Network design/ concept

advertisement
Local area network (LAN)
Topic 3 – Designing the network
Revision 1
November 2000
Designing the network
1.0 INTRODUCTION
As a network administrator, you must understand the hardware and software components that make up a
local area network. This knowledge will enable you to recommend and implement network systems. It will
also help you troubleshoot problems on the network. You will increase your understanding of LANs by
studying
 network cabling systems,
 network topologies, and
 protocols.
As a network administrator, You will be asked to help make important decisions about which hardware
and software to purchase when the LAN is implemented or expanded. Hence, you will need a good
background in how computers use LANs to communicate, as well as the options and standards currently
available to accomplish this communication.
2.0 LAN COMMUNICATIONS
Computers communicate over LANs by sending blocks of data called packets. Each packet contains
 the information to be transmitted,
 along with control information used by the receiving computer to identify and process the data
contained in the packet.
In other words, a packet contains
1. Data
2. From and to address, and
3. Error checking
The term interoperability refers to the capability of different computers and applications to communicate
and share resources on a network. For this we need some standard/ rule which everyone can follow. The
two major organizations that play a role in LAN standards are the International Standards Organization
(ISO), which works on LAN communication software models, and the Institute of Electrical and
Electronic Engineers (IEEE), which works on physical cable and access method standards.
3.0 OSI (OPEN SYSTEMS INTERCONNECT) MODEL
The ISO introduced a seven – layer model in 1980, known as the open systems interconnect (OSI)
model. This seven – layer model acts as a blue print to help network designers and developers build
reliable network systems that can interoperate. As a network administrator, you need to know the basic
levels and functions of the OSI model in order to understand the LAN communication process and better
be able to select and configure network hardware and software components. In addition to helping you
implement and maintain network systems, a good understanding of the principles of network
communication provided by the OSI model will be important to help you troubleshoot and identify network
problems.
LAN Communications chart
OSI Layer
Application
Presentation
Session
Transport
Network
Action
Interaction with user
To organize data in machine readable format.
Used to compress information.
Make initial connection with receiving computer;
maintain communication during session, and
session off when complete. Control data flow by
sequencing packets. Addition of packet
sequence numbers.
Reliable data delivery. Identification and
acknowledgement fields added to the message.
Determination of the best route to the
Result
Application program executed
Message packet
Packet sequence number
added to message packet.
Segment package formed
Datagram packet formed
1
Local area network (LAN)
Topic 3 – Designing the network
Data link
Physical
destination computer and addition of network
address to the packet.
Addition of the physical address of the
destination computer
Transmission of packet one bit at a time
Revision 1
November 2000
Ethernet frame formed
Electronic signals representing
bits appear on the cable
system.
There is a simple phrase to help you remember the OSI layers, from the application layer to the physical
layer: “All people seem to need data processing.”
For example, the transport layer on the computer will include control information in the network packet
that can be used by the transport layer on the receiving computer to acknowledge receipt of the packet.
3.1 Application Layer
The application layer consists of software that interacts with the users and enables them to perform their
tasks without being involved with the complexity of the computer or network systems. Examples of
application software include: word processors, spreadsheets, other software products used in offices. The
function of the application layer is to provide inerface to the above application software in a network
communication.
3.2 Presentation Layer
The purpose of the presentation layer is to organize the data in machine-readable form. The resulting
block information created by the presentation layer is referred to as a message packet.
Presentation layer software can also be used to compress information in order to save space and
transmission time. For increased security, using a password or key in order to make it difficult for an
intruder to capture and access the information can also use the presentation layer (data encryption).
3.3 Session Layer
The power of the session layer is to initiate and maintain a communication session with the network
system. The session layer enables to log in to the NetWare server by providing the server with a valid
user name and password.
3.4 Transport Layer
The primary function of the transport layer is the reliable delivery of information packets from the source
to the destination. The transport layer on the sending computer provides proper address information, and
the transport layer on the receiving computer sends an acknowledgment of each packet successfully
received from the network. The transport layer creates a packet, called a segment, by surrounding the
message packet with the necessary acknowledgment and identification fields.
The transport layer on some multitasking computers can also be used to place parts of several message
packets from different application into each segment. The process of placing pieces of multiple message
packets into one segment is called multiplexing. Multiplexing can save communication from several
applications simultaneously.
3.5 Network Layer
The network layer provides the information necessary to route packets through the proper network paths
in order to arrive at the destination address. Uses network addresses, which identify each group of
computers on your network system. The network layer then creates a datagram packet by encapsulating
the information in the segment packet with the necessary packet routing information.
3.6 Data Link Layer
The data link layer is the delivery system of the computer network and is responsible for using the
destination address to send the packet through the requested network cable system. The data link layer
2
Local area network (LAN)
Topic 3 – Designing the network
Revision 1
November 2000
creates packet, called a frame, that encapsulates the datagram packet with control information including
the source and destination physical addresses.
Physical addresses are unique NIC addresses that are permanently assigned to each NIC by the
manufacturer. Each physical address is a hexadecimal number divided into two parts: The first part
identifies the manufacturer, and the second part is a unique number to identify the card among all cards
produced by that manufacturer.
The IEEE 802 committee, which is the IEEE group that works on network standards, divides the data link
layer into two sub layers: The logical link control (LLC) layer and the media access control (MAC) LAYER.
The LLC layer interfaces with the network layer, while the MAC layer provides compatibility with the NIC
used by the physical layer.
3.7 Physical Layer
The physical layer comprises the network cable system and connectors that are responsible for sending
the data frame packet out as a series of bits.
OSI Layer
Application
Representation
Presentation
Session
Transport
Network
Data link
Physical
Function
The NetWare SEND command is a DOS command line utility that is
the application layer in this example. The SEND command allows you
to enter and send a message to another user. Other
e-mail applications could serve the same purpose.
Presentation layer converts input to binary ASCII code and creates the
message packet.
Session layer establishes communication session with receiving
computer. Sequence number added to message packet.
Transport layer adds identification and acknowledgment fields to form
segment packet. This provides “certified delivery”.
Network layer adds routing information to network containing
destination computer. Network address added to segment packet to
form datagram packet.
Data link layer adds physical address of destination computer to
create Ethernet frame.
At the physical layer the NIC converts bits to electronic signals and
transmits them on the cable system.
The Network layer in each computer keeps table – similar to a ZIP code reference book – that contains
the correct network address of all NetWare servers.
The data link layer encapsulates the datagram packet received from the network layer with heading
information, including the addresses for the destination and source computers along with error-checking
codes. The data link layer then sends the data frame to the network card for transmission, working
closely with the network card to ensure the data frame is transmitted successfully.
The physical layer of a computer network consists of hardware devices such as NICs, connectors, and
cable systems that are responsible for transmitting the message bit by bit across the network system.
The data link layer then uses the error-checking codes to perform a cyclic redundancy check (CRC), in
which a mathematical algorithm compares bits received to the CRC code contained in the frame packet.
4.0 NETWORK COMPONETS
3
Local area network (LAN)
Topic 3 – Designing the network
Revision 1
November 2000
We will learn about the network components that make up each layer of the OSI model.
4.1 Physical Layer Components
The two aspects of the physical network system are
 the media, the transmission systems used to send electronic signals, and
 the topology, the physical geometry of the network wiring.
4.1.1 Network Media
The network media consists of the communication systems that are used to transmit and receive bits of
information. Most network media used today are often referred to as bounded media because the
signals are contained in or ”bounded” by a wire. Another medium type, which is much less common in
LANs, involves beaming signals between computers with radio and light waves. These types of
transmission media are referred to as unbounded media. Although unbounded media are generally
used in wide area network (WAN) systems and involve satellite and microwave links over hundreds and
thousands of miles, certain specialized types of unbounded media, such as infrared, are gaining
acceptance for specialized local area network (LAN) applications.
You should consider three major factors when selecting a medium for your network system:
 bandwidth,
 resistance to electromagnetic interference, and
 cost.
The bandwidth of a network medium is a measure of the medium’s capacity in terms of the number of
bits per second that can be transmitted. A general rule is that the higher the bandwidth, the more traffic
and higher speed the network medium can support.
A. Twisted – Pair Cable
Twisted – pair cable is probably the most common form of bounded medium in use on LANs today.
Twisted – Pair Cable can be unshielded or shielded and consists of pairs of single – strand wire twisted
together.
Twisting the wires together reduces the possibility of a signal in one wire affecting a signal in another
wire. Twisting the wires eliminates the noise by canceling out the magnetic field. Fifty or more pairs of
twisted wire can be put together in one large cable, referred to as a bundle pair.
One problem of unshielded twisted – pair (UTP) cable is that external electrical voltages and magnetic
fields can create noise inside the wire.
To reduce electromagnetic interference (EMI), shielded twisted – pair (STP) cables are surrounded by
a metal foil that acts as a barrier to ground out the interference. For STP cable to work, it is important to
connect the cable ground to the building’s grounding system properly. Unfortunately, the shield of STP
cable changes the electrical characteristics of the wire, reducing the distance and the speed at which the
network’s signal can be transmitted.
Two types of connectors can be used on the ends of twisted – pair cable: RJ-45 plugs and IBM data
connectors. RJ-45 plugs are similar to the modular RJ-11 plugs commonly used to connect telephones to
wall jacks and are generally preferred for unshielded cable because of their low cost and ease of
installation.
Cable types
Wire Type
Speed Range
Typical Use
1 and 2
Up to 4 MBPS
Voice and low – speed data
3
Up to 16 MBPS
Data
4
Up to 20 MBPS
Data
5
Up to 100 MBPS
High – speed data
4
Local area network (LAN)
Topic 3 – Designing the network
Revision 1
November 2000
The major disadvantages of twisted – pair cable, especially UTP, are its sensitivity to EMI and increased
susceptibility to wiretapping by intruders. Wiretapping involves using special equipment, called a sniffer,
to direct the signals on the cable by sensing the electrical fields.
B. Coaxial Cable
Coaxial cable, commonly referred to as “coax,” is made of two conductors. The name coaxial is derived
from the two conductors in the cable share the same axis. At the center of the cable is a fairly stiff wire
mesh tube that also serves as a shield. A strong insulating plastic tube forms the cable’s outer covering.
Generally, thicker cable is used to carry signals longer distances but is more expensive and less flexible.
When compared to twisted-pair, coaxial cable supports higher data rates and is less susceptible to EMI
and wiretapping. On the other hand coaxial cable is generally more expensive, harder to install, and more
susceptible to damage due to linking. In the past, many networks were wired with coaxial cable.
Improvement in twisted-pair cable’s bandwidth, however, along with its flexibility and lower cost, are
causing most organizations to select UPS as a medium over coaxial cable for new network installations.
Coaxial Cable
type
RG-8
RG-58
RG-59
RG-62
Resistance
Typical Usage
50 ohms
50 ohms
75 ohms
93 ohms
Thick Ethernet networks
Thin Ethernet networks
Cable TV and IBM broad band networks
ARCnet networks
C. Fiber Optic Cable.
Fiber optic cable looks similar to coaxial cable. It consists of light-conducting glass or plastic fibers at the
center of a thick tube of protective cladding surrounded by a tough outer sheath. One or more fibers can
be bounded in the center of the fiber optic cable. Pulses of light are transmitted through the cable by
either lasers or light emitting diodes (LEDs) and received by photo detectors at the far end, from 100
million bits per second to more than 2 billion bits per second. Do not attenuate (lose strength) over
distances as quickly as electrical signals, fiber optic cables can be used to carry high-speed signals over
long distances. In addition, fiber optic transmission is not susceptible to EMI and is very difficult to tap.
The principal disadvantages of fiber optic cable are its relatively high cost, lack of mature standards, and
difficulty of locating trained technicians to install and troubleshoot it.
One common use of fiber optic cable is in connecting several high-volume NetWare servers, or
minicomputers to form a backbone network. A backbone network is a cable system used primarily to
connect a host computer to NetWare servers, each of which can have its own local network
D. Infrared
Infrared is a wireless medium that is based on infrared light from light emmitting diodes (LEDs). Infrared
signals can be detected by direct line-of-sight receivers capturing signals reflected off walls or ceiling.
Infrared signals, however, are not capable of penetrating walls or other opaque objects and are diluted by
strong light sources. These limitations make infrared most useful for small, open, indoor environments
such as a classroom or a small office area with cubicles.
Infrared transmission systems are very cost-efficient and capable of high bandwidths similar to those
found in fiber optic cables. As a result, infrared medium can be a good way of connecting wireless LANs
when computers are all located within a single room or office. Infrared eliminates the need for cables and
allows computers to be easily moved as long as they can always be pointed toward the infrared
transmitter/receiver, normally located near the ceiling.
Growth of infrared media is expected to accelerate as other radio frequencies become increasingly
congested. A large pool of potential infrared installations exists in the networking of classroom computers
and limited home or small business applications.
5
Local area network (LAN)
Topic 3 – Designing the network
4.1.2 Comparing Network Media
Medium
Cost
Installation
Unshielded
twisted-pair
cable
Shielded twistedpair cable
Coaxial cable
Fiberoptic cable
Infrared
Revision 1
November 2000
Low
Simple
1-100 MBPS
Immunity from EMI
and Tapping
Low
Moderate
Simple to
moderate
Simple
Difficult
1-100 MBPS
Moderate
1-1000 MBPS
100-2000 MBPS
Moderate
Very high
Simple
10-100 MBPS
Subject to
interference from
strong light sources.
Moderate
Moderate to
high
Moderate
Capacity
4.1.3 Network Topologies
An important aspect of a network system using bounded media is the method chosen to connect the
networked computers. The physical geometry or cable layout used to connect computers in a LAN
is called a network topology. Linear bus, ring, and star are the three major topologies used today to
connect computers in a LAN.
A. Star Topology
The star topology derives its name from the fact that all cables on the network radiate from a central hub.
The hub is a device that connects the network cables together and passes the signals from one cable to
the next. The type of hub we need will depend on the access system used by the network cards
(described in the section on data link components). Although star topologies entail higher costs due to the
amount of wire needed, they are generally more reliable and easier to troubleshoot than other topologies.
Because each cable in a star topology is a separate component, the failure of one cable does not affect
the operation of the rest of the network. Another advantage of the star topology is the ease of adding or
removing devices on the network without affecting the operation of other computers.
The star topology is rapidly becoming the most popular way to wire computers together due to its
exceptional flexibility and reliability. Today star networks are usually wired with a Patch Panel, In a patch
panel system, a wire runs from each potential computer location in the building through a drop cable to a
central patch panel. A Patch cable is then used to connect a device in any given location to the hub. A
patch panel system makes it easy to move a computer to another location as well as to connect or
disconnect computers from the network for troubleshooting purposes. Star topologies are generally
implemented with twisted pair cable rather than coaxial cable because of lower cable cost combined with
the increase flexibility and smaller size of twisted pair cable. RJ45 connectors on twisted pair cable allow
easy connection of computers to wall outlets and between hubs and patch panels.
B. Linear Bus Topology
The linear bus topology connects computers in series by running a cable from one computer to the next.
The method of attaching the computers to the bus depends on the network card and cable system.
When coaxial cable is used, each computer is usually attached to the bus cable by means of the Tconnector. When twisted pair cable is used, each network card usually contains two RJ-45 female
connectors that allow twisted-pair cable to be run from one computer to the next.
Each end of a linear bus network requires some sort of terminator or “Wire-Wrap” plugs in order to
prevent echo signals from interfering with communication signals. The resistance and size of coaxial
cable is an important factor and depends on the requirements of the network cards (described in the
section on data link components)
6
Local area network (LAN)
Topic 3 – Designing the network
Revision 1
November 2000
The primary advantages of a linear bus topology are to reduce amount of cable needed and the ease of
wiring computers that are clustered in locations such as a classroom or a computer lab. The two biggest
disadvantages of a bus network are adding or removing computers and troubleshooting.
Star networks in many organizations are gradually replacing linear bus networks because star networks
are easier to troubleshoot. A broken wire in a star network configuration affects only one workstation. In
a linear bus network all computers on the cable segment fail when the cable is disconnected or broken
anywhere in the network.
C. Ring Topology
A ring topology is similar to a liner bus topology with the single difference being that the ends of the
cable are connected instead of terminated. As a result, signals on the ring topology travel around the
network in one direction until they return to the device from which they originated. In a ring topology,
each computer in the ring receives signals and then retransmits them to the next computer in the ring.
Because the signals are regenerated at each device along the network, a ring topology allows its network
signals to traverse longer distances as long as there is another computer located within the distance limit
of each network card’s transmitter.
The disadvantage of a ring topology is the extra cable needed to complete the ring circle when computers
are spread out in serial fashion. In addition, the ring has the same disadvantage as the linear bus in
terms of interrupting network transmissions in order to add or remove workstations. An advantage of the
ring topology over the linear bus topology is that ring topology is often easier to troubleshoot. Because
each computer on the ring receives and then retransmits a signal, it is possible for the troubleshooter to
use software that quickly determines which computer is not receiving the signal.
4.2 Data Link Layer Components
As mentioned in the previous section, the data link layer components actually control the way signals are
transmitted and received on the network cable system. As a result, the components you select for the
data link level of your network will determine what network topologies and cable types can be used on the
network, conversely, when you want to use an already existing cable system, you will want to select data
link products that best support it. The data link layer components consist of the network interface cards
and card driver programs.
4.2.1 Network Interface Card
The network interface card is the component that acts as an interface between the network’s data link
and physical layers by converting the commands and data frames from the data link layer into the
appropriate signals used by the connectors on the physical cable system.
7
Local area network (LAN)
Topic 3 – Designing the network
Revision 0
Sep 2000
Topology
Wiring
expansion
Fault Tolerance Troubleshooting
Star
Requires the
great amount
of wire
because a
cable must be
led from each
computer to a
central hub
Easy to expand by
using a patch panel
to plug new
computers into the
hub
Highly fault
easiest to trouble shoot by
tolerant because removing suspect computers
a bad cable or from the network
connector will
affect only one
computer
Linear bus
Usually
requires the
least amount
of cable
because the
cable is
connected
from one
computer to
the next
difficult to expand
unless a connector
exists at the
location of the new
computer
Poor fault
tolerance
because a bad
connector or
cable will disrupt
the entire
network
segment
The most difficult to
troubleshoot because all
computers can be affected
by one problem.
Ring
Wiring
requirements
are more than
those of linear
bus because
of the need to
connect the
cable ends but
are less than
those of a star
Difficult to expand
because of the
need to break the
ring in order to
insert a new
computer
Poor fault
tolerance
because a bad
connector or
cable will disrupt
the entire
network
segment
Fairly easy to troubleshoot
with proper software that can
identify which computer
cannot receive the signal
4.2.2 Driver software
It is needed to control the network card and provide an interface between the data link layer and the
network layer software. In order to provide this software interface, Novell has developed a set of driver
specifications, called the Open data interface (ODI). ODI-compatible drivers allow the network card to
be shared by multiple programs running on the workstation or on the NetWare server. For example, ODI
drivers enable the NetWare server to communicate with both Apple Macintosh and IBM PCs attached to
the same network.
Microsoft networks, on the other hand, use a driver interface called network driver interface
specifications (NDIS) to interface network card drivers to Microsoft’s network operating system. NDIS
compatible drivers allow software developer to write programs for use on Windows 95 and Windows NT
computers without requiring them to write instructions to control the network card. The NDIS drivers
perform the hardware functions for them. Microsoft’s approach results in fewer programming
requirements for applications developers as well as more standardized and reliable networking
functionality in those applications.
Because there are two types of driver interfaces, ODI and NDIS, you will need to be sure the network
cards you obtain for your network contain the correct driver for the type of NOS you will be supporting.
Novell provides ODI- compatible driver programs for many popular network cards with NetWare 4.1., but
some cards are not supported. The manufacturer of an unsupported card should supply a disk with the
8
Local area network (LAN)
Topic 3 – Designing the network
Revision 0
Sep 2000
ODI compatible driver program that will interface its NIC to NetWare server or workstation. Whenever
possible, try to obtain NICs that work with the standard NetWare ODI drivers to make it easier to install
and maintain your network system.
4.2.3 Access methods
In addition to controlling types of signals, data link layer standards control how each computer accesses
the network. Because only one signal can be sent on the network cable at any one time, a channel
access method is necessary to control when computers transmit in order to reduce collisions that can
occur when two or more computers attempt to transmit at the same time. Collisions cause network errors
by distorting data signals, making them unreadable.
Channel access methods used on today’s LANs are either
 token passing or
 contension based
A. Token passing method
It enables only one computer to transmit a message on the network at any given time. This access to the
network is controlled by a Token, which is a special packet passed from one computer to the next to
determine which machine can use the network. When a computer needs to transmit data, it waits until it
receives the token packet and then transmits its data frame packet on the network. After the transmission
is complete, the transmitting computer releases the token. The next computer on the network can pick it
up and then proceed to transmit. In its actual implementation, the token passing system is very complex,
involving token priorities, early release of tokens, and network monitoring and error-detection functions.
As a result, network cards based on the token passing method are generally more expensive.
The token passing technology was originally developed by IBM and has now been standardized by the
IEEE 802.5 committee.
B. Contention access method
This allows a node to transmit a message whenever it detects that the channel is not in use. On a
computer network, this contention system is referred to as carrier sense multiple access with collision
detection (CSMA/CD) and has been standardized by the IEEE 802.3 committee into several different
product types, based on speed and cable type. The two most popular IEEE 802.3 committee standards,
10BaseT and 10Base2, will be described later.
A contention system works very well when network traffic is light, but its performance drops off quickly
under heavy network transmission loads. Token-based systems perform better under heavy loads
because the performance does not drop off as abruptly.
4.2.4 Token Ring Networks
IBM originally designed the token ring system for use in industrial environments that requires reliable
high-speed communications. Today, token ring is widely considered to be the best network system in
terms of overall performance and reliability.
Standard token ring cards can transmit at 4 MBPS and 16 MBPS (million bits per second). You cannot
mix cards running at 4 MBPS with cards running at 16 MBPS on the same token ring network.
Workstations are connected by twisted pair cables to a central hub called multiple stations access unit
(MAU). Although this appears to be a star arrangement, the network signals actually travel in a ring,
which is why it is often referred to as a star ring.
If a workstation is down, the relay in the MAU will automatically pass signal on to the next workstation,
hence it is resistant to breakdown. The advantages of token ring system is the speed, expandability, fault
9
Local area network (LAN)
Topic 3 – Designing the network
Revision 0
Sep 2000
tolerence, and easy to troubleshoot. The disadvantage is the extra wiring, high cost of most tokenring
system components, a MAU for every 8 computers.
4.2.5 Ethernet Networks
The term Ethernet originally applied to networks using a linear bus topology and CSMA/CD (carrier sense
multiple access/ collision detection) on coaxial cable. This system, discussed in detail below, is also
known as 10Base2. However, several variants of the specification have been created, and now the term
Ethernet is used as a general reference to the entire family of variations. The members of the Ethernet
family discussed below are 10Base2, 10BaseT, 100BaseTX, and 100BaseFX.
The term 10Base2 stands for 10-Mbps baseband using digital baseband signals over a maximum of two
100-meter coaxial cable segments. The term baseband describes a computer network that carries
digital signals; a broadband system carries analog signals, like the signals used for television and
radio transmissions. In 10Base2, thin RG- 58 coaxial cable with T-connectors enables up to 30 machines
to be attached to a single cable run, which is called a segment.
According to the 10Base2 standards, a segment cannot exceed 607 feet (200M) in length, and no more
than five segments can be joined by repeaters to form the entire network. Additionally, a maximum of
three of the five segments can have workstations attached. Network professionals often refer to 10Base2
as ThinNet because of its thin coaxial cable.
Wiring 10Base2 is simpler and more cost-effective than 10BaseT in certain environments-those in which
groups of computers are located in a small area, such as a computer lab, where one coaxial cable runs
from machine to machine. Thick coaxial cable is sometimes used instead of thin coaxial cables.
Networks using thick coaxial cable are referred to as 10Base5, Thick Ethernet, or ThickNet.
The 10BaseT-network system is very popular in business offices today because it combines the flexibility
of the star topology with the lower cost of the CSMA/CD channel access method. The IEEE 802.3
designation of 10BaseT stands for 10-Mbps baseband network using twisted-pair cable.
10
Local area network (LAN)
Topic 3 – Designing the network
Revision 0
Sep 2000
Although the 10BaseT network used the same star topology as a token ring network, the 10BaseT signals
are not sent from one station to the next as in token ring. They are broadcast to all stations
simultaneously by using the CSMA/CD method standardized by the IEEE 802.3 committee. In many
instances a cable system designed for token ring can easily be converted to support 10BaseT simply by
replacing the MAUs with concentrators. The concentrator acts as a repeater, receiving signals on one
cable port and then retransmitting those signals on all other ports. When two or more network stations
attempt to transmit at the same instant, collision occurs, and the stations must retransmit after waiting a
random period of time.
The advantages of 10BaseT include high performance under light to medium network loads and low costs
for network cards due to the relative simplicity of the CSMA/CD system. Although 10BaseT performance
can be faster than token ring under light loads, it is more easily slowed due to collisions when many
stations are transmitting on the network. Another disadvantage of the 10BaseT system is additional cost
for both concentrators and for the star topology wiring.
The 100Base TX and 100Base FX network systems are extensions of the 10Base T system and are
overseen by the IEEE 802.3 committee. They use the same star topology and the CSMA/CD channel
T
access method. The designation of 100BaseTX indicates a 100-Mbps base band network using twistedpair cable or IBM STP cable. The 100BaseFX designation indicates the use of fiber optic cable.
100Base TX and 100BaseFX networks appear identical to a 10BaseT network. A concentrator is used as
the hub to connect all machines in a star topology. The concentrator still acts as a repeater.
The advantages of 100BaseTX and 100BaseFX include higher performance for networks needing fast
data transmission, such as those using video. The disadvantages include shorter maximum cable run
lengths in some cable systems, which is a tradeoff necessary to gain the extra speed, and a higher cost
of hub and NICs capable of handling the higher speed.
4.2.6 100VG-AnyLAN networks
This system was originally developed by Hewlett-Packard and AT&T Microelectronics as the 100Base VG
Ethernet system. Hewlett-Packard then worked with IBM to create 100VG-AnyLAN,a 100-Mbps network
solution to the emerging need for higher data transmission rates on the network, which is usable as an
upgrade from either Ethernet or Token ring network. The standard is under the IEEE 802.12 committee,
and designation of 100VG-AnyLAN stands for a 100-Mbps base band network using voice grade
11
Local area network (LAN)
Topic 3 – Designing the network
Revision 0
Sep 2000
(category 3) twisted-pair cable, fiber optic cable, or IBM STP cable. It differs from other Ethernet systems
and token ring by using a demand priority media access method instead of the CSMA/CD channel
access method or token passing. A demand priority system enables only one workstation to broadcast
based on a priority system, so that more important network messages are broadcast first.
The term AnyLAN refers to the ability of a 100VG-AnyLan system to use either Ethernet or token ring
NICs. One network, however, must use one or other—Ethernet and Token ring cannot be combined in
the same network. This ability makes 100VG-AnyLAN a potential upgrade path for Ethernet and token
ring network. It appears identical to a 100BaseTX network, using a hub to connect all machines in a star
topology.
The 100Base FX specification has so far proved to be more popular than 100VG-AnyLAN. However,
Hewlett-Packard and other vendors still support the technology and offer products to implement.
4.2.7 ARCnet topology
Despite its relatively slow speed (2 Mbps), ARCnet was popular for small networks because of its low
cost and flexible topology. Today, the decreased cost of Ethernet systems combined with the lack of
IEEE standards for ARCnet and its slower speed make it a poor choice for most networks. The ARCnet
system has a star topology in which an active hub acts as a signal repeater, enabling cable runs of up to
2,000 feet from the active hub to the attached workstation computers. Passive hubs are simple signal
splitters. They can be used at the end of a run to split the cable and allow up to three workstations to be
attached to a single cable run. When a passive hub is used, wire length must be limited to 100 feet.
Depending on the ARCnet card used either twisted-pair or RG-68 coaxial cable can connect computers.
The advantages of ARCnet are low card cost and flexible wiring option. Its disadvantages are slow
speed, higher cabling cost based on its topology, and lack of standardization.
4.2.8 Comparing Network Systems
Selecting a network is a complex task that depends on such variable as type and location of computers,
existing wiring, and the amount of load expected on the network. In many organizations, multiple network
systems are necessary to meet the needs of different departments. Such network systems can be
connected with bridges and routers.
Network
System
Cable
Types
Topology
Token ring
star
10Base2
UTP, STP,
fiber
Coaxial
10BaseT
UTP
Star
linear bus
Maximum IEEE
Speed
Number of Standard
Nodes
96
802.5 4-16
mbps
30 per
802.3 10 mbps
segment
with
maximum
of 3
segments
512
802.3 10 mbps
Access
Method
Distance
Token
150' per cable run
CSMA/CD
607' per segment
CSMA/CD
100 meters per
cable run on UTP
Cat 3 & 4: 150
meters on UTP cat
5
12
Local area network (LAN)
Topic 3 – Designing the network
Revision 0
Sep 2000
100BaseTX
UTP,STP
Star
512
802.3 100 mbps CSMA/CD
100 meters per
cable run on UTP
Cat 3 & 4: 150
meters on STP
type 1
100BaseFx
fiber
star
512
802.3 100 mbps CSMA/CD
412 meters on
fiber
100VGAnyLAN
UTP, STP,
fiber
star
240
ARCnet
RG-62
coaxial
UTP
star
255 NONE
802.12 100 Mbps Demand
priority
2 Mbps
Token
standard
100 meters per
cable run on UTP
Cat 3 & 4: 150
meters on STP
type 1; 2000 M on
fiber
2000' from active
hub, 100' from
passive hub
4.3 Repeaters, Bridges and Routers
Each network system presented in this chapter has unique limitations. In some cases, you will want to
take advantage of certain features found in two different products. For example, in a school environment
you might want to implement the Ethernet system in computer labs to take advantage of the economical
coaxial wiring arrangement. If other computers in the building are located many feet apart in completely
separate areas, however, you will not want to connect them this way. You can solve this problem by
creating two separate networks: Ethernet for the lab and token ring for the office. You then connect the
networks so they share access to the same NetWare server. In other cases, it might be necessary to
break a large network into two or more smaller networks to overcome performance problems or cabling
distances, or to accommodate large numbers of users.
Within a network system, you use repeaters to maintain a strong, reliable signal throughout the network.
To connect separate network systems you use bridges or routers, and the resulting connected networks
are called an internetwork.
4.3.1 Repeaters
Network cable systems consist of one or more cable lengths, called segments, that have termination
points on each end, Repeaters are hardware devices that allow you to link network segments together.
Repeaters work at the physical layer of the OSI model. This means that the repeater simply receives
signals from one network segment and then retransmits them to the next segments.
The hub of a star network topology, for example, can act as a repeater, receiving a signal from one
computer cable and broadcasting it on the other cables. Each computer in a ring topology acts as a
repeater, receiving the signal from the “upstream” computer and retransmitting it to the next computer on
the ring. Repeaters are also used to connect two linear bus segments. This use of repeaters increases
the fault tolerance of a linear bus network because a bad connector or cable on one segment does not
prevent computers on other segments from communicating.
4.3.2 Bridges
13
Local area network (LAN)
Topic 3 – Designing the network
Revision 0
Sep 2000
A bridge operates at the data link layer of the OSI model. This means that the bridge sees only the
packet’s frame information, which consists of the addresses of the sender and receiver along with errorchecking information. During network operation, the bridge watches packets on both networks and builds
a station of workstation node addresses for each network. When it sees a packet on one network that
has a destination address for a machine on the other network, the bridge reads the packet, builds new
frame information, and sends the packet out on the other network. Bridges work at the data link level,
and are used to connect networks of the same type. For example, a bridge can connect two different
token ring networks and allow more than 100 users to access the same NetWare server.
Another use for a bridge might be to break a heavily loaded Ethernet or 10BaseT network into two
separate networks in order to reduce the number of collisions occurring on any one-network system. A
bridge is often contained in a separate black box but can also consist of specializing software running on
a microcomputer that simply contains two network cards.
4.3.3 Routers
Routers are needed to create more complex internetworks. A router operates at the network layer of
the OSI model and therefore has access to the datagram information containing the logical network
address along with control information. When a router is used, each network must be given a separate
network address. The router information contained in the datagram packet enables a router to find the
correct path and, if necessary, break up a datagram for transmission on a different network system. Two
disadvantages of routers are that they require a little more processing time than bridges and that network
packets must use a datagram format that the router can interpret.
Generally, networks with different network topologies are connected with routers, whereas
networks of the same topology are connected with bridges. Novell uses routers in its NetWare
servers to allow up to eight different network cards to be installed in a single NetWare server computer.
This enables you to use the NetWare server to connect networks of different types and topologies in
order to form an internetwork.
5.0 PROTOCAL STACKS
The network’s protocol stack is responsible for formatting requests to access network services and
transmit data. While the delivery of the data packets throughout a network system is the
responsibility of its data link and physical layer components, the functions of the network,
transport, and session layers are built in to a network operating system’s protocol stack
5.1 IPX/SPX
The IPX/SPX Protocol is Novell’s proprietary system that implements the session, transport, and network
OSI layers, as shown in Figure. Notice that IPX/SPX is not a true implementation of OSI model because
IPX and SPX functions overlap layers. This is true of many older protocol stacks that were developed
before the OSI model was developed and standardized.
FIG/3-23
NCP
SPX
IPX
Ethernet
Token
ring
ARC net
Others
Physical
Data link
X
X
X
X
X
X
OSI Model Layers
Network Transport Session
X
X
X
X
X
Presentation
X
Application
14
Local area network (LAN)
Topic 3 – Designing the network
Revision 0
Sep 2000
IPX (internetwork packet exchange) is the NetWare protocol that manages packet routing and
formatting at the network layer. To function, IPX must be loaded on each network workstation and on the
NetWare server. In addition to IPX, each workstation and NetWare server must have loaded a network
card driver in order to transmit the frames containing the packets. IPX software and the network card
driver are brought together during the network installation process.
In addition to IPX, NetWare uses two protocols, SPX and NCP, to provide network services.
SPX (sequential packet exchange) operates at the OSI transport level and provides guaranteed
delivery of packets by receiving an acknowledgement for each packet sent.
NCP (NetWare Core Protocol) provides the session and presentation levels at the workstation through
DOS requester workstation clients. On the NetWare server, NCP provides network services such as
login, file sharing, printing, security, and administrative functions.
5.2 TCP/IP
Transmission control protocol /internet protocol covers the network and transport OSI layers, as does
IPX/SPX. Unlike IPX/SPX, however, TCP and IP don’t overlap in the transport layer. Like the IPX
protocol, TCP/IP is responsible for formatting packets and then routing them between networks using IP
(internet protocol).
IP is more sophisticated than IPX in fragmenting packets and transmitting over wide area network links.
When IP is used, each workstation is assigned a logical network and node address. IP allows packets to
be sent out over different routers and then reassembled in the correct sequence at the receiving station.
TCP (transport control protocol) operates at the transport level and provides the guaranteed delivery of
packets by receiving acknowledgements. The acknowledgment system allows the sender and receiver to
establish a window for the number of packets to be acknowledged. This allows for better performance
over WANs because each packet does not need to be individually acknowledged before another packet is
sent.
Today TCP/IP is commonly used on UNIX operating systems as well as the Internet. NetWare servers
can use the TCP/IP protocol to communicate with UNIX-based computers to provide Internet services,
and to route TCP/IP packets between network cards.
FIG/3-24
TCP
IP
Ethernet
Token
Ring
Others
Physical
Data Link
X
X
X
X
X
X
OSI Model Layers
Network Transport Session
X
X
Presentation
Application
NetWare 4.1 provides a TCP/IP module that can be loaded on the NetWare Server. NetWare 4.1 also
allows you to use TCP/IP as the NetWare protocol. If you choose to use TCP/IP, IPX packets are placed
within TCP/IP packets—the IPX structure is not totally eliminated.
5.3 NetBEUI
The NetBEUI protocol is Microsoft’s own protocol stack and is integrated into Windows for Workgroups,
Windows 95, and Windows NT products. Of the three protocols described in this section, NetBEUI is the
smallest, fastest, and easiest to use. It has few features, however, and cannot be used in large internet
15
Local area network (LAN)
Topic 3 – Designing the network
Revision 0
Sep 2000
work environments because it does not support the network layer needed for routing packets between
networks. As a result, the NetBEUI protocol is limited to communicating with other computers attached to
the same network cable system. Another disadvantage of the NetBEUI protocol is that it was developed
specifically to support peer-to-peer networking on small networks comprising 30 to 50 workstations.
Physical
NetBIOS
NBForNBT
Ethernet
Token
Ring
Others
Data
Link
Network
Transport
X
X
Session
Presentation
Application
X
X
X
X
X
X
X
The NetBEUI protocol stack consists of NetBIOS and service message blocks (SMBs) at the session
layer and NetBIOS frames (NBF) at the transport layer.
Because NetBIOS-based applications are popular, Novell has provided a NetBIOS interface to work with
its IPX/SPX protocol. This allows workstations to run peer-to-peer applications while still accessing
service from NetWare servers. The LANtastic peer-to-peer network product also uses NetBIOS to
establish communication among DOS-based computers.
5.4 AppleTalk
The AppleTalk protocol suite was originally developed to allow Macintosh computers to communicate in
peer-to-peer networks. It currently provides connectivity for a variety of computer systems including IBM
PCs running MS-DOS, IBM mainframes, and various UNIX-based computers. The AppleTalk protocol
suite was developed after the OSI model was conceived and therefore can be mapped reasonably well to
the OSI layers.
On the data link level, the Apple Address Resolution Protocol (AARP) connects the AppleTalk protocol
stack to the Ethernet, 10BaseT, or token ring protocol. AppleTalk supports the routing of packets
between networks by using the Datagram Delivery Protocol (DDP).
16
Local area network (LAN)
Topic 3 – Designing the network
Physic
al
Apple
Filing
Protocol
(AFP)
Apple
Session
Protocol
(ASP)
Apple
Transition
Protocol
(ATP)
Datagram
Delivery
Protocol
(DDP)
AARP
(Apple
Address
Resolution
Protocol)
Local Talk
Ethertalk
(Ethernet)
Token Talk
(Token
Ring)
Data
Link
Revision 0
Sep 2000
Network
Session
Transpor
t
Presentati
on
Applicati
on
X
X
X
X
X
X
X
X
X
X
X
X
___________
17
Download