Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Community College of Rhode Island, Cisco Regional Academy Sem 1 V2 Chapter 3 Local Area Networks LANS C. Marandola Cisco I Fall 2001 Chapter Three Goals Understand Basic LAN Devices. Understand the Evolution of Network Devices. Understand the Basics of Data Flow Through LANs. Understand the Building of LANs. The concept of a topology. The basic function of computers on the LAN is to provide the user with an almost limitless set of applications. A server (at least from a LAN perspective - which typically has more RAM and storage capacity, if not a faster processor than a typical host PC) provides applications and data to the hosts, and performs network services such as the Domain Name System (DNS) that keeps track of domain names End users often call computers clients if they rely on other special computers, called servers, to keep programs and data that are shared by many other clients. Relational databases reside on servers, and can sort and store incredible amounts of information They operate at all 7 layers of the OSI model. They perform the entire process of encapsulation and decapsulation to do their job of sending e-mails, printing reports, scanning pictures, or accessing databasees. A network interface card (NIC card or NIC) is a small printed circuit board that fits into the expansion slot of a bus on a computer’s motherboard or peripheral device network adapter. On laptop/notebook computers NICs are usually the size of a PCMCIA card. Its function is to adapt the host device to the network medium. NICs are considered Layer 2 devices because each individual NIC throughout the world carries a unique coded name, called a Media Access Control (MAC) address. . Sometimes the NIC card has a separate transceiver (transmitter/receiver) device, however, the modern NIC card has the transceiver (which converts one electrical signal into another electrical or optical signal) built into it. If a transceiver is used by itself (e.g. to connect a 25-pin AUI interface to an RJ-45 jack, or to convert electrical signals to optical signals), it is considered a Layer 1 device, because it only looks at bits, and not at any address information or higher level protocols Attachment unit interface. The symbols for media vary. Ethernet, token-ring FDDI, The basic functions of media are to carry a flow of information, in the form of bits and bytes. wireless LANs use theatmosphere, or space PANs (personal area networks, that use the human body as a networking medium) Networking media confine network signals to a wire, cable, or fiber. Networking media are considered Layer 1 components of LANs. Coaxial cable, optical fiber, and even free space can carry network signals The principal medium you will study in this class is called Category 5 unshielded twisted-pair cable (CAT 5 UTP). Repeater The purpose of a repeater is to amplify and retime network signals at the bit level. Repeaters can be single-port "in" and single-port "out" devices, though more often now, they are stackable (modular), or multi-port repeaters, better known as hubs. Repeaters are classified as Layer 1 devices, in the OSI model, because they act only on the bit level and look at no other information. HUBs The purpose of a hub, also known as a multi-port repeater, is to amplify and re-time network signals, at the bit level, to a large number of users (e.g. 4, 8, or even 24) using a process known as concentration. If you have several devices (e.g. hosts) to connect to one shared device (e.g. a server), and it's only reasonable for the server to have one NIC, then you might used a hub. Some hubs passive devices because they split the signal to multiple users. Most hubs are active; they take energy from a power supply and add it to the network signals. Some hubs have console ports, which means they are managed hubs and can be controlled. Many hubs are called dumb hubs because the simply take an incoming networking signal and repeat it to every port (the reason for the term multi-port repeater). Hubs are considered Layer 1 devices because they only look at bits Bridge The purpose of a bridge is to filter traffic on a LAN, to keep local traffic local, yet allow connectivity to other parts (segments) of the LAN for traffic that has been directed there. It looks at the name and the address. Every networking device has a unique NIC card MAC address, the bridge makes its decisions based on this MAC address. The bridge is a Layer 2 device; it uses Layer 2 m processing to make the decision whether or not to forward information Switches The symbol for a switch suggests a two-way flow of data. Switches at first glance often look like hubs, since part of their function is connectivity (allowing many devices to be connected to one point in the network). The front of a switch has interfaces (ports); the back has an ON/OFF button, a power connection, and a console port for managing the switch. The purpose of a switch is to concentrate connectivity, while guaranteeing bandwidth. For now, think of the switch as something that is able to combine the connectivity of a hub with the traffic regulation of a bridge on each port. It switches packets from incoming ports (interfaces) to outgoing ports, while providing each port with full bandwidth The switch uses the MAC address to make its switching decisions. You might think of each port on a switch as a micro-bridge,which makes it a Layer 2 device Routers The symbol for a router is suggestive of its two primary purposes path selection, and switching of router routes, and packets. Each router interface is connected to a different network or network segment, hence it is considered an inter-networking device. The purpose of a router is to examine incoming packets, choose the best path for them through the network, and then switch them to the proper outgoing port. Routers are the most important traffic-regulating devices on large networks. They enable virtually any type of computer (using the appropriate protocols) to communicate with almost any other computer anywhere in (or outside) the world! While performing these basic functions, they can also execute many other tasks. Routers make their path selection decisions based on Layer 3 information (packets) - the network addresses – therefore they are considered Layer 3 devices.Routers can also connect different layer 2 technologies, such as Ethernet, token-ring, and FDDI, but because of their ability to route packets, based on Layer 3 information, routers have become the backbone of the Internet, running the IP protocol. Cloud The purpose of the cloud is to represent a large group of details that are not pertinent to a situation, or description, at a given time. It is important to remember that, at this point in the curriculum, you are only interested in how LANs connect to larger WANs, and to the Internet (the ultimate WAN), so that any computer can talk to any other computer, any place, any time. Because the cloud is not really a device, but a collection of assumed capabilities, it is classified as a Layer 1-7 device. A network diagram that includes several LAN technologies uses different symbols for each. In a way, the network appears to be broken into segments. These segments help control traffic on a network, and occur naturally as different small ,networks are linked to make a larger network within a company or school. The segments in the diagram shown can be considered Layer 1 and Layer 2 technologies. While each segment performs operations involving all of the layers, the differences between Ethernet, token-ring, and FDDI ,are in their Layer 1 and Layer 2 specifications. The history of computer networking is complex 1940s, computers were huge electromechanical devices that were prone to failure. In 1947, the invention of a semiconductor transistor opened up many possibilities for making smaller, more reliable computers. 1950s, mainframe computers, run by punched card programs, began to be commonly used by large institutions. In the late 1950s, the integrated circuit - that combined several, many, and now millions, of transistors on one small piece of semiconductor - was invented. Through the 1960s, mainframes with terminals were common place, and integrated circuits became more widely used. 60s and 70s, smaller computers, called minicomputers (though still huge by today's standards), came into existence. In 1978, the Apple Computer company introduced the personal computer. In 1981, IBM introduced the open-architecture personal computer. The user friendly Mac, the open architecture IBM PC, and the further micro-miniaturization of integrated circuits lead to widespread use of personal computers in homes and businesses. late 1980s began, computer users - with their stand-alone computers - started to share data (files) and resources (printers). Starting in the 1960s and continuing through the 70s, 80s, and 90s, the Department of Defense (DoD) developed large, reliable, wide area networks (WANS). The repeater (an old device used by telephone networks) was introduced to enable computer data signals to travel farther. The multi-port repeater, or hub, was introduced to enable a group of users to share files, servers and peripherals. You might call this a workgroup network. Because of the functions of hubs (they broadcast all messages to all ports, regardless of destination), as the number of hosts and the number of workgroups grew, there were larger and larger traffic jams. The bridge was invented to segment the network, to introduce some traffic control. The best feature of the hub - concentration /connectivity - and the best feature of the bridge - segmentation - were combined to produce a switch. In the mid-1980s, special purpose computers, called gateways (and then routers) were developed. These devices allowed the interconnection of separate LANs. Internetworks were created. The World Wide Web began in the 1990’s. Hosts and servers operate at Layers 2-7; they perform the encapsulation process. Transceivers, repeaters, and hubs are all considered active Layer 1 devices, because they act only on bits and require energy. Patch cables, patch panels, and other interconnection components are considered passive Layer 1 components because they simply provide some sort of conducting path. NIC cards are considered Layer 2 devices since they are the location of the MAC address; but since they often handle signaling and encoding they are also layer 1 devices. Bridges and switches are considered Layer 2 devices because they use Layer 2 (MAC Address) information to make decisions on whether or not to forward packets. Routers are considered Layer 3 devices because they use Layer 3 (network) addresses to choose best paths and to switch packets to the proper route. Clouds, which may include routers, switches, servers, and many devices we have not yet introduced, involve Layers 1-7. The order of encapsulation is Data, Segment, Packet, Frame and Bits. The packet flow through Layer 1 devices is simple. Physical media are considered Layer 1 components. All they attend to are bits (e.g. voltage or light pulses, wave forms). If the Layer 1 devices are passive (e.g. plugs, connectors, jacks, patch panels, physical media), then the bits simply travel through the passive devices, hopefully with a minimum of distortion. If the Layer 1 devices are active (e.g. repeaters or hubs ), then the bits are actually amplified and re-timed. Transceivers, also active devices, act as adapters (AUI port to RJ-45), as media converters (RJ-45 electrical to ST Optical), or as parts of NIC cards. In all cases the transceivers act as a Layer 1 devices. No Layer 1 device examines any of the headers or data of encapsulated packet. All they care about are bits Many network problems are caused by problems in Layer 1 - poorly terminated cables, broken jacks, improperly installed cable, or repeaters, hubs, or transceivers left unplugged. In addition, Layer 1 devices can be the sources of reflections, near-end crosstalk, short circuits, open circuits, electromagnetic interference, and radio frequency interference (RFI), all of which can corrupt or destroy packets. NIC cards are where the unique MAC address resides; therefore they are shown on the diagram as a Layer 2 device. Bridges work by examining the MAC address (Layer 2) of incoming packets. If the packet is a local packet (with a MAC address on the same network segment as the incoming port of the bridge), then the packet is not forwarded across the bridge. If the packet is non-local (with a MAC address not on the incoming port of the bridge), then it is forwarded to the next network segment. You will not study the details of switching until Semester 3, but for now, consider a switch to be a hub with individual ports that act like individual bridges. The switch takes packets, de-encapsulates them to Layer 2, examines the Layer 2 MAC addresses, and forwards the packets (switches them) to the appropriate ports. Because the switches’ circuitry makes these decisions based on MAC addresses, switches are also considered a Layer 2 device. Certain devices, such as routers, operate at Layers 3, 2, and 1. Packet flow through routers (i.e. selection of best path and actual switching to the proper output port) involves the use of Layer 3 network addresses and Layer 2 MAC addresses (names). Routers are referred to as Layer 3 devices. The graphic shows that certain devices operate at all seven layers. Some devices (e.g. your PC) are Layer 1-7 devices. In other words, they perform processes can be associated with every layer of the OSI model. Encapsulation and de-encapsulation are two examples of this. A device called a gateway (essentially a computer which acts like a router) is also a Layer 7 device. Finally, clouds that may contain several kinds of media, including NIC cards, networking devices, hardware, and software, should also be considered Layer 1-7 devices. You will follow an e-mail packet as it travels through a small LAN. Note that the layer in which the packet is examined depends on the networking device through which it passes. Host I sends an e-mail to host D, host P, host H, and to another host in the internet cloud. The packet starts at the switch and goes to the e-mail server, which sends it out. Follow the packet as it travels to each host. The packet for host D passes through the main switch, the workgroup switch, and arrives at D. The packet for P passes through the router's E0 interface, the router’s E1 interface, the repeater, the bridge, and is finally de-encapsulated at P. The packet for H passes through the main switch, router E0 interface, router T0 interface, around the tokenring, and is finally de-encapsulated by host H. The packet bound for the Internet passes through the F0 interface onto the FDDI ring. Without intelligent devices - which actually examine packets and help guide them through the network - the e-mail message would be seen by every host on every part of every network. Now, imagine two, three, and four computers sending packets and you will understand why there is a need for intelligent Layer 2 and Layer 3 devices that can break up, or segment, the network into regions, and then filter, or screen, the packets based on their physical and logical address information. We use a crossover cable to connect same type devices together. A physical topology is an illustration of how a network is connected. The End A hub is used to connect multiple computers. With five computers and one hub we would need to use five IP addresses.