are
two types of hubs:
• Passive Hub
• Active hub
A passive hub only acts as connection points; it does not regenerate the signal. Passive
hubs do not require electrical power to run.
An active hub regenerates and retransmits the signal the same way a repeater does Thus
an active hub can be used to extend the distance that a signal can be transmitted. An
active hub is sometimes referred to as a multiport repeater. An active hub requires
electrical power to run.
Hubs create a physical star network while maintaining a logical bus or ring configuration
internally.
• Many hubs have different ports to accommodate a variety of cabling types, e.g. a
single hub can take coaxial and twisted pair cables.
• Hubs also offer centralized monitoring of network activity and traffic. Many
active hubs contain diagnostic capabilities to indicate whether or not a connection
is working.
Bridges are devices that operate at layer 2 of the OSI reference model. That is why they
are widely referred to as data-link devices. When bridges were introduced in the early
1980’s, they were used to connect two homogeneous LAN segments, that is LAN
segments with identical network architecture (i.e. 802.3 to 802.3 or 802.5 to 802.5).
Nowadays, bridges are available that can connect different networks or LAN segments
using different access methods (for example joining an Ethernet segment to a token ring
segment), and different types of cables. Bridges can perform the same functions as
repeaters, extending the length of a network, but they can also reduce traffic by
segmenting the network based on media access control addresses.
Because bridges operate at the layer 2 of the OSI, they use hardware addresses. A bridge
builds a routing table of computer MAC addresses. It listens to all traffic. Each time a
bridge is presented with a packet, it captures the source address together with the port and
segment on which the computer is connected. In other words, it “learns” which
computers are on which segment and which computer is associated with a particular
address.
NB The address table built by a bridge is called a routing table because it is used to
determine to which side of the bridge the packet should be routed. Don’t confuse this
with the routing table used by a router. A bridge’s routing table uses hardware addresses,
but a router’s routing table is based on higher-level IP addresses.
A bridge filters network traffic based on the media access control (MAC) address of a
packet to determine whether a specific packet belongs on a local segment or another
segment. The action taken by a bridge when it receives a packet depends on which
segments the source and destination nodes are on. When a bridge receives a packet from
a computer on one of the connected segments, it examines the destination address for that
packet. It then determines whether the destination computer resides on the same network
segment by verifying the MAC address from the MAC address table.
• If the destination address is in the routing table and on the other segment, the
bridge forwards the packet to the other segment. In other words, the bridge passes
the packet across the bridge to the other segment.
• If the destination address is not in the routing table, the bridge forwards the packet
to all segments except the source segment (segment on which the source computer
resides).
Bridges can also reduce network traffic by segmenting the network (dividing one network
into segments). This isolates traffic or problems and reduces traffic on both segments,
making more bandwidth available.
Although a bridge can reduce network traffic by segmenting the network traffic based on
media access control addresses, it cannot filter broadcasts. Bridges simply pass on all
broadcast packets (packets with no entry in the MAC address table). If the destination
address of a packet is not in the bridge’s MAC address table, the bridge forwards the
packet to all of the connected nodes, thereby contributing to broadcast storms.
Bridges are slow in operation. There can be some data loss in bridges, and if a data loss
occurs, the lost data cannot be recovered. However, new technology has been developed
in the form of switches and routers that replaced bridges.
i) Transparent Bridge
The traditional bridge (also called transparent bridge) requires little or no setup. The
bridge will automatically initialize itself and configure its own routing information after it
has been enabled. A transparent bridge is intelligent, because it makes all routing
decisions:
Transparent bridges are also known as spanning tree, IEEE 802.1 D. The bridge is said
to be transparent because computers on the network are not aware of its presence (it is
invisible to the computers). Computers on the network just see one large network
without realizing that the network is made up of segments connected by the bridge.
Transparent bridging is found primarily in Ethernet networks.
It is a special type of bridge used on Token Ring networks. It does not maintain a routing
table of its own, but depends on host computer to make routing decisions. Each computer
or device on the network must maintain its own table of all the routes (using hardware
addresses) required for communication with other network computers. To send data, the
source computer must incorporate the routing information in the header of the packet to
be sent. Packets are forwarded using information specified in the packet’s MAC header
as opposed to a path determined by the bridge. The routing information in the packet’s
MAC header lists the hardware addresses needed for the packet to reach its destination.
The source-routing bridge examines this routing information and forwards the packet
according to this information.
This occurs when transparent and source routing bridges coexist. It combines the
algorithms of transparent bridging and source route bridging to enable communication in
mixed Ethernet and Token ring environments.
• Local bridges
• Remote bridges
A Local bridge provides direct connection between multiple LAN segments that are in
the same area (close together).
A remote bridge is used to connect multiple LAN segments that are far apart using
communication links such as leased telephone line/public dial-up lines.
Router
Static routing requires the system Administrator to manually setup and configure the
routing table and to specify each route between networks. Routing information entered
this way does not change. The router does not have the capability of adjusting to changes
in the network (it is not possible to learn new routes). As a result, if a defined route fails
or becomes unavailable the destination becomes unreachable. This technique is simple to
implement and simple to understand, but it becomes difficult to keep routing tables
accurate when the network is growing rapidly and too much work if the network is very
large. It has the advantage of eliminating all traffic related to routing information updates:
Static routing conserves bandwidth because the routers do not generate route update
traffic, which consumes a lot of network bandwidth.
In dynamic routing, routers have the ability to discover the best routes using some
protocols. In a network a link may fail unexpectedly, or a new link may be established. A
dynamic routing protocol discovers these changes and automatically adjusts its routing
table and informs other routers of these changes through the transmission of various
messages, such as the routing update message which consists of all or part of a routing
table. The routers use this information to make packet-by-packet decisions about how to
send data across the network. The protocols facilitate the exchange of routing information
between networks and upgrade routing tables automatically, thus requiring a minimal
amount of setup and configuration. The process of updating routing tables to reflect
changes that have occurred in the network is called convergence.
Some of the protocols that are used for dynamic routing are:
Interior Gateway protocols are those protocols that are used to exchange routing
information within a single Autonomous System (AS). An Autonomous System is a
collection of networks under a single administrative authority (i.e. a single company or
organization) that use a common routing strategy. An autonomous system is also known
as a routing domain. Examples of Interior gateway protocols are: OSPF, RIP, IGRP/
EIGRP.
Exterior gateway protocols (EGPs) are those protocols that are used for inter AS routing
(routing between separate autonomous systems/routing domains), so that each AS may be
aware of how to reach others through the Internet. Examples of exterior gateway
protocols are EGP and BGP.
Routing protocols are also classified as Distance Vector or Link-State according to the
algorithms they use to route data.
Distance Vector routing protocols use distance vector algorithm to calculate the routes for
network traffic. The name distance vector is derived from the fact that routes are
advertised as vectors of distance and direction, where distance is defined in terms of a
metric and direction is defined in terms of the next-hop router. The primary distance
routing algorithm is the Bellman-Ford algorithm Examples of distance vector protocols
are:
• RIP
• IGRP
• Apple Talk’s Routing Table Maintenance Protocol (RTMP)
• DEC’s DNA Phase IV
When an RIP router is initialized, it broadcasts a request for routing table information
from all the neighbouring routers it can see. The routing information that it receives from
the neighouring routers includes, routing metric, and the hop count for each known route.
The information received is then entered into the local routing table and is used by the
router to determine the shortest path to each destination. Once the table is built, the router
sends a RIP broadcast every 30 seconds indicating its known destinations and the cost (in
hops) to get to each.
RIP has slow convergence: It takes a relatively long time for network changes/updates to
be propagated to all routers. This is because RIP sends full table updates instead of
sending only the changes across the network at 30 seconds intervals. This process takes
several minutes for a distant router to be notified of a change across the network.
Because of time delays in transmitting updated routing table information, routing loops
can occur in large networks that use RIP.
Link-State routing protocols use Link-state routing algorithms to route network traffic.
The primary Link-state routing algorithm is the Dijkstra’s algorithm. The major
disadvantage of Link-State protocols is that they require more processing power to
process the routing information (It is compute and memory intensive). They also require
a lot of memory to store Link State Advertisements (LSA) and topological database.
They maintain a complex database on the topology of the network Examples of Link
State protocols are:
• OSPF
• BGP
• EGP
• DEC’s DNA Phase V
• Novell’s Netware Link Service Protocol (NLSP)
OSPF is a link-state routing protocol that uses some algorithm to calculate routes to
destinations. Link state protocols do not just take a route with the least number of hops to
get to the destination. They calculate routes based on line speed, traffic or utilization, and
cost. Link state routing protocols reduce broadcast traffic because the do not send out
periodic full table updates as with distance vector protocols. The only time when link
state protocols exchange full tables or complete copies of their routing tables is upon
initialization. Thereafter route updates contain only the changes not the entire table, and
are only send to routers within the same logical area. If no changes occur, they do not
generate an update. OSPF was developed by the Internet Engineering Task Force (IETF)
as a replacement for RIP. Link-state algorithms are more efficient and create less network
traffic than distance-vector algorithms. OSPF is more sophisticated than RIP and requires
more knowledge and experience to set up and administer.
OSPF can operate within a hierarchy. The largest entity within the hierarchy is the
Autonomous System. An autonomous system can be divided into a number of areas,
or groups of contiguous networks and attached hosts. Routers with multiple
interfaces can participate in multiple areas. These routers, which are called area
border routers, maintain separate topological databases for each area.
OSPF employs two different types of routing, depending on whether the source and
destination are in the same or different areas. Intra-area routing occurs when the
source and destination hosts are in the same area. Inter-area routing occurs when
they are in different areas. An OSPF backbone is responsible for distributing routing
information between areas. It consists of all area border routers, networks not wholly
contained in any area, and their attached routers. Fig 12-3 illustrates this.
In the above diagram, routers 4, 5, 6, 10, 11, and 12 make up the backbone. If
Host H1 in Area 3 wants to send a packet to Host H2 in area 2, the packet is
sent to Router 13, which forwards the packet to Router 12, which sends the
packet to Router 11. Router 11 then forwards the packet along the backbone to
area border Router 10, which sends the packet through two intra-area routers
(Router 9 and Router 7) to be forwarded to Host H2.
Column Description
Network Address (the destination This column represents all the networks
network IP address) that the router knows. These are the
addresses to which a packet arriving at
this router can be send
A default route with address 0.0.0.0 is often called the 'route of last resort'. It is the last
route where a packet of data is send to when a router gets a packet and cannot establish
the network address where the packet should be forwarded. If no default route is defined,
a data packet whose destination network cannot be established is discarded and an ICMP
error message is send to the originator. The Administrator inserts the default route
manually, it is not learned.
If no default route is available, the router drops the packet, and then sends a message to
the sending station indicating that it was unable to forward the packet because the
destination was unreachable.
Brouter
A brouter operates at layer 2 and layer 3 of the OSI reference model. It can function as
either a bridge or a router (it incorporates the functionality of both bridges and routers)
depending on the network transport protocol in use. For instance, a brouter can act like a
router with routable protocols such as TCP/IP and acts as a bridge with non-routable
protocols such as NetBEUI.
A switch is a high-speed packet routing device that enables multiple physical LAN
segments to be connected to form a large single network. Switches operate at much
higher speeds than bridges and can support new functionality such as virtual LANs.
Switches can be categorized according to the OSI layer at which they operate. According
to this, we have layer 2 and layer 3 switches. The difference between layer 2 and layer 3
switching is the type of information inside the frame that is used to determine the output
interface. Layer 2 switches use MAC addresses to determine the output port.
Layer 3 switches use IP addresses to determine the output interface (in layer 3 switching,
frames are switched based on IP address information/ network layer information). Layer
3 switches also support router functionality
Technically speaking, hubs operate using a broadcast model and switches use a virtual
circuit model.
For example, when four computers are connected to a hub, and two of these computers
are communicating with each other, the hub simply pass through all network traffic to
each of the four computers
Unlike hubs, which broadcast messages to all ports regardless of the destination address,
switches use internal address tables to selectively forward frames to only the port
associated with the receiving node. Each port on a switch will receive only packets that
are meant for it.
Fig 12-4 The difference between a hub and a switch in a situation where station A
Transmits data to station B.
There are two kinds of switches-the workgroup switch and the enterprise switch.
The workgroup switch works as described above. It is the direct replacement of the
hub, allowing computers to be directly connected to it and allocating full bandwidth to
the connected computers.
An enterprise switch connects to the network backbone and has no stations directly
connected to it. Hubs, bridges and routers are directly connected to it.
The bandwidth of the enterprise switch should be greater than the combined bandwidth of
the entire network to which it is connected.
At present there are three basic architectures for Data Link Switches:
Cut-through. The frame is forwarded to its destination as soon as the switch has
copied the first 6-bytes following the preamble that make up the destination address
information into the buffer. It then looks up the destination address in its switching
table and forward the frame to the appropriate port. Cut-through provides reduced
latency because it begins to forward the frame after reading the destination address
of the frame. This has the advantage of being very fast, but there is no error
checking - too many frame re-transmissions may slow the network down.
Store-and-forwrad. The entire frame is copied into a buffer and Cyclic Redundancy
Check (FCS) is performed to check for errors before the frame is transmitted to its
destination. If the frame has errors, it is discarded and retransmission is carried out. This
has the advantage of ensuring that bad frames are not transmitted, but is much slower
than the cut-through architecture. If the frame does not contain any errors, the switch
looks up the destination address in its switching table and forwards the frame to the
appropriate port.
Fragment-free. It combines the best of both cut-through and store-and-forward by acting
as a cut-through switch while monitoring the traffic for errors. The switch uses cut-
through until a certain error threshold is reached. It will change over to store and forward
switching when the defined error threshold is reached. The error threshold is normally
configurable. The main disadvantages are that of cost - this type of switch is more
expensive - and the reliance on management setting the correct error threshold.
A switch can allow computers to access full bandwidth on a network: A key problem
associated with LANs is the fact that the bandwidth of the connecting cable is shared
among all workstations connected to the LAN. For instance, in a 10-station 100BaseTX
network, each station (on average) obtains 10Mbps. This means that the available
bandwidth is divided among the stations.
Servers can be connected directly to a switch, allowing network users to utilize the
network’s bandwidth when accessing server resources.
Gateways are more complex than bridges and routers. They are used to connect two
heterogeneous networks (connecting networks using different protocols, data formats
language and architecture). An example is connecting an Apple network to an IBM SNA
network.
A gateway is called a protocol converter because it changes the format of data from one
network to the format used on another network. It stripes old protocol stacks that were
used to format the data on one network and repackages the data with the protocol stack of
the destination network. Gateways can operate at any of the OSI layers.
Often you find the words frame and packet used synonymously, although frames are only
defined at the data link layer of the OSI reference model and packets at the network layer
and above.
The frame structure varies according to the network technology. For example several
flavours of Ethernet, Token ring and FDDI frames exist. The following figure illustrates
the format of an Ethernet frame as defined in the original IEEE 802.3 standard
Preamble
Start Byte
It is a special pattern 10101011 that indicates the start of a frame. It also acts as a signal
to other nodes on the network so that they are made aware that another node has started
transmitting
Destination Address
It identifies the physical address (MAC Address) of the station or stations that are to
receive the frame. If the first bit is a 0, the field specifies a particular station (a single
station) as the destination. If the first bit is a 1, the destination address is a group address
(multicast address) and the frame is send to all stations in the predefined group specified
by the address. If all bits are 1s, the frame is broadcast to all stations on the network.
It identifies the station that send the frame and therefore who to respond to or ask for
more information.
Data Length
It specifies the number of bytes in the combined data and pad fields.
Data field
It contains the actual data being transmitted (the actual data being transmitted is also
referred to as the payload)
The Pad field contains some extra bytes that are added (padded) to the actual data bytes
if the data bytes are less than 46-bytes. This is because the data field must be at least 46
bytes as specified by the IEEE 802.3 standard, and a maximum of 1500 bytes. If it is less
than 46 bytes, then the pad field will make up the difference.
It checks for errors in the transmitted data using a 32-bit Cyclic Redundancy Check
(CRC). This ensures that all data received at the destination has no errors. The receiving
node calculates the CRC value for the incoming data and compares it with the transmitted
value. Any discrepancy between the two values means that data has been corrupted
during transmission, and the receiving station would request for a resend.
Switching Methods
Switching is the process by which packets are received, stored and transmitted to their
destination.
Packet Switching
Packet switching involves dividing data into small manageable units called packets. Each
packet has a destination address, which makes it possible to send individual packets
separately across the network. Packets belonging to the same data may each take different
routes to their destination. When a packet reaches a node, the logic at that node
determines the next node where the packet should go in a route leading to the destination.
Because of the intelligence built at each node (routing strategy or routing algorithm),
dynamic routing of data is possible. The routing strategy looks at factors such as the cost
of a connection from one node to the other and the best route at that time. This ensures
that no routes are congested. Although each packet may travel along a different path, the
packets are ordered and sequenced by protocols when they get to their destination. The
packet size is kept very small so that if there is an error in transmission, a small packet
retransmission will be easier than the retransmission of a large packet. Also, small
packets are held at the node for very short periods of time.
The major disadvantage of packet switching is that each packet requires a copy of control
information (it requires a header field for storing source and destination addresses, etc)
i) Unicast
In unicast packets of data are addresses to a single station. For example, if station A
communicates with station B, the packets exchanged between these two stations are
unicast.
ii) Multicast
In multicast, packets are addressed to a predefined group of stations on a network, but not
necessarily all of the stations on the network.
In broadcast, packets are addressed to all stations on the network. Broadcast offers a way
to communicate the same data to every station on a network at once. All stations receive
the broadcast packets regardless of whether a particular station is interested in the packet.
Circuit Switching
Transmission of data through a circuit switched network takes the following phases of
operation:
Before any data can be transmitted from one station to the other, an end-to-end (station-
to-station virtual circuit) communication path has to be established.
After the establishment of a communication path between the two stations, data is
transferred. The virtual circuit is maintained for the period of data transfer. Generally the
full duplex mode of communication is used.
The link or communication path between the two stations can be disconnected only after
the two stations have finished communicating (circuit disconnection)
The most common example of a circuit switched network is the telephone network,
which is primarily used for voice communication. When a call is made, the switching
equipment in the Telephone Exchange establishes a circuit or logical connection between
the caller and the answerer. The circuit is maintained for the duration of the call. The
major advantage of circuit switching is that data from one station to the other does not
contain the additional formatting bits and flow control information. As a result data
immediately appears in the same form at the destination.
• Both stations must be available at the same time for the data transfer to take place.
• During data transfer the communication path setup between the two stations is
entirely dedicated to those two stations. It cannot be used for communication by
other stations on the network. It will only be available to other stations when the
two stations have finished communicating and have broken down the
communication path (circuit disconnection)
• Simultaneous availability of the sender and receiver is not required, since the
network can store the message pending the availability of the receiver.
• Higher priority messages experiences less delay than the lower priority messages
Each TCP/IP host is identified by a logical IP address. The IP address is a network layer
address and has no dependence on the data link layer address (such as a MAC address of
a network interface card). A unique IP address is required for each host and network
component that communicates using TCP/IP.
The IP address identifies a system’s location on the network in the same way a street
address identifies a house on a city block. Just as a street address must identify a unique
residence, an IP address must be globally unique and have a uniform format.
Each IP address includes a network ID and a host ID.
• The network ID (also known as a network address) identifies the computers that are
located on the same physical network bounded by IP routers. All computers on the
same physical network must have the same network ID. The network ID must be
unique to the internetwork.
• The host ID (also known as a host address) identifies a workstation, server, router, or
other TCP/IP host within a network. The address for each host must be unique to the
network ID.
An IP address is 32 bits long. Rather than working with 32 bits at a time, it is a common
practice to segment the 32 bits of the IP address into four 8-bit fields called octets. Each
octet is converted to a decimal number (the Base 10 numbering system) in the range 0-
255 and separated by a period (a dot). This format is called the dotted decimal notation.
Table 15-1 shows an example of an IP address in binary and dotted decimal formats.
Table 15-1 Binary and Dotted Decimal Forms of an IP Address
Binary Format Dotted Decimal Notation
11000000.10101000.00000011.00011000 192.168.3.24
A subnet mask also called a net mask is a 32-bit binary number (similar to an IP Address)
used to distinguish the network and the host portions of an IP address. It can also be
expressed in the dotted decimal notation as shown in table 15-2
IP Address Classes
IP Addresses are divided into five classes: A, B, C, D and E. The following table shows
the characteristics of each IP address class.
Loopback Addresses
Any address staring with 127 is a loop back address and should never be assigned to a
machine. It is used for testing TCP/IP configuration. The loopback address is typically
127.0.0.1
Broadcast Addresses
Reserved IP Addresses
Certain addresses have been set aside and reserved for private use only. Routers will not
route data from these addresses. They are for internal private use only. If you would like
to use TCP/IP on your internal network (intranet) and not use the Internet, you can use
the private addresses. The private addresses are as follows:
IP Address 192.20.16.5
It is easy to determine the Network ID and the Host ID for a given IP address when using
the default subnet masks. All you have to remember is that the octets in the subnet mask
which have all their bits set to 1 points to the portion of the IP Address that represent the
Network ID. The zero octets (octets with all their bits set to zero, in the subnet mask),
point to the portion of the IP Address representing the Host ID.
These are class C IP Addresses, but one cannot tell whether the two addresses are on the
same subnet or not without a subnet mask. If the two IP Addresses are using a subnet
mask of 255.255.255.0, the two IP Addresses are located on different subnets (192.20.1
and 192.20.6 respectively).
Two host addresses are subtracted because there are two invalid addresses:
• The host bits cannot be all zeros, because when the host bits are all zeros, the IP
Address will refer to the network and not any of the hosts.
• The host bits cannot be all ones. When the host bits are all ones, the IP address
becomes a broadcast address. Hence, such an IP Address will not identify a
particular host, but send packets to all computers on the network.
IP 15.6.100.1
The Host ID is 100.1. It has two octets, which means there are 16-bits representing the
host since each octet will have 8-bits. Therefore the maximum number of hosts is:
216 – 2
n = 16
= 65536 – 2
= 65534 hosts
In order to create some subnets, we need to borrow bits from the host portion of an IP
Address.
Example 1
IP Address 129.20.5.6
There are 16-bits representing the host. In order to create at least 5 subnets, we should
first determine the number of bits to be borrowed from the host portion of the IP Address.
The number of subnetting bits to be borrowed is determined by the formula:
To create at least 5 subnets, the value of n should be 3.This means that we need 3
subnetting bits. Therefore the subnet mask changes
1 129.20.32 10000001.00010100.00100000
2 129.20.64 10000001.00010100.01000000
3 129.20.96 10000001.00010100.01100000
4 129.20.128 10000001.00010100.10000000
5 129.20.160 10000001.00010100.10100000
6 129.20.192 10000001.00010100.11000000
To determine the range for each subnet, we keep those octets, which are not changing as
we move from one subnet to the other (i.e. 129.20). We then consider the remaining
octets, starting from the octet that contains the subnetting bits to any other octet that
follows (if any), as we move from Right to Left.
The address range for the first subnet is from 129.20.a.b to 129.20.c.d
a.b and c.d are of the form: 001xxxxx.xxxxxxxx (x means the value can be a 1 or a 0)
Therefore the subnet 129.20.32 will have IP Address range from 129.20.32.1 through
129.20.63.254
Similarly, for the second subnet (129.20.64) we keep those octets, which are not
changing (129.20).
The address range for the second subnet is from 129.20.a.b to 129.20.c.d
a.b and c.d are of the form: 010xxxxx.xxxxxxxx (x means the value can be a 1 or a 0)
NB. Never change the value of any of the three subnetting bits in calculating the
max. and min. values
Therefore the subnet 129.20.64 will have IP Address range from 129.20.64.1 through
129.20.95.254
The address 129.20.95.255 will be the broadcast address for this subnet (address with all
host bits set to 1).
a.b and c.d are of the form: 011xxxxx.xxxxxxxx (x means the value can be a 1 or a 0)
Again the values of the subnetting bits are not changed in determining max. and
min. values
Therefore the subnet 129.20.96 will have IP Address range from 129.20.96.1 through
129.20.127.254
The address 129.20.127.255 will be the broadcast address for this subnet (address with all
host bits set to 1).
Note that each subnet does not use all the available IP addresses for its range, because an
IP address that contains all binary zeros for the host portion would represent the network
address, and an IP address that contains all binary ones for the host portion is interpreted
as a subnet-direct broadcast.
Example 2
Consider the network 210.199.10.0. A class C network (class C default subnet mask is
255.255.255.0). In order to create six subnets we proceed as follows:
2n – 2 ≥ 6
To determine the subnets that are created, you take the decimal value of the lowest order
subnetting bits. In this case it is 25 = 32. This means that subnets to be created will differ
by 32 as follows:
1 210.199.10.32 11010100.11000111.00001010.00100000
2 210.199.10.64 11010100.11000111.00001010.01000000
3 210.199.10.96 11010100.11000111.00001010.01100000
4 210.199.10.128 11010100.11000111.00001010.10000000
5 210.199.10.160 11010100.11000111.00001010.10100000
6 210.199.10.192 11010100.11000111.00001010.11000000
Data Communications and Networking Copyright © 2005, African Virtual University 100
To determine the range for each subnet, we keep those octets, which are not changing as
we move from one subnet to the other (i.e. 210.199.10). We then consider the remaining
octets, starting from the octet that contains the subnetting bits to any other octet that
follows (if any), as we move from Right to Left.
The address range for the first subnet is from 210.199.10.a to 210.199.10.b
Therefore the subnet 210.199.10.32 will have IP Address range from 210.199.10.33
through 210.199.10.62
The address 210.199.10.63 will be the broadcast address for this subnet (address with all
host bits set to 1).
Similarly, for the second subnet (210.199.10.64) we keep those octets, which are not
changing (210.199.10). The subnet ranges from 210.199.10.a to 210.199.10.b
NB. Never change the value of any of the three subnetting bits in calculating the
max. and min. values
Therefore the subnet 210.199.10.64 will have IP Address range from 210.199.10.65
through 210.199.10.94
The address 210.199.10.95 will be the broadcast address for this subnet (address with all
host bits set to 1).
Data Communications and Networking Copyright © 2005, African Virtual University 101
For the third octet:
Again the values of the subnetting bits are not changed in determining max. and
min. values
Therefore the subnet 210.199.10.96 will have IP Address range from 210.199.10.97
through 210.199.10.126
The address 210.199.10.127 will be the broadcast address for this subnet (address with all
host bits set to 1).
Table 15-7
Data Communications and Networking Copyright © 2005, African Virtual University 102
Note that each subnet does not use all the available IP addresses for its range, because an
IP address that contains all binary zeros for the host portion would represent the network
address, and an IP address that contains all binary ones for the host portion is interpreted
as a subnet-direct broadcast.
Example 3
Consider the subnet mask 255.128.0.0 this can be written in binary as:
11111111.10000000.00000000.00000000
It cannot be used for subnetting because there is only one bit available for subnetting. We
need at least two bits for subnetting.
Example 4
197.129.59.0
Solution
i) 2n – 2 >= 62
2n >= 64
Therefore n = 6
Data Communications and Networking Copyright © 2005, African Virtual University 103
To calculate the number of hosts per subnet, we need to find the new subnet mask that
includes the subnetting bits (custom subnet mask). The default class C subnet mask is
255.255.255.0
If we now add the 6 subnetting bits the new subnet mask in binary is as follows:
This custom subnet mask clearly shows that there are two bits remaining for the host
(the bits which are zero)
Number of hosts per subnet is given by 2n –2. The value of n = 2, which gives us 2 hosts
per subnet.
In big networks, subnetting is generally recommended. Big networks with computers that
are geographically disperse or even Local Area networks, are usually divided into subnets
(smaller networks) that can be connected together by routers.
• It permits a mix of network technologies e.g. the Ethernet (Bus) and Ring can be
connected.
• It reduces network congestion because broadcasts and local network traffic are
limited to the local subnets.
• It simplifies management because it is easier to identify and isolate network
problems in a group of smaller networks connected together than within one big
network.
• It allows many computers to be networked than can be put on one network. For
example, by subnetting, more computers can be networked than those that can be
put on a single Bus network
Data Communications and Networking Copyright © 2005, African Virtual University 104
16
DHCP server
DHCP stands for Dynamic Host Configuration Protocol. A DHCP server is a computer
configured with the DHCP protocol so as to automatically assign TCP/IP addresses to
client computers along with the correct subnet mask, default gateway, and DNS server.
Each TCP/IP host on a network must be allocated a valid and unique IP Address, either
automatically (using a DHCP sever) or manually (using static addresses). When
configuring a DHCP server, remember to give the server a static IP address. There are
three ways in which IP addresses are grouped for use and allocated by a DHCP server.
These are as follows:
Scope. A scope is a range of IP Addresses that a DHCP server can assign to the clients
that are on one subnet
Superscope. It is a range of IP Addresses that span several subnets. The DHCP server
can assign these addresses to clients that are on several subnets.
When setting up a DHCP server the lease duration should also be defined. The lease
duration is the period of time that a computer is given an IP address by the DHCP server.
When using a DHCP server, IP Addresses are leased instead of permanently assigned to
computers. As a result, in a DHCP environment, an IP Address is not a permanent
property of a computer.
Data Communications and Networking Copyright © 2005, African Virtual University 105
A DHCP client is a computer that obtains IP information automatically from a DHCP
server.
It is possible to have more than one DHCP server on a subnet. If there is more than one
DHCP server on a subnet, you can not control which DHCP server gives a client an IP
address. Any DHCP server that receives a client’s DHCP request broadcast can send a
DHCP offer to that client. It is up to the client to take-up an offer from one DHCP server
and ignores other offers.
When using more than one DHCP server, you must ensure that no IP Addresses are
duplicated on the DHCP servers. If Addresses are duplicated on the DHCP servers, an IP
Address can potentially be leased to two DHCP clients at the same, thereby creating
some conflicts.
For instance, if you have two DHCP servers on your subnet, you could split the IP
Address range as follows:
Data Communications and Networking Copyright © 2005, African Virtual University 106
How a Client Computer Obtains an IP Address from A DHCP Server
There are four stages that a client computer goes through in order to obtain an IP Address
fro a DHCP server:
Stage 1
When a DHCP client is switched on, it broadcast a request for an IP Address lease from
the available DHCP server(s). The broadcast packet is referred to as a DHCPDISCOVER
packet.
The discover packet contains the hardware address or MAC address and name of the
client computer requiring IP address information.
Stage 2
All DHCP server(s) that receive the IP lease request respond to the DHCP client request
with an IP offer by sending a DHCPOFFER packet (each DHCP server sends its own
DHCPOFFER)
A DHCPOFFER packet is a proposal from the DHCP server to the DHCP client. It
contains an IP Address that can be used by the client, a subnet mask, a lease period (in
hours) and the IP Address of the DHCP server offering the proposal.
Stage 3
The DHCP client selects an offer from one of the DHCP servers and broadcast a
DHCPREQUEST packet containing the IP Address of the of the DHCP server it selected
to obtain IP Information from. The DHCPREQUEST is broadcasted so that the DHCP
servers whose offers were not accepted withdraw or pull-back their IP address offers.
Once the chosen DHCP server receives the DHCPREQUEST packet from the client, it
updates its DHCP database and marks the address it has given to the client as leased.
Stage 4
The DHCP server selected by the client responds with an acknowledgement packet
known as a DHCPACK.
Data Communications and Networking Copyright © 2005, African Virtual University 107
DHCP Lease Renewal
The DHCP client automatically attempts to renew its IP address lease when 50% of the
lease period has expired. To do that, the DHCP client sends a DHCPREQUEST packet
directly to the DHCP server from which it obtained the lease. A DHCPNACK (DHCP
Negative Acknowledgement) is send to the DHCP client if the lease can be renewed. If
the lease cannot be renewed by the DHCP server, the DHCP client should start the lease
process again with a DHCPDISCOVER packet to obtain another IP address when the
lease expires.
If the lease renewal was successful, the DHCP server responds by sending a DHCPACK
directly to the DHCP client that requires the lease renewal.
A DHCP client can be forced to renew its lease before 50% of the lease period has
expired by the ipconfig/renew command in windows.
Data Communications and Networking Copyright © 2005, African Virtual University 108
17
Network Management
Network management is the execution of a set of functions that are required to provide
high-quality and reliable communication on a network.
• Account Management
• Performance management
• Configuration management
• Security Management
• Fault management
Account Management
Account Management involves creating and maintaining user accounts and providing
appropriate access to resources.
The Network Administrator is responsible for creating user accounts. A user account is
composed of a username, password and appropriate permissions to access resources. It is
a good idea to implement passwords with a minimum length. The system should be
configured to maintain a history of passwords already used, and force users to
periodically create new, unique passwords. Furthermore the administrator should
configure the system to lock accounts if an incorrect password is entered several times.
Users should be advised not to use obvious passwords such as the date of birth, and social
security numbers. The Administrator can put user accounts into groups. Groups are used
to logically organize users with similar resource requirements. This makes it easy for the
administrator to treat a large number of accounts as one account. For instance, if there are
100 users in a group, the administrator can simply send a message to the group and all the
members of the group would get the message. Members of a group automatically inherit
the permissions and Rights set for the group. The administrator can also disable and
delete user accounts if necessary. The administrator can also decide on the type of profile
the users would have after logging on the network. The administrator can allow users to
have a uniform profile or can allow individuals to create their own profiles.
Data Communications and Networking Copyright © 2005, African Virtual University 109
Performance Management
By carefully monitoring and analyzing the activities of the network, bottlenecks could
be identified and eliminated. A bottleneck is a system device that is slowing down
network performance. Some of the devices that can become bottlenecks are as
follows:
• The processor
• Network interface cards
• Physical memory
• Disk controllers
• Data transmission media
Data Communications and Networking Copyright © 2005, African Virtual University 110
Security Management
It is the process of controlling access to network resources according to user rights and
privileges. This may include setting up access lists in routers (creating firewalls to keep
intruders out). It is also essential to implement security within the organization to make
sure right people have access to resources. Without these security measures in place, you
might find someone destroying your valuable data, or selling your company secretes to
your competitors or someone invading the privacy of others. Primarily a security plan
must identify which user in the organization can see which data and perform which
activities on the network.
Many operating systems include some utilities that are used to ensure network security.
For example, Windows 2000 server includes tools or utilities that support the ability to
define a corporate-wide default security configuration for user accounts and audit
policies. Audit policies are policies that track the activities of users and record selected
types of events in the security log of the server or workstation.
Infrastructure components (hubs, switches and routers) should be kept in secure places
where only administrators and technical staff have access.
Fault Management
It is the duty of the system administrator to protect company data from being lost due to
site disasters or power outages. Most fault management systems are able to detect, log,
notify and automatically fix some of the problems so as to keep the network running.
Some of the failure recovery strategies that can be put in place are as follows:
A UPS is a device that keeps computers running (servers and clients) after a power
failure, providing power from batteries for a short period of time. The UPS can keep a
server running in the event of a power failure long enough for users to log off and the
administrator to perform a clean shutdown of the system. However, a UPS cannot be used
to guard against server disk failures.
A backup system should be in place. For example, a tape backup system could be used so
that when the hard disk on the server fails or develops some problems, data can safely be
retrieved from the backup tape.
Backup should be planned so that it can be carried out on a daily basis, weekly basis, or
monthly basis. Never consider off-site storage as an option, it should be a mandatory part
of the backup process. Disaster strike when you least expect it. An unexpected fire could
wipe out your company data. Floods, earthquakes and other disasters can strike at any
moment.
Data Communications and Networking Copyright © 2005, African Virtual University 111
It is unlikely that a disaster could simultaneously strike two places at the same time.
Placing your data in more than one location helps to reduce the probability of data loss by
disasters.
To avoid data loss due to disk failure in servers, some fault-tolerant disk configurations
can be used. These are the RAID-1 and RAID-5 configurations. RAID stands for
Redundant Array of Inexpensive Disks.
RAID-1 (Mirroring)
Mirroring is the use of two separate disks in a single computer such as a server. One
physical disk is known as the primary drive and the other is the secondary drive. Data
written to the primary drive is mirrored (copied) to the secondary. Mirrored disks provide
fault-tolerance in that if one drive in the mirror set fails, the other continues to work
without an interruption in the service or loss of data.
Disk Duplexing
Disk Duplexing is a form of Disk mirroring where each of the mirrored drives uses a
separate controller. The use of separate controllers instead of one protects against
controller failure. Thus disk duplexing protects against controller failure as well as disk
failure. The main disadvantage of mirrored disks is high overhead. The same data is
written to two hard drives. For example to implement a mirror of a 4 GB drive, you need
two 4GB disks (a total of 8GB of storage space)
RAID-5 is a method of combining space on separate disks so as to have one large storage
space as well as providing data recovery if one of the disks in the set fails. RAID-5
requires a minimum of 3 disks in the striped set. Data and parity information are
distributed across all disks in the array. If a single drive in the striped set fails, the parity
information stored on the other drives can be used to regenerate or rebuild the data on a
new disk that replaces the failed disk.
Data Communications and Networking Copyright © 2005, African Virtual University 112
Configuration Management
Data Communications and Networking Copyright © 2005, African Virtual University 113
Network Management Tools
Hardware
It is the most basic, all-purpose electronic measuring tool. In skillful hands, it can reveal
far more than just the amount of voltage or current passing through a wire. It can be used
to check for continuity in network cables and to check the resistance of terminators.
Continuity checks can reveal shorts or breaks in cables.
Oscilloscope
An oscilloscope is an electronic instrument that measures the amount of signal levels and
displays the signals on a screen. It can also detects shorts and open circuits.
Advanced cable testers not only display information on the physical condition of the
cable. They can also provide information on message frame counts, excess collisions, late
collisions, error frame count, and congestion errors.
It is used to check for breaks and shorts in cables. Just as any other components in a
system, cables can also develop problems. Yet unlike equipment that can be examined,
pulled apart, or replaced, cables often stretch for longer distances. It is usually difficult,
time consuming, and costly to locate a cable problem. Imagine pulling out meters of
cable or digging up cables that are buried underground to locate a break somewhere in
the cable. Fortunately, there is a way to identify the location of a cable problem working
from one end of the cable only, without needless exploration. This technique is called
Time Domain Reflectometry
The principle behind TDR is that any imperfection in a cable: a short between
conductors, an open or a low resistance between conductors acts as a partial mirror to
some of the energy or signal send through the cable. Some of the transmitted energy will
be reflected back to the transmitter by the discontinuity, instead of continuing to the
intended receiver. By carefully measuring the time between sending and receiving the
reflected signal, the distance to the fault can be calculated, since the propagation factor of
a given type of cable is known.
Data Communications and Networking Copyright © 2005, African Virtual University 114
The time between transmitting a signal and receiving the reflected signal is divided by
half to find the one-way time. The one-way time is then multiplied by the propagation
factor to find the distance to the fault.
Protocol Analyser
A protocol Analyser can be hardware or software tool used to analyse data packets
passing through a network and display their contents. It captures the data packets, and
once captured the data packets can be analysed in real time or in recorded time. The
actual data can be extracted from the formatting information and closely studied to
identify the cause of the problem. It can also identify bottlenecks, protocol problems and
malfunctioning network components. Most protocol analysers support several network
protocols, such as TCP/IP and IPX/SPX
The software version of this tool is known as the Network Monitor. It comes with
operating systems like Windows NT and Windows 2000. It is a scaled-down version that
can capture data between the host computer on which it is running and the other
computers on the network. Network monitor software has two components:
One component is installed on the server, and the other component is installed on the
client machines. The client component is required because it puts the network adapter
card into promiscuous mode, in which the card will accept packets not addressed to it
(obviously a requirement to monitor overall network traffic)
Network monitor basically allocates a lot of RAM to use as a buffer. It captures every
packet it encounters on a particular NIC to the buffer, gathering statistical data.
Data Communications and Networking Copyright © 2005, African Virtual University 115
Software
• SNMP Manager
• SNMP Agent
• Management Information Base (MIB)
The SNMP Manager is a computer or station that has the SNMP management software
installed. The management software sends queries to the device that are being managed
(devices running the SNMP Agent)
The SNMP agent is part of the SNMP protocol, which are programs that run in Key
Network components such as:
• Hubs
• NICs
• Routers and Bridges
• Other specialized equipment
When the SNMP Agent is running, it records information about the device on which it is
executing or running. On demand, it returns the information when requested by the
SNMP Manager.
The MIB is a database on which the agent records information pertaining to the device on
which it is executing.
The SNMP Manager (a central Management program) is used to poll the agents and
download the information stored in MIBs. The information is presented in the form of
graphs, maps and charts that can give information about the behaviour of the network.
Data Communications and Networking Copyright © 2005, African Virtual University 116
18
WAN Transmission
WANs are composed of geographically dispersed LANs that are interconnected. Some of
the technologies used for connecting LANs include the following:
• Analog
• Digital
• Packet switching
• ISDN (Integrated Services Digital Network)
• Frame Relay
• ATM (asynchronous Transfer Mode)
The reason why digital lines are preferred to analog lines is that they provide reliable
transmissions. Digital lines are available in several forms including DDS, T1, T3, T4, and
switched 56.
Digital Data Services (DDS) can be used to implement digital connectivity. It is faster
and offers more secure transmission environment than analog lines. DDS provides point-
to-point synchronous communications at the following data rates:
• 2.4Kbps
• 4.8Kbps
• 56 Kbps.
DDS uses digital communication and does not require modems.
Data Communications and Networking Copyright © 2005, African Virtual University 117
T1
It is a digital leased line that uses two-wire pairs (one for sending and the other for
receiving) to transmit data using full duplex mode. It is a point-to-point transmission
technology (used for transmissions between two fixed points) A T1 line operates at
1.544Mbps. It is used to transmit digital voice, video and data signals. A T1 line can be
split into a total of 24 separate channels called Fractional T1 (FT1). Each of these
channels can operate at 64Kbps.Subscribers who do not need or cannot afford the cost of
an entire T1 can subscribe to one or more T1 channels. A T1 line is known as an E1 line
in Europe.
NB. T1 services are not available in all countries.
T3
It is similar to T1, but T3 has an even higher capacity. A T3 line can transmit at up to
45Mbps. A T3 line is made up of 672channels each at 64Kbps (Fractional T3). T3 and
Fractional T3 leased lines provide voice, video and data services from 6Mbps to
45Mbps.They are the highest capacity leased lines available today. They are used for
point-to-point transmissions.
Switched 56
Because packet technology is fast, convenient and reliable, it is used in transmitting data
over wide areas such as between cities, states, or countries. Data is broken down into
packets and each packet can be switched or routed separately since it contains all the
necessary information required to send it.
Data Communications and Networking Copyright © 2005, African Virtual University 118
X.25 Packet Switched Network (PSN)
Data Terminal Equipment (DTE). It is a device that acts as the data source or sink (a
device that can send or receive data).DTEs are usually terminals, personal computers or
hosts that are connected as end systems.
Data Communication Equipment (DCE). It is a device that establishes, maintains and
terminates a connection between stations and also provides the necessary signal
conversion required for data transmission over a communication link. DCEs are
communication devices such as modems and packet switches.
Packet Switching Exchange (PSE). These are switches that make up the bulk of the
carrier’s network. They transfer data from one DTE device to another through the X.25
packet switched Network (PSN)
Data Communications and Networking Copyright © 2005, African Virtual University 119
The X.25 packet switched network uses the following protocols to perform the functions
of the first three layers (bottom three layers) of the OSI reference model.
Packet-Layer Protocol (PLP). PLP is the X.25 network layer protocol. It maps to the
Network layer of the OSI reference model. It manages packet exchange between DTE
devices across virtual circuits. PLP operates in 5 distinct modes:
i) Call setup. This mode is used to establish switched virtual circuits between DTE
devices. It is used only with switched virtual circuits (SVCs), not with Permanent Virtual
Circuits (PVCs). The call setup mode is executed on a per-virtual circuit basis, which
means that one virtual circuit can be in call setup mode while another is in a different
mode.
ii) Data transfer mode. This mode is used for transferring data between two DTE devices
across a virtual circuit. In this mode, PLP handles segmentation and reassembly, error
and flow control. Again, this mode is executed on a per-virtual circuit basis and is used
with PVCs and SVCs.
iii) Idle mode. It is used when a virtual circuit is established but no data transfer is taking
place. It is executed on a Per-virtual circuit basis and is used only with SVCs.
iv) Clearing mode. It is used to end communication sessions between DTE devices and to
terminate SVCs. This mode is executed on a per-virtual circuit basis and is used only
with SVCs.
Data Communications and Networking Copyright © 2005, African Virtual University 120
X.21 bis
It is a physical layer protocol used in the X.25 packet switched network. It defines the
electrical and mechanical specifications that are required to transmit data on the physical
medium. It supports point-to-point connections.
The PAD is a device commonly found in the X.25 packet switched network. It is usually
located between a DTE device and a DCE device. A PAD performs three primary
functions:
SVCs are temporary connections that are established for the period of data transfer and
broken down after the data transfer.
PVCs are permanently established connections used for frequent and consistent data
transfer.
Data Communications and Networking Copyright © 2005, African Virtual University 121
ISDN (Integrated Service Digital Network)
It is a dial-up connection designed to provide voice, video and data transmission services
on digital telephone networks. Because it is a dial-up connection, it is used when needed
and released when communication is complete.
Channel Types
• The bearer (B) channel carries voice, video and data information. A ‘B’ channels
operates at 64kbps.
• The delta (D) channel carries control and signaling information. The ‘D’ channel
speed is 16kbps for BRI ISDN and 64kbps for PRI ISDN.
Service Types
• Basic Rate Interface (BRI). Basic Rate ISDN uses three channels. Two ‘B’
channels to carry the digital data and one D channel that manages the link using
signaling information at 16Kbps.Basic Rate ISDN is therefore referred to as 2B +
D. Basic Rate ISDN can therefore provide a maximum data rate of 128 Kbps.
This means a computer using Basic Rate ISDN can use both channels together for
a combined 128Kbps data rate. If compression is supported, much higher
throughput can be achieved. Sometimes the D channel is used to carry data as
well, though this option is only now being offered within vendors’ products.
Data Communications and Networking Copyright © 2005, African Virtual University 122
Frame Relay
Frame Relay networks are gaining popularity because they are much faster than other
switching networks. This is because Frame Relay uses Permanent Virtual Circuits (PVC)
that gives permanent virtual pathways for WAN connection (an end-to-end permanent
virtual path). As a result there is no need for Frame Relay devices to perform
fragmentation and reassembly or to provide best-path routing.
Frame Relay networks can also provide subscribers with bandwidth as needed
(bandwidth on demand), which allows nearly any type of transmissions. Frame Relay
technology requires a Frame Relay capable router or bridge.
Data Communications and Networking Copyright © 2005, African Virtual University 123
ATM can theoretically offer transfer rates of up to 1.2 Gbps, but most commercial
hardware currently operate at 155Mbps.ATM can be implemented with any type of
media (coaxial, twisted pair or fibre-optic). To reach the maximum speeds, fibre media
should be used. ‘Asynchronous’ refers to the characteristic of ATM in which
transmission time slots do not occur at the same intervals, but are at irregular intervals.
The biggest disadvantage of using ATM right now is that it is still relatively new and,
therefore is much more expensive than other solutions. As the technology becomes more
accepted, the cost will decrease. The ATM network requires ATM compatible devices
such as routers and bridges.
Data Communications and Networking Copyright © 2005, African Virtual University 124
Glossary
Access control list (Acronym: ACL). A list that contains information about the users
and groups that have predefined permissions to some resources.
Access control. The mechanism for limiting access to certain resources based on users’
identity and their membership in various predefined groups.
Backbone. It is a generic term used to refer to the main cable in a network that
interconnects a number of computer segments or subnets.
Bandwidth.
Bit-Error Rate (BER). The fraction of data bits transmitted that are received in error.
Cross talk. The unwanted coupling of electromagnetic signals from one communications
cable to another as on a telephone line.
Daemon: A program that is usually initiated at startup and runs in the background and
can be called to start other processes or services. It waits and listens in the
background until summoned by another process.
Data Communications and Networking Copyright © 2005, African Virtual University 125
Glossary
Default route: A route that is used when no other routes for the destination are found in
the routing table. For example, if a router or end system cannot find a
Network route or host route for the destination, the default route is used.
The default route is used to simplify the configuration of end systems or
routers. For IP routing tables, the default route is the route with the
network destination of 0.0.0.0 and net mask of 0.0.0.0
gateway. The address of the router’s interface that is used to forward packets
not destined for the local network.
Fibre core. The centre of the optical fibre through which light is transmitted.
Flow control. Synchronizing the sender and receiver so that data is transmitted only as
fast as the receiver can handle.
Data Communications and Networking Copyright © 2005, African Virtual University 126
Glossary
Internet. It is a system of linked networks that are worldwide in scope and facilitate data
communication services such as remote login, file transfer, electronic mail, the World
Wide Web and newsgroups. The Internet was initially restricted to military and academic
institutions, but now it is a full-fledged conduit for any and all forms of information and
commerce. Internet websites now provide personal, educational, political and economic
resources to every corner of the planet.
Intranet. A private network inside a company or organization that uses the same kinds
of software that you would find on the public Internet, but that is only for internal use.
Learning bridge (Also known as transparent bridge). This type of bridge is transparent
to the device sending the packet. At the same time, this bridge will learn over time what
devices exist on each side of it.
Load balancing. The process of distributing some load across multiple links, servers,
processors or other devices in order to improve performance and overcome deficiencies
in existing equipment.
Logical topology. The logical path a signal follows as it passes among the network
nodes.
Link-state routing A routing algorithm that only sends out route table changes.
Logical Topology. The logical pathway a signal follows as it passes among the network
nodes.
Data Communications and Networking Copyright © 2005, African Virtual University 127
Glossary
On-demand service. A type of telecommunication service in which the communication
path is established almost immediately in response to a user request.
Routing. The sending of data packets end systems (stations or nodes) located on different
networks.
Spanning Tree. An algorithm used by bridges to create a logical topology that connects
all network segments, and ensures that only one path exists between any two stations.
Subnet. A subdivision of an IP network. Each subnet has its own unique subnet
network ID.
Throughput. The amount of actual user data transmitted per second without the
overhead of protocol information such as Start and Stop bits of frame headers and
trailers.
Data Communications and Networking Copyright © 2005, African Virtual University 128