Sunday, August 5, 2012

How To Design A Wide Area Network

WAN Overview:
WANs are usually required for high volume, long-distance data traffic.

To implement WANs, you can use the following transmission media:
  • PSTN (Public switched telephone network)
  • High-speed, high-bandwidth dedicated leased circuits
  • High speed fiber-optic cable
  • Microwave transmission links
  • Satellite links
  • Wireless radiated media (radio frequency)
  • The internet
There are two types of WANs:
  • Enterprise networks: When a network connects a company’s branch offices and divisions, it becomes an enterprise- wide network. For example, a corporation may have sites on every continent, all of which are interconnected to form one wide area network.
  • Global networks: When a network spans several countries and continents and includes many types of organizations and individuals, it can be labeled  global. These networks serve multinational corporations and scientific, academic and military establishments. The internet, often called the “network of networks” fits that definition.
Public Network Services:
    Two of the most popular methods are the PSTN and the internet.

    PSTN:
    •  PSTNs were originally designed exclusively for telephones but have become highly sophisticated, able to handle different kinds of data transmission, including digital data transmission.
    • The PSTN provides a number of options for data transmissions, including services that route packets between different sites.
    Available services and some possible transmission rates include the following:
                 Service                                            Transmission Rate
                  Switched 56                                    56Kbps
                  X.25                                               56Kbps
                  T1 circuits                                       1.544Mbps
                  T3 circuits                                       44.736Mbps
                  Frame relay                                     1.544Mbps
                  SMDS                                            1.544Mbps
                  ISDN                                              1.544Mbps
                  ATM                                              44.736Mbps
    The Internet:
    It is a shared network of government agencies, educational institutions, private organizations and individuals from over a hundred nations.
    No one owns the Internet; anyone can have access to the transmission media.
    SLIP and PPP:
    • Serial Line Internet Protocol (SLIP) and Point-To-Point (PPP) are two very common protocols used to transmit IP packets over serial line and telephone connections, most often as part of a dial-up internet connection.
    • SLIP an PPP are similar protocols. But some differences are there:
    • Basically PPP is a multistage protocol signal transport mechanism. SLIP is designed for maintaining one type of traffic protocol  (TCP/IP traffic) at a moment.
    • With SLIP, you must know both the IP address assigned to you by an ISP and the IP address of the remote system your computer will be dialing into. PPP deals with these problems by negotiating configuration parameters at the beginning of your connection.
    • It also said that PPP can be  negotiate header compression. SLIP does not offer this type of compression.
    • Another things about PPP that it offers IP enhanced security  protection.
    Switching:
    • Switching is an important technique that can determine how connections are made and how data movement is handled on a WAN.
    • Data sent across the PSTN or other internetworks can travel along different paths from sender to receiver.
    Three major switching techniques are:
    • Circuit switching
    • Message switching
    • Packet switching
    Circuit switching:
    • In circuit switching, a dedicated physical connection is established between the sender and the receiver and maintained for the entire conversation.
    • PSTN uses a circuit switching system.
    • Before any two computers can transfer data, a dedicated circuit must be established between the two.
    • The sending machine requests a connection to the destination, after which the destination machine signals that it is ready to accept data.
    • The data is then sent from the source to the destination and the destination sends acknowledgements back to the source.
    • When the conversation is finished, the source sends a signal to the destination, indicating that the connection is no longer needed and disconnect itself.
    • A advantage of circuit switching is that the dedicated transmission channel the machine establish provides a guaranteed data rate.
    • Since the channel is always available, it does not need to be requested again.
    • Disadvantages: It is often an inefficient use of the transmission media.
    • Dedicated channels require more bandwidth than non-dedicated channels, so transmission media can be expensive.
    • Also, this method can be subject to long connection delays; it may take several seconds to establish the connection.
    Message switching:
    • Message switching is unlike circuit switching in that it does not establish a dedicated path between two communicating devices.
    • Instead, each message is treated as an independent unit and includes its own destination and source addresses.
    • Each complete message is then transmitted from device to device through the internetwork.
    • Each intermediate device receives the message, stores it until the next device is ready to receive it and then forwards it to the next device.
    • For this reason, a message switching network is sometimes referred to as a store-and-forward network.
    Advantages:
    • It provides efficient traffic management.
    • It reduces network traffic congestion. The intermediate devices are able to store messages until a communications channel becomes available.
    • Its use of data channels is more efficient than circuit switching.
    • It provides asynchronous communication across time zones.
    Disadvantages:
    • The delay introduced by storing and forwarding complete messages make message switching unsuitable for real-time applications.
    • It can be costly to equip intermediate devices with enough storage capacity to store potentially long message.
    Packet switching:
    • In packet switching, message are broken up into packets, each of which includes a header with source, destination and intermediate node address information.
    • Individual packets don’t always follow the same route; this is called independent routing.
    Independent routing offers two advantages:
    Bandwidth can be managed by splitting data onto different routes in a busy circuit
    If a certain link in the network goes down during the transmission, the remaining packets can be sent through another route.

    Methods of packet switching:
    1. Datagram packet switching
    2. Virtual-circuit packet switching
    Datagram packet switching: In a datagram packet-switched network, a message is divided into a stream of packets.
    Each packet is separately addressed and treated as an independent unit with its own control instructions
    The switching devices route each packet independently through the network, with each intermediate node determining the packet’s next route segment.

    Saturday, August 4, 2012

    Internetwork Connectivity Devices for Networking


    Internetwork Connectivity Devices
    An internetwork connectivity consists of two or more independent networks that are connected and yet maintain independent identities. An internetwork may include different types of networks. To connect independent networks, we use internetwork connectivity devices. The devices are: routers, brouters, gateways, CSUs/DSUs etc. 

    Some of the benefits of internetworking are:
    • Reduces network traffic:With internetwork connectivity devices, most traffic stays on the local network and only packets destined for other networks cross internetwork connectivity devices.
    • Optimizes performance:The benefit of reduced traffic is optimized performance.
    • Simplifies management:Network problems can be more easily identified and isolated in smaller networks, as opposed to one large network.
    • Efficiently spans long geographical distances: Because WAN links are many times slower and more expensive than LAN links, having a single large network spanning long distances can complicate network management and slow network performance. We can more efficiently span long distance by connecting multiple smaller networks.
    • Interconnection: To connect our network with those of other organizations is also a good reason.
    Routers:
    • Practically Routers are devices that connect two or more networks. 
    • Router consist of a combination of hardware and software. 
    • In Router the hardware can be a network server, a separate computer or a special black box device.
    • For Router the two main pieces of software is the OS and the routing protocol. 
    • Management software is another component of router. 
    •  For routing the Routers use logical and physical addressing to connect two or more logically separate networks. 
    • Different Router accomplish this connection by organizing the large network into logical network segments (subnet).
    • In each of these sub network it has given a logical address. 
    • For packet transferring each packet in addition to having a physical device address, has logical network address. 
    • The network address allows routers to more accurately and efficiently calculate the optimal path to a workstation or computer.
    •  Routers keep the networks separate and router processing is generally slower than bridge processing.
    • Routers are more intelligent than bridges because they use algorithms to determine the best path to send a packet to a network. 
    • By passing packets only according to network addresses, routers can help prevent a broadcast storm.
    • Routers list network addresses in routing tables.
    • These tables contain all known network addresses and possible paths. 
    Terms to quantify the routing cost:
    • Hop count describes the number of routers a message must pass through to reach its destination.
    • Tick count describes the amount of time required for a message to reach its destination. A tick is 1/18 second.
    • Relative expense is a number you can assign based on the actual monetary cost or some other relevant criteria required to use a given link. 
    • Route discovery is the process of finding the possible routes through the internetwork and then building routing tables to store that information.
    Two methods of route discovery are:
    • Distance-vector  
    • Link-state
    Distance-Vector Routing:
    • In distance-vector routing, each router advertises its presence to other routers on the network.
    • Periodically each router on the network broadcasts the information contained in its routing table.
    • The other routers then update their routing tables with the broadcast information they receive.
    • These periodic broadcasts of routing table information by the routers performing distance-vector route discovery add up to a noticeable amount of traffic.
    • This traffic is not a problem in LANs, because plenty of bandwidth is available and the number of routers is usually low.
    • However, it seriously affect performance in a WAN.
    • In a large internetwork, distance-vector routing tends to be quite inefficient as route changes must be broadcast through the network from router to router and because changes are contained within complete routing tables, it can take a long time before all the routers on the network know of a change.
    Link-State Routing:
    • Link-state routers broadcast their complete routing tables only at startup and at certain intervals-much less frequently than distance-vector broadcasts.
    • This type of routing generates less network traffic than the distance-vector method.
    • The major difference between the link-state and distance-vector methods is that once the initial routing-table exchange has occurred, a link-state router will generally broadcast routing updates only when it detects a change in its routing table. When it does broadcast, it sends only information about the change, it doesn't send its complete routing table.
    • Selection of the optimum route can be dynamic or static.
    • Dynamic route selection permits routers to constantly adjust to changing network conditions.
    • With static route selection, packets must always follow a predetermined path.
    • Dynamic route selection uses the cost information that is continually being generated by routing algorithms and placed in routing tables to select the best for each packet.
    • Other routers that receive broadcast messages regarding changes in the state of network links use this information to update their own routing tables.
    • As only the changes are sent, these updates can be done in less time.
    • Once a router has created its routing table, it can use the cost information contained within that table to calculate the best path through the internetwork.
    • Routing protocol can select the best path based on the minimum number of hops, number of ticks or relative expense.
    • As network conditions change, the router can select different paths to maintain the lowest possible costs.
    • The router can even select new paths “on the fly” as it is transmitting packets.
    • If changes occur during a transmission that make one route suddenly less attractive than another, the router can send the remaining packets of the transmission along a different path from the packets in the first part of the transmission.
    • With static route selection, the data path is not selected on the fly by the routers involved.
    • Instead, the data path is designed in advance.
    • Either the network administrator or a computer on the network selects a route for the data from a predefined table.
    • All packets are then forced along that route and intermediate routers are not allowed to make route selection decisions.
    • Static route selection tends to be less efficient than dynamic route selection because it cannot adapt to changing network conditions.
    Brouter:
    • A brouter is a router that can also bride.
    • A brouter first tries to deliver the packet based on network protocol information.
    • If the brouter does not support the protocol the packet is using or cannot deliver the packet based on protocol information, it bridges the packet using the physical address.
    • True routers simply discard a packet if it doesn’t have a correct logical address.
    • A brouter can be a more affordable option to having both a router and a bridge.
    • Keep the following in mind when working with routers:
    • Some routers may not follow standards. This can cause problems when we use different vendors’ routers on the same network.
    • Be sure the router is rated to handle the speed of the network connection.
    • Routers slow down network communications to a small extent, so don’t use them unnecessarily.
    •  Routable protocol: DECnet, DDP, TCP/IP, NWLink IPX, OSI, XNS
    • Non-routable protocol: LAT, NetBEUI
    • A gateway is a device that can interpret and translate the different protocols that are used on two distinct networks.
    • Gateway can be comprised of software, dedicated hardware or a combination of both.
    • Gateways can function at network layer.
    • When you need to have different environments communicating, you may wish to consider a gateway.
    • A gateway can actually convert data so that it works with an application on a computer on the other side of the gateway.
    • You can connect systems with different communication protocols, languages and architecture using a gateway.
    • Gateway can be slow because they need to perform intensive conversion and they can be expensive.
    CSUs/DSUs:
    • Sometimes, when expanding your network, it is less costly and easier to use existing public networks, such as the public telephone network in your area.
    • Connecting to some of these networks requires the use of CSUs/DSUs (channel service units/digital service units).
    • Network service providers may require you to use a CSU/DSU to translate in signals of your LAN into a different signal format and strength for use on their transmission media.
    • CSUs/DSUs are also useful for shielding your network from both noise and voltage currents that can come through the public network.

    Friday, August 3, 2012

    How To Expanding A Networks

    Network Connectivity Devices:  
    To expand a single network without breaking it into new parts or connecting it to other networks, we can use the following devices:
    •  Hubs
    •  Repeaters
    •  Bridges
    •  Multiplexers

    Hub:
    • All networks require a central location to bring media segments together
    • The central locations are called hubs
    •  A hub organizes the cables and relays signals to the other media segments.
    • Important things about hub:
    • There is a limit to the number of hubs that can be connected to each other to extend a network.
    • When possible, connect each hub directly to a server network card rather than to another hub.
    • Label the connection on the hub.
    • The more hubs data passes through, the slower the connection.
    • Passive hubs
    • A passive hub simply combines the signals of network segments.
    • There is no signal processing or regeneration.
    • As it does not boost the signal and absorb some of the signal, it reduces by half of maximum cabling distance permitted.
    Here, each computer receives the signals sent from all the other computers connected to the hub.
    Active hub:
    • It regenerates or amplify signals.
    • The distance between devices can be increased.
    • They also amplify the noise as well.
    • They are more expensive than passive hub.
    • Bcz some active hubs function as repeaters, they are sometimes called multi-port repeaters.

    Intelligent hub:
    Intelligent hubs can regenerate signals but it can perform some network management and intelligent path selection.
    A switching hub chooses only the port of the device where the signal needs to go, rather than sending the signal along all paths.
    Many switching hubs can choose which alternative path will be the quickest and send the signal that way.

    Repeaters:
    • All transmission media attenuate the electromagnetic waves that travel through them.
    • Adding a device that amplifies the signal can allow it to travel farther, increasing the size of the network.
    • Devices that amplify the signals in this way are called repeaters.
    • Repeaters fall into two categories: amplifier and signal-regenerating repeaters.
    • Amplifiers simply amplify the entire incoming signal and amplify both signal and noise.
    • Signal regenerating repeaters create an exact duplicate of incoming data by identifying it amidst the noise, reconstructing it and retransmitting only the desired information.
    • The original signal is duplicated, boosted to its original strength and sent.
    Bridges:
    Bridges connect network segments.
    The use of bridge increases the maximum possible size of your network.
    A bridge selectively determines the appropriate segment to which it should pass a signal.
    It does this by reading the address of all the signals it receives.
    The bridge reads the physical location of the source and destination computers from this address.

    The process works like:
    A bridge receives all the signals from both segment A and segment B.
    The bridge reads the addresses and discards all signals from segment A that are addressed to segment A, bcz they do not need to cross the bridge.
    Signals from segment A addressed to a computer on segment B are retransmitted to segment B.
    The signals from segment B are treated in the same way
    Through address filtering, bridges can divide busy networks into segments and reduce network traffic.
    Network traffic will be reduced if most signals are addressed to the same segment and do not cross the bridge.

    Two types of bridges:
    • Transparent bridges keep a table of addresses in memory to determine where to send data
    • Source-routing bridges require the entire route to be included in the transmission and do not route packets intelligently.
    • Multiplexing allows you to use more bandwidth of the medium by combining two or more separate signals and transmitting them together.
    • The original signals can then be extracted at the other end of the medium. This is demultiplexing.
    • Multiplexing provides a way of sharing a single medium segment by combining several channels for transmission over that segment.
    Three major methods of multiplexing are:
    1. Frequency division 
    2. Time division 
    3. Statistical time division

    Frequency-Division multiplexing:
    FDM uses separate frequencies to combine multiple data channels onto a broadband medium.
    You can use FDM to separate traffic traveling in different directions in a broadband LAN.

    Time-division multiplexing:
    • TDM divides channel into time slots.
    • Each of the devices communicating over this multiplexed line is allocated a time slot in a round-robin fashion.
    • If a device does not use its time slot, that slot is wasted.
    Statistical Time-division multiplexing:
    • TDM systems can be inefficient if many slot times are wasted.
    • StatTDM provides an intelligent solution to this problem by dynamically allocating time slots to devices on a first-come, first-serve basis.
    • The number of time slots allocated to a particular device depends on how busy it is.
    • You can use priorities to allow on device greater access to time slots than another.
    • For the multiplexer on the receiving end to determine which signal a particular time slot is carrying, there must be a control field tat identifies the owner attached to the data.

    Thursday, August 2, 2012

    Designing the Local Area Network


    Network Scale:
    • How many clients do you have?
    • How far apart are the computers?
    • What software are you using?
    • What software will you use?
    • What special requirements do you have?
    • How much can you spend?

    How many computers do you have?
    • The number of client computers you have is the most important factor in network design
    • You all other design factors are affected by the size of your network

    Peer Network (2-10 Users):
    • A peer network provides basic connectivity between computers but does not set apart any central computer as a server or provide many of the security features of a centralized client server network.
    • If you have only a few users and security is not a major concern, consider suing a peer network.

    Peer networks are good for:
    -File sharing
    -Printer sharing
    -E-mail
    -Tight budget
    -Easy installation

     They are not good for:
                   -Security
                   -Backup
                   -Organization of data
                   -Database application
                   -Large networks
                   -Simple administration
                   -Internet/WAN access

    Single-Server Network (10-50 users):
    • If you have fewer than about 50 people, you can run your entire organization with a single server.
    • This allows you to centralize a number of services and maintain strong control over your network environment.

    Single server nets are good for:
    -Centralized file services
    -Network printing
    -E-mail
    -Work flow and groupware
    -Login security
    -Archiving
    -Organizing data
    -Easy installation
    -Simple administration

    They are not good for:
                   -Application serving
                   -Distributed organizations
                   -Large organization

    Multiserver Networks (50-250 Users):
    As your network grows, however, a point will come when you need to begin adding more servers.

    Multiserver nets are good for:
    -Centralized file services
    -Networking printing
    -E-mail
    -Workflow and groupware
    -Login security
    -Application services
    -Large database
    -Internet/WAN access

    They are not good for:
                   -Tight budgets
                   -Easy installation
                   -Organizing data
                   -Simple administration

    Multiserver High Speed Backbone Networks (250-1000 Users):
    • With more than 250 clients, network planning becomes a lot more challenging.
    • This number of clients tends to be spread out over larger areas than can be supported from a central computer room.
    •  This geographic aspect requires both a distributed network and a lot of servers.
    • A network of this size will be connected with a high speed backbone that runs between servers.

    It is good for:
    -Centralized file services
    -Networking printing
    -E-mail
    -Workflow and groupware
    -Login security
    -Application services
    -Client-server database
    -Internet/WAN access

    It is not good for:
                   -Tight budgets
                   -Easy installation
                   -Organizing data
                   -Speed

    Enterprise Networks (1000+ Users):
    • Enterprise networks are so large they are no longer really considered a single network.
    • With more than 1000 users, it’s best to break down the network into multiple connected networks that have different directory services and are split along some natural boundary.
    • These smaller networks are then designed according to the criteria presented above smaller networks and then connected with the network and internetwork connectivity services.

    It is good for:
    -Networking printing
    -E-mail
    -Workflow and groupware
    -Login security
    -Application services
    -Client-server database
    -Internet access

    It is not good for:
                   -Tight budgets
                   -Easy installation
                   -Centralized file services
                   -Organizing data
                   -Speed

    How far Apart Are the Computers?
    • The distance to the most distant client computer is important; it will help you determine which network protocol you should use and what type of cabling will work for your situation.
    • Walking Rule: If you are less than 6 ft  tall, multiply the number of paces by 2 ft. If you are over 6 ft, multiply the number of paces by 30 inches; then divide by 12 to get the number of feet. Add 20 ft for vertical rise to the ceiling and back down. The result will be a good estimate of the number of cable-feet between your most distant client and your network equipment area.

    What software are you using?    
    • Software and files are the data that flows over a network, so knowing what type of software is in use will give you a good estimate of how much data per client will traverse the network.
    • Word processors and Spreadsheets, Graphics and CAD, Database software

    What software will you use?    
    • An important software consideration in addition to the software currently in use is the software you will add once your network is up and running.
    • Networks naturally improve the communications processes in networked organizations with tools such as e-mail, internet connectivity and groupware.
    What Special Requirement do you have?       
    • Do you have some special need for security on your network?
    • Are any of your computers more than 100 m from where you will locate your hub?
    • Have there been any problems with electrical interference that you know about?
    • These issues will play a part in determing what sort of cabling and network devices you will need to install.

    How much can you spend?
    • The amount of money you can spend is a factor that will determine which solutions are available to you.
    • Be sure to take the time to determine how much money you will be able to justify spending on your network.

    Wednesday, August 1, 2012

    Data Segmentation and Token Ring For Networking.



    • As an Ethernet network grows and more stations are added to the LAN, performance can drop significantly.
    • Ethernet is a shared media network; when a lot of stations have data to transmit, the net gets congested and many collision occur.
    • Segmentation is the solution.
    • Segmentation is the process of splitting a larger Ethernet network into two or more segments linked by brides or routers.
    • The resulting segments have fewer stations to contend with for access to the net and the router or bride transfer data from one segment to the other only when the destination for the data is on the other segment. The rest of the net traffic stays in the segment where it belongs.

    Token Ring was developed by IBM as a robust and highly reliable network.

    Specification:
    Cable type                                                                  UTP, STP or fiber-optic
    Maximum MSAUs                                                      33
    Maximum nodes                                                         260
    Max dist between node and MSAU                            45.5 m for UTP, 100m
    Max patch cable distance connecting MSAUs             45.5m UTP, 200m STP, 1 Km fiber-optic
    Min patch cable dist connecting MSAUs                      2.5m
    Max cumulative patch cable dist connecting all MSAUs   121.2m UTP, several Km for fiber-optic

    How Token Ring Works:
    • The ring passes a free token around the ring in one consistent direction.
    • A node receives the token from its nearest active upstream neighbor and passes it to its nearest active downstream neighbor.
    • If a station receives a free token, it knows it can attach data and send it on down the ring.
    • Each station is given an equal chance to have the token and take control in order to pass data.
    • Each station in the ring receives the data from the busy token with data attached and repeats the token
    • and data, exactly as it received them, to the next active downstream neighbor on the ring.
    • The data is received and retransmitted by each node on the network until it has gone full circle.

    Advantages and Disadvantages:
    • Token Rings continues to operate reliably under heavy loads
    •  Built-in diagnostic and recovery mechanisms
    • Token Ring makes connecting a LAN to an IBM mainframe easier
    • Fault-tolerance features are provided through ring configuration

    Disadvantages:
    • Token Ring cards and equipments are more expensive than Ethernet
    • Token Ring can be very difficult to troubleshoot and requires considerable expertise
    FDDI
    FDDI:
    • Fiber Distributed Data Interface (FDDI) is another ring-based network.
    • FDDI uses fiber-optic cables to implement very fast, reliable networks.
    • FDDI uses a token-passing scheme to control network access.
    • Several FDDI devices can transmit data simultaneously.
    • A token is passed around the ring, and the possessor of the token is allowed to transmit FDDI frames.
    •  A FDDI network may have several frames simultaneously circulating on the network.
    • This is possible bcz the possessor of the token may send multiple frames, without waiting for the first frame to circulate all the way around the ring before sending the next frame.
    • The possessor of the FDDI token is also allowed to release the token and send it to the next station in the ring as soon as it is through transmitting frames, rather than having to wait for the frames to make it all the way around the ring.


    Tuesday, July 31, 2012

    Desigining Real World Network.

    Ethernet is the most popular physical network architecture in use today. First conceived in the 1960s at the University of Hawaii as the ALOHA network. In 1972 Robert Metcalfe and David Boffs at Xerox PARC implemented the network architecture and signaling scheme and in 1975 they introduced the first Ethernet product. Ethernet is a bus or star bus based technology that uses baseband signaling and CSMA/CD to arbitrate network access.

    • Ethernet arbitrates access to the network with the CSMA/CD media access method.
    • Only one workstation can use the network at a time.
    • Workstations send signals (packets) across the network.
    • When a collision takes place, the stations transmitting the packets stop transmitting and wait a random period of time before retransmitting.
    10Mbps Ethernet:
    Four commonly used 10Mbps Ethernet cabling systems are:
    • 10Base5 or thicknet, which uses thick coaxial cable.
    • 10Base2 or thinnet, which uses thin coaxial cable.
    • 10BaseT, which uses UTP cable.
    • 10BaseFL, which uses optical fiber.
    Specifications:
    • Maximum segment length                            500 m
    • Maximum taps                                             100
    • Maximum segments                                      5
    • Maximum segments with node                     3
    • Maximum distance between taps                  2.5 m
    • Maximum repeaters                                      4
    • Maximum overall length with repeater          2.5 kms
    • Maximum AUI drop cable length                  50m
    • Large size
    • High cost
    • Connection method
    • Very few advantages comparing today’s network but it is still reliable.
    10Base2 (Thinnet) Ethernet:
    Specifications:
    • Maximum segment length                            185 m
    • Maximum segments                                     5
    • Maximum segments with node                     3
    • Maximum repeaters                                     4
    • Maximum overall length with repeater        925 m
    • Maximum devices per segment                    30
    Disadvantages of Thinnet:
    • High cost compared to UTP cable.
    • Bus configuration makes the network unreliable.
    • It was economical solution since longtime, so it is used in many existing installation
    • Maximum segment length                           100 m
    • Maximum segments                                    1024
    • Maximum segments with node                    1024
    • Maximum nodes per segment                      2
    • Maximum hubs in a chain                            4
    • Maximum nodes per network                     1024
    Advantages:
    • UTP costs less and is more flexible than 10Base5 or 10Base2 cabling.
    • 10BaseT is easy to troubleshoot.
    • It is possible to isolate a device that is causing problems.
    10BaseFL Ethernet:
    Specifications:
    • Maximum segment length              2000 m
    • Maximum segments                       1024
    • Maximum segments with node      1024
    • Maximum nodes per segment        2
    • Maximum hubs in a chain             4
    • Maximum nodes per network       1024
    100Mbps Ethernet:

    For some applications, a 10Mbps data rate is not enough.
    Two competing standards of 100Mbps:
    • 100VG-AnyLAN.
    • 100baseT Ethernet or Fast Ethernet.
    100VG-AnyLAN has thefollowing advantages:
    • It is faster
    • It supports both Ethernet and Token Ring packets
    • It uses a demand priority access method
    • Hubs can filter individually addressed frames for enhanced privacy 

    Sunday, July 29, 2012

    Network Protocols For computer Networking

    Protocols are the agreed upon ways in which computers exchange information.
    Protocols that work together to provide a layer or layers of the Open System Interconnection model are known as protocol stack or suite.

    Standard protocol stacks:
    •  The ISO/OSI protocol suite
    •  IBM System Network Architecture (SNA)
    •  Digital DECnet                    ,  AppleTalk
    •  Novell NetWare       , TCP/IP
    A protocol is a set of basic steps that both parties must perform in the right way.

     For one computer to send a message to another computer, first computer must perform the following steps:
    1. Break the data into small section called packets
    2. Add addressing information to the packets identifying the destination computer
    3. Deliver the data to the network card for transmission over the network
    The receiving computer must perform the same steps but in opposite order:
    1. Accept the data from the network adapter card.
    2. Remove the transmitting information that was added by the transmitting computer.
    3. Reassemble the packets of data into the original message.
     Networks primarily send and receive the small chunks of data called packets.

    Packet structure: Packets have the following components:
    1. A source address specifying the sending computer.
    2. A destination address.
    3. Instructions that tell the computer how to pass the data along.
    4. Reassembly information for when the packet is part of a longer message.
    5. The data to be transmitted to the remote computer.
    6. Error-checking information to ensure that the data arrives intact.
     The components are combined into three sections:
    •  Header: Includes alert signal to indicate that the data is being transmitted, source and destination addresses and clock information to synchronize the transmission.
    •  Data: The actual data being sent. This can vary from 48 bytes to 4K.
    • Trailer: The contents of the trailer varies among network types, but it typically includes a CRC. CRC helps the network determine whether a packet has been damaged in transmission

    Microsoft-Supplied Network Protocol:
    • NetBEUI
    • NWLink
    • TCP/IP
    • NetBEUI
    NetBEUI: It stands for NetBIOS Extended User Interface. Microsoft included NetBEUI 3.0 with Windows NT. (Originally it is developed by IBM)

    Advantages of NetBEUI:
    • High speed on small network
    • Ability to handle more than 254 sessions
    • Better performance over slow serial links than previous versions
    • Ease of implementation
    • Self-tuning features
    • Good error protection
    • Small memory overhead
    Disadvantages of NetBEUI:
    • It cannot be routed between networks
    • Few tools for NetBEUI such as protocol analyzer
    • It offers very little cross-platform support
    NWLink:
    NWLink is Microsoft’s implementation of Novell’s IPX/SPX protocol stack, used in Novell NetWare.

    Saturday, July 28, 2012

    Network Adapters And The Theoretical Network

    Network Adapter:

    • Network adapters perform all the functions required to communicate on a network.

    • They convert data from the form stored in the computer to the form transmitted or received on the cable and provide a physical connection to the network.
    • Fiber-optic Ethernet adapters convert the data from 8, 16 or 32 bit words to serial pulses of light.
    • Microwave network interfaces convert the computer data to serial radio waves.
    • Network adapters receive the data to be transmitted from the motherboard of your computer into a small amount of RAM called a buffer.
    • The data in the buffer is moved into a chip that calculates a checksum value for the chunk and add address information, which includes the address of the destination card and its own address.
    • Ethernet adapter addresses are permanently assigned when the adapter is made at the factory.
    • The network adapter must still convert the serial bits of data to the appropriate media in use on the network.
    • Some cards have more than one type of transceiver built in so you can use them with your choice of media.
    • While adapters transmit, they listen to the wire to make sure the data on the line matches the data being transmitted.
    • If another adapter has interrupted, the data being heard by the transmitting network adapter will not match the data being transmitted.
    • If then happens, the adapter ceases transmitting and transmits a solid on state instead, which indicates to all computers that it has detected a collision and that they should discard the current frame because has been corrupted.
    • The network adapter waits a random amount of time and then again attempts to transmit the frame.
      You have remember some condition for selecting an Adapter:
      • What type of network are you attaching to?
      • What type of media are you using?
      • What type of bus does your computer have?
      The Open System Interconnection Model attempts to define rules that apply to the following issues:
      • How network devices contact each other and if they have different languages, how they communicate with each other.
      • Methods by which a device on a network transmissions are received correctly and by the right recipient.
      • Methods to ensure that network transmissions are received correctly and by the right recipient.
      • How the physical transmission media are arranged and connected.
      • How to ensure that network devices maintain a proper rate of data flow.
      • How bits are represented on the network media.
      • The OSI model is nothing tangible; if is simply a conceptual framework.
      • The OSI model does not perform any functions in the communication process.
      • The OSI model simply defines which tasks need to be done and which protocols will handle those tasks, at each of the seven layers of the model.

      Friday, July 27, 2012

      Essential Network Components & Media for Networking.


      Media are what the message is transmitted over.

      Transmission media are divided into two categories:
      • Cable media: have a central conductor enclosed in a plastic jacket. Used for small LANs. Cable media normally transmit signals using the lower end of the electromagnetic spectrum. Ex- Coaxial, Twisted pair, Fiber-optic
      • Wireless media: employs the higher electromagnetic frequencies, such as radio wave, microwaves and infrared. It is used in mobile networks. They are prevalent in enterprise and global networks.
      Factors of Medium’s characteristics:
      • Cost: it should be weighed against the performance it provides and the available resources.
      • Installation: Some types of media can be installed with simple tools and little training; others require more training and knowledge and may be better left to professionals.
      • Bandwidth Capacity: In the world of networking, bandwidth is measured in terms of Mbps. A medium with high capacity has a high bandwidth. A high bandwidth normally increase the throughput and performance.
      • Node Capacity: Each network cabling system has a natural number of computers that can be attached to the network.
      •  Attenuation: Electromagnetic signals tend to be weaken during transmission. The phenomenon imposes limits on the distance a signal can travel through a medium without unacceptable degradation.
      • Electromagnetic Interference: EMI affects the signal that is sent through the transmission media. EMI is caused by outside electromagnetic waves affecting the desired signal. It is often referred to as noise.
      Characteristics of Cable Media

      Fiber-Optic Cable:
      • Fiber-optic cable transmits light signals rather than electrical signals.
      • Each fiber has an inner core of glass or plastic that conducts light.
      • The inner core is surrounded by cladding, a layer of glass that reflects the light back into the core.
      • Each fiber is surrounded by a plastic sheath.
      • The sheath can be either tight or loose.
      • A cable may contain a single fiber, but often fibers are bundled together in the center of the cable.
      • Optical fiber may be multimode or single mode.
      • Single mode fibers allow a single light path and are typically used with laser signaling.
      • Single mode fiber can allow greater bandwidth than multimode and is more expensive.
      • Multimode fibers use multiple light paths and use with LEDs.
      • Optical interface devices convert computer signals into light for transmission through the fiber.
      • Conversely, when light pulses come through the fiber, the optical interface converts them into computer signals.