CIM6400 CTNW Lesson 9 – LAN Architectures & Networking Protocols and the OSI Model CIM6400 CTNW (04/05) 1 LAN Architectures CIM6400 CTNW (04/05) 2 Ethernet • • • Architecture refers to the overall structure of a computer or communication system. It determines the capabilities and limitations of the system. The Ethernet architecture is based on the IEEE 802.3 standard. The IEEE 802.3 standard specifies that a network implements the Carrier Sense Multiple Access with Collision Detection (CSMA/CD) access control method. Standard transfer rates are 10 Mbps or 100 Mbps, but new standards provide for gigabit Ethernet, which are capable of attaining speeds up to 1 Gbps over fiber-optic cable or other high-speed media. CIM6400 CTNW (04/05) 3 Ethernet • • • CIM6400 CTNW (04/05) 10BASE-T uses a star topology. The 10 stands for the common transmission speed of 10 Mbps, the "BASE" stands for baseband mode, and the "T" stands for twisted pair cabling. Ethernet cable generally describes the UTP cabling, but STP cable can also be used. 4 Ethernet • • • CIM6400 CTNW (04/05) 100BASE-X (also called Fast Ethernet) comes in several different varieties. It can be implemented over 4-pair Category 3, 4, or 5 UTP (100BASE-T). It can also be implemented over 4-pair Category 5 UTP or Shielded Twisted Pair (STP) (100BASE-TX), or as Ethernet over 2-strand fiber-optic cable (100BASE-FX). 5 Ethernet • • • 1000BASE-T is Gigabit Ethernet. This architecture supports data transfer rates of 1 Gbps. Its implementation over fiber-optic cable makes it suitable for metropolitanarea networks (MANs). CIM6400 CTNW (04/05) 6 Token Ring • • • • The Token Ring standards are defined in IEEE 802.5. It is often integrated with IBM mainframe systems such as AS400. Token Ring is so named of its logical topology and its MAC method of token passing. The transfer rate for Token Ring can be either 4Mbps or 16Mbps. A Token Ring network uses a token (that is, a special signal) to control access to the cable. A token is initially generated when the first computer on the network comes online. When a computer wants to transmit, it waits for and then takes control of the token when it comes its way. The token can travel in either direction around the ring, but only in one direction at a time. CIM6400 CTNW (04/05) 7 Fiber Distributed Data Interface (FDDI) • • • • • • FDDI is a type of Token Ring network. It runs on fiber-optic cable, and thus combines high-speed performance with the advantages of the token-passing ring topology. It runs at 100 Mbps, and its topology is a dual ring. The outer ring is called the primary ring and the inner ring is called the secondary ring. Normally, traffic flow only on the primary ring. If primary ring fails, the data automatically flows onto the secondary ring in the opposite direction (fault tolerance). Advantages High speed fiber-optic transmission Not susceptible to EMI and noise Send data for greater distances between repeaters CIM6400 CTNW (04/05) 8 Networking Protocols and the OSI Model CIM6400 CTNW (04/05) 9 OSI Model Overview • • CIM6400 CTNW (04/05) The Open Systems Interconnection (OSI) reference model is an industry standard framework that is used to divide the functions of networking into seven distinct layers. Each layer provides specific services to the layers above and below it in order for the network to work effectively. 10 OSI Model Overview • • A message begins at the top application layer and moves down the OSI layers to the bottom physical layer. As the message descends, each successive OSI model layer adds a header to it. CIM6400 CTNW (04/05) 11 OSI Model Overview • • • CIM6400 CTNW (04/05) A header is layer-specific information that basically explains what functions the layer carried out. Conversely, at the receiving end, headers are striped from the message as it travels up the corresponding layers. The process of data being encapsulated on the sending end and data being deencapsulated on the receiving end is the function of the OSI model. 12 OSI Model Layer and Their Functions • The OSI model was intended to be a reference model for developing networking protocols. CIM6400 CTNW (04/05) 13 What is a Protocol? • • CIM6400 CTNW (04/05) Protocol is a controlled sequence of messages that is exchanged between two or more systems to accomplish a given task. Protocol specifications define this sequence together with the format or layout of the messages that are exchanged. 14 Transmission Control Protocol/Internet Protocol • • Internet CIM6400 CTNW (04/05) The Transmission Control Protocol/Internet Protocol (TCP/IP) suite of protocols has become the dominant standard for internetworking. TCP/IP represents a set of public standards that specify how packets of information are exchanged between computers over one or more networks. 15 Transmission Control Protocol/Internet Protocol Internet Internet Internet CIM6400 CTNW (04/05) 16 Transmission Control Protocol/Internet Protocol • Application Protocols Hypertext Transfer Protocol (HTTP) • Govern how files – such as text, graphics, sounds and video – are exchanged on the Internet. • A web server runs an HTTP services or daemon. A daemon is a program that services HTTP requests. Hypertext Markup Language (HTML) • A page-description language • Web designers use HTML to indicate to web browser software how the page should look. Telnet • Enables terminal access to local or remote systems CIM6400 CTNW (04/05) 17 Transmission Control Protocol/Internet Protocol • Application Protocols (Cont.) File Transfer Protocol (FTP) • Provides services for file transfer and manipulation. FTP uses the session layer to allow multiple simultaneous connections to remote file system Simple Mail Transport Protocol (SMTP) • Provides messaging services over TCP/IP and supports most Internet e-mail programs. Domain Name System (DNS) • Provides access to name servers, where network names are translated to the addresses used by Layer 3 network protocols. CIM6400 CTNW (04/05) 18 Transmission Control Protocol/Internet Protocol • Transport Protocols Transmission Control Protocol (TCP) • Facilities for end-to-end connection establishment, error detection and recovery, and metering the rate of data flow into the network (i.e. for reliable delivery of data) User Datagram Protocol (UDP) • Offers a connectionless service to applications • Uses lower overhead than TCP Both TCP & UDP identify applications by port number CIM6400 CTNW (04/05) 19 Transmission Control Protocol/Internet Protocol • Internet Protocols Internet Protocol (IP) address • Provides source and destination addressing. In conjunction with routing protocols, the IP address provides packet forwarding from one network to another Internet Control Message Protocol (ICMP) • Used for network testing and trouble-shooting, it enables diagnostic and error messages Routing Information Protocol (RIP) • Operates between router devices to discover paths between networks Address Resolution Protocol (ARP) • Maps an IP address to a physical machine address CIM6400 CTNW (04/05) 20 Internetwork Packet Exchange/Sequenced Packet Exchange • • • CIM6400 CTNW (04/05) Internetwork Packet Exchange/Sequenced Packet Exchange (IPX/SPX) is the protocol suite employed originally by Novell®, NetWare. It delivers functions similar to those included in TCP/IP. The native – or original – NetWare protocols remained proprietary 21 NetBEUI • • • • • NetBIOS Extended User Interface (NetBEUI) is a protocol used primarily on small Windows NT networks. It was used earlier as the default networking protocol in Windows 3.11, Windows for Workgroups, and LAN manager. NetBEUI is a simple protocol that lacks many of the features that enable protocol suites such as TCP/IP to be used on networks of almost any size. NetBEUI cannot be used to build large networks or to connect several networks. However, it is suitable for small peer-to-peer networks. It can be used in conjunction with another routable protocol such as TCP/IP. CIM6400 CTNW (04/05) 22 AppleTalk • • • • CIM6400 CTNW (04/05) AppleTalk is a protocol suite that is used to network Macintoch computers. AppleTalk is comprised of a set of protocols that span the seven layers of the OSI reference model. AppleTalk protocols were designed to run over the major LAN types, notably Ethernet and Token Ring, and also Apple's own LAN physical topology, LocalTalk. Like Novell, Apple Computer also developed its own proprietary protocol suite to network Macintosh computers. 23