Download Data Network Connectivity

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

IEEE 802.1aq wikipedia , lookup

RS-232 wikipedia , lookup

Wireless security wikipedia , lookup

Distributed firewall wikipedia , lookup

Deep packet inspection wikipedia , lookup

Net bias wikipedia , lookup

Wake-on-LAN wikipedia , lookup

Zero-configuration networking wikipedia , lookup

Recursive InterNetwork Architecture (RINA) wikipedia , lookup

IEEE 1355 wikipedia , lookup

Computer network wikipedia , lookup

Network tap wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Piggybacking (Internet access) wikipedia , lookup

UniPro protocol stack wikipedia , lookup

Airborne Networking wikipedia , lookup

Routing in delay-tolerant networking wikipedia , lookup

Transcript
Data Network
Connectivity
Chapter 11
Objectives
In this chapter, you will learn to:








Explain how NICs operate
List the most common types of NICs
Describe the purpose and operation of hubs and repeaters
Describe the purpose and operation of bridges and switches
Explain how routers connect dissimilar networks
Identify other Layer 3 connectivity devices and understand their
uses
Describe how remote users can connect to a LAN or WAN via a
modem
Identify the components necessary for access and carrier
network connectivity
Network Interface Cards (NICs)

Devices that act as transceivers for workstations, servers,
connectivity devices, and peripherals on a network.

Transmit data in a format that other network nodes can
interpret.

Receive and interpret encoded data from the network.

Assemble data frames during transmission and
disassemble data frames during reception.
Adapter Card NICs

A circuit board used to connect a device to the
system board.

Expansion slots - openings with multiple
electrical contacts into which the adapter can
be inserted.

Bus - the circuit that is used by the system
board to transmit data to the computer’s
components.
Adapter Card NICs
PC Card NICs
USB NICs
Hubs
Hubs
Hubs
Bridges
Bridges

Transparent bridging - a bridge begins polling a network to
learn about its physical topology as soon as it is installed on the
network.

Spanning tree algorithm - a routine that can detect circular
traffic patterns and modify the way multiple bridges work
together, thus eliminating such patterns.

Source-route bridging - a bridge polls the network to
determine which path is best for a packet to travel from point A
to point B.

Translational bridging - the bridge not only forwards packets,
but also translates packets between one logical topology and
another.
Data Switches
Data Switches
Disadvantages
Advantages


Switches offer greater
security because they isolate
one device’s traffic from
another.
They provide separate
channels for every device


Switches can become
overwhelmed by
continuous, heavy traffic.
In that event, they cannot
prevent data loss.
On a fully switched
network, in which every
node uses its own port on
the switch and therefore
provides separate data
channel, devices cannot
detect collisions.
Routers
Routers

Functions:
 Filter out broadcast transmissions to alleviate network
congestion
 Prevent certain types of traffic from getting to a
network, enabling customized segregation and
security
 Support simultaneous local and remote connectivity
 Provide higher network fault tolerance through
redundant components, such as power supplies or
network interfaces
 Monitor network traffic and issue statistics to a
database
 Diagnose internal or other connectivity problems and
trigger alarms
Routers

Static routing - a technique in which a network
administrator programs a router to use specific
paths between nodes.

Dynamic routing - automatically calculates the
best path between two nodes and accumulates
this information in a routing table.
Routers
Routing Protocols

Best path - the most efficient route from one node on a
network to another.

Routing protocols - to determine the best path, routers
communicate with each other through routing protocols.

Convergence time - the time it takes for a router to
recognize a best path in the event of a change or outage.

Bandwidth overhead - the burden placed on the
underlying network to support the routing protocol.
Routing Protocols

Routing Information Protocol (RIP) for IP and IPX - factors in
only the number of of hops between nodes when determining a
path from one point to another.

Open Shortest Path First (OSPF) for IP - uses more complex
algorithm for determining best paths.

Enhanced Interior Gateway Routing Protocol (EIGRP) for IP,
IPX, and AppleTalk - offers the benefits of supporting multiple
protocols and limiting unnecessary network traffic between
routers.

Border Gateway Protocol (BGP) for IP - the routing protocol
for Internet backbones.
Firewalls
Gateways

Combinations of networking hardware and
software that connects at least two dissimilar
kinds of networks.

Operate at multiple layers of the OSI model

Can run on servers, workstations, or mainframe
computers
Gateway

Categories:





E-mail gateway - translates messages from one type
of e-mail system to another.
Internet gateway - allows and manages access
between LANs and the Internet.
LAN gateway - allows segments of a LAN running
different protocols, network access methods, or
transmission types to communicate with each other.
Voice/data gateway - allows a data network to issue
data signals over a voice network.
Wireless gateway - integrates a wireline network with
a wireless network.
Gateway
Remote Connection Methods

Direct dial to a remote access server - the client uses
a dial-in software supplied with its operating system to
connect to a remote access server on the LAN.

Direct dial to a host workstation - the remote client
uses a dial-in software supplied with its operating system
to connect to a workstation that is directly attached to the
LAN.

Connect via the Internet - the client first connects to the
Internet then connects to a private network.
Remote Connection Methods
How Modems Work

Data compression:
 to obtain higher throughput, modems compress the
data they receive from a computer before transmitting
it.

Data Transfer Rates:



V.90 defines 56 Kbps, asymmetrical transmission in which
one of the modems is assumed to be using a digital line.
V.92 improves upon V.90 by increasing the upstream
transmission rate to a maximum of 48 Kbps.
V.92 also accomplishes faster session negotiation because
modems using this standard keep a record of previous
connections.
Flow Control and Buffering

Software flow control (Xon/Xoff) - flow control
information is issued over the same channel as the data
being sent.

Hardware flow control - separates flow control
information from the data being sent.

Buffer - a logically defined area of a computer’s memory
where data is temporarily stored until it is requested by
software, or until it is cleared.

Buffering - the process of issuing data to a buffer.
Asynchronous and Synchronous
communication

Asynchronous - refers to a communications
method in which data being transmitted and
received by nodes does not have to conform to
any predetermined timing schemes.

Synchronous - refers to a communications
method in which data is transmitted in a
continuous stream of bits.
Modem Types

Adapter card - modems can exist as an adapter card
that connects to a computer’s bus.

Serial port - traditionally, external modems connected to
a computer via the serial port, which accepts a 22-pin,
RS 232 data connector.

PC Card - an excellent alternative for laptop users.

USB - an excellent option for both desktop and laptop
computer users.
Adapter Card
Serial Port
PC Card
USB
Virtual Private Networks
Digital Loop Carrier (DLC)

A technique for delivering digital signals to a high volume of LEC
subscribers over a combination of new and old local loop
infrastructure.

Uses multiplexing to consolidate multiple subscriber lines into
fewer, high-capacity digital connections that lead to the LEC’s
central office.

The point at which lines are combined is called the remote
subscriber terminal.

Central office terminal - separates individual subscriber lines
into their original circuits.
Digital Loop Carrier (DLC)
Access Nodes
The point at which a user’s traffic enters or exits
a carrier’s network.

Digital cross-connect system (DCS) - a
device that directly connects multiple digital
lines with other digital lines.

Integrated access devices (IADs) - integrate a
number of functions into one device.
Access Nodes
Summary

NICs enable workstations and other nodes to
connect to a network.

Gateways are combinations of software and
hardware that connect two dissimilar networks
or systems.

A virtual private network (VPN) allows an
organization to carve a private WAN over public
transmission facilities.