Guidance for a measurement titled “Measurements for local computer networks” VOL 1 Written by: Telecommunication pattern laboratory of Department of Telecommunication and Telematics in September 1995 First edition: Department of Telecommunication and Telematics Telecommunication pattern laboratory September 1995 Composed by: György Horváth,engineer Tel.: 18-65 MAIL: horvaath@bme-tel.ttt.bme.hu Content Usage of guidance Concept of LAN, and the OSI reference model Building elements of the network of Department Cabling Testing of cables Testing of line signals IEEE802 series of recommendation SIEMENS K1102 type of LAN protocol tester Databases of K1102 Mandatory literature Recommended literature Appendix 1. Ethernet Vendor codes Appendix 2. Codes of the Etherneet Type field i About the usage of the guidance This guidance was prepared for a measurement of Telecommunication and Communication Networks of “A” module laboratories of Electrical Engineering Department titled “Measurements for local computer networks”. Its primer t ask is to introduce students through some examples to the basic methods of testing the local networks. On the one hand it presents the network of Department, following the layers of OSI reference model, and then presents the services of a protocol tester, and the method of its usage. . We assume, that the reader has some basic user knowledge of IBM-PC typed personal computers, and Novell and Unix (TCP/IP) network applications. This material is a guidance for topics mentioned below: Concept of LAN, and the OSI reference model Building elements of network of the Department Physical layer - Cabling- Testing of cables Physical layer – Testing of line signals Series of recommendation IEEE802, LLC/MAC, the 2. layer SIEMENS K1102 typed protocol tester Traffic generation, monitoring Preparation of trends, statistics Testing of layer III. protocols, routers Applications, and a correspondent Gateway This document (plus a measurement record) can be found presently at N drive of PUB field of servers of the Department in subdirectory of MERESEK\10\DOC alkönyvtárában (in the case of GUEST, vagy MERES5,6 topic numbers it is on the L drive) at the name of LANVIZS.DOC (or MERES10.DOC). 1 Concept of LAN and the OSI reference model Concept of LAN (Local Area Network) is the following according to the IEEE (Institute of Electrical and Electronics Engineering): A kind of datacommunication system, which can make possible for numerous independent tools to communicate with each other directly within a medium-sized geographical field, with the help of a physical communication channel installed for this purpose, with a medium capacity. The present computer network of our Department is a typi cal LAN, if the files, printeable materials, electronic letters arosen during the computer work must be forwarded with speed of 10...16 Mbit/sec among the approximately 100 pieces of computers existing in building Stoczek working independently from each ot her, through thin Ethernet, token-ring, and thick Ethernet cables, that can be found in this building miscellaneously (see next chapter). OSI (Open System Interconnection) reference model connects systems, which are open for a communication with other systems. The model based on a recommendation worked out by ISO (International Standards Organisation) is a hierarchic one, and consists of seven layers built onto each other. They are the following: 7. Application layer It provides direct services for the users. In the case of LANs it is realized by network applications installed to the workstation, or to the server, which have either a user surface, or are able to complement the resources of the given operation system with network resources, e.g. file transfer, electronic correspondence, remote terminal service, printing, etc. 6. Presentation layer It provides semantically correct information for the application to ensure the platform-independent operation. E.g. two different operation systems at the to ends of the link, code conversion. A typical problem is the lack of this layer in case of transmission of the file over the TCP/IP protocol (FTP), where the user must inform the other side about the type of the transmittable file. 5. Session layer It organizes the cooperation between the graphic entities, synchronizes their dialogues, and transacts their data changes. 4. Transport layer 3. Network layer 2. Data link layer 1. Physical layer It provides the end-to-end delivery of messages through the network. This layer can transmit messages transparently with suitable packaging of the data flow. E.g. it provides forwarding of the packages to the upper layers in an appropriate order. It provides a network connection, maintenance and dissociation between stations containing communicating entities besides an appropriate route extraction (searching or designation). E.g. connecting-transmitting tools of LAN (router) must give this layer the most powerful support, using the database describing the topology of the network dynamically and/or statically. Tools, with that one, or more data connecting connection can be generated, maintained, or dissolved. Task of this layer is to expose, or improve errors occurring in the physical layer during transmission. According to the recommendations of IEEE 802.x series, this layer broke into two parts: one is the LLC (Logical Link Control) which makes a logical connection control, independently from the medium connection method; and the other is the MAC (Media Access Control), which controls the availability of the given physical layer. E.g. CSMA/CD, token, connected, etc. These are the tools and processes, which are necessary for transmitting data, for generation, maintenance and dissolving of physical connection between data connection entities. E.g. this layer shows, that a bit series with no sense for the layer can be taken away with what kind of line coding, with what kind of electrical characteristics with what type of cable, and how far away. Operation mode of the layers mentioned above can be conditioned with processes and methods controlled well, which are suitable for a so called layer protocol. In a computer connected to a network, unique layers of a reference model can have a concrete shape. Hardware/software technical elements of layers can occur in different forms. E.g. 7 layers can be realized by inner or outer commands of the operation system, complemented with network resources, or by task-oriented applications, the 4..6 layers can be realized by dynamic or static process directories, while the 1..3 layers are realized by driving softwares with BIOS or kernel level, and by the connecting cards connected with cable. 3 Building elements of network of the Department Network of the Department relies on the NetWare v3.1x of Novell, and on its 4.1 series network operation system, and on the network services of the various UNIX-os platforms (DEC-Alpha, IBM RS6000, Sun Sparkstation). Basic model of Novell realizes a typical server/client connection, where the server integrates resources necessary for the laboratory work (mass storage devices with fixed disk, printers, data connection with other servers/networks, etc.) which are used by PC based workstations with less resources. HSN laboratory of the Department relies on UNIX workstations with a large capacity, where both the server and the client applications are used in a given computer. Application of the Microsoft Windows-based (Workgroup) peer-to-peer model is not typical. One of the most evident characteristics of network is the accessing physical connection, and its topology. It mostly covers the arrangement of the cable system, the computers, and their network connecting cards, and other network building elements. Sematic draft of the department network can be seen on Figure 1 (it is the state of September 1995). Transmitting data on the physical network is executed according to largely standardized protocols. Protocol levels embedded into each other provide the access to the data transmitting medium, the logical data connection between the intermediate points, and the addressing and route searching processes, data security and order of importance, connection between the ends without any error, and the incidental code conversion for the user programs. Novell network prefers IPX/SPX protocols, but it supports also the TCP/IP protocol preferred by UNIX system among others, which makes possible the connection to the department computers (IBM/RISC, DEC/ALPHA, Sun), to department and university computers (Sun, HP/Apollo), to UNIX laboratories and to the Internet. There are numerous computers at the University, which are DEC products with a VMS operation system running on them, and their preferred protocol is DECNET. There was an SNA-based local network for years in the PS2 laboratory of our Department, which is the preferred network architecture of the SNA. Sztoczek gerinchálózat Dial Up Távközlési laborok Stáb II. em. Multimédia Labor PS2 Labor Mérõhely felé DSP Labor Tanszéki gerinchálózat 16 Mbit/sec Token-Ring I. em. Egyetemi hálózat felé Alhálózati szegmensek 10 Mbit/sec Ethernet Fszt. UNIX Labor Jelmagyarázat Figure 1 Sematic draft of the network of the Department We can track on the above figure, what kind of basic elements build the department netwok. In the further part of our material we will examine the role, the operation, and the test of the individual elements in details, including the concept of the repeater, the router, and the gateway. 5 Cabling We can classify networks on the basis of the medium used for the transmission. Here are some typical medium, transmission rate and its connectors: Copper cable Unshielded-Twisted-Pair, UTP Speed 10 Mbit/sec* Tip. Z0 Conn RJ11 120 RJ45 IBM tr 150 16 Mbit/sec Shielded-Twisted-Pair, STP Asymmetrical coaxial cable 10 Mbit/sec BNC 50 Glass fiber Multimodal cable pair 150 Mbit/sec n/a SMA Multimodal cable pair 150 Mbit/sec n/a ST Radio channel Wireless LAN, transmission with spreaded 2 Mbit/sec n/a spectrum *In the case of Fast-Ethernet the speed is 100 Mbit/sec! Nowadays the 100BaseT is standardized. Table 1. Some typical transmission medium The figure below shows the cables mentioned in Table 1, with their connectors: IBM Token-Ring RJ11 Krimpelt BNC RJ45 Csavaros BNC Figure 2 Cables with connectors Hereafter we will present cable types of a network connecting tool applied in our Department now, or earlier, with a simple error searching process. Our Department prefers the usage of the thin Ethernet cable for connecting computers. Wave impedance of an RG58C/U typed coaxal cable with an 5-mm diameter, and a plastic cover is 50 . Individual parts are given by pieces with a BNC plug of their ends.. On Figure 1 elements marked as En2, En4, En6 were implemented with this kind of cable type The cable of ArcNet network used earlier was a coaxial RG62 type, too, with a wave impedance of 95 . We do not already use this type here at our Department. Cable of the token ring realizing the main network of the Department is an IBM Type 1, which has a pair of STP in a mutual plastic wrap. We can see the identifier of the Tr5 in Figure 1. Topology of cabling can be various, as we can seen on the following figure: Sín (Bus) topológia Gyûrû (Ring) topológia Csillag (Star) topológia HUB MAU Csillag-Gyûrû (Star-Ring) topológia Figure 3. Network topologies Arrows on this figure intent from the transmitting unit of one computer to the receiving unit of the other computer. 7 For the topology of the track the thin Ethernet subnetwork segments of the Department can provide a typical example (En0, En4, En6 segments on Figure 1).Computers can connect to the segment closed with a 50 of resistance on its two ends with T forks on the bottom of the BNC unit of the transceiver of the Ethernet connecting card inside them. We can see a on the right side of the figure a closure implemented in a factory, while the figure below shows a connecting point with the raised connecting card. . In case of a start topology the transmission-reception circuits in the HUB unit will provide the transmission of the signal received on one of the ports to the others. In case of the older Arcnet network the active HUB can make a signal regeneration, too, while the passive HUB is a simple circuit built up from resistances. The modern Fast-Ethernet HUBs can make even intelligent traffic filtering tasks. Topology of Token ring realizing the main network of the Department is the Star-Ring (it is the Tr5 ring in Figure 1). MAU (Multi-station Access Unit, do not mix it with terminology named Media Attachment Unit applied in IEEE 802.x standard series) provides the sectioning of a wrong or a dead wire computer. Simple ring is rarely applied because of its poor error-tolerant ability, while the double ring is a typical topology of optical connections with a large speed. Examination of cables Operation of local networks is largely influenced by the quality of cabling. Data traffic can slow down, or can be entirely stopped because of cable errors. It refers to that kind of error, if the number of repetitions or the control text (CRC) errors grow very fast during the examination with a protocol tester, or with the examination of the inner counters of an intelligent network tool (e.g. SNMP based monitoring). With the help of the following simple measuring scheme the mosst types of errors can be exposed easiliy besides locating the place ot the error. Drawback of this measuring method, that it can be made only on a section, which is free from traffic (free from energy Principle of measurement: Time domain reflection measurement (TDR) Tools of measurement: - LeCroy 9450A 300Mhz oscilloscope - Justification generator of the oscilloscope, as an impulse generator - A computer connected to the oscilloscope with GPIB for documentation purposes Measurable object: induction - Klf.(?) cable sections with an error place Draft of the measuring arrangement: Oszcilloszkóp Impulzusgenerátor U0 Zg Generátor impedancia kiegészítése Z0-ra U0/2 l 0 Kábelszakasz az elsõ hibáig Hibahely 0 t1 t2 t3 - Indítás felfutó élre - Trigger szint kb. U0/10 - Idõalap kb. 50 nsec/div - referencia az indításon Lezárás Z0 Figure 4. Arrangement of a simple TDR measurement The task of the Zg complementary element shown on this figure is to complement the inner impedance of the justification generator to the nominal impedance of the tested RG58C/U cable section. We can 9 count the way from the reference point on the side of the generator to the first error place (distance of the error place) from t1 time, which is necessary to the wave front to run this distance from the first error place and back (reflection). In the case of the cable in the measuring place the speed of the wave front is approximately 200000 km/sec (group speed), which is smaller, than the speed of the light. In our case distance can be estimated with the formula below: l t/10 ahol l méterben, t pedig nanoszekundumban van megadva. Analysing the figure with the oscilloscope we can find several cable errors. From t1 to t2 the stranger cable section with a larger wave impedance, at t2 a capacitive endurance at the connection point (waving!), from t3 it is a normal section, while the end of the cable is closed with a tear (running up to U0). It is because of the so many error places, that it cannot reach the U0 of the multiple reflection We can see some oscilloscope sheaths belonging to a simple situation on the line of figures below:. Tear at 10 m (T cstal.slipped apart) rough breakage) Short circuit at 10 m (a crucial BNC error, or a Reactant endurance at 10m (Breakage or a card error) Normal closure at 10m Figure 5. Some typical TDR situations 11 Examnation of line signals Important characteristic of a given LAN architecture is the method of a line coding (or perhaps modulation) applying during reception , and the electrical methods of the signal (levels, speed). The two following tables summarize two processes applied in the case of the LAN of the Department: Name Ethernet Token-Ring Standard IEEE802.3 IEEE802.5 Speed 10Mbit/sec 16Mbit/sec Coding Manchester Differential Manchester The following figure shows the beginning of an Ethernet package on the screen of the oscilloscope. We can see on the lower ray the beginning of the frame, as the transmitter switches the impulse flow levelled 2.05V according to the standard to the cable free fromm energy. (We will see only the -1.77 V signal, attenuated by the cable section in the place of the examination.) We can see on the upper ray the a part of the lower signal elongated to the 100 nsec of time base with the 10101011 bit series indicating the beginning of the frame, at the end of the preamble. Manchester coding seen on the figure is very simple,edge running up at the middle of the bit time represents the binary one, while the running down one represents the binary 0. Speed is 10Mbit/sec. 100nsec 1.77 V 1 0 1 0 1 0 1 1 Figure 6. Beginning of an Ethernet frame and its electrical characteristics 13 On a fail-safe, but long cable section the signal suffers such a large attenuation, that won’t be able to a fail-safe connection any more. If, for example, we got at the measuring place packages, where the signal level reduced under 1 V, we can surely expect to s low or wrong operation in the case of a remote workstation. In this case we must induct repeaters, that operates basically as a signal generator, and in the case of a more developed tool, as a traffic filter (which passes through only the traffic from one section to the other). This kind of tool with four connection point can be seen on Figure 1. with an MPR (MultiPort repeater) mark. This table below summarizes the maximum length of the cable in the csase of some Ehternet or token-ring cablings, and the number of the accessible computers in the case of a passive segment. Name Identifier Speed Lenght Thin Ethernet Thickg Ethernet UTP Ethernet Fast Ethernet Token ring Token ring 10BASE2 10BASE5 10BASET 100BASET Type 1 (STP) Type 3 (UTP) 10 Mbit/sec 10 Mbit/sec 10 Mbit/sec 100Mbit/sec 4 Mbit/sec 4 Mbit/sec 185 m 500 m 100 m N/A 750 m N/A --------------------------------------------------- Number of computer 30 100 2,(HUB) 2 (HUB) 260 72 IEEE802-es recommendation series Examining the bottom of the data connection layer of OSI reference model, we can group the various networks according to the method of the medium access, too. The four main access methods are shown in the following table: Centred Distributed On-demand Line connected (PBX) Random access (CSMA/CD) Controlled Polling Token In order to a multiple usage of the given medium we can apply time-shared, frequency-shared or code-shared (e.g. spreaded spectrum) transmission technique. In the case of LANs the IEEE recorded in its 802 recommendation series some of this kind of methods, including the specifications of the physical layer, too. They are summarized in the following table: Standard IEEE802.2 IEEE802.3 IEEE802.4 IEEE802.5 Subject Logical connection control CSMA/CD Token tracks Token ring OSI layer 2LLC 2MAC/1 2MAC/1 2MAC/1 Illustration Ethernet ArcNet IBM Token-ring Hereinafter we will review only the Ethernet process in details, which is a very preferred application at our Department. IEEE802.3 (Ethernet means a product!) CSMA/CD (Carrier Sense Multiple Access with Collision Detection) is a distributed, ondemand, random-access medium access method. This standard recorded six basic functions for the MAC. These are the following: : 1. Framing of the transmission data Preamble, frame, addressing, data embedding, CRC. 2. Organization of medium access transmitter, impact detection 3. Data coding 4. Receiver data decoding Manchester decoding beginning of Receiver perception, switching on Manchester coding Clock signal extraction, frame synch, 5. Reception medium access Detection, CRC control 6. Unpacking of received data Address control, data exposion 15 Here occurs first the typical basic action of the various protocols, the repacking, which means the completion of data packages arriving from higher protocol levels with incidental information necessary for the operation of the given level. Figure 7. demonstrates this activity. Adat az LLC alrétegtõl ... Keret start Elõtag (preamble) Célcím Forráscím Hossz aa aa aa aa aa aa aa ab 00 00 C0 6f 42 b0 00 00 C0 6f 45 c3 05 0a MAC ... Adat az LLC alrétegtõl CRC-32 11 5f 43 2d Figure 7. Framing process of MAC Preamble: aa Hex pattern (10101010 bit series) with the length of 7 bytes to the synch o n the side of the receiver Frame start 1 byte ab Hex indicates the beginning of the frame Task address: The 48-bit Ethernet address of the terminal. The address, which consists of only numeric characters “1” is the so called broadcast, which is a call to every station. Resource address: Address of the transmitting station Lenght: Length of the frame Data: Embedded data from the LLC. CRC-32 32-bit of controlling amount. Since the appearance of the Ethernet, as a product anticipated the standardization procedure, there were numerous types of frame spreaded in practice. One of them is the "Ethernet II", where the length information is absent, and instead of it the frame type occurs derived from the higher protocol layers, that is not a really matching information. . What really unified is in this level, that is the distribution of the first 3 maximum byte of the 48-bit Ethernet among the varoois vendors. Appendix 1 contains the prefixes assigned to the different vendors. E.g. the addresses shown on Figure 7. according to the table refer to the vendor named "Western Digital/SMC". Standard of IEEE 802.2 specify the method of Logical Link Control (LLC) of LANs. As the standard appeared a bit late, it was force to give a start to other product, that have already got a strong place in the market. This solution is really elegant. In the focus of the standard a connection-oriented standard, the so called number 2 tries to fit in the OSI reference model, while the number 1 connection free protocol means the start, where there is no really protocol in special cases, the layer is quasi transparent towards the upper, not OSI layers. In the case of the connection free protocol there is no frame numbering and error protection – these are the tasks of the higher protocol levels. We will not review the connection-oriented case, in details, since the LAN of the Department does not apply this one. Instead of it we demonstrate the summary of frame types occurring at our Department in practice, complemented with the LLC information fields. Byte Ethernet II Ethernet-SNAP IEEE802.3 IEEE802.2 0-5 6-11 Task address Resource address Type Task address Resource address Length DSAP SSAP Control Organization Code (3 byte) Type Task address Resource address Length Task address Resource address 14 15 16 17 18 19 20-21 Length DSAP SSAP Control-1 (Control-2) The start giving mentioned above can manifest itself in the case of the 802.2, and SNAP preferred by IBM, that the operation code of the connection free LLC corresponds to the sending of a plain information without any numbering (Control field, Unnumbered Info, code: 03) at the transmission of Novell and TCP/IP protocols. As an illustration, the table below shows some connection free codes in the case of 802.2 and IBM framing.. Type 1.LLC operation Unnumbered Info. (UI) Change of identifier (XID) TEST 802.2 Control C0 F5 C7 IBM Control 03 AF E3 Type identifiers (Type field) are current in practice, they identify protocols of firms producting various LAN solutions, or “self - 17 employed” protocols of organizations – their list can be found in Appendix 2 SAP (Service Access Point) provides theoretically virtual connection points to the network layer for the access of the individual network services, but in practice it serves for the indentification of higher level or embedded protcols – as it is shown in the table below. 00 02 03 04 06 0E 42 4E 5E 80 8E AA BC E0 F0 F4 FC FE FF Management Individual LLC sublayer management Group LLC sublayer management SNA Path Control Internet IP Proway-LAN Spanning tree EIA-RS 511 ISI IP 3Com XNS Proway-LAN TCP/IP SNAP (Ethernet type in LLC) Banyan VINES Novell IPX IBM NetBIOS IBM LAN Management RPL ISO DIS 8473 Broadcast In the case of the IPX/SPX protocol of the Novell Netware either the resource (Source SAP, SSAP) or the task (Destination SAP, DSAP) code is E0. In case of the Internet traffic of the Tr5 ring seen on Figure 1 this code will be AA. The SIEMENS K1102 typed LAN protocol tester SIEMENS K1102 dual-port protocol analysator is suitable for the examination of local (LAN), and large (WAN) netoworks, with application of optionally changeable interface types - IEEE802.3 (Ethernet), IEEE802.4 Token-Bus, IEEE802.5 Token-Ring, FDDI, and V11/V28 WAN. The specimen in the laboratory has only IEEE802.3 and V28/V11 measuring interfaces. The protocol tester has an independent transmission (traffic generator) and receiver (analysator) function, separatedly for both two ports, thus it is suitable for the examination of network routers and gateways. Its measuring interfaces are different from the normal network connection tools in several points. - More developed clock signal extraction and sycnh Filter functions with a transputer Large, quick storage for longer registrated issues A possibility for a direct data change between the two interfaces Block diagram of the hardware protocol tester: AT-bus ¦ +--AT-CPU----+ ¦ ¦ +-- billentyûzet ¦---¦ AT-alaplap ¦ ¦ ¦ processzor +-- printer ¦ ¦ ¦ ¦ +------------+ +------------+ +------------+ ¦ +--DISPLAY---+ ¦ 1.sz mérõ ¦ ¦ Transputer ¦ ¦ ¦ EGA ¦ EL-EGA LAN1-><--¦ interfész ¦--¦ + RAM ¦--+---¦ csatoló +-- display ¦ és csatl. ¦ ¦ (+Filter) ¦ ¦ ¦ kártya ¦ +------------+ +------------+ ¦ +------------+ ¦ ¦ +------------+ ¦ +------------+ +------+ ¦ +---¦ Ütemezés, ¦ ¦ ¦ Floppy disk¦ ¦Floppy¦ Adatcsere ¦ órajel ¦ ¦---¦ kontroller +-¦disk ¦ ¦ +---¦ kinyerés ¦ ¦ ¦ ¦ ¦drive ¦ ¦ ¦ +------------+ ¦ +------------+ +------+ +------------+ +------------+ ¦ +------------+ +------+ ¦ 2.sz mérő ¦ ¦ Transputer ¦ ¦ ¦ Hard disk ¦ ¦Hard ¦ LAN2-><--¦ interfész ¦--¦ + RAM ¦--+---¦ kontroller +-¦disk ¦ ¦ és csatl. ¦ ¦ (+Filter) ¦ ¦ ¦ ¦ ¦drive ¦ +------------+ +------------+ ¦ +------------+ +------+ ¦ +------------+ ¦ ¦ szabad ¦ ¦---¦ SLOT(ok) ¦ ¦ ¦ +------------+ The module of the protocol tester event and the data extractor consist of the interface connector and the transputer card The examined amount of data can be reduced by installing a hardware levelled filtering function. 19 The protocol tester has a built-in tool ensuring the man-machine connection (keyboard, display), a mass storage device (Floppy, Hard disk, RAM), and recording tools (printer, disk). These functions can operate with the help of a built-in IBM-PC/AT compatible computer. The basic operation system is the DOS 4.0, and the makers of this tool prepared numerous applications for this. There are two program packages in the computer, a one-port Ethernet analysator package from 1992, and a dual-port from 1993, where one of the supported interfaces is the Ethernet.. The one-port (SP) package (c:\k1102etn subdirectory) consists of four elements: * K1102I frame program (shell) * K1102AI standard tests - Node detection - Protocol detection - Examination of the ISO transport layer - Echo test * K1102DI diagnostic - Frame recording - Traffic generation from stored frames - Generate Network Load - Programmed measures (Received event->frame sending) * K1102SI preparation of statistics - Load trend - Collision trend - Fault trend - Length distribution - Gap distribution - Fault distribution - Load distribution according to stations - Display of connection matrix The dual-port (DP) package (c:\k1102dp subdirectory k1102.exe) makes possible the operation of the basic functions mentioned above at the same time besides a multiple window display, where the same or different results of one, or both ports can be displayed in two windows. The protocol tester at the measuring place has a special configuration, because it was completed with a NE2000 compatible Ethernet connecting card for documentation purposes, and with the necessary softwares for the access to the Novell network. The following figure shows the arrangement of the measuring place in the LAN environment of the Department.. En2 Terminátor MPR felé K1102 10BASE2 Transceiver BME-TEL felé Dokumentációs célú LAN kapcsolat Mérõ interface NE2000 LAN adapter En4 AUI csatlakozó Figure 8. Fitting of the measuring place to the LAN of the Department The measurable object in the case of monitoring will be the living traffic of the thin Ehternet segment marked as En2 (logically it is the main network of the Stoczek building), while in the case of traffic generation we should use the En4 segment after the change of the two connecting points. After switching the tester on, students can enter automatically to the Novell network of the Department, which makes possible the storage of measurement results on the students’ workplaces (HOME or PROJECT). As a resident, there will be loaded a screen image storing program named CAMERA, which makes possible the recording of the graphic screen images of the tester in a file of LBM format. After pressing the ALT+C keyboard combination SCREENnn.LBM files are generated, where nn is the number of the picture. These can be converted with the help of the CONVERT program to a PCX format appropriate for the Word. One of the services of the tester is to record some of the results to files. We will review the files applied by the tester in the next chapter in details. 21 Databases of the K1102 During the examination of the local networks the various data structures have an important role, especially the set of the protocol elements, the storage of the measuring results, and the li sts applied during the operation of the network, which contain the data of computers of LAN. In the case of K1102 a separated menu can be found for handling of the various database files, and for their selection (System Management-File Management). Figure 9. Databases of K1102 Perhaps there will be necessary for us to introduce filtering conditions during the analysis of the traffic, if we wish to narrow the range of our examinations e.g. for a grup of computers (filtering according to the address), or for a kind of protocol, or for the combination of these ones. The filtering conditions, which can be set under the "Presetting-Harware filter" menu, can be stored in files of *.FIL format. Figure 10. Setting of filtering conditiions On the previous we can see an example, where we narrow the resource address to SMC/WD type of connection cards, and we want to see only Novell packages with Ethernet II. (Novell old, Type 8137 in the Area field). We can set more of these kind of records, but we can activate only six during one measurement. The tester contains more filters set in advance (in USER or ROOT directories), some typical filters from them: DUR_IP.FIL DUR_NOV.FIL DUR_BANY.FIL Internet IP packages Novell IPX/SPX Banyan Vines During traffic generation or programmed measurement perhaps there will be necessary to set the content of packages to be sent for simulation purposes. Tester stores this kind of set of packages in files of *.GEN format. Compilation of content of the chosen file can be executed in the "Presetting - Transmit frames" menu, giving the frame fields learnt at the filters, and the content of the package. If later we would like to store one part of the traffic for processing purposes (Evaluation menu), the tester will put the content of the hardware filtered packages into *.DAT files. Definition of the content of packages (Evaluation - Frame decoding menü) can be made easier with *.NRM files given the names of the individual protocol-dependent fields and their positions in the frame. There is an appropriate file at the most frequent protocols disposal. If we want to examine a special protocol (protocol developint work), we can generate the NRM file with the help of the enclosed SLD/PR translator. NEWPROTO.SPZ PSDL.EXE NEWPROTO.NRM We have also a SPZ specification belonging to the manufactured NRMs. Here is a detail from the TCP/IP specification: Link Link_addr Type ::= PSDL_SEQUENCE { destination source type ::= BYTE_HEX ::= BYTE_HEX Link_addr, Link_addr, Type } {LENGTH(6) STATION} {LENGTH(2) COMMENT( ['0800'H] "internet", ['0806'H] "arp", "not_internet")} *.DBF (DBase III format) of the DP program package, and *.STA database of the SP package serve for the registration of nodes of the 23 local network by name. It is very useful, if the individual nodes appear according to their names at the maintenance activities of the network, at error searching, and at preparation of statistics and distributions, and we can thus refer to their names. We can edit the list of stations in the "Sytem management - Node list" menu. Fortunately, the DBF format is quite frequent, so, for example even the Microsoft-Excel can handle it directly. It is worth to convert for the programs of the SP package to the STA format with the help of the "File management- Select file - transfer" menu. During the monitoring of the network we can store the results in *.MON files It can be evaluated later according to various points of views (Evaluation menu), or it can be converted for other table handling programs (MON2DBF menu). E.g. distribution of a traffic statistics related to computers can make in a circle diagram format with a link of processes of MON2DBF - Excel import - Excel chart. Mandatory literature BME-TTT, Segédlet a "Lokális számítógéphálózatok szolgáltatásai" c. méréshez, 1995 N:\MERESEK\05\DOC\?????.DOC BME-TTT, Segédlet az "Elektronikus Levelezés" c. méréshez, 19 94 N:\MERESEK\??\DOC\EMAIL.DOC Recommended literature James Martin, Kathleen K. Chapman: LOKÁLIS HÁLÓZATOK NOVOTRADE Kiadó kft.-Prentice Hall, 1992 Andrew S. Tanenbaum: SZÁMÍTÓGÉP-HÁLÓZATOK NOVOTRADE Kiadó kft.-Prentice Hall, 1992 Dr. Harangozó József: Számítógéphálózati laboratóriumi gyakorlatok BME-Folyamatszabályozási Tanszék, 1994 SIEMENS Ag.: K1102 LAN Protocol Tester, User Manual, Order No.: C73000-G6076-C200, 1991 április 25 Appendix 1. 00-00-02 00-00-0E 00-00-10 00-00-15 00-00-1A 00-00-1D 00-00-21 00-00-23 00-00-2A 00-00-3D 00-00-46 00-00-4B 00-00-51 00-00-55 00-00-5D 00-00-61 00-00-65 00-00-6B 00-00-77 00-00-7A 00-00-7D 00-00-80 00-00-84 00-00-89 00-00-93 00-00-95 00-00-98 00-00-A0 00-00-A3 00-00-A5 00-00-A7 00-00-A9 00-00-C0 00-08-2D 00-DD-00 02-07-01 08-00-02 08-00-06 08-00-09 08-00-0B 08-00-11 08-00-20 08-00-38 08-00-46 08-00-5A 08-00-6E 08-00-89 Ethernet Vendor codes BBN Fujitsu Sytek/Hughes LAN Systems Datapoint AMD ? Cabletron SC&C ABB TRW ATT Bunker Ramo APT Hob Electronic AT&T RCE Gateway Network General MIPS MIPS/Interphase Ardent Cray Research/Harris Dowty Network Services Aquila ? Cayman Systems Proteon Sony/Tektronics CrossCom Sanyo Electronics NAT Compatible Systems Corporation NCD Network Systems Western Digital/SMC Siemens Nixdorf: TACLAN Ungermann-Bass MICOM/Interlan 3Com-Bridge Siemens Nixdorf HP Unisys Tektronics Sun Bull Sony IBM Excelan Kinetics 00-00-0C 00-00-0F 00-00-11 00-00-18 00-00-1B 00-00-20 00-00-22 00-00-29 00-00-3C 00-00-44 00-00-49 00-00-4F 00-00-52 00-00-5A 00-00-5E 00-00-62 00-00-69 00-00-6E 00-00-78 00-00-7B 00-00-7F 00-00-81 00-00-86 00-00-8A 00-00-94 00-00-97 00-00-9F 00-00-A2 00-00-A4 00-00-A6 00-00-A8 00-00-AA 00-00-C9 00-AA-00 00-DD-01 02-60-8C 08-00-05 08-00-07 08-00-0A 08-00-10 08-00-14 08-00-2B 08-00-39 08-00-4E 08-00-69 08-00-7C 08-00-90 Cisco NeXT Tektronics Webster Novell/Eagle Technology Data Industrier AB Visual Technology IMC Auspex Castelle Apricot Logicraft ODS SK/Xerox IANA Honeywell Silicon Graphics Artisoft Labtam Research Machines Linotronic Synoptics Gateway Datahouse Information Systems Asante Epoch Ameristar Technology Wellfleet Acorn Network General Stratus Xerox Emulex Intel Ungermann-Bass 3Com Symbolics Apple Nestar Systems AT&T Excelan DEC Spider BICC Silicon Graphics Vitalink Retix Apppendix 2. Codes of the Ethernet Type field 0600 0800 0802 0804 0806 081C 0900 0A01 0BAF 10011600 3C004321 6000 6002 6004 6006 60107001 7003 7007 70207031 8003 8005 8008 8013 8015 8019 802F 8036 8038 803A 803C 803E 8040 8042 80468049 805C 8060 80658068 806A 806D 807A 807C 8080 8088809C80A380C6 80C880CF80D5 80DE80E480F3 80F7 81078130 8137 814C 817D 8582 8888 9001 9003 FF00 XNS DOD IP NBS internet Chaosnet ARP Symbolics private Ungermann-Bass net debug Xerox PUP Address Translation Banyan Echo Berkeley trailer encapsulation VALID system protocol 3Com NBP THD - Diddle DNA experimental DNA Remote Console -MOPDEC: Local Area Transport DEC: Customer Use 3Com Ungermann-Bass NIUs Ungermann-Bass OS/9 Microware Sintrom (was LRT) Prime NTS Cronus VLN HP Probe AT&T/Standford Silicon Graphics diagnostic Silicon Graphics Apollo DOMAIN Tigan Aeonic Systems DEC: bridge DEC: (Argonaut console) DEC: NMSV DNA Naming DEC: distributed time service DEC: NetBIOS Datagrams DEC Unassigned AT&T ExperData Stanford V Kernel Little Machine UMass. at Amherst General Dynamics Autophon Compugraphic Corp. Matra Merit Internodal Vitalink TransLAN III Mgmt Xyplex Datability Siemens-Nixdorf Pacer Software Intergraph Corp. Taylor Instrument IBM SNA Service on Ethernet TRFS (Integrated Solutions) Datability AppleTalk AARP Apollo Computers Symbolics Waterloo Microsystems Novell NetWare SNMP over Ethernet XTP Kalpana HP LanProb 3Com: XNS Mngmt 3Com: loopback detection BBN VITAL-LanBridge 0601 0801 0803 0805 0807 08880A00 0BAD 1000 1234 1989 4242 5208 6001 6003 6005 6007 7000 7002 7005 7009 7030 7034 8004 8006 8010 8014 8016 802E 8035 8037 8039 803B 803D 803F 8041 8044 8048 805B 805D 8062 8067 8069 806C 806E807B 807D8081809B 809F 80C080C7 80CD80D380DD 80E080F2 80F4 80FF812B 8131 8139814F 81D6 XNS Address Translation X.75 internet ECMA internet X.25 Level 3 XNS Compatibility Xyplex Xerox PUP Banyan Systems Berkeley trailer negotiation DCA - Multicast Artificial Horizons (dogfight sim.) PCS Basic Block Protocol BBN Simnet Private DNA Dump/Load -MOPDNA IV Routing Layer DEC: Diagnostics DEC: LAVC Ungermann-Bass download Ungermann-Bass diagnostic/loopback Ungermann-Bass Bridge OS/9 Net ? Racal-Interlan Cabletron Cronus Direct Nestar Excelan Silicon Graphics network games Silicon Graphics XNS Nameserver Tymshare Reverse ARP IPX (Netware) DEC: DSM/DDP DEC: (VAXELN) DEC: encryption DEC: LAN Traffic Monitor DEC: Local Area System Transport Planning Research Corp. DEC: DECamds VMTP/RFC-1045 Evans & Sutherland Counterpoint Computers Veeco Integrated Automation AT&T ComDesign Landmark Graphics Corp. Dansk Data Elektronic Vitalink Communications Counterpoint Computers AppleTalk (EtherTalk) Spider Systems DCA: Data Exchange Cluster Appplitek Corp. Harris Corporation Rosemount Corp. Varian Associates Allen-Bradley Retix Kinetics Wellfleet Talaris VG Laboratory Systems KTI Technically Elite Concepts Lantastic 9000 9002 AAAA Loopback 3Com: TCP/IP Mngmt DECNET 27