In the
early 1980s, the International Standards Organization (ISO) saw the need ;to
develop a network model to help vendors create interoperable network
solutions. It developed what is now
known as the open System Interconnection (OSI) reference model. Even though other networking models have been
created, they often are related back to the OSI reference model when vendors
want to provide education about their products.
Translate
Translate
Sunday, December 28, 2014
What is the Open System
The concept of derived from
a need standardization. Many people have
encountered a situation in which they must choose between competing
products. The major problem is that if
you buy BigCorp’s XYZ product, you are tied to that product as your networking
solution.
TCP/IP
is good example of an o pen system for a protocol suite. Through the use of RFCs, all TCP/IP standards
are fully documented. They have been
designated as required or elective components to be included in a vendor’s
implementation of TCP/IP. The goal of TCP/IP is to provide connectivity between
heterogeneous systems. You might have to
make some choices about how you implement the connectivity. By using TCP/IP,
however, you know you have an underlying framework that is available on most
platform.
Be
careful with the term open systems. Many
times it is bandied about as the end-all and be-all almost a religion. Competing products drive the market to come
up with better solutions. If there is
absolutely no difference between product A and Product B, why would you not
always choose the cheaper of the two products?
Asynchronous Transfer Mode (ATM)
Asynchronous
Transfer mode uses advanced technology to segment data into cells at high
speeds. Each cell is fixed length,
consisting of 5 byte of header information and 48 bytes of payload data. The use of a fixed-length packet results in
higher transfer speeds because the network
spends less time processing incoming data It also helps in planning
application bandwidth. Cells cross the
ATM network by the passing through devices known as ATM switches. These switches analyze header information to
switch the cell to the next ATM switch that ultimately leads to the destination
network. ATM enables more than one
computer to transmit at the same time through the use of multiplexers.
The
request includes the ATM address of the Target ATM device as well as quality of
service (Qos) parameters. The QOS
parameters essentially set minimum guidelines stat must be met for
transmission. They include values for
peak bandwidth, average sustained bandwidth, and burst size, if the actual
traffic flow does not meet the QOS specifications, the cell can be marked as
discard-eligible. This means any ATM
switch that handles the cell can drop the cell in periods of congestion. At each switch, the signaling request is
reassembled and examined. If the switch
table has an entry of the destination ATM device and the ATM switch can
accommodate the QOS requested for the connection, it forwards the cell to the
next ATM switch. When the cell to the
next ATM switch. When the cell signaling requested for the connection, it
forwards the cell to the next ATM switch.
When the cell signaling request reaches the destination endpoint, it
responds with an accept message.
The
wraps up the basics of the various network types that can be implemented for
your network. The next section looks at
a concept, Open Systems, that allows standardized protocols to be developed
that provide network connectivity over the networks we deploy.
Frame Relay
Frame
Relay uses permanent virtual circuits (PVCs) so the entire path between two
hosts is known from end to end. This
creates an optimal network environment in which the path between two hosts is
predetermined. Instead of always having
to calculate the best path to remote host, the PVC has predetermined that
route. In addition, because the hosts
are connected using a common frame relay network, packets do not have to be
fragmented due to differing Maximum Transmission units (MTUs) The MTU is the
largest packet size that canbe used on a network segment. Frame relay networks all have a same MTU,
removing the issues with differing MTUs.
Frame
Relay also includes the following local management interface (LMI) extensions:
·
Virtual circuit status messages provide
information about PVC integrity. They
report the addition of any new PVCs and the deletion of existing PVCs. These status messages prevent hosts from
sending messages to a PVC that has ceased to exist.
·
Multicasting is an optional LMI extension that
enables a host to send a single frame destined for multiple recipients. This reduces overall network traffic because
a single frame can be sent to multiple hosts instead of one message per host.
·
Global addressing provides globally significant
connection identifiers. Frame Relay uses
data link connection identifiers (DLCIs) to identify a circuit ID. When global addressing is implemented, each
connection has a globally unique ID.
This ID is known to all other connections.
If Winnipeg must send a frame to Minneapolis, Winnipeg places a value of
40 in the DLCI field and sends the frame into the Frame Relay network. When the frame arrives in Minneapolis, the
network changes the DLCI field contents to 10.
This shows that the frame came from the Winnipeg network. This addressing scheme enables the Wan to
function using the same methods as a LAN.
·
Simple flow control provided an XON/XOFF
flow-control mechanism. Frame Relay
includes simple congestion-notification messages that enable the network to
inform user devices when network resources are approaching a congested
state. The simple flow control LMI
extension is provided for devices that cannot use these notification messages
and that need some level of flow control.
Tuesday, December 23, 2014
Packet Switching Networks
Packet-Switching Networks-
Packet
switching network enable you to transmit data over an any-to-any connection
Sometimes a packet-switched network is described as a mesh network. When information is transmitted over the network,
it is known what path the information will take between the sender and the
recipient of t he data.
The
original data is broken into smaller packets.
Each packet is tagged with the destination address and sequence
number. As the packet traverses the
network between the source and destination hosts, it travels on the best
current path. This way, if a network
link goes down during the transmission of a stream of packets, not all the
packets have to be re-sent. Some of the
packets will have found an alternate route when the link went down.
The
following are three common implementations of packet-switching networks:
·
X.25
·
Frame relay
·
Asynchronous transfer mode(ATM)
X.25 Networks-
X.25 is
developed in the 1970s to provide users with WAN capabilities over public data
networks. Phone companies developed it,
and it attributes are international in nature,
It is administered by an agency of the United Nations called the
International Telecommunications Union (ITU).
In an
X.25 network, a host calls another host tyo request a communications session. If the call is accepted, the two systems. Can
begin a full-duplex information transfer. Either host can terminate the
session.
A point –to-point connection
takes place between data terminal equipment (DTE) at the client site and data
circuit-terminating equipment (DCE) at the carries’ facilities. The DTE
is connected to the DCE through a translation device known as a packet
assembler/disassemble (PAD). The DCE connects to packet switching exchanges
(PSEs), more commonly known as switches.
The switches interconnect with each other until they reach the DCE of
the destination host. This DCE connects
to the DTE connects to the DTE of the host complete the communications session.
An association known as a virtual circuit
accomplishes the end-to-end communication between the two DTEs. Virtual circuits enable communication between
two defined end points to take place through any number of intermediate
nodes. These nodes do not have to be a
dedicated portion of the network. The
circuit is not a physical data link; it is bandwidth that can be allocated on
demand. The following are the two types
of virtual circuits:
·
Permanent
virtual circuits (PVCs)- PVCs
are used for common data transfers known to occur on a regular basis. Although the route is permanent, the client
pays only for the time the line is in use.
·
Switched
virtual circuits (SVCs)- SVCs
are used for data transfers that are sporadic in nature. The connection uses a specified route across
the network. The route is maintained
until the connection ceases.
Sunday, December 21, 2014
Duel-Ring Networks
Duel-Ring Networks-
Duel-Ring
Networks commonly run the Fiber Distributed Data Interface (FDDI). FDDI is limited to a maximum ring length of
62 miles and operates at 100Mbps.
There
are difference between token ring and FDDI when it comes to token passing. A computer on an FDDI network can transmit as
many; frames as it can produce in a preset time interval before letting the
token go. In addition, several frames
can circulate the ring at once. This
gives an overall edge in speed to FDDI over token ring.
One
ring called primary ring; the other ring is the secondary ring. Under normal operation, all data flows on
the primary ring, and the secondary ring remains idle. The secondary ring is used only if a break
occurs in the primary ring. The ring
automatically reconfigures itself to use the secondary ring when necessary and
continues to transmit.
Workstation
generally is connected only to the primary ring. These single-attachment hosts connect to the
ring using a dual-attached concentrator (DAC).
These clients only have a connection to the primary ring. The DAC and dual-homed stations have
connections to both the primary and secondary rings. When the primary ring is broken, only
stations with dual connections are involved in calculating an alternative
route.
The primary medium for an FDDI network is fiber-optic
cable. This means
·
An FDDI network is more secure because it does
not emit electromagnetic-field signals that can be tapped.
·
An FDDI network can transmit over longer
distances without the use of repeaters to strengthen the signal.
·
An FDDI network is immune to electromagnetic
noise.
Ring Network
Ring Network-
In the
network, the entire computer joined in logical circle. Data travels around the circle and passes
through each computer. In a physical
layout, a ring network appears to be the same layout as a star network. The key difference is the connection unit
known as a Multi-Station Access Unit (MAU).
Within the MAU, data signals are passed in a ring a Multi-Station Access
Unit (MAU). Within the MAU, data signals
are passed in a ring from one host to the next.
Data is
transmitted around the ring is using a method called token passing. When a host needs to transmit data, it
modifies the token with the MAC address of the destination host. The data passes by each computer until it
reaches the destination host. The
destination host modifies the token of indicate that data was received
successfully. After the sending host
verifies that the data was received, the frame is removed from the
network. The token is released so that
another host on the network can transmit data.
Only a
single token exists in a ring topology network.
If a client wants to transmit data and the token is in use, he must
wait. Although this sounds inefficient,
the token travels at a very fast rate.
If the total cable length for network is 400 meters, a token can circle
this ring around 5,000 times per second.
Wireless Star Topology
Wireless Star Topology-
Wireless
networking using the 802.11 standard use Wireless Access Point (WAP) as the
central connection unit. Devices connect
to the WAP using wireless network cards and the 802.11 standard. 802.11 communications can reach speeds of
11Mbps. For more information on Wireless
networking,
New Categories for Twisted Pair Wiring
New Categories for Twisted-Pair Wiring-
Three
new categories of referred to when talking about twisted pair wiring categories:
Cat5e, Cat-6, and Cat7. Cat5e uses more stringent specifications than Cat5 and
offers better performance. The Cat5e
uses more stringent specifications than Cat5 and offer better performance. The Cat5E standard is approved to “Electronics Industries
Association/Telecommunications Industry Association (EIA/TIA)” and the” Institute of Electrical and Electronics
Engineers (IEEE)”. Cat6 not an
official standard, supports frequencies up to 350MHz, about two and a half
times the specification for Cat5. The
Telecommunications Industry Association is currently working on Draft 6 for
Cat6. Finally Cat7 uses a copper core
wiring that supports frequencies up to 600MHz.
Because of the use of Copper, Cat7 will require shielded wiring rather
than unshielded wiring. At this time, Cat7 is a working item and even earlier
in the standardization process.
Depending
on the type of wiring you implement, different cable connectors are used
interface the wiring segments with the network cards. RJ45 connectors commonly are used with UTP
wiring. RJ45 connectors commonly used
with UTP wiring. RJ45 connectors look
much like phone connectors, but they are about twice as big. In some cases,
especially with older token-ring network cards, DB9 connectors look like AUI
connectors, expect there are 9 pins rather than 15 pins on the connectorStar Topology
Star Topology-
The
star topology is the most prevalent network topology; implemented in networks
today. The chief advantage of the star
topology over the bus topology is that, if a cable segment is broken, only the
host connected to the hub on that cable segment is affected. The following other benefits of using a star
topology:
·
It is easy to stake hubs to increase the number
of ports that a host can link into the hub stake. This helps star based networks to grow in
size.
·
Different cable types can be used to connect to
the hubs.
When implementing a star network, you use different cabling
types than in a bus network. The most
common wiring standard used with star-based networks is 10BASED-T wiring, which carries
Ethernet signals on inexpensive twisted-pair wiring. The following 5 categories of unshielded
twisted pair (UTP) cable can be used:
·
Category
1 (Cat 1)- Used in traditional UTP telephone cable. It
can carry only voice traffic, not data.
·
Category2 (Cat2) - Certified for data transmissions of up to 4
Megabits per second (Mbps)(early token ring).
·
Category3
(Cat3) - Certified for the
data transmissions of up to 10Mbps (Ethernet).
·
Category4
(Cat4) - Certified for the data
transmissions of up to 16Mbps (token rind).
·
Category5
(Cat5)- Certified for data
transmissions of up to 100Mbps(fast Ethernet).
Mixing Media
Mixing Media-
At times, you might encounter a situation in which the computers in
your office are networked using one
type of cable medium, but the network cards do not support that cable
medium, In this situation, it sometimes
is easier to purchase transceivers to convert the network cards instead of
purchasing new network cards.
Transceivers have two interfaces. One interface is a BNC connector and the
other is an AUI connector. This enables
a network card with an AUI interface to be used on a bus network utilizing BNC
connectors. The transceiver passes
information between the two connectors so the AUI type network card can still participate
in the network.Hardware of Bus Topology Network
Hardware Utilized in
a Bus Topology Network-
Both
thin Ethernet and thick Ethernet require the following additional network
hardware to link the hosts:
·
BNC connectors
·
Terminators
·
AUI connectors
British Naval Connector (BNC) connectors enable the various
thin net coaxial cab le segments to interconnect. Each host has a T-connector that is used to
link the cable segment to a host computer.
Wire Standards in a Bus Network
Wire Standards in a Bus Network-
Networked
computers commonly are linked using network cabling. The following are two
wiring standards for communications on a bus network:
·
10BASE-2-
Also known as thin Ethernet, it allows network segments up to 185 meters on
coaxial cable.
·
10BASE-5-
Also known as thick Ethernet, it allows network segments up to 500 meters on
coaxial cable.
Another common wiring standard
implemented in local area networks is the 10Base-T standard. This standard is discussed in the section
about star networks.
Topology of LANs
Topology of Lan-
A bus
network is the simplest method used to network computers. A bus network consists of a single cable that
connects all computers, servers, and network peripherals in a single network
segment. Hosts on a bus network communicate with each other by putting
information on the cable addressed to the physical address of the network card
used to connect the destination computer to the segment. This physical address is called the Media
Access Control (MAC) address.
Network card and MAC Address
Network card and MAC Address-
Each network card is assigned a unique MAC address. MAC addresses are 12-digit hexadecimal addresses such as 00-01-0E-6F-6D-62. Each network card manufacturer is assigned a prefix to be used for its network cards. It is the responsibility of the network card manufacturer to be sure no two of its cards have the same MAC address.Server based Network
Server Based Network-
In
server-based networks, at least one host is dedicated to server functionality.
Client computers do not share any information with other computers. All data is stored on the central
server. Most corporate networks are
based on this methodology. Within a server-based network, servers can play
several roles. These roles include the following:
·
Directory
Servers:These provide a central directory service for management of
users, groups, and host objects to allow
for centralized authentication and authorization using the central directory.
·
File
and Print Servers: These provide
a secure repository for all data. They also
can manage printqueues that provide access to network-sharable print resources.
·
Application
Servers: These provide the
server side of client/server applications. In a client/server environment, the
client runs a small version of the program that allows connectivity to the
server. The server side of the
application is used to perform processor-intensive queries on behalf of the
client. Example of application servers
includes Web servers and database servers.
·
Mail
Servers: These provide
electronic-message capabilities for the clients of the network. With the use of gateways, mail transport can
take place between heterogeneous mail systems.
·
Security
Servers: These provide security
to the local area network if it is connected to any larger networks such as the
Internet. Security servers include
firewalls and proxy servers.
·
Remote
Access Servers: These enable external data flow to occur
between the network and remote clients. A
remote client can use a modem to dial in to the local area network, or alternatively
use a technology known as tunneling or Virtual Private Networks (VPNs) to
connect to the remote network over a public network such as the Internet. The system that allows the remote client to
connect to the corporate network is the remote access server. A remote access to the network, or one or
more virtual ports to allow tunnel connections. After the client has connected
to the remote network, the user can function as if he or she were directly
connected to network using a network card.
Peer-to-Peer network
Peer-to-Peer networks-
Peer-to-Peer
networks operate with no dedicated servers on the network. Each host functions as both a client and a
server. The user at each host determines
what information or peripherals he is willing to share with the other members
of the network. Peer-to-Peer networks
generally are relegated to smaller organizations; they do not scale well to
larger ones. They have several security
issues as a result of each host’s capability to control its own security, which
decentralizes security control.
Wide Area Networks (WANs)
Wide Area Networks (WANs)-
LAN
implementations have physical and geographic limitations. Wide area networks (WANs) meet a need for
networking that requires connectivity over larger distances.
Most
WAN are simply combinations of local area networks and additional
communications links between the LANs.
The following terms are used to dercribe the scope or size of a WAN:
·
Metropoliton
Area Networks (MANs)- MANs are
WANs is a small geographic area.
Generally, they are localized to single city or region.
·
Campus
area networks (CANs)- CANs is a common designation for WANs that link
regions of a university campus.
For practical implementation, these are no different
from a wide area network except for the area they physically cover.
Communications
over a WAN use one of the following transmission technologies:
·
Analog
·
Digital
·
Packet Switching
Analog and digital technologies
commonly are implemented as point-to-point technologies. In other words, they are configured between
two distinct hosts. Packet switching, on
the other hand, links several hosts using a mesh or cloud technology. Any host participating in t;he cloud can
establish a session to another host in the cloud.
Analog WAN Connectivity-
Analog
phone lines can be used to connect networks despite the poor line quality and
slower speeds. The public switched
telephone network (PSTN) was primarily designed for voice traffic; it also can
be used for data traffic. Remote users
connecting to the home network from the road often use PSTN access. Although it is possible to purchase a
dedicated analog line to connect networks, the cost of a conditioned line
generally is prohibitive, and other networking solutions are investigated.
Digital Wide Area Network Connectivity-
A more
common method of linking a WAN is to use digital data service (DDS) lines. DDS provides a point-to-point synchronous
connection. A company can lease
dedicated circuits that provide full-duplex bandwidth by setting up a permanent
link from each endpoint of the network.
Digital
lines are preferable to analog lines due to increased speed and lack of
transmission errors. Digital traffic
does not require a modern Instead, data is sent from a router on a network to a
channel service unit/data service unit (CSU/DSU).
The
following are common digital connectivity methods:
·
T1/E1
·
T3/E3
·
ISDN
·
Switched 56
T1/E1- T1 service
(known as E1 in Europe) is the most widely used digital service at higher data
speeds. T1 can transmit a full duplex
signal at a rate of 1.544 Mbps. It can
be used to transmit voice, data, and video signals.
Because of the high cost of a T1
line, many subscribers opt for fractional-T1 service. Instead of using a T1’s
full bandwidth, the subscriber uses one or more T1 channels, Each T1 channel is
a 64Kbps increment.
T3/E3- T3 service
(known as E3 in Europe) can provide voice and data-grade service at speeds up
to 45Mbps. This is the highest-capacity
service available to the consumer today.
As with T1 service, fractional-T3 service is available as an alternative
to multiple T1 lines.
Integrated Services Digital Network(ISDN)- ISDN is an inter LAN connectivity
method that can carry data, voice and imaging signals. Two flavors olf ISDN are available: basic
rate and primary rate.
Basic rate ISDN provides two bearer channels (known as B Channels) that communicate at 56Kbps; an 8Kbps link-management channel; and one data channel (known as a D channel) that carry signal and link management data at a r ate of 16Kbps. A network using both B channels can provide a 128Kbps data stream.
Basic rate ISDN provides two bearer channels (known as B Channels) that communicate at 56Kbps; an 8Kbps link-management channel; and one data channel (known as a D channel) that carry signal and link management data at a r ate of 16Kbps. A network using both B channels can provide a 128Kbps data stream.
Primary rate ISDN provide the
entire bandwidth of a T1 link by provide the entire bandwidth of a T1 link by
providing 23B channels and one D Channel.
In Europe, 30B channels are used.
The D channel under primary rate ISDN communicates at 64Kbps and still
is used only for signal and link management data.
ISDN is a demand-dial interface,
Instead of remaining active at all hours, it demand-dials whenever a connection
is required.
What is Local Area Network(LANs)
Local Area Network(LANs)-
Local
area Networks (LANs) are the most common networks. A LAN has the following characteristics:
·
The network operates in a contained area. This could be a single floor in a building or
simply within a single building.
·
The host within the LAN is interconnected with
high-bandwidth network connections such as Ethernet or token ring, or use newer
technology such as wireless networks.
·
All facets of the LAN often are privately
managed. No third parties are required for connectivity solutions.
·
LAN services are available on a 7-dayh, 24-hour
basis.
Type of Network -
·
Peer-to-peer networks
·
Server-based networks
Peer-to-Peer networks-
Peer-to-Peer
networks operate with no dedicated servers on the network. Each host functions as both a client and a
server. The user at each host determines
what information or peripherals he is willing to share with the other members
of the network. Peer-to-Peer networks
generally are relegated to smaller organizations; they do not scale well to
larger ones. They have several security
issues as a result of each host’s capability to control its own security, which
decentralizes security control.
Server Based Network-
In
server-based networks, at least one host is dedicated to server functionality.
Client computers do not share any information with other computers. All data is stored on the central
server. Most corporate networks are
based on this methodology. Within a server-based network, servers can play
several roles. These roles include the following:
·
Directory
Servers:These provide a central directory service for management of
users, groups, and host objects to allow
for centralized authentication and authorization using the central directory.
·
File
and Print Servers: These provide
a secure repository for all data. They also
can manage printqueues that provide access to network-sharable print resources.
·
Application
Servers: These provide the
server side of client/server applications. In a client/server environment, the
client runs a small version of the program that allows connectivity to the
server. The server side of the
application is used to perform processor-intensive queries on behalf of the
client. Example of application servers
includes Web servers and database servers.
·
Mail
Servers: These provide
electronic-message capabilities for the clients of the network. With the use of gateways, mail transport can
take place between heterogeneous mail systems.
·
Security
Servers: These provide security
to the local area network if it is connected to any larger networks such as the
Internet. Security servers include
firewalls and proxy servers.
·
Remote
Access Servers: These enable external data flow to occur
between the network and remote clients. A
remote client can use a modem to dial in to the local area network, or alternatively
use a technology known as tunneling or Virtual Private Networks (VPNs) to
connect to the remote network over a public network such as the Internet. The system that allows the remote client to
connect to the corporate network is the remote access server. A remote access to the network, or one or
more virtual ports to allow tunnel connections. After the client has connected
to the remote network, the user can function as if he or she were directly
connected to network using a network card.
Saturday, November 15, 2014
Connecting To a Cisco Router
We can connect to a Cisco Router to configuration it, verify its configuration and check statics. There are different way to this, but most after, the first place uou would connect to is the console post. The console lpost is usually an RJ-45 (8-pin modules) default there's may or may not be a password set. The new cisco as the password by default.
Note- Auxalic Port is connected by modem.
Note- Auxalic Port is connected by modem.
Wednesday, August 20, 2014
Types of Router
Router provide connectivity inside enterprises and the internet, and within on internet service provider(ISP).
One of the larges routers exemple the Cisco CRS-1 or Juniper T 1600 interconnect internet service provider (ISP), They arte used within ISPs, or may be used in very large enterprises networks. The smallest router provide connectivity for small and home office.
One of the larges routers exemple the Cisco CRS-1 or Juniper T 1600 interconnect internet service provider (ISP), They arte used within ISPs, or may be used in very large enterprises networks. The smallest router provide connectivity for small and home office.
EDGE COMPUTER- The type of router are placed at the edge of the ISP network, the are noremaly configured tro external protocol protocol like BGP (Border gateway proocol) to another BGP of other ISP
or large organisation.
SUBSCRIBER EDGE ROUTER- The type of router belongs to an end user (enterprises) organization. Its configured to broadcast external BGP to its provider's ASes.
INTER-PROVIDER BORDER ROUTER- This type of router is for inter connecting ISPs. This is a BGP speaking router that maintains BGP sessions wih other BGP speaking routers i n other provider ASes.
CORE ROUTER- A router that resides within the midle or backbone of the LAN network rather then at its periphery.
In same instance a core router provides a stepdown backbone inerconnecting the distribution routers from multiple building of a campus(LAN) or large inerprises location (WAN). They tend o be optimized for a high bandwidth
CORE ROUTER- A router that resides within the midle or backbone of the LAN network rather then at its periphery.
In same instance a core router provides a stepdown backbone inerconnecting the distribution routers from multiple building of a campus(LAN) or large inerprises location (WAN). They tend o be optimized for a high bandwidth
What is router
A router is a networking device that forwards data from one network to another. This include residential routers that also use Network Address Translation.
or
This is a hardware device that routes data (hence the name) from a local area network (LAN) to another network connection. A router acts like a coin sorting machine, allowing only authorized machines to connect to other computer systems. Most routers also keep log files about the local network activity.
Subscribe to:
Posts (Atom)