Basic Networking White Paper

advertisement
White Paper
Basic Networking
Introduction
As multi-computer households become more common, many home users are discovering the benefits of
networking their computers. For these households, and for small offices and home offices, being able to
share resources becomes a real need. Unless you employ an IT professional, you may be wondering how
you can best share files, printers, and an Internet connection. The solution is a basic network that you can
easily and affordably implement.
A network, or local area network (LAN), is an assortment of interconnected computing devices that allows a
community of people to share information and resources. Networks can range in size from two computers
sharing a printer to thousands of computers worldwide that are exchanging information (these are wide area
networks, or WANs).
With your computers networked, you’ll be able to do the following:
•
•
•
•
•
Share an Internet connection
Access E-mail
Share a single printer
Share files, such as music, pictures, or documents
Play games with multiple users at different computers, or play online games without monopolizing
the Internet
This paper aims to explain the basics of networking. A network is made up of a physical topology, cables
(media), hardware (components), a media access method (i.e., Ethernet, LocalTalk, or FDDI), and network
services (i.e., file or print sharing).
Network Topologies
A topology is the physical layout of a network. The topology of your network will depend on the media
access method it uses and the type of cables that are installed. Large networks that involve a wide physical
area may use a combination of topologies. However, a small network need only employ one topology. There
are three common types of network topologies: star, bus, and ring (or star-wired ring).
Star Topology
In this topology, each device (computer, printer, server, peripheral, etc.) has a dedicated set of wires
connecting it to a central network hub or switch. (See Figure 1) The failure of one connection usually will not
affect the other connections in the network. Also, all network traffic passes through the hub, so the hub may
act as a central point for gathering statistics and isolating problems in the network. This topology is common
for Ethernet, FDDI, and ATM networks.
Bus Topology
In a bus topology, each device is connected directly to a common cable, and most often serves as a
backbone for a network. (See Figure 2) This wiring scheme is unstructured, without a central point, and can
be difficult to troubleshoot. No hub is required for this topology, which can help to keep the network costs
lower.
1
5/21/03
Asanté Technologies, Inc.
White Paper
Ring Topology and Star-Wired Ring Topology
A ring topology is made up of a logically closed loop of cable. Data packets travel around the ring from one
network device to the next. (See Figure 3 below.) Each device acts a repeater (it regenerates the signal) to
send the packets to the next device. If one device fails, the whole network is affected, making this topology
difficult to implement and maintain. Because of this disadvantage, another topology was created: the starwired ring topology. (See Figure 4 below.) It has essentially replaced the ring topology. Networks using the
star-wired ring topology have devices radiating from a hub, which acts as a logical ring with data packets
traveling port to port in sequence. The benefit is that, like a star topology, if one device fails, the network can
continue to operate.
Cabling
Cable is what connects all your network devices together, transmitting data between them. Larger networks
that use multiple topologies may also use more than one type of cabling, whereas a small home network
requires just a single type of cable. The type of cable you use depends on the network’s topology, size, and
network technology (i.e., Ethernet, FDDI, or LocalTalk).
Twisted-Pair Cable
This cable consists of two insulated wires that are twisted around each other and covered with a plastic
casing. Shielded Twisted Pair (STP) cable includes a layer of shielding that is placed between the wire and
the casing. STP is less affected by noise interference than Unshielded Twisted Pair (UTP) and can transmit
data farther, but is more difficult to install, and more expensive as well. UTP cabling is a popular choice for
most LANs. UTP cable is grouped into categories, numbered 1 through 6. The higher the category rating,
the tighter the wires are twisted together, allowing for faster data transmission with less interference on the
wire.
2
5/21/03
Asanté Technologies, Inc.
White Paper
Fiber-Optic Cable
Fiber-optic cable is made of flexible glass and plastic. Data is transmitted via photons, or light. Fiber-optic
cable is more resistant to electronic interference than other media types, and is therefore able to transmit
data signals farther than coaxial or twisted pair cabling. It is often installed as a backbone in large facilities
and between buildings. However, the cost of installing and maintaining fiber-optic cable makes it a poor
choice for small home networks.
Coaxial Cable
This type of cable has a copper conductor surrounded by insulation, a secondary conductor (the two
conductors on the same axis explains the name coaxial), and a plastic outside covering. Because of the two
layers of shielding, it is very resistant to interference, and can be used to transmit data long distances.
Coaxial cable is a good choice for running the lengths of buildings as a bus topology on the network
backbone. LANs use two sizes of coaxial cable, commonly referred to as thick and thin coaxial cable. Thick
coaxial, or thicknet, cable adheres to the 10Base5 Ethernet specification, with a maximum segment length of
500 meters. Thin coaxial, or thinnet, cable uses the 10Base2 specification, with a maximum segment length
of 200 meters. Thick coaxial cable can extend farther than thin, but thin coaxial cable is more flexible, less
expensive, and easier to install, making it the more popular of the two.
Network Components
The components of your network include both the hardware and the software. Whether your network uses
some or all of the following components will depend on its size and the needs of the users.
Computers: The most obvious part of a network is the computer. It is what connects people to the network,
allowing users to share resources and information.
Network Adapters: The network adapter is the physical link between the computer and the network cable.
Typically, an adapter is a card that slides into an expansion slot, an external device, or is built into the
device, and provides a connector for attaching network cable.
File Server: A file server is a high-speed, large memory computer that acts as storage for data and
application programs for the network. A small home network is not likely to require file servers. A file server
can also act as a print server or mail server. A print server spools print jobs and stores them until the printer
is available, thereby freeing the user’s computer to continue with other tasks. A mail server stores e-mails
until the user retrieves the messages.
Network Operating System (NOS): A NOS is a software program that resides on the server. It supervises
how the network operates by defining who can use the network, and how information and resources are
shared among users. A small home network is not likely to require a NOS. The NOS depends on, and runs
on top of, the server’s operating system. Common NOSs include Microsoft Windows NT, Novell NetWare,
AppleShare, and Unix.
3
5/21/03
Asanté Technologies, Inc.
White Paper
Ethernet/Fast Ethernet Switches: Sometimes called routers, or Internet routers. Essentially, an Ethernet
switch is a multi-port bridge that provides a dedicated 10 or 100 Mbps Ethernet connection between ports.
With switches, multiple 10/100Mbps connections can be simultaneously established, increasing the
aggregate bandwidth of the network. Switches also allow for a high bandwidth Fast Ethernet or Gigabit
Ethernet link to servers or the network backbone. In most small home networks, a switch provides a link to
your modem, thereby allowing you to share your Internet connection. Note: a 100Mbps switch will increase
your bandwidth within your LAN, but does not increase the speed of your Internet connection.
Bridges: When the number of devices on a network increase, so does the network traffic increase, slowing
data transfer. A bridge divides the network into smaller segments and can filter traffic between segments to
create better traffic control. The segments remain part of a logical network.
Routers: Routers are similar to bridges, but are able to logically separate multiple network segments,
allowing them to function as independent networks. Also, routers can perform advanced functions such as
calculating the shortest path between the source and destination.
Gateways: A gateway is a more complex device used to link two or more networks with different network
architectures, e.g., from Ethernet to Token Ring. The term gateway can also refer to the point of access
between a network and the Internet. For example, in your home you may have two or three computers, a
printer, a modem and an Internet router. The router becomes the gateway to the Internet, and the computers
attached are secured “behind” the router.
The OSI Model
The Open Systems Interconnection (OSI) Model is a set of seven layers that describes how data travels
from one computer to another over a network. It is worth outlining here, since network switches and routers
will come with different capabilities and features, depending on which OSI layer they can function. The OSI
Model was developed by the International Standards Organization (ISO) to define a standard for designing
data communication protocols in order for interoperability between equipment from different manufacturers.
Communication between computers begins at the Application Layer, where data is sent through the layers,
across the cable to its destination, and back up the layers to the receiving computer’s application.
The top three levels represent the Application Set:
•
•
•
Layer 7: The Application Layer—interacts with the software (operating system) running on the
computer
Layer 6: The Presentation Layer—translates data from the user to a standard format that other
layers will understand
Layer 5: The Session Layer—synchronizes communication between computers, controlling when
users may send and receive data
The remaining layers represent the Transport Set:
•
•
•
•
4
Layer 4: The Transport Layer—ensures that data makes it intact to its destination, and can
request retransmission if data is not intact. This layer maintains flow control, integrating data from
multiple applications into one data stream for the physical network
Layer 3: The Network Layer—handles logical protocols, translates addresses and routes data
from one device, or node, to another
Layer 2: The Data Layer—assigns the appropriate physical protocol to the data. It defines how
data is transferred over the cable, provides data link service to the higher layers, and defines who
can use the network when multiple computers are trying to access it simultaneously
Layer 1: The Physical Layer—the level of the actual hardware, and deals with the properties of
the cable and connectors
5/21/03
Asanté Technologies, Inc.
White Paper
Network Technologies
Network technologies are used for connection of peripherals to computers, computers to computers,
computers to network devices, and network devices to other network devices or backbones. Different
network technologies use different media access control methods (Carrier Sense Multiple Access, with
Collision Detection—CSMA/CD—or token passing). Local Area Network (LAN) technologies connect
multiple devices that are physically close together, as in an office or home office. Wide Area Network (WAN)
technologies connect devices that are physically separated—across a city, or across countries.
The following list describes several of the most popular network technologies:
•
•
•
•
•
Ethernet, Fast Ethernet, and Gigabit Ethernet
Token Ring
LocalTalk
FDDI
Wireless
Ethernet
The first specifications for Ethernet were established in the 1970s by Digital Equipment Corporation, Intel,
and Xerox (and was known as DIX Ethernet). Later, in the 1980s, the Institute of Electrical and Electronics
Engineers (IEEE) published Project 802. IEEE 802.3 is the Ethernet Working Group standard that continues
to be used today.
Ethernet is the networking technology used by the Internet. It has become a well-understood technology,
and with its speed and reliability, has become one of the most popular network technologies. As a nonproprietary industry standard, Ethernet network components from multiple manufacturers will work together
and be able to communicate effortlessly. It can be implemented in both small and large network
environments, in bus and/or star configurations. Ethernet networks transmit data over UTP, thin coaxial,
thick coaxial, and fiber-optic cables at rates of 10Mbps (Ethernet), 100Mbps (Fast Ethernet), and 1000Mbps
(Gigabit Ethernet). Gigabit Ethernet and Fast Ethernet both have backward compatibility to 10Mbps
Ethernet, making it simple and affordable for growing networks.
All types of Ethernet use a media access control mechanism called Carrier Sense Multiple Access, with
Collision Detection (CSMA/CD). This means that on an Ethernet network, each computer “listens” to the
cable before sending a data packet. If the cable is clear, the computer will transmit; otherwise, the computer
waits and tries again. If two or more computers transmit simultaneously, a collision occurs (the signals from
the two devices run into each other). Each device then attempts to resend its data when the cable is silent. It
is normal to have collisions, as long as the number remains low compared to the number of signals that
transmit successfully.
Token Ring
The Token Ring media access method was developed in the mid 1980s by IBM Corporation, and
subsequently defined by the IEEE in Project 802. Since Token Ring has been IBM's preferred method for
networking, it is found primarily in large IBM mini and mainframe installations. Due to the increasing
popularity of Fast Ethernet and Ethernet, the number of Token Ring networks has significantly decreased.
Token Ring networks use a star-wired ring topology over shielded and unshielded twisted-pair wiring. A type
of hub called a Multi-station Access Unit, or MAU, is at the center of the ring. Two versions of Token Ring
are available: 4Mbps and 16Mbps.
Token Ring networks use a token passing media access control mechanism to circulate packets around the
ring. An electronic token travels from station to station in a single, logical direction. If the token is free, a
station can attach data to the token, change the token's status to busy, and then send the token on to the
next station. Each consecutive station then checks the destination address of the data to see if it should
process the data. It then passes the token on. When the station that originated the token receives it back, it
removes the data from the token and changes the token status back to free.
5
5/21/03
Asanté Technologies, Inc.
White Paper
LocalTalk
LocalTalk is a proprietary media access method built into Apple Macintosh computers and LaserWriter
printers. LocalTalk networks are best suited for small networks of Macs (e.g., a home office or an
independently networked classroom). With LocalTalk, computers are set up in a bus configuration using
both shielded and unshielded twisted-pair wiring. Data transmits at only 230.4Kbps, or about 1/40 the rate of
Ethernet. For this reason, many schools and universities are upgrading their LocalTalk Macintosh
installations to Ethernet and Fast Ethernet in order to better handle large file transfers.
LocalTalk uses the CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) media access control
mechanism for transmitting data. CSMA/CA is similar to CSMA/CD in that a computer listens to the cable
before transmitting data. If the computer does not detect a signal, it will send its own signal to try to avoid
collisions—in effect saying, "I'm about to transmit, so stay off the line."
FDDI
The Fiber Distributed Data Interface (FDDI) media access method transfers data at very high speeds
(100Mbps) over fiber-optic cable. Like Token Ring, this access method employs a token passing media
access control mechanism to transmit data. FDDI, however, uses a dual counter-rotating ring topology,
meaning there are two rings of cable with two tokens circulating in opposite directions. This set-up
creates a relatively fault-tolerant network and is commonly used in networks working with mission-critical
data. If a link fails, the network continues to operate. Each station contains relays that bypass a station if it is
having problems. Before Fast Ethernet and Gigabit Ethernet came along, FDDI was commonly used in the
LAN and campus environment, as well as in the backbone to tie together devices on service provider
networks and at exchange points on the Internet. FDDI can support up to 500 devices or nodes, over a
maximum distance of 100 kilometers (60 miles). It can also support copper cable over shorter distances.
The dual counter-rotating rings offer redundancy (fault tolerance). If a link fails or the cable is cut, the
network continues operating. Each station contains relays that join the rings in case of a break or bypass the
station in case it is having problems.
Wireless
Wireless LANs (or WLANs) are the equivalent of wired LANs (usually Ethernet) without the wires. WLANs
send high-frequency radio signals between computers to share data. WLAN technology has advanced
rapidly, and is now a convenient and affordable alternative for home and office environments. The wireless
data rate can reach speeds of 11 Mbps, which is comparable to Ethernet. The convenience of wireless is
attractive to many home network users, by giving freedom to move about with a laptop or by eliminating the
need to run cable through the house.
A typical WLAN consists of a fixed-position wireless access point, which is a wired transceiver
(transmitter/receiver) that broadcasts data to the wireless adapters that are installed in each computer. The
access point can be connected to the network backbone in larger networks. In a home or small office
network, the access point can act as the Internet gateway.
Network Protocols
A network protocol is the format for sending and receiving data. In order for any devices on a network to
communicate, the devices must understand the same format (like a language). Your computer and devices
must support the right protocols for your network to work. Some common protocols are NetBEUI, AppleTalk,
and TCP/IP.
NetBEUI
NetBEUI stands for NetBIOS Extended User Interface. NetBEUI is an updated, extended version of the
NetBIOS protocol that was developed by IBM. Microsoft adopted it for use in its network operating systems,
such as Windows NT and LAN Manager. NetBEUI is useful for communication within a local area network,
but it does not support routing messages to other networks. Your network will require another protocol, such
as TCP/IP, for communication beyond your LAN.
6
5/21/03
Asanté Technologies, Inc.
White Paper
AppleTalk
AppleTalk is the proprietary set of LAN communication protocols created specifically for Apple computers. It
provides inter-network routing, transaction and data stream service, naming service, and file and print
sharing services. The AppleTalk protocol suite is an inexpensive and easy networking protocol that uses the
LocalTalk interface built into Apple computers. AppleTalk is capable of porting to Ethernet, and can be used
together in an Ethernet network.
TCP/IP
Transmission Control Protocol/Internet Protocol (TCP/IP) is the standard for transmission on the Internet,
and has become the dominant networking protocol in the world today. The suite actually uses several
protocols, with TCP and IP as the two main ones. They act as a two-layer system. The higher layer is
Transmission Control Protocol (TCP). It ensures that packets are delivered to the intended destination, in the
same order that they are sent. The lower layer is Internet Protocol (IP). It specifies the format of the data
packets and addresses those packets in order that the message can reach its destination.
Network Services
So far we have described what networks look like physically, as well as how they transmit data. Now we will
look at some of the benefits of networking. Refer to your computers’ operating system (OS) manual for
information on configuring the following services.
File Sharing
An important task of any computer network is the ability to share files. Many versions of popular operating
systems make file sharing fairly easy to set up, and once done, any computer on the network can share files with
any other computer. Sharing your entire hard drive is not recommended, so check with your OS documentation
on how to secure private files.
Print Sharing
Print services allow users to send print jobs to a shared printer. Some networks are set up so that computers
print to a print queue on a server. The server then handles the printing, allowing the user to continue his or
her work even if the print job hasn't finished. A small home network, however, may simply need to share
one printer without the hassle of moving it between computers. Please refer to your OS documentation
for more information.
Some Ethernet switches, or Internet routers, come equipped with a serial port that allows several users
to all reach one printer without enabling print sharing on the OS. See your switch’s documentation for
more information.
Sharing the Internet Connection
One of the more attractive benefits to networking your computers is the ability to share your Internet
connection. There is software available to enable you to share a connection (e.g., Microsoft’s ICS), as well
as hardware devices (e.g., Asanté FriendlyNET cable/DSL routers). You’ll have to select and install the
software or hardware that allows sharing the connection, and you’ll need to configure each computer to
access the Internet via the shared connection. Please refer to your product’s documentation for more
information.
7
5/21/03
Asanté Technologies, Inc.
White Paper
Glossary
Access Method: The method that a computer uses to put a signal onto the networking media is called the
access method. Media access methods include token passing and CSMA/CD.
AppleTalk: A networking protocol developed by Apple for communication between Apple computer products
and other computers that is independent of the network layer on which it is run. Implementations exist for
LocalTalk, a 230.4Kbps local area network; and EtherTalk, a 10Mbps Ethernet local area network.
Backbone: The line or set of lines that local area networks connect to for a wide area network connection,
or, within a LAN, to span larger distances (e.g., between buildings). On the Internet or other WAN, a
backbone is a set of paths that local networks connect to for long distance connection.
Bandwidth: Typically, this means the amount of data that can be sent through a given communications
circuit. For example, Ethernet has a bandwidth of 10Mbps (megabits per second). Technically, it is the
difference, in Hertz (Hz), between the highest and lowest frequencies of a transmission channel.
Bits Per Second (bps): A measure of the rate of data transmission.
Bridge: A device that connects two or more networks and forwards packets between them. The segments
must use the same networking technology, such as Ethernet, but may use different cable types. It is used to
relieve network congestion by separating traffic on the two networks. Bridges differ from repeaters in that
repeaters simply forward electrical signals from one cable to another. Bridges can usually be configured to
filter packets; that is, to forward only certain traffic. See repeater.
Coaxial Cable: A cable with an inner and outer conductor sharing the same axis or center point. Ethernet
can use coaxial cable; cable TV also uses it.
CSMA/CA (Carrier Sense, Multiple Access with Collision Avoidance): A media access method used by
the local area networking technology LocalTalk. Similar to CSMA/CD (see below).
CSMA/CD (Carrier Sense Multiple Access with Collision Detection): A media access method used by
local area networking technologies such as Ethernet. Multiple stations contend for access to a transmission
medium by listening to see if it is idle. A mechanism is provided to detect when two stations simultaneously
attempt to transmit data.
E-mail (Electronic mail): A system enabling a computer user to exchange messages with other computer
users (or groups of users) via a communications network. E-mail is one of the most popular uses of
internets.
Ethernet: The most common LAN networking system in the world today. Ethernet is a best-effort delivery
system that uses CSMA/CD technology. It runs at 10Mbps, 100Mbps (Fast Ethernet), or 1000Mbps (Gigabit
Ethernet). Ethernet can be run over thin-wire coaxial cable (10BASE2), thick-wire coaxial cable (10BASE5),
twisted pair cable (10/100/1000BASET), or fiber optic cable.
FDDI (Fiber Distributed Data Interface): A high-speed (100Mbps) fiber optic LAN standard based on token
ring.
Fiber Optic: A data transmission medium consisting of glass or plastic fiber(s).
Gateway: The original Internet term for what is now called a router—or more precisely, an IP router. In
modern usage, the terms gateway and application gateway refer to systems that connect LANs with different
protocols or data format.
Internet: A worldwide network of interconnected computers and computer networks.
IP (Internet Protocol): The network layer protocol for the TCP/IP protocol suite.
ISO (International Organization for Standardization): The organization responsible for establishing
worldwide computer network standards, it developed the seven-layer OSI (Open Systems Interconnection)
suite of network protocols.
8
5/21/03
Asanté Technologies, Inc.
White Paper
LAN (Local Area Network): A LAN connects a group of computers, printers, and other devices together,
usually a network in one office or building.
Layer: Communication networks for computers may be organized as a set of more or less independent
protocols, each in a different layer (or level). The lowest layer governs direct host-to-host communication
between the hardware on different hosts; the highest layer consists of user applications. Each layer builds
on the layer beneath it. For each layer, programs on different hosts use protocols appropriate to the layer to
communicate with each other. TCP/IP has five layers of protocols; OSI has seven.
MAU: 1. Media Access Unit (transceiver). 2. In a Token Ring network, Multi-station Access Unit (properly
abbreviated MSAU).
Media: The physical wiring of a network; for example, coaxial cable, twisted-pair wire, or fiber optic cable.
NetBEUI (NetBIOS Extended User Interface): Provides data transport services for NetBIOS.
NetBIOS (Network Basic Input/Output System): An interface used by application programs in a PC to
access networks. Defined by IBM and extended by Microsoft. Used in Windows NT, Windows for
Workgroups, and OS/2.
Network: A computer network is a data communications system that interconnects computer systems at
different sites. A network may be composed of any combination of LANs or WANs.
NIC (Network Interface Card): Circuit board installed in a personal computer to allow connection to a local
area network.
Operating System (OS): An organized collection of programs that control the operation of a computer
system (e.g., MS-DOS, Windows, or Macintosh OS X).
OSI (Open Systems Interconnection) Reference Model: A suite of protocols, specifically ISO standards,
that uses a seven-layer model as the international standard computer network architecture. See ISO.
7 - Application (managing communications between applications)
6 - Presentation (identifying data syntax)
5 - Session (establish and control dialog between users and machines)
4 - Transport (end-to-end reliability)
3 - Network (routing of end-to-end data packets)
2 - Data Link (error-free transmission of bits on the interface)
1 - Physical (hardware interface)
Protocol: A formal description of message formats and the rules two computers must follow to exchange
those messages. Protocols can describe low-level details of machine-to-machine interfaces or high-level
exchanges between application programs.
Repeater: A device that propagates electrical signals from one cable to another without making routing
decisions or providing packet filtering. See bridge and router.
Router: A device that interconnects LANS and dynamically routes data depending on parameters such as
destination and available routes (at the OSI network layer 3). See gateway, bridge, and repeater.
Server: A computer that provides the services for all nodes on a LAN. Examples of servers are file servers,
print servers, and database servers.
Switch: A switch is a multi-port bridge. It routes packets out one of its ports based on the destination
address of the packet.
TCP (Transmission Control Protocol): The TCP/IP standard transport layer protocol in the Internet suite of
protocols, providing reliable, connection-oriented, full-duplex streams. It uses IP for delivery.
TCP/IP Protocol Suite (Transmission Control Protocol over Internet Protocol): This is a common
shorthand that refers to the suite of transport and application protocols that runs over IP.
9
5/21/03
Asanté Technologies, Inc.
White Paper
Token: A combination of bits that a workstation uses as permission to transmit on a token ring network.
There is only one token on a token ring network. FDDI uses token passing—in which case, more than one
token may be present at a time.
Token Ring: A token ring is a type of LAN with nodes wired into a ring. Each node constantly passes a
control message (token) on to the next; whichever node has the token can send a message.
Topology: A description of the physical cabling and connections on a network.
Transceiver: A device used to convert from one media type to another.
Twisted Pair: Cable used in a network where the wires in cable pairs are twisted around each other. Wire
types are STP (shielded) or UTP (unshielded) twisted pair.
WAN (Wide Area Network): A network connecting devices over longer distances.
10
5/21/03
Asanté Technologies, Inc.
Download