Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
COS226 notes Networking standards organisations ANSI (American National Standards Institute) Represents the USA in setting international standards Determines standards for the electronics industry and other fields Requests manufacturers to comply with its standards, rather than dictating EIA (Electronic Industries Alliance) Composed of representatives from electronics manufacturing firms across USA Sets standards for its members and helps write ANSI standards Divided into subgroups, one of which is the TIA (Telecommunications Industry Association) IEEE (Institute of Electrical and Electronic Engineers) An international society composed of engineering professionals Goals: Promote development & education in electrical engineering & computer science Establish their own standards (for electronics etc) and contribute to the work of ANSI Set standards for protocols used at the Physical layer (e.g. IEEE 802 standards) ISO (International Organisation for Standardisation) A collection of standards organisations representing 130 countries (HQ is in Geneva) Developed the OSI model Goal: Establish international technological standards to facilitate global information exchange Authority extends to the fields of textiles, packaging, energy production, shipbuilding… ITU (International Telecommunication Union) A specialised United Nations agency that regulates international telecommunications, including radio & TV frequencies, satellite & telephony specifications, networking infrastructure… Provides developing countries with technical expertise and equipment The OSI model 1 Physical layer Function: Manages hardware connections Contains the physical networking medium Protocols generate & detect voltage so as to transmit & receive signals carrying data Sets the data transmission rate & monitors data error rates Doesn’t provide error correction services Devices / media: Cabling, connectors, repeaters, hubs, amplifiers, transceivers, and NICs 2 Data Link layer Primary function: Divides data received from the Network layer into frames that can be transmitted by the Physical layer Inserts a frame check sequence at the end of each frame Function: Codes, addresses, and transmits information Retransmits information if there’s no acknowledgement from the receiver Doesn’t try to figure out what went wrong in the transmission Controls the flow of information if multiple requests, that include many frames, are received Functions independently of the type of Physical layer used by the network Ethernet is an example of a Data Link layer technology The IEEE separated the Data Link layer into two sub-layers: 1. LLC (Logical Link Control) Provides a common interface and supplies reliability and flow control services 2. MAC (Media Access Control) Appends the physical address of the destination computer onto the data frame Connectivity devices: Bridges, switches, and NICs 1 3 Network layer Primary function: Translates logical network addresses into physical ones, and decides how to route data from sender to receiver Determines the best path between two points on different networks, by factoring in delivery priorities, network congestion, quality of service, and cost of alternative routes Connectivity devices: Routers 4 Transport layer Primary function: Ensures that data are transferred reliably, in the correct sequence, and accurately The most important layer in the OSI model Sends an acknowledgment (ACK) to tell the sender that data were received correctly Requests retransmission if the data contained errors Retransmits data if there’s no acknowledgement within a given time period Transport protocols handle flow control (= gauging the appropriate transmission rate based on how fast the recipient can accept data) Long packets are broken into the maximum size that the type of network can handle Segmentation = decreasing the size of data units for a network that can handle only small units Reassembly = reconstructing the segmented data units Sequencing = assigning sequence numbers to each piece, so data can be reassembled correctly Services: TCP, SPX 5 Session layer Primary function: Establishes and maintains communication between two nodes on the network Synchronises the dialogue between two nodes Determines whether communications have been cut off, figuring out where to restart transmission Decides which node will communicate first and how long a node can communicate Monitors the identification of session participants, giving access to only authorised nodes 6 Presentation layer Function: Handles text formatting and displays code conversion Serves as a translator between the application and the network Formats data in a schema that the network can understand Manages data encryption & decryption Protocols code & decode graphics and file format information 7 Application layer Function: Transfers information from program to program Provides interfaces to the software that enable programs to use network services Some services provided: file transfer, file management, and message handling for email APIs (Application Program Interface) = routines that allow programs to interact with the OS MSMQ (Microsoft Message Queuing) = an API that stores messages sent between nodes in queues, and then forwards them to their destinations Applying the OSI model Communication between two systems How a message file is retrieved from the server: The APPLICATION layer formulates a request for data from a remote node, and transfers the request to the Presentation layer The PRESENTATION layer determines whether the request should be formatted / encrypted, and adds any necessary translation / codes required, before passing the request to the Session layer The SESSION layer picks up the formatted request and assigns a data token to it (to indicate that you have the right to transmit data) before passing the data to the Transport layer The TRANSPORT layer breaks down the data & control info into chunks. If the data is too large for one frame, it is subdivided into smaller blocks. One block at a time is passed to the Network layer The NETWORK layer adds addressing information to the data so that subsequent layers will know the source & destination of the data. The data blocks are then passed to the Data Link layer 2 The DATA LINK layer packages the data blocks into individual frames and inserts a Frame Check Sequence at the end of the frame, as well as a header that incorporates destination & source addresses. The Data Link layer then passes the frames to the Physical layer The PHYSICAL layer just delivers the data to the cabling and sends it across the network Once data arrives at the remote system, your request is unravelled, and the process is reversed. Addressing through the layers Addressing is a system for assigning unique ID numbers to each node on a network. Data Link layer addresses: Fixed numbers are associated with the networking hardware, and are assigned at a factory Also called MAC (Media Access Control) addresses / physical addresses Guaranteed to be unique Block ID = the part of the MAC address that is unique to a particular vendor Device ID = the remaining 6 characters, based on the NIC’s model and manufacture date E.g. Block ID = 00608C, Device ID = 005499, so MAC address = 00608C005499 Network layer addresses: Follow a hierarchical addressing scheme in which subsets of data incrementally narrow down the location of a node Also called logical addresses / virtual addresses Can be assigned through operating system software Useful to internetworking devices, like routers, because they make sorting data more logical Network protocols TCP/IP Low cost Ability to communicate between a multitude of dissimilar platforms The standard on the Internet The default protocol for NetWare 5.x and Windows 2000 Biggest advantage: Routable (i.e. carries network addressing information) Flexible (can run on any combination of NOS or network media) Disadvantage: Can require significant configuration (because of its flexibility) Compared to the OSI model OSI model TCP/IP model Application Application Presentation Session Transport Transport Network Internet Data Link Network Interface Physical Protocols FTP, TFTP, HTTP, SMTP, SNMP DHCP, Telnet, POP, IMAP, NTP TCP, UDP IP, ICMP, ARP, RARP Protocols: IP (Internet Protocol) Provides information about how and where data should be delivered Unreliable, connectionless protocol (i.e. doesn’t guarantee delivery of data) Enables TCP/IP to internetwork (i.e. traverse more than one LAN segment or network) Subnets = individual networks (in an internetwork) that are joined together IP datagram = the IP portion of a data frame The IP datagram contains the necessary info for routers to transfer data between subnets 16 The length of the IP datagram cannot exceed 65 535 bytes (i.e. 2 ) The TTL (Time To Live) component of an IPv4 IP datagram header indicates the maximum time in seconds that a datagram can remain on the network before it is discarded 3 TCP (Transmission Control Protocol) Provides reliable data delivery services Connection-oriented subprotocol (i.e. a connection must first be established between nodes) Checksum, flow control, and sequencing information compensate for IP’s reliability deficiencies TCP segment = the entity that becomes encapsulated by the IP datagram UDP (User Datagram Protocol) Connectionless transport service Offers no assurance that packets will be received in the correct sequence Doesn’t guarantee that packets will be received at all Provides no error checking or sequence numbering Lack of sophistication makes it more efficient than TCP Useful when data must be transferred quickly, like live audio / video transmissions ICMP (Internet Control Message Protocol) Notifies the sender when something goes wrong in transmission and packets aren’t delivered Simply reports which networks are unreachable and which packets have been discarded Doesn’t provide error control Used by diagnostic utilities like PING and TRACERT ARP (Address Resolution Protocol) Obtains the MAC address of a node, then creates a local database that maps the MAC address to the node’s IP address Works closely with IP RARP (Reverse Address Resolution Protocol) A client sends a broadcast message with its MAC address and receives its IP address in reply The RARP server maintains a table of MAC addresses and their associated IP addresses Telnet Terminal emulation protocol used to log on to remote hosts using TCP/IP Often used to connect two dissimilar systems FTP (File Transfer Protocol) Used to send and receive files via TCP/IP The node running the FTP server portion accepts commands from one running the client portion Comes with a set of very simple commands that make up its user interface TFTP (Trivial File Transfer Protocol) Like FTP, but it relies on UDP Connectionless and doesn’t guarantee reliable delivery of data A computer issues a read / write request to the remote node, which responds with an acknowledgement, before the two computers begin transferring data Useful when you need to load programs on a diskless workstation Files that are transferred should have full read & write privileges for all remote users SMTP (Simple Mail Transfer Protocol) Responsible for moving messages from one email server to another Uses a simple request-and-response mechanism to move messages Relies upon more sophisticated protocols, like POP to keep track of storing & forwarding messages POP (Post Office Protocol) Provides centralised storage for email messages Relies on SMTP Doesn’t allow users to keep mail on the server after they retrieve it IMAP (Internet Mail Access Protocol) Mail storage & manipulation protocol that also depends on SMTP’s transport system A more sophisticated alternative to POP Biggest advantage over POP: Users can store messages on the mail server, rather than always having to download them to a local machine 4 Features: Users can retrieve all / a portion of a mail message Users can review messages & delete them while the messages stay on the server Users can create sophisticated methods of organising messages on the server Users can share a mailbox in a central location IMAP4 provides better security than POP because it supports authentication Disadvantages: IMAP servers require more storage space & processing resources than POP servers If the IMAP server fails, users can’t access the mail left there HTTP (Hypertext Transfer Protocol) The language that Web clients & servers use to communicate Forms the backbone of the Web NTP (Network Time Protocol) Used to synchronise the clocks of computers on a network (If clocks aren’t synchronised, packets could expire prematurely, resulting in data loss) (Time is also used in routing to determine the most efficient path for data) Depends on UDP Time-sensitive, and can’t wait for the error checking that TCP would require SNMP (Simple Network Management Protocol) Used to manage devices on a TCP/IP network Each device runs an agent that collects information about that device The collected information is transported to a central database DHCP (Dynamic Host Configuration Protocol) Automatically assigns a unique IP address to devices on a network Advantages: Reduces time & planning spent in IP address management Reduces potential for errors in assigning IP addresses Enables users to move their workstations & printers without changing their TCP/IP configuration Makes IP addressing transparent for mobile users Addressing First octet value: 0 1-126 127 128-191 192-223 224-239 240-254 255 Network class: Additional info: Class A Share 1st octet 127.0.0.1 Share 1st two octets Share 1st three octets (Not for consumers) (Not for consumers) 255.255.255.255 Class B Class C Class D Class E Purpose: Broadcasts Loopback information Multicasting Experimental use Broadcasts IP addresses are 32 bits in size, grouped into four 8-bit octets, separated by dots Network portion: Indicates the network class Host portion: Follows the network portion, and is unique to each device Static IP address = one that is assigned manually Dynamic IP address = one that is assigned automatically by DHCP ICANN (Internet Corporation for Assigned Names and Numbers) are responsible for IP addressing and domain name management IANA (Internet Assigned Numbers Authority) are responsible for system administration Individuals and businesses typically obtain IP addresses from their ISPs If your network sits behind a firewall, you don’t need to adhere to ICANN standards Each host requires a host name, e.g. student1 Each network requires a network name (domain name), e.g. sacc.tec.ca.us Host name + domain name = FQDN (Fully Qualified Domain name) e.g. student1.sacc.tec.ca.us 5 IPX/SPX Required for NetWare version 3.2 / lower Can also be used with higher versions of NetWare, Windows 2000, and 98 Carries network addressing info, so it IS routable Compared to the OSI model OSI model IPX/SPX model Application NCP, SAP, RIP Presentation Session NetBIOS Transport SPX Network IPX Data Link Transmission media & protocols like Ethernet Physical Core protocols IPX (Internetwork Packet Exchange) Provides routing and internetwork services Uses datagrams to transport data Connectionless service (it doesn’t require a session to be established first) Doesn’t guarantee that data will be delivered in sequence or without errors SPX (Sequenced Packet Exchange) Works with IPX to ensure that data are received whole, in sequence, and error free Connection-oriented protocol (it must verify that a session is established first) Can detect whether a packet was not received in its entirety If it discovers a packet was lost / corrupted, it resends the packet SAP (Service Advertising Protocol) Devices advertise their availability through SAP Broadcasts occur every 60 seconds, by default Unnecessary traffic may be generated because of the broadcast mode used SAP servers maintain a database of device names correlated with their IPX addresses When a client needs a service, it queries the SAP database, which provides the IPX address Users don’t need to know the IPX addresses of other servers & workstations NCP (Netware Core Protocol) Handles requests for services, like printing and file access, between clients & servers Acts as a translator between the workstation’s OS and the NetWare OS A client asks NCP to request a service NCP notifies the server NCP waits for acknowledgement from the server NCP allows the workstation to transmit data The request-and-response mechanism results in high reliability Extra traffic is generated that may lead to congestion RIP (Routing Information Protocol) Factors in only the number of hops between nodes when determining a path between points Doesn’t consider things like network congestion or link speed Routers using RIP broadcast their routing tables every 30 seconds to other routers Broadcasting creates excessive network traffic Advantage of RIP: Stability RIP doesn’t work well in very large network environments with more than 15 routers RIP is slower and less secure than other routing protocols Addressing IPX/SPX networks rely primarily on the MAC address for each workstation Network address (external network number) = the first part of an IPX address The network address is an 8-bit hex address, e.g. 000008A2 Node address = the second part of an IPX address The node address is equal to the device’s MAC address, e.g. 0060973E97F3 An example IPX address: 000008A2:0060973E97F3 6 Socket address = an address assigned to a process that needs to communicate on the network Socket addresses (e.g. 456h) are appended to IPX addresses Example of a complete IPX address for a socket: 000008A2:0060973E97F3:456h NetBIOS & NetBEUI NetBIOS doesn’t contain a Network layer so it can’t be routed Used primarily with Windows-based systems Not very secure Not suitable for large networks NetBEUI (‘Enhanced User Interface’) is an added application layer component on top of NetBIOS Compared to the OSI model OSI model NetBIOS & NetBEUI Application Presentation Session NetBIOS Transport NetBEUI Network Data Link Physical Addressing NetBIOS (alphanumeric) names are assigned to each workstation The NetBIOS name can consist of up to 16 alphanumeric characters, e.g. MY_COMPUTER Once NetBIOS has found a node’s NetBIOS name, it will find its MAC address and use that AppleTalk An AppleTalk network is separated into logical groups of computers called AppleTalk zones Each node can belong to only one zone AppleTalk zones enable users to share file & printer resources on their Macintoshes AppleTalk is unsuitable for large LANs or WANS Compared to the OSI model OSI model AppleTalk Application AppleShare Presentation AFP Session ASP Transport ATP | NBP | RTMP | ZIP Network DDP Data Link Physical Subprotocols AppleShare Provides file sharing & print queuing services, password access to files or folders, and user accounting information AFP (AppleTalk Filing Protocol) Provides transparent access to files on both local and remote systems ASP (AppleTalk Session Protocol) Establishes and maintains connections between nodes and servers ATP (AppleTalk Transaction Protocol) Ensures reliable delivery of data NBP (Name Binding Protocol) Translates human-readable node names into numeric AppleTalk addresses 7 RTMP (Routing Table Maintenance Protocol) Maintains a routing table of AppleTalk zones and their networks Uses ZIP to manage data in the routing table ZIP (Zone Information Protocol) Updates zone information maps that tie zones to their networks for routing purposes DDP (Datagram Delivery Protocol) Assigns an AppleTalk node’s address upon start-up Manages addressing for communications between AppleTalk nodes Addressing 3 ways of identifying computers: Zone names can be plain words or numbers, and describe a department / group of users AppleTalk node IDs are 8 / 16-bit numbers that uniquely identify computers and that are randomly chosen from a group of addresses AppleTalk network numbers are 16-bit numbers that identify the network to which a node is connected so that nodes from different networks can communicate. Transmission basics Analogue signals Voltage (= signal strength) varies continuously, appearing as a continuous wave Advantage: can convey greater subtleties, because they are more variable than digital signals Disadvantage: more susceptible to flaws (noise) than digital signals Amplitude = a measure of a wave’s strength, or the height of the wave Frequency = the number of times the amplitude cycles from and back to its starting point Wavelength = the horizontal distance between extreme points on a wave’s cycle Phase = the progress of a wave over time in relationship to a fixed point Digital signals Voltage turns on and off repeatedly Advantage: more reliable than analogue signals, because noise affects transmission less Disadvantage: many pulses are required to transmit the same amount of info as one wave can Data modulation A technology used to modify analogue signals in order to make them suitable for carrying data over a communication path A carrier wave is combined with a data wave, and is transmitted from one node to another The purpose of the carrier wave is to help convey information - it does not represent information The data wave is added to the carrier wave, modifying one property of the carrier wave (like frequency, amplitude, or phase) When the signal reaches the destination, the receiver separates the data from the carrier wave Frequency modulation (FM) - the data must travel along a particular frequency Amplitude modulation (AM) - the data must travel along a particular amplitude Transmission direction Simplex Signals may travel in only one direction Half-Duplex Signals may travel in both directions, but in only one direction at a time One channel must be shared for multiple nodes to exchange information Duplex Signals can travel in both directions over a medium simultaneously Multiple channels are used on the same medium Multiplexing A form of transmission that allows multiple signals to travel simultaneously over one medium 8 Used to increase the amount of data that can be transmitted in a given time span To accommodate multiple signals, the single medium is logically separated into sub-channels A multiplexer (device that can combine many signals on a channel) is required at the sending end A demultiplexer (device that separates the combined signals) is required at the receiving end Time division multiplexing (TDM) Divides a channel into multiple intervals of time Assigns a separate time slot to every node on the network If a node has no data to transmit, nothing will be sent during its time slot Disadvantage: Inefficient if some nodes on the network rarely send data Statistical multiplexing Assigns slots to nodes according to priority and need More efficient than TDM because time slots are unlikely to remain empty Advantage: Allows networks to maximise available bandwidth Wavelength division multiplexing (WDM) New technology used only with fibre-optic cable Each carrier signal is assigned a different wavelength, which is like its own separate sub-channel The wavelength of each carrier signal is then modulated with a data signal Multiplexed signals may be sent in both directions simultaneously At the transmitting end: A fibre-optic modem (FOM) creates a WDM wave At the receiving end: A FOM separates the multiplexed signals into individual ones Relationships between nodes Point-to-point transmission: One transmitter and one receiver Broadcast transmission: One transmitter and multiple receivers Webcasting: Broadcast transmission over the Web Throughput and bandwidth Throughput = the measure of how much data is transmitted during a given period of time Throughput is expressed in bits per second Bandwidth = a measure of the difference between the highest and lowest frequencies Bandwidth is expressed in Hz / MHz Baseband A transmission form in which digital signals are sent through direct current pulses applied to wire This direct current (DC) requires exclusive use of the wire’s capacity As a result, baseband systems can transmit only one signal / one channel at a time Every device on a baseband system shares the same channel When one node is transmitting, all nodes must wait for transmission to end before they can send Supports bidirectional signal flow: computers can both send & receive info on the same wire Ethernet is an example of a baseband system Broadband Signals are modulated as radiofrequency (RF) analogue pulses that use different frequency ranges The use of multiple frequencies enables access to several channels, so more data can be carried Broadband transmission is used to bring cable TV to your home Traditionally, signals travel in one direction, so you need a separate wire for transmission & receipt More expensive than baseband transmission because of the extra hardware involved Can span longer distances than baseband Transmission flaws Most noise is caused by electromagnetic interference (EMI) or radiofrequency interference (RFI) EMI & RFI = waves that emanate from electrical devices / cables carrying electricity Wireless transmission is typically more susceptible to noise than wireline transmission Attenuation = the loss of a signal’s strength as it travels away from its source To strengthen analogue signals: an amplifier increases the voltage of the signals To strengthen digital signals: a repeater regenerates the signals Amplifiers also amplify noise, whereas repeaters retransmit the signals in their original, pure form 9 Media characteristics Cost Factors that can influence the final cost of implementing a certain type of media: Cost of installation Cost of new infrastructure versus reusing existing infrastructure Cost of maintenance and support Cost of a lower transmission rate affecting productivity Cost of obsolescence Noise immunity You should install cabling well away from powerful electromagnetic forces Thicker cables and cables coated with protective shielding are less susceptible to noise You can use antinoise algorithms to protect data from being corrupted by noise A metal conduit / pipeline can contain the cabling to protect it Size and scalability Maximum nodes per segment Depends on the attenuation: Each device added increases the signal’s attenuation slightly Maximum segment length Limited because of attenuation: After a certain distance, a signal loses too much strength Maximum network length Latency = the delay between transmission & receipt of a signal When you connect multiple segments, you increase the latency in the network Things that can cause latency: The existence of intervening connectivity devices (like routers / hubs) A NIC in a PC (because data must travel through it) CAT5 wiring (The longer the wire, the greater the latency) (Note: A patch cable that is too short won’t cause latency because it is length that contributes) Throughput The most significant factor in choosing a transmission medium Noise and devices connected to the transmission medium can limit throughput (A noisy circuit spends more time compensating for the noise, and less time transmitting) Connectors Pieces of hardware that connect the wire to the network device The type of connector affects the cost of installing & maintaining the network, ease of adding new segments, and the technical expertise required to maintain the network Twisted-pair cable Crosstalk occurs when signals travelling on nearby wire pairs infringe on another pair’s signal The twists in the wire help to reduce the effects of crosstalk Alien crosstalk occurs when signals from an adjacent cable interfere with transmission Alien crosstalk can occur when you bundle too many cables into small conduits STP can sustain the most bending without impairing transmission, compared to UTP, Thinnet, Thicknet Standards that may be used on modern networks: CAT3 - contains 4 wire pairs and can carry up to 10 Mbps of data CAT5 - contains 4 wire pairs and supports up to 100 Mbps throughput (Most popular form of UTP!) IEEE Physical layer networking standards: 10BaseT - 10Mbps, CAT3+, UTP, star topology with central hub / repeater 100BaseT - 100Mbps, CAT3+, UTP, star topology with central hub / repeater * 100BaseTX - CAT5+, UTP, full duplexing * 100Base T4 - uses all 4 pairs of UTP for unidirectional signalling, no full duplexing 100BaseVG - efficient process to carry audio & video data, UTP, no full duplexing Coaxial cable Devices on a Thinnet network should be separated by at least 0.5m Devices on a Thicknet network should be separated by at least 2.5m 10 Both Thinnet and Thicknet cable require 50-ohm resistors terminating either end of the network Fibre-optic cable Fibre doesn’t conduct electricity like copper wire, so it doesn’t emit a current and is thus more secure Fibre can transmit data in only one direction at a time, so each cable must contain two strands Fibre’s high throughput makes it suitable for applications that generate a lot of traffic, like video & audio Multimode fibre uses multiple light paths and is typically used on LANs Multimode fibre is better suited for shorter distances than single-mode fibre IEEE Physical layer networking standards: 10BaseF - 10Mbps, 2 strands of multimode fibre, full-duplex, ST connectors, star topology 100BaseFX - 100Mbps, 2+ strands of multimode, full-duplex, various connectors, star topology Comparison of Networking Media: Twisted pair UTP STP 1. Cost 2. Noise immunity: Resistance to noise 3. Size & scalability a) Max segment length b) Max nodes / segment c) Max network length Distance signals can be carried before amplification is necessary 4. Throughput 5. Connectors Cheapest Least resistant 100M 185M 500M 1024 30 100 Depends on type of signalling used 550M 1500M Standards Topology Fibre-optic SingleMulti-mode mode Most expensive Most resistant 100M Depends on type of fibreoptic cable used Shortest distance Longest distance Medium (100 Mbps) Lowest (10 Mbps) BNC-T & Transceiver BNC Barrel (MAU) with connectors vampire taps. AUI / n-series connectors. Highest (1000 Mbps) SC connectors ST connectors RJ-45 connectors Appearance Coaxial Thinnet Thicknet (RG-58A/U) (RG-8) Colour-coded pairs of insulated copper wires, twisted round each other and all encased in a plastic sheath No Surrounded additional by (foil) shielding shielding CAT1 CAT7 10BaseT, 100BaseT, 100BaseVG Star / star-hybrid Black sheath Yellow sheath Glass fibres at the centre, surrounded by a layer of glass (cladding) a plastic buffer Kevlar strands a plastic sheath Narrow core Wide core 10Base2 10Base5 10BaseF, 100BaseFX Central copper core, surrounded by an insulator, then braiding, then a sheath Bus Star Cable design and management Cable plant = the hardware that makes up the enterprise-wide cabling system Structured cabling TIA/EIA’s Commercial Building Wiring Standard Suggests how networking media can best be installed to maximise performance & minimise upkeep Specifies standards without regard for the type of media / transmission technology used Based on a hierarchical design that divides cabling into 6 subsystems: 1. Entrance facilities The point at which a building’s internal cabling plant begins Separates LANs from WANs 11 2. Backbone wiring Provides interconnection between ‘telco rooms’, equipment rooms, and entrance facilities Risers = vertical connectors between floors Usually fibre-optic / UTP cable 3. Equipment room Location where significant networking hardware, like servers and mainframe hosts, resides Cabling to equipment rooms usually connects telecommunications closets 4. Telecommunications closet Contains connectivity for workstations in its area, and cross connections to equipment rooms Punch-down block = a panel of data receptors into which cabling from the workstations is inserted Patch panel = a panel of receptors into which patch cables from the punch-down block are inserted Patch cables connect the patch panel to the hub / switch Good cooling and ventilation systems are important to maintain a constant temperature 5. Horizontal wiring Wiring that connects workstations to the closest telecommunications closet Three possible types for horizontal wiring: STP, UTP, or fibre-optic Maximum allowable distance = 100m 6. Work area An area encompassing all patch cables and horizontal wiring necessary to connect workstations, printers, and other network devices from their NICs to the telco closet Patch cable = a short section of twisted-pair cabling with connectors on both ends that connects network devices to data outlets Atmospheric transmission media Infrared transmission Infrared light signals transmit data through space Infrared pathways can carry data at rates that rival fibre-optic cable’s throughput Can function at 100 Mbps Can span distances up to 1000 m Direct infrared transmission The transmitter and receiver must be within line of sight of each other Most often used for communications between devices in the same room Advantage: More secure than many other transmission methods, since signals are hard to intercept Disadvantage: The line of sight limitation prevents widespread use Indirect infrared transmission Signals bounce off objects in the path Disadvantage: Not very secure because signals are not confined to a specific pathway RF transmission Relies on signals broadcast over specific frequencies, like radio / TV broadcasts Advantage: RF can penetrate walls Disadvantage: Easy interception of RF transmissions, so don’t use it if security is important Disadvantage: Very susceptible to interference (RF signals can also interfere with each other) Makers of RF components must obtain licenses for specific frequencies in different locations The licensing procedure ensures that nearby systems won’t operate at the same frequencies Narrowband = a RF technology which concentrates significant RF energy at a single frequency Spread spectrum - uses a lower-level signal distributed over several frequencies simultaneously Narrowband RF can be easily intercepted, but spread spectrum RF is quite secure Both these types of RF offer a moderate throughput, ranging as high as 10 Mbps Choosing the right transmission medium Environmental factors to take into account: Areas of high EMI or RFI Thick Ethernet and fibre-optic cable are the most noise-resistant media Corners and small spaces STP and UTP are both very flexible Distance Fibre-optic or wireless media are best for long stretches of transmission 12 Security Fibre-optic, direct infrared, and spread spectrum RF media are the most secure Existing infrastructure The media you choose should be tailored to the previously installed equipment Growth Find out how the organisation plans to expand and consider future applications, traffic, etc. Simple physical topologies Bus A single cable connects all nodes, without intervening connectivity devices Only one channel for communication, so every node share’s the bus’s total capacity Most bus networks use coaxial cable When a node wants to transmit data, it broadcasts an alert to the entire network Each node passively listens for data directed to it - the destination node picks up the transmission At the ends are 50-ohm resistors (terminators), which stop signals that reach the end of the wire Signal bounce = when signals bounce between two ends of the network (if there are no terminators) Advantage: Networks based on a bus topology are inexpensive to set up Disadvantage: The more nodes, the more performance degrades and the slower the transmission Disadvantage: Not practical for a network of more than 200 workstations Disadvantage: Difficult to troubleshoot (intermediate errors are only picked up at the receiving point) Disadvantage: Not very fault-tolerant (a break in the bus affects the entire network) Ring Data are transmitted clockwise, in one direction, around the ring Each node accepts the packets addressed to it, and forwards the rest to the next node Most ring networks use twisted-pair or fibre-optic cabling No terminators, because there are no ends and data stops at the destination Disadvantage: A single malfunctioning workstation can disable the network Disadvantage: The more workstations, the slower the response time Token passing: 1. A 3-byte packet (token) is transmitted from one node to another around the ring 2. A computer that wants to transmit picks up the token packet, adds control & data info & the destination node’s address to transform the token into a data frame 3. The transformed token circulates around the network until reaching its destination 4. The destination node picks it up and returns an acknowledgment to the originating node 5. When the originating node gets the acknowledgement, it releases a new free token down the ring This ensures that only one workstation transmits data at any given time Active topology, because each workstation acts as a repeater for the transmission Advantage: High data reliability (no collisions), and efficient use of bandwidth Advantage: Doesn’t impose distance limitations on the LAN segment length (unlike CSMA/CD) Disadvantage: Generates extra network traffic Star Every node is connected through a central device, like a hub Most star networks use twisted-pair or fibre-optic cabling A cabling problem will affect two nodes at most Devices transmit data to the hub, which retransmits the signal to the destination node Advantage: More fault-tolerant than bus / ring networks Advantage: Scalable (can easily be moved, isolated, or interconnected with other networks) Disadvantage: A failure in the central connectivity device can take down a LAN segment Disadvantage: More cabling and configuration is required than with bus / ring networks Hybrid physical topologies Star-wired ring Physical layout of a star, with token-passing data transmission Data are sent around the star in a circular pattern 13 Token Ring networks use this hybrid Advantages: Fault tolerance of star topology and reliability of token passing Star-wired bus Groups of workstations are star-connected to hubs and networked via a single bus You can cover longer distances and easily interconnect / isolate different network segments Ethernet relies most often on this hybrid Disadvantage: More expensive than using star or bus alone (more cabling & connectivity devices) Daisy-chained Hubs in star-wired bus / ring topologies can be daisy-chained Little additional cost is required to expand a LAN this way There is a limit as to how many hubs can be connected in sequence If you daisy-chain a topology with limited bandwidth, you risk overloading the channel errors Hierarchical You can separate hubs, switches, and routers for reasons of security, cost, scalability, reliability… Layers separate devices based on their priority or function Advantage: Ability to segregate (isolate) bandwidth among different groups Advantage: Ease in adding / isolating different network groups Advantage: Flexibility to interconnect different network types Enterprise-wide topologies Backbone networks Backbones are capable of more throughput than the cabling that connects workstations to hubs Serial backbone Simplest kind of backbone network Two or more hubs are connected to each other by a single cable Identical to daisy-chained networks of hybrid physical topologies Not suitable for large networks or long distances Rarely implemented for enterprise-wide networks Distributed backbone A number of hubs are connected to a series of central hubs / routers in a hierarchy Allows for simple expansion and limited capital outlay for growth Network administrators can segregate workgroups and therefore manage them more easily You need to consider the maximum allowable distance between nodes and server Advantage: Implementation can be relatively simple, quick, and inexpensive Disadvantage: Central point of failure (The hub at the uppermost layer) Collapsed Backbone A single router / switch is the central connection point (at the highest layer) for multiple subnetworks The router / switch must contain multiprocessors to handle the heavy traffic going through it Advantage: You can interconnect different types of subnetworks Advantage: You can centrally manage maintenance and troubleshooting chores Disadvantage: A failure in the central router / switch can bring down the whole network Disadvantage: Using routers can be slower, because they can’t move traffic as quickly as hubs Parallel backbone The most robust enterprise-wide topology Like a collapsed backbone, but more than one connection to each network segment Advantage: Redundant links ensure connectivity to any area of the enterprise Disadvantage: More expensive, because more cabling is required Mesh networks Routers are interconnected with other routers, with at least two pathways connecting each router Mesh networks typically contain several different backbone networks 14 WAN topologies Peer-to-peer Each site depends on every other site in the network to transmit and receive traffic Each location is connected to another one through (usually) dedicated circuits Suitable for only small WANs Best for organisations with only a few sites and the capability to use dedicated circuits Disadvantage: Doesn’t scale well, because all sites must participate in carrying traffic Disadvantage: The addition of more sites can cause performance to suffer Disadvantage: A single failure can take down communications between all sites Ring Each site is connected to two others, forming a ring pattern Practical for connecting fewer than 4 or 5 locations Advantage: A single cable problem won’t affect the entire network Advantage: Routers at any site can redirect data to another route if one route is too busy Disadvantage: Expanding ring-configured WANs can be difficult Disadvantage: Expanding WANs is expensive because of the additional link Star A single site acts as the central connection point for several other points This arrangement provides separate routes for data between any two sites Advantage: More reliable that peer-to-peer or ring WANs Advantage: Shorter data paths between any two sites Advantage: Extending a star WAN is easy, and cheaper than with peer-to-peer or ring Disadvantage: A failure at the central connection point can bring down the entire WAN Mesh Many locations are incorporated, so data can travel directly from origin to destination If one connection has a problem, routers can redirect data easily and quickly To reduce costs, you can implement a partial mesh, instead of a full mesh Advantage: Very fault-tolerant, because of the multiple routes provided Disadvantage: Expensive to connect every node to every other one Tiered WAN sites connected in star / ring formations are interconnected at different levels Advantage: Easy expansion and inclusion of redundant links to support growth Disadvantage: Flexibility means careful consideration of geography, usage patterns, and growth Logical topologies The way in which data are transmitted, rather than the physical layout of the paths Most common logical topologies are bus (used by Ethernet) and ring (used by Token Ring) Bus logical topology: Signals travel from one device to all other devices on a network Networks that use a bus / star / star-wired bus physical topology also use a bus logical topology Ring logical topology: Signals follow a circular path between sender and receiver Networks that use a pure ring / star-ring hybrid physical topology also use a ring logical topology Switching Determines how connections are created between nodes Circuit switching A connection is established between two nodes before they begin transmitting data Bandwidth is dedicated to this connection until the users terminate communication E.g. Phone call Good for live audio / videoconferencing, which can’t tolerate time delay of packet switching 15 Also used by: ISDN, T1 service, ATM Disadvantage: Not economical, because bandwidth is monopolised Message switching A connection is established, information is transferred, and the connection is then broken The information is stored and forwarded from one device to the next, until the destination E.g. Email Each device in the path must have enough memory and processing power to accept, store, and pass on the information to the next node Packet switching Data is broken into packets before they are transported Packets can travel any path on the network and needn’t arrive in the same sequence The destination node reassembles the packets based on their control information E.g. Ethernet, FDDI, the Internet Fast and efficient mechanism for transporting data like word-processing files Advantage: Doesn’t waste bandwidth by holding open a connection (like circuit switching) Advantage: Doesn’t require devices in the path to process info (like message switching) Ethernet The most popular network technology used on modern LANs Flexible (can run on a variety of media) and offers excellent throughput at a reasonable cost Carrier Sense Multiple Access with Collision Detection (CSMA/CD) 1. 2. 3. 4. 5. 6. 7. The network access method that all Ethernet networks have in common “Carrier Sense”: Ethernet NICs listen and wait till sensing that no other nodes are transmitting “Multiple Access”: Several Ethernet nodes can be connected and access the media simultaneously When a node wants to transmit data it must first determine whether the channel is free If the channel is not free, the node waits and checks after a random amount of time When the channel is free, the node transmits its data If two nodes see that the channel is free and begin to transmit, you get a collision The network then carries out a collision detection routine The NICs stop transmitting Jamming follows: The NIC issues a 32-bit sequence that tells the rest of the nodes that its previous transmission was faulty and that those frames shouldn’t be accepted as valid 8. The node waits, and retransmits its data when the line is available again Collision domain = an individual segment on an Ethernet network in which collisions can occur Repeaters repeat collisions, so connecting multiple parts of a network with repeaters results in a larger collision domain Higher-layer connectivity devices, like switches and routers, can separate collision domains Data propagation delay = the time data take to travel from one point to another on a segment If the distance between two nodes is too far, CSMA/CD won’t work because collisions can’t be identified accurately Demand priority The network access method used by 100BaseVG Each device on a star / hierarchical network sends a request to transmit to the central hub The hub grants the requests one at a time Data travel from one device to the hub, and then to another device Advantage: No collisions, because the hub determines which nodes transmit and when Advantage: Secure, because data doesn’t pass by each node (only source & destination see it) Advantage: The hub can prioritise transmission requests Disadvantage: An intelligent hub is required (Some Ethernet networks don’t have one) Disadvantage: The time a hub takes to process each request reduces overall performance Switched Ethernet Shared Ethernet: Fixed amount of bandwidth that must be shared by all devices on a segment Stations can’t send and receive data simultaneously 16 Stations can’t transmit a signal when another one on the same segment is sending / receiving Switched Ethernet: A switch separates a network segment into smaller ones, with each one supporting its own traffic Multiple nodes can simultaneously transmit & receive data over different logical network segments Increased bandwidth on a network segment, because of fewer workstations Gigabit Ethernet Can run over UTP cable, but performs better over multimode fibre A fibre-based 1 Gigabit Ethernet network uses CSMA/CD transmission, the IEEE 802.3 frame type, and is capable of full duplexing Often encountered as part of a network’s backbone Ethernet frame types Frames are structured packages for moving data Using frames reduces the possibility of errors / lost data, because of the built-in error checking A node must be configured to expect one type of frame If a node receives a different type of frame, it won’t be able to decode the data Ethernet frame types have no relation to the topology / cabling characteristics of the network Autosense = device driver software that senses what types of frames are running on a network IEEE 802.3 (“Ethernet 802.2” / “LLC”) The default frame type for versions 4.x and higher of the Novell NetWare NOS The most popular Ethernet frame type for use with IPX/SPX traffic on most LANs Preamble (8 bytes) Destination address (6 bytes) Source address (6 bytes) Length (2 bytes) LLC (DSAP, SSAP, Control field) (46 to 1500 bytes) Frame Check Sequence (4 bytes) Signals that data are coming (Not included in frame’s total size) MAC address identifies where data should be delivered MAC address identifies where data originated Length of the data field Data plus padding. (Padding increases the size of the frame to its minimum requirement of 46 bytes) Ensures that data are received just as they were sent. When a node transmits data, it performs a CRC (Cyclical Redundancy Check): The values of the frame fields are used to generate a unique number (the FCS), which the destination node unscrambles and compares to the frame’s original form. Logical Link Control (LLC) layer information: Purpose: To distinguish among multiple clients on a network Destination Service Access Point (1 byte) A Service Access Point (SAP) identifies a node that uses the LLC protocol. Source Service Access Point (1 byte) Control field (1 byte) Identifies the kind of LLC connection that must be established (from unacknowledged to fully acknowledged) Novell Proprietary 802.3 (“Ethernet 802.3”) The original NetWare frame type The default frame type for networks running NetWare versions lower than 3.12 Supports only the IPX/SPX protocol Also called 802.3 Raw, because its data portion contains no control bits Rarely used on modern networks Preamble (7 bytes) SFD (1 byte) Destination address (6 bytes) Source address (6 bytes) Length (2 bytes) Data + padding (46 to 1500 bytes) Frame Check Sequence (4 bytes) Indicates the beginning of the addressing frame Ethernet II The original Ethernet frame type developed by DEC, Intel, and Xerox The type field enables Ethernet II to support Novell IPX/SPX, TCP/IP, and AppleTalk protocols 17 The type field also compensates for the lack of LLC information Preamble (8 bytes) Destination address (6 bytes) Source address (6 bytes) Ethernet type (2 bytes) Data + padding (46 o 1500 bytes) Frame Check Sequence (4 bytes) Identifies the upper-layer protocol contained in the frame IEEE 802.3 SNAP SNAP = Sub-Network Access Protocol Compatible with IPX/SPX, TCP/IP, and AppleTalk protocols, but rarely used on modern LANs Preamble (8 bytes) Destination address (6 bytes) Source address (6 bytes) Length (2 bytes) Data + padding: LLC (8 bytes), (46 to 1500 bytes) FCS (4 bytes) Logical Link Control fields: DSAP (1 byte) SSAP (1 byte) Control (1 byte) OUI - Organisation ID (3 bytes) Ethernet type (2 bytes) Identifies the type of network on which the frame is running (Like the Ethernet II frame) Design considerations for Ethernet networks Cabling - Ethernet networks can use coaxial / UTP cabling Connectivity devices - Ethernet connectivity devices are cheaper than Token Ring / LocalTalk Number of stations - Limit of 1024 on a 10BaseT / 100BaseTX Ethernet Network Speed - Throughput of 10 Mbps, 100 Mbps, 1 Gbps and soon 10 Gbps Scalability - You can easily expand Ethernet networks by adding connectivity devices on the bus Topology - 10BaseT and 100BaseTX Ethernet networks use a star-wired bus hybrid topology LocalTalk A network access method for networking Macintosh computers Only capable of 230 Kbps maximum throughput Not easily supported by non-Macintosh devices Requires twisted-pair wiring and uses the same type of cabling used for phone connections Relies on a star or, more often, a bus physical topology Maximum segment length = 305 metres Up to 32 nodes may be connected to any single LocalTalk network before errors begin to occur LocalTalk relies on the AppleTalk protocol, but may also support MacTCP (the Mac version of TCP/IP) Carrier sense Multiple Access with Collision Avoidance (CSMA/CA) A node signals its intent to transmit before it actually does so, so collisions are avoided Token Ring A network technology first developed by IBM Biggest disadvantage: more expensive to implement than Ethernet networks Reliability results in less downtime and lower network management costs than Ethernet High-Speed Token Ring (HSTR) can use either twisted-pair / fibre-optic cable Uses the token-passing routine and a star-ring hybrid physical topology Active monitor = a workstation on the network, acting as the controller for token passing Connectors that may be used on Token Ring cables: RJ-45, DB-9, or type 1 IBM A media filter can enable different connectors and receptors to fit together 18 Multistation Access Unit (MAU) Token Ring’s equivalent of a hub In the star-ring hybrid topology, the MAU completes the ring internally with Ring In & Out ports You can easily expand a Token Ring network by connecting MAUs through by their In & Out ports Unused ports on a MAU have self-shorting data connectors that internally close the loop Advantage: The self-shorting feature of the MAU ports makes Token Ring highly fault-tolerant Controlled Access Unit (CAU) A connectivity device similar to a MAU, but more flexible and manages nodes more easily Contain interchangeable modules that you can plug into the Ring In & Out connections With interchangeable modules, you can change easily from e.g. STP to fibre-optic cable You can connect to a CAU and determine what type of traffic is passing through a device More expensive than MAUs Plug in a Lobe Attachment Module (LAM) to a CAU if you want to connect more nodes LAMs allow up to 20 devices to plug into each CAU receptacle Token ring switching Switching helps networks better utilise limited bandwidth More expensive and more difficult to manage than Ethernet switches Token ring frames Two types of frames: IEEE 802.5 and IBM Token Ring frame Larger than Ethernet frames (Larger frame sizes result in more efficient data transmission) Start delimiter (1 byte) Access control (1 byte) Frame control (1 byte) Destination address (6 bytes) Source address (6 bytes) Data (0 - 16 000 bytes) Frame Check Sequence (4 bytes) End delimiter (1 byte) Frame status (1 byte) (Red = fields that make up the token) Signifies the beginning of the packet Contains info about the priority of the frame Defines the type of frame; used in the FCS Destination node’s MAC address Originating node’s MAC address Data, possibly also routing & management info Results of CRC algorithm - used to check the integrity of the frame Indicates the end of the frame Provides acknowledgement that the frame was received whole Note: Each frame type is unique and won’t interact with different frame types on a network (I.E. Ethernet frames can’t interpret Token Ring frames and vice versa.) You can however work with multiple protocols on a network while using only one frame type Design considerations for Token ring networks Cabling - STP or UTP Connectivity devices - More expensive than Ethernet equipment Number of stations - Limited, depending on cabling Speed - Token ring networks can run at either 4, 16, or 100 Mbps Scalability - You can easily daisy-chain Token ring MAUs to expand the network Topology - Star-wired ring topology, which is highly fault-tolerant Fibre Distributed Data Interface (FDDI) A network technology that uses a double ring of fibre to transmit data at 100 Mbps Developed in response to the throughput limitations and Ethernet & Token ring at the time No longer popular, because Ethernet & Token ring now have faster transmission speeds Based on ring physical & logical topologies, similar to a Token ring network Also relies on the same token-passing routine Unlike Token ring, FDDI runs on two complete rings The secondary ring is used for transmission if the primary ring experiences Physical layer problems Advantage: Reliable and secure, because of redundancy and fibre-optic cable Advantage: Works well with Ethernet 100BaseTX technology Disadvantage: High cost relative to Fast Ethernet 19 Asynchronous Transfer Node (ATM) A networking standard that describes both a network access method and a multiplexing technique Relies on a fixed packet size to achieve data transfer rates up to 9953 Mbps A cell (the fixed packet) contains 48 bytes of data and a 5-byte header These small packet sizes need more overhead, but the cells’ efficiency makes up for that loss Typically used on WANs Very expensive Very well suited to videoconferencing A packet switching technology, because data is packaged into cells before transmission (Circuit switching too, because of virtual circuits) Relies on virtual circuits (connections between nodes that logically appear as direct links) Advantage of virtual circuits: Efficient use of limited bandwidth The reliable connection provided by virtual circuits allows ATM to guarantee a specific QoS Quality of Service (QoS) = a standard that specifies that data will be delivered within a certain time ATM cells can support multiple types of higher-layer protocols (TCP/IP, IPX/SPX, AppleTalk…) LANE (LAN Emulation) enables ATM networks to be integrated with Ethernet / Token ring networks LANE encapsulates incoming Ethernet / Token ring frames and converts them into ATM cells Gigabit Ethernet (which is faster and cheaper) poses a threat to ATM Network adapters Types of network adapters 1. Expansion slot network adapters Connect to a PC’s bus Expansion board = a circuit board used to connect a device to the system board Expansion slots = openings into which the expansion board can be inserted Bus = the circuit used by the system board to transmit data to the computer’s components The type of expansion board (your NIC) must match the computer’s bus Some PC bus types: Industry Standard Architecture (ISA) 8 / 16-bit bus Can’t support 100-Mbps throughput May connect serial devices, like mice / modems MicroChannel Architecture (MCA) 32-bit bus IBM’s bus for personal computers Extended Industry Standard Architecture (EISA) 32-bit bus Compatible with older ISA devices because of the same length and pin configuration Peripheral Component Interconnect (PCI) 32 / 64-bit bus Used for nearly all of today’s new PCs Shorter connector length, but faster data transmission For externally attached network adapters: 2. USB network adapters Connect to a Universal Serial Bus port USB = a standard external bus that can be used to connect multiple types of peripherals Advantage of using a USB network adapter: simple installation Disadvantage: Throughput limitation of 12 Mbps 3. PC cards (‘credit card adapters’) PCMCIA (Personal Computer Memory Card International Association) interfaces provide a standard interface for connecting any type of device to a portable computer PCMCIA devices are commonly known as PC cards 4. Parallel port network adapters Connect to the parallel port of a computer on one side, and to the network cable on the other side Designed primarily for use on laptops, but rarely used now 20 5. Wireless network adapters Use an antenna to exchange signals with a base station transceiver or another wireless NIC Expansion slot network adapters, PC card network adapters (especially!), and USB network adapters can all be wireless Advantage: Well suited to environments where cabling can’t be installed Disadvantage: More expensive than wire-dependent network adapters Installing network adapters To install a network adapter, first install the hardware, and then the software Sometimes a third step is necessary: Configuring the firmware (= combo of hard + soft-ware) The hardware component of firmware is an EEPROM chip (because data may be changed) Firmware contains info about the NIC’s transmission speed, preferred IRQ, I/O port address, etc. Installing and configuring network adapter hardware On older expansion board NICs, you can use a jumper instead of modifying firmware settings Jumper = a small, removable piece of plastic that contains a metal receptacle The metal receptacle fits over a pair of pins on a circuit board to form a bridge that completes a circuit between those two pins By moving the jumper you can modify the board’s circuit, thereby giving it different instructions DIP (Dual Inline Package) switch = a small, plastic toggle switch that can represent ‘on’ and ‘off’ As with jumpers, they can be used to modify system settings and are rarely used on modern NICs Installing and configuring network adapter software You must ensure that the correct device driver is installed for the network adapter Device driver = software that enables an attached device to communicate with the computer’s OS Some operating systems come with many built-in device drivers; others don’t Variable settings: IRQ (Interrupt Request) A message to the computer instructing it to stop what it’s doing and pay attention to something else When a device attached to the bus (e.g. keyboard) requires attention, it uses an interrupt request Interrupt = the wire on which a device issues voltage to signal this request IRQ number = a number that uniquely identifies a component to the main bus IRQ numbers range from 0 to 15, and many devices reserve the same number by default (Numbers 9 - 11 have no default assignment) You can view IRQ settings in the computer’s CMOS utility If two devices try to use the same IRQ, any of the following problems may occur: The computer could ‘hang’ The computer could run much more slowly than usual Other devices (like serial / parallel ports) may stop working Video or sound card problems may occur The computer could fail to connect to the network The computer could experience intermittent data errors during transmission Memory range Indicates the area of memory that the network adapter and CPU will use for exchanging data Some memory ranges are reserved for specific devices (e.g. the system board) Network adapters typically use a memory range in the high memory area (A0000 - FFFFF) Base I/O port The base I/O port setting specifies which area of memory will act as a channel for moving data between the network adapter and the CPU Firmware settings When you change firmware, you are writing to the EEPROM chip on the network adapter To change a network adapter’s firmware, you need a bootable floppy disk containing the configuration or DOS install utility that shipped with the network adapter To run the utility, you must start the computer with this floppy disk inserted The configuration utility allows you to view the IRQ, I/O port, base memory, and node address The utility also allows you to perform diagnostics (component and connectivity tests) If a network adapter fails its connectivity tests, it’s probably configured incorrectly If a network adapter fails a physical component test, it may need to be replaced Choosing the right network adapter The most critical factor is compatibility with your existing system 21 If the network adapter will be installed in a server, then performance is very important Comparison of connectivity devices: Time to transmit data: Fastest repeaters & hubs bridges routers gateways Slowest Devices Purpose Repeaters Regenerate a digital signal Description Hubs Connect switches, servers, and PCs etc. to the network A multi-port repeater Features * Only suited to bus topology networks * Support a variety of media and transmission speeds * MIB stores info generated by intelligent hubs. OSI layer Ports Physical One input One output No Physical Multiple Intelligence Advantages Disadvantages * Allow you to extend a network inexpensively * Can’t improve or Passive / intelligent * Intelligent hubs can analyse data Bridges Analyse incoming frames and decide how to direct them to their destination (Forward packets based on MAC addresses) Look like repeaters Switches Subdivide a network into smaller logical pieces Routers Integrate LANs and WANs running at different transmission speeds and using a variety of protocols Gateway Connect two dissimilar kinds of networks A multi-port bridge Combination of hardware & software * Filtering database stores MAC addresses * Don’t distinguish between different protocols * Bridging methods: - Transparent - Source-route - Translational Data link One input One output Yes * Each device connected to a switch receives its own dedicated channel * Often used to ease traffic congestion Internal processor, memory & power supply, input & output jacks, management console interface * Protocoldependent * Can determine shortest, fastest path * Flexible Data link Multiple Network Multiple Multiple Yes Yes * Flexible: can forward frames from different protocols with equal speed and accuracy * Enhance network performance by filtering traffic * Can detect and discard flawed packets * Extend the max distance of a network * Limit the number of devices in a collision domain ltd potential for collisions * Secure * Provide separate channels for every device * Intelligent hubs report * Can become overwhelmed 22 * Not simple to install * Repackage info so that it can be read by another system * More ex- correct a bad signal every time a port detects a lost connection. * Intelligent hubs are more expensive than passive ones. by continuous heavy traffic pensive than routers Hubs Elements shared by most hubs Ports = receptacles where patch cables connect devices to the hub Uplink port = the receptacle to connect one hub to another hub in a daisy-chain / hierarchy Port for management console = a receptacle used to connect some type of display that enables you to view the hub’s management information Backbone port = the receptacle used to connect a hub to the network’s backbone Link LED = the light on a port that indicates whether it is in use Traffic LED = the light on a port that indicates that traffic is passing through the port Collision LED = the light (on Ethernet hubs only) that roughly indicates collisions by blinking Power supply = the device that provides power to the hub Ventilation fan = a device used to cool a device’s internal electronics Intelligent hubs (‘managed hubs’) can provide network management information Hub types Description Standalone Serve a group of computers that are isolated from the rest of the network. Connections Can connect to another hub by coax, fibre-optic, or twisted-pair cable. Typically not connected in a hierarchy / daisy-chain. Small, independent departments, home offices, or test lab environments. Passive / intelligent. Usually 4, 8, 12, or 24 ports Hublet - 4 ports Up to 200 connection ports Environment Intelligence Ports Modular Provide a number of interface options within one chassis. Adapters are inserted into a system board. Overkill for small networks. Nearly always intelligent. Usually 6, 12, or 24 ports The network doesn’t depend on a single hub (so no single point of failure). Advantages Disadvantages Stackable Resemble standalone hubs, but are physically designed to be linked with other hubs in a single telco closet. Support a number of different media connectors and transmission speeds A single hub for many connections introduces a single point of failure. Choosing the right hub Factors to consider: 23 More flexible than standalone / stackable hubs. Highest reliability, because you can attach redundant components. Allow for future growth by providing expansion slots for additional devices. Can accommodate many types of devices. Most expensive type of hub. Performance - If it is a concern, rather use switches (which can sub-divide a LAN segment) Cost - If your budget is tight and you don’t need much flexibility, use a passive standalone hub Size & growth - You need to determine how many devices will connect to each hub Security - If your network carries very sensitive data, rather use switches, routers, or firewalls Management benefits - An intelligent hub can provide management info Reliability - If your network can’t tolerate any downtime, choose a modular hub with redundant power supplies and redundant connections to the backbone Bridges Methods for forwarding / filtering packets: Transparent bridging Used on many Ethernet networks A bridge polls a network to learn about its physical topology as soon as it is installed When a bridge receives a packet from an unknown source, it adds the location of that source to its filtering database Disadvantage: On LANs with many bridges, each one may recognise a different path to one node When this happens, data could get bounced among the bridges and never reach the destination Spanning tree algorithm = a routine that can detect circular traffic patterns and modify the way multiple bridges work together to avoid such patterns Source-route bridging Used on most Token Ring networks A bridge polls the network to determine what path is the best to get from point A to B The bridge then adds this info to the data packet The forwarding info is part of the data, so you don’t get circular traffic problems Very well-suited to WANs, where multiple bridges and long routes are common Translational bridging Connects networks that use different logical topologies The bridge forwards packets, and also translates packets between different logical topologies Switches Two methods of switching used by LAN switches: 1. Cut-through mode The switch reads a frame’s header and decides where to forward the data before receiving the entire packet The switch can’t verify data integrity from the FCS because it isn’t read before transmitting Switches can detect runts (packet fragments with a certain type of data flaw), and will wait to transmit that packet until it determines its integrity Switches can’t detect corrupt packets Biggest advantage: Speed (because the switch doesn’t stop to read the entire data packet) Time-saving advantages become insignificant if the switch is flooded with traffic Cut-through switches are best suited to small workgroups where speed is important and the low number of devices minimises the potential for errors 2. Store and forward mode A switch reads the entire data frame into its memory and checks it for accuracy before transmitting More time-consuming than cut-through mode, but data is transmitted more accurately More appropriate for larger LAN environments because data errors are not propagated Switches can also transfer data between segments running different transmission speeds Using switches to create VLANs (Virtual LANs) VLAN = a logically separate network within a network, created by grouping a number of ports into a broadcast domain Broadcast domain = a combination of ports that make up a Layer 2 segment and must be connected by a Layer 3 device (like a router or a Layer 3 switch) The ports don’t have to reside on the same switch or even on the same network segment A VLAN can include servers, workstations, printers, routers… (devices you can connect to a switch) Advantage of VLANs: Ability to link distant users and create small workgroups from large LANS 24 Higher layer switches Layer 3 switch = one capable of interpreting Layer 3 data Layer 4 switch = one capable of interpreting Layer 4 data These higher-layer switches are also called routing switches / application switches These switches can perform advanced filtering, statistics keeping, and security functions They can also transmit data more rapidly than a router and are easier to install They can’t translate between Token Ring and Ethernet networks, encapsulate protocols, or prioritise traffic, so you still do need routers Higher-layer switches can cost three times more than Layer 2 switches Routers Modular router = one with multiple slots that can hold different interface cards or other devices Routers can’t forward packets as quickly as bridges can because they operate at layer 3 and therefore take time to interpret logical addressing information Basic functions: Connect dissimilar networks Interpret Layer 3 information Determine the best path for data to follow from point A to point B Reroute traffic if a primary path is down but another path is available Optional functions: Filter out broadcast transmissions to alleviate network congestion Prevent certain types of traffic from getting to a network Support simultaneous local and remote connectivity Provide high network fault tolerance through redundant components Monitor network traffic and report statistics to a MIB Diagnose internal or other connectivity problems and trigger alarms Static routing A network administrator programs a router to use specific paths between nodes Not optimal, because it doesn’t account for congestion, failed connections, or device moves Dynamic routing Automatically calculates the best path between two nodes and stores this info in a routing table If failures affect the network, the router can reroute data through a different path Brouter (bridge router) A combined router and bridge Advantage: You can forward non-routable protocols, like NetBEUI, and connect multiple network types through one device Offers support at both Layers 2 & 3 of the OSI model Intelligently handles any packets that contain Layer 3 addressing info, and simply forwards the rest Routing switch A combined router and switch Can interpret data from Layers 2 & 3 of the OSI model Not as fully featured as a true router, so routing switches haven’t gained wide acceptance Routing protocols Used to determine the best path between nodes Used to collect data about current network status and contribute to selecting the best path Convergence time = the time it takes for a router to recognise a best path in the event of a change Bandwidth overhead = the burden placed on the network to support the routing protocol RIP (Routing Information Protocol) For IP and IPX (see notes above in the IPX/SPX section) OSPF (Open Shortest Path First) For IP Makes up for some of RIP’s limitations, and can co-exist with RIP on a network Uses a more complex algorithm for determining best paths Under optimal network conditions, the best path is the most direct path If there is too much traffic in the way, the router can determine the most efficient path Each router maintains a database of the other routers’ links, and if it is notified of a failure, it can rapidly compute an alternate path 25 Advantage: Network bandwidth is kept to the minimum Disadvantage: This approach requires more memory and CPU power on the routers EIGRP (Enhanced Interior Gateway Routing Protocol) For IP, IPX, and AppleTalk Fast convergence time and low network overhead Easier to configure & less CPU intensive than OSPF Supports multiple protocols and limits unnecessary network traffic between routers Accommodates very large & heterogeneous networks, but is only supported by Cisco routers BGP (Border Gateway Protocol) For IP The routing protocol of Internet backbones The most complex of the routing protocols Gateways Popular types of gateways E-mail gateway Translates messages from one type of email system to another IBM host gateway Establishes and manages communication between a PC and an IBM mainframe Internet gateway Allows and manages access between LANs and the Internet Can restrict the kind of access LAN users have to the Internet, and vice versa LAN gateway Allows segments of a LAN running different protocols / network models to communicate A router, single port on a router, or a server may act as a LAN gateway WANs Send data over public communications links Mostly take the form of mesh or partial-mesh networks WAN link = a connection between two WAN sites WAN links typically connect one site to only one other site (point-to-point) PSTN (Public Switched Telephone Network) The network of typical phone lines Originally composed of analogue lines and developed to handle voice-based traffic Now uses digital transmission through fibre-optic & twisted-pair cable, microwave and satellite A modem must still convert a computer’s digital pulses into analogue signals for PSTN Currently used for most dial-up connections to LANs Uses circuit switching Offers only marginal security because it is a public network, so you must encrypt data for security Advantages: Ubiquity, ease of use, low cost Disadvantage: Inability to ensure quality (The digital lines are more reliable than the analogue ones) Disadvantage: Limited throughput (PSTN modems have a connection speed of 56 Kbps) POP (Point Of Presence) POP = the place where two phone systems meet (a long-distance carrier with a local phone company, or a local carrier with an ISP’s data centre) 1. When you dial into your ISP, your signal travels to the local phone company’s POP 2. At the POP, your signal is converted back to digital pulses and transmitted to your ISP’s POP through a digital backbone 3. The ISP’s POP connects to its ISP through a digital link 4. Your request for info enters the Internet and the process is reversed to bring you a Web page Each time your transmission travels through a POP, or is converted, it loses a little throughput X.25 and Frame Relay 26 X.25 An analogue, packet-switched technology designed for long-distance data transmission Maximum throughput of 2.048 Mbps Originally developed as a more reliable alternative to the voice phone system for connecting mainframe computers and remote terminals Ensures data reliability over long distances by verifying the transmission at every node Slow and unsuitable for time-sensitive applications (audio/video) because of this verification Frame relay An updated, digital version of X.25 that also relies on packet switching Data is separated into frames, which are then relayed from one node to another without any verification or processing Supports higher bandwidth than X.25 Maximum of 1.544 or 45 Mbps throughput Something in common with ATM connections: both rely on virtual circuits X.25 & frame relay are depicted as clouds, because of the indeterminate nature of their traffic patterns X.25 and frame relay may be configured as switched / permanent virtual circuits SVC = a connection established when parties need to transmit and dismantled when complete PVC = a connection established before transmission and maintained afterwards CIR (Committed Information Rate) = the amount of bandwidth guaranteed by the service provider Advantage: Leasing a frame relay circuit means you pay for only the amount of bandwidth required Advantage: Frame relay is much cheaper than the newer WAN technologies, like ATM Advantage: Frame relay follows an established worldwide standard Disadvantage: Variable traffic patterns, because X.25 and frame relay use shared lines Disadvantage: Frame relay circuits are not as private as dedicated circuits ISDN (Integrated Services Digital Network) An international standard for transmitting data over digital lines Uses the phone carrier’s lines and either a dial-up or dedicated connection Can carry up to two voice calls and one data connection simultaneously B (bearer) channel: employs circuit-switching techniques to carry voice, video, audio, etc D (data) channel: employs packet switching to carry information about the call (like session info) Each ISDN connection uses only one D channel and the number of B channels varies Disadvantage: ISDN can span up to only 18 000 feet before a repeater is needed BRI (Basic Rate Interface) The most economical type of ISDN connection Uses 2 B channels and 1 D channel (2B + D) The two B channels are treated as separate connections by the network The B channels can carry voice and data simultaneously and separate from each other Bonding = when the two 64 Kbps B channels are combined to achieve 128 Kbps throughput A NT1 (Network Termination 1) device at the customer’s site connects the twisted-pair wiring with the ISDN terminal equipment TE (Terminal Equipment) may include cards / devices used to connect computers to the ISDN line A TA (Terminal Adapter) converts digital signals into analogue ones for the analogue equipment PRI (Primary Rate Interface) Used by businesses that need more throughput Uses 23 B channels and 1 D channel (23B + D) Uses the same kind of equipment as BRI links, but needs an extra termination device: NT2 Network Termination 2 is necessary for handling the multiple ISDN lines T-carriers Transmission uses time division multiplexing over two wire pairs (one for transmitting and one for receiving) to divide a single channel into multiple channels Each channel may contain data, voice, or video signals 27 Common WAN links for use in large businesses Types of T-carriers A T1 circuit can carry 24 voice / data channels, with max throughput of 1.544 Mbps A T3 circuit can carry 672 voice / data channels, with max throughput of 44.746 Mbps Speed depends on a T-carrier’s signal level (= Physical layer signalling characteristics) DS0 (Digital Signal, level 0) is the equivalent of one data / voice channel A T3 provides 28 times more throughput than a T1 Leasing several T1s can be cheaper than leasing a single T3 A fractional T1 lease allows you to use (and pay for) only some of the T1 channels Only businesses with extraordinary bandwidth requirements should consider using T3s T-carrier connectivity Wiring Every T-carrier line requires connectivity hardware at the customer site and the local carrier’s POP The specialised connectivity hardware can’t be used with other WAN transmission methods T1 technology can use UTP / STP copper wiring (i.e. telephone wire) Repeaters must regenerate the signal approximately every 6000 feet For multiple T1s, coaxial cable, microwave, or fibre-optic cabling should be used For T3s, microwave or fibre-optic cabling is necessary CSU/DSU (Channel Service Unit / Data Service Unit) The connection point for a T1 line at the customer’s site The CSU provides termination for the digital signal and ensures connection integrity The DSU converts the digital signal used by bridges, routers, and multiplexers into the digital signal sent via the cabling The CSU/DSU box connects the incoming T1 with the multiplexer Multiplexer A device that combines multiple voice / data channels on one line Terminal equipment = the devices that connect to the multiplexer Multiplexers can take input from a variety of terminal equipment (bridges, routers…) In some network configurations, the multiplexer is integrated with the CSU/DSU Routers and bridges On a typical T1-connected network, the terminal equipment will consist of bridges / routers / both With the T1 connection, the bridge / router typically integrates two types of networks: the Internet and an Ethernet / Token Ring LAN at the customer’s site DSL (Digital Subscriber Line) Suited to the local loop portion of a WAN link, since repeaters are necessary after short distances Can support multiple data and voice channels over a single line A dedicated service, so a connection is always available for use Uses advanced data modulation techniques to achieve extraordinary throughput over phone lines Cheaper installation and faster throughput than T1s More secure than cable Advantages: High throughput, low cost, ease of installation Disadvantage: Not available in all areas Disadvantage: Relative newness has led to a backlog in installations, so subscribers must wait… Types of DSL There are at least 8 types of DSL Downstream transmission = data travelling from the carrier’s POP to the customer Upstream transmission = data travelling from the customer to the carrier’s POP Asymmetrical communications Downstream throughput is usually much higher than upstream throughput Well suited to users who pull more info off the network than they send E.g. ADSL (Asymmetric DSL), G.Lite (a version of ADSL), VDSL (Very high bit-rate DSL) 28 Symmetrical communications Provides equal capacity for data travelling both upstream and downstream Well suited to users who upload and download significant amounts of data E.g. SDSL (Symmetric / Single-line DSL), HDSL (High bit-rate DSL) DSL types Vary in terms of their capacity and maximum line length Vary according to how they use the PSTN ADSL is the most popular form of DSL DSL connectivity Voice signals on the PSTN use a small range of frequencies, leaving higher, inaudible frequencies unused and available for carrying data ADSL, G.Lite and VDSL use the same pair of wires that carry voice signals, but modulate data on the higher frequencies ADSL: A splitter must be installed at the carrier & customer’s premises to separate the data signal from the voice signal before it reaches the terminal equipment G.Lite: Eliminates the splitter, but requires a filter to prevent high-frequency DSL signals from reaching the telephone HDSL, SDSL: Can’t use the same wire pair that is used for voice signals, but use the extra pair of wires contained in a telephone cable (that are typically unused) DSL modem Found at the customer’s office, to demodulate the signal and pass the info to the computer May contain a splitter (for ADSL) to separate the line into multiple channels for voice & data May be external to the computer and connect to a computer’s Ethernet NIC or USB port May connect to a connectivity device (hub / router) if bandwidth is to be shared on a LAN DSLAM (DSL Access Multiplexer) Found at the other end of the line, at the carrier’s POP Aggregates multiple DSL subscriber lines and connects them to a larger carrier / Internet backbone (At the POP, there might be a splitter between the incoming line and the phone & data switches) Cable An asymmetrical technology You need a special cable modem Traditional cable TV supplies the infrastructure for downstream (but not upstream) communication To provide Internet access through its network, the cable company must upgrade its equipment to support bidirectional, digital communications: The wiring must be replaced with HFC (Hybrid Fibre-Coax) - an expensive fibre-optic link The HFC connects the cable company’s offices to a node location near the customer Fibre-optic / coax may connect the node to the customer via a connection called a cable drop The head end (the cable company’s central office) can connect to the Internet in different ways Advantage: Provides a dedicated connection that doesn’t require dialling up a service provider Disadvantage: Many subscribers need to share the same line, affecting security and throughput SONET (Synchronous Optical Network) Data transfer rates from 64 Kbps 39.8 Gbps Uses the same TDM technique used by T-carriers Was developed to link different phone systems around the world Emerged as the best choice for linking WANs between America, Europe, and Asia, because it can work directly with the different standards used in different countries Internationally known as SDH (Synchronous Digital Hierarchy) Integrates well with T-carriers, making it good for connecting WANs & LANS over long distances Often used to aggregate multiple T1s or T3s Also used as the underlying technology for ATM transmissions Depends on fibre-optic media to achieve its extraordinary QoS and throughput Uses multiplexers and terminal equipment to connect at the customer’s end (Like T-carriers) A typical SONET network takes the form of a ring topology, similar to FDDI One ring acts as the primary route for data and a second one acts as a backup Self-healing = when SONET automatically reroutes traffic along the backup ring (very reliable!) 29 The data rate of a particular SONET ring is indicated by its Optical Carrier (OC) level SONET technology is not implemented by small / medium businesses, because of its high cost Particularly suited to audio, video, and image data transmission WAN implementation 1. Speed Speeds range from 56 Kbps for a PSTN dial-up connection to 39.8 Gbps for SONET 2. Reliability Not very reliable: Sufficiently reliable: Very reliable: PSTN dial-up ISDN, T1, fractional T1, T3, DSL, cable, X.25, frame relay SONET 3. Security Provide encryption measures, and secure connectivity devices, like firewalls Enforce password-based authorisation for LAN and WAN access Enforce a security policy for users Maintain restricted access to network equipment rooms and data centres Virtual Private Networks (VPNs) WANs logically defined over public transmission systems, isolating the organisation’s traffic from other users of the same public lines Provide a way of constructing a WAN from existing public transmission systems Inexpensive solution for long distance WANs, because you don’t have to lease a full T1 circuit Security techniques ensure that data can be interpreted only at the WAN’s nodes The security techniques may be purely software-based or may include hardware, like a firewall The software required to establish VPNs is usually inexpensive A company might choose to implement a VPN to lower its WAN transmission costs Remote connectivity Three ways for a remote user to connect to a LAN: 1. Dial directly to the LAN, with a modem Remote access server = a combination of hardware & software that provides a central access point for multiple users to dial into a LAN / WAN The LAN treats the direct-dial remote client like any other client on the LAN Remote node = the computer dialling into the LAN Advantage: Can provide the best security Advantage: The transmission speed doesn’t suffer when the Internet becomes congested Disadvantage: The most complex access method to configure 2. Dial directly to a workstation, with a modem Remote control = when the remote computer takes over a LAN computer, using special software running on both computers Advantage: Not as difficult to configure and confers the same security and throughput benefits as directly dialling into a remote access server Advantage: Provides the best performance for processing-intensive applications, like databases Disadvantage: Allows only one connection to the LAN at any given time 3. Use an Internet connection with a Web interface Requires some setup steps on client and server, but isn’t as complex as direct-dial configuration Advantage: A Web interface is very simple to use and widely available Advantage: A nearly unlimited number of remote users can simultaneously access the LAN Disadvantage: Security and throughput can’t be controlled as thoroughly as direct-dial, because the remote user’s connection isn’t dedicated A popular method for gaining remote access to a LAN is by using an ICA (Independent Computing Architecture) client to connect with a remote access server The simplest dial-in server is the RAS (Remote Access Service), which comes with Windows 2000 server 30 Serial Line Internet Protocol (SLIP) and Point-to-Point Protocol (PPP) SLIP PPP Communications protocols that enable a workstation to connect to a server using a serial connection (like a modem) Necessary to transport Network layer traffic over serial interfaces, which belong to the Data Link layer Encapsulate higher-layer networking protocols in their lower-layer data frames Less popular More popular for dial-up connections to the Internet because it doesn’t require as much configuration on the client side as SLIP does You have to specify the IP address for client and PPP can automatically obtain this information as it server connects to the server Can carry only IP packets Can carry many different types of Network layer packets (IPX, AppleTalk…) Supports only asynchronous data transmission Supports both asynchronous and synchronous transmission Asynchronous Data being transmitted and received don’t have to conform to any predetermined schemes that specify when they can transmit data. A node can transmit at any time, and the destination node must accept the data as it comes Start and stop bits ensure that the receiving node knows when it has received a complete frame Transmission occurs in random stops and starts Synchronous The data being transmitted & received must conform to a timing scheme A receiving node knows it should be receiving data by looking at the time on the clock Start & stop bits are not necessary, because the clock indicates where transmission begins & ends TCP/IP addressing & name resolution Subnetting The process of subdividing a single class of network into multiple, smaller networks More efficient use of IP addresses because you don’t need to request another class of addresses when you exceed your node limit You can use one class of addresses for several network segments A subnetted address includes network, subnet, and host information E.g. If you use a Class B network, you can use the third octet to subdivide the network into the functional equivalent of 254 Class C networks Extended network prefix = the combination of an address’s network + subnet information If you don’t use subnetting, the extended network prefix = just the network portion of the IP address Devices external to a subnetted LAN don’t need to interpret the LAN’s subnetting information Subnet masks Special 32-bit numbers that, when combined with a device’s IP address, inform the rest of the network about the network class to which the device is attached Composed of 4 octets - 255 represents part of the extended network prefix; 0 = host information If you don’t specify a subnet mask, the default is 255.0.0.0 for a Class A network, etc. If you are using subnetting, the subnet mask for a class A network is 255.255.0.0 When not to use subnetting: If you have a very small network If you never want to connect to the Internet (and don’t need to follow IP addressing standards) If your organisation has more IP addresses than it can ever use Gateways A combination of hardware & software than enables 2 different network segments to exchange data Facilitates communication between different subnets Because one device can’t send data directly to a device on another subnet, a gateway must intercede and hand off the information 31 Every device on a TCP/IP network has a default gateway that first interprets its outbound requests to other subnets, and then interprets its inbound requests from other subnets If your network has only one segment and you don’t connect to the Internet, your devices wouldn’t need a default gateway because traffic wouldn’t need to cross the network’s boundary Often, a default gateway isn’t a separate device, but a network interface on a router When a router is used as a gateway, it must maintain routing tables as well Gateways on the Internet handle a relatively small amount of addressing information, which is used to forward data to another gateway that knows more about the data’s destination Core gateways = the gateways that make up the Internet backbone NAT (Network Address Translation) The process of assigning an IP address to the client’s transmission when it reaches the IP gateway IP gateways can hide the IP numbers assigned within an organisation Hiding IP addresses protects your identity and gives you more flexibility in assigning addresses Clients behind the gateway may use any (unrecognised) IP addressing scheme Sockets & ports Socket = a logical address assigned to a specific process running on a host computer A socket forms a virtual connection between the host and client The socket’s address combines the host computer’s IP address with the port number associated with a process (The port number follows a colon after the IP address), e.g. 10.43.3.87:23 Primary advantage of sockets: They enable clients & servers to communicate more expeditiously Default port numbers for commonly used TCP/IP processes have values lower than 255 Well-known ports = port numbers in the range of 0 to 1023 The use of port numbers simplifies TCP/IP communications and ensures that data are transmitted to the correct application You can configure port numbers through software Ports 20 & 21: FTP Port 23: TELNET Port 25: SMTP PORT 80: HTTP Host names & Domain Name System (DNS) Domain names Every host is a member of a domain (= a group of computers belonging to the same organisation with part of their IP addresses in common) Domain names are associated with a company / organisation, e.g. ibm.com ICANN has established conventions for domain naming in which certain suffixes apply Host files The Internet used to rely on one text file (HOSTS.TXT) to associate names with IP addresses The growth of the Internet made the file impossible to maintain Within a company you may still find this older system of ASCII text files Each host is matched by one line identifying the host’s name & IP address, and an alias On a UNIX-based computer, a host file is called hosts and is located in the /etc directory On a Windows 9x computer it is called lmhosts and is located in the c:\windows directory DNS A hierarchical way of tracking domain names and their addresses A TCP/IP service that belongs to the Application layer The DNS database doesn’t rely on one file / server, but is distributed over several key computers across the Internet to prevent failure if a few computers go down To route traffic more efficiently, the DNS is divided into 3 components: 1. Resolvers Any hosts on the Internet that need to look up domain name information 2. Name servers Servers that contain databases of names and their associated IP addresses Supply the resolvers with the information they require If a name server can’t resolve the IP address, the query passes to a higher-level name server 32 Each name server manages a group of devices, collectively known as a zone Root server = a name server maintained by ICANN, at the highest level in the hierarchy ICANN acts as the ultimate authority and maintains 13 root servers around the world 3. Name space Refers to the actual database of Internet IP addresses and their associated names Every name server holds a piece of the DNS name space Resource record = a single record that describes one piece of info in the DNS database Resource record fields: name, type, class, time to live, data length, and the actual record data BOOTP (Bootstrap Protocol) 1. 2. 3. 4. A service to facilitate IP address management Uses a central list of IP addresses and their associated MAC addresses to dynamically assign IP addresses to clients A client connects to the network and sends a broadcast asking to be assigned an IP address This broadcast message includes the MAC address of the client’s NIC The BOOTP server looks up the client’s MAC address in its BOOTP table It then supplies: The client’s IP address, the IP address of the server, the host name of the server, and the IP address of a default router Thanks to BOOTP, a client doesn’t have to remember its own IP address An ideal situation for diskless workstations (with no hard disks) i.e. network computers A BOOTP table needs manual intervention and can be difficult to maintain on large networks DHCP (Dynamic Host Configuration Protocol) DHCP leasing A device borrows an IP address while attached to the network and relinquishes it when logging off A network administrator can configure the duration of the lease to be as short or as long as needed 1. When the client starts up, it broadcasts a DHCP discover packet to the DHCP/BOOTP server port 2. Every DHCP server connected to the same subnet as the client receives the broadcast request 3. Each DHCP server responds with an available IP address, while withholding it from other clients 4. The client accepts the first IP address that it receives 5. The client responds with a broadcast confirming to the DHCP that it wants to accept the address 6. All other DHCP servers see this confirmation and return their IP addresses to the pool 7. When the DHCP server receives the confirmation, it broadcasts an acknowledgement message 8. It also provides more info, such as DHS or gateway addresses that the client might have requested Terminating a DHCP lease A DHCP lease can be manually terminated or expire based on the period established for it WINS (Windows Internet Naming Service) Used exclusively with systems that use NetBIOS Provides a means of resolving NetBIOS names to IP addresses A computer’s NetBIOS name and its TCP/IP host name are different entities The WINS / NetBIOS relationship is just like the DNS / TCP/IP relationship Unlike DNS, WINS is an automated service that runs on a server Maintains a database on the server that accepts client requests to register with a NetBIOS name WINS doesn’t assign names / IP addresses, but keeps track of which NetBIOS names are linked to which IP addresses The WINS server can’t use a dynamic IP address; one must be assigned to it manually Advantages: Guarantees that a unique NetBIOS name is used for each computer Support for DHCP Better network performance because there’s no broadcast traffic Addressing in IPv6 Advantages over IPv4: More efficient header Inclusion of the IPSec security technique Better support for QoS Automatic IP address configuration Biggest advantage: Billions of additional IP addresses through the new addressing scheme 33 Differences: IPv4 IPv6 Four 8-bit octets 32 bits Eight 16-bit fields 128 bits Binary numbers, separated by a dot: Hex numbers separated by a colon: 123.45.67.89 F:F:0:0:0:0:3012:0CE3, or FF::3012:0CE3 Loopback address = 127.0.0.1 Loopback address = 0:0:0:0:0:0:0:1 or ::1 Each node has its own IP address Each interface on a device has its own IP address No distinction is made between an address Each address contains a format prefix at the that represents one device / interface and beginning of the address that indicates what type of an address that represents multiple address it is (Unicast / anycast prefix = FEC0 / devices / interfaces FE80; Multicast prefix = FF0x) Unicast address = one that represents a single interface on a device Multicast address = one that represents multiple interfaces (so there is no broadcast address) Anycast address = one that represents any one interface from a group of interfaces TCP/IP troubleshooting ARP ARP table = the database that lists the associated MAC and IP addresses Dynamic ARP table entries are created when a client makes an ARP request that can’t be satisfied by data already in the ARP table Static ARP table entries are those that someone entered using the ARP utility The ARP utility provides a way of obtaining info from and manipulating a device’s ARP table The ARP utility can be a valuable troubleshooting tool PING (Packet Internet Groper) A utility that can verify that TCP/IP is installed, bound to the NIC, configured correctly, and communicating with the network Often used to determine whether the host is responding Uses ICMP to send echo request & reply messages that determine the validity of an IP address: 1. An echo request is sent out to another computer 2. The other computer rebroadcasts the signal in the form of an echo reply, to the sender Pinging = the process of sending this signal back and forth You can ping either an IP address or a host name By pinging the loopback address you can determine whether your TCP/IP services are running Netstat Displays TCP/IP statistics and details about TCP/IP components and connections on a host Information that can be obtained: The port on which a particular TCP/IP service is running Whether or not a remote node is logged into a host Which network connections are currently established for a client How many packets have been handled by a network interface since it was activated How many data errors have occurred on a particular network interface Nbtstat NetBIOS isn’t routable, but when encapsulated in another protocol, like TCP/IP, it is On networks that run NetBIOS over TCP/IP, the nbtstat utility can provide info about NetBIOS statistics and resolve NetBIOS names to their IP addresses I.e. If you know the NetBIOS name of a workstation, you can use nbtstat to determine its IP address Nslookup Allows you to query the DNS database from any computer on the network You can find the DNS host name of a device by specifying its IP address, or vice versa Useful for verifying a host is configured correctly or for troubleshooting DNS resolution problems Tracert (Traceroute) Uses ICMP to trace the path from one node to another, identifying all intermediate hops in between Useful for determining router / subnet connectivity problems Useful for diagnosing network congestion / network failures 34 1. To find the route, traceroute transmits a series of UDP datagrams to a specified destination 2. The first three datagrams have their TTL set to 1 (which expire as they hit the first router) 3. When they expire, they are returned to the source (i.e. the node that began the traceroute) 4. In this way, traceroute obtains the identity of the first router 5. Then traceroute transmits datagrams with a TTL of 2 etc… until the destination node is reached 6. Traceroute also returns the time taken for the datagrams to reach each router in the path Disadvantages: Traceroute can’t detect router configuration problems Traceroute can’t detect whether a router uses different send & receive interfaces Routers may not decrement the TTL value correctly at each stop in the path Ipconfig The TCP/IP administration utility for use with Windows NT, 2000, and XP Command-line based Provides info about a network adapter’s IP address, subnet mask, and default gateway Useful for checking a computer’s TCP/IP configuration and managing TCP/IP settings Also enables you to release & renew DHCP-assigned addresses Winipcfg Performs the same TCP/IP configuration & management as ipconfig, but for Windows 9x & Me Supplies the user with a GUI Ifconfig The TCP/IP configuration & management utility used on UNIX systems Applications & services WWW Unqualified host name = a host name minus its prefix and suffix, e.g. ‘weather’ E-mail If a user can’t retrieve email, you must verify his TCP/IP settings If a department can’t retrieve email, you must investigate problems with the department’s gateway If an organisation can’t retrieve email, you must troubleshoot your mail server & Internet connection FTP & TFTP (already covered) Gopher A text-based utility that allows you to navigate through a series of menus to find & read files Not sophisticated enough to interpret document formatting commands, like HTML Allows you to transfer files from one host to another by connecting with FTP The first Internet interface to provide links from one host to another that are transparent to the user You need a local gopher client and a gopher server Rarely used today because Web servers and browsers have made it obsolete Newsgroups Messages are distributed to a wide group of users at once Require news servers and, on the client side, email programs capable of reading newsgroups Instead of using SMTP, messages are transported by the NNTP Network News Transport Protocol supports reading messages, posting new messages, and transferring news files between servers News servers are organised hierarchically, similarly to DNS servers E-commerce One of the fastest growing sectors of the Internet VoIP (Voice over IP) The provision of telephone service over a TCP/IP network Internet telephony = when VoIP is carried over by Internet 35 VoIP over private lines is effective and economical, and congestion can be easily controlled, resulting in better sound quality than the Internet can provide Advantage: Low cost Disadvantage: Voice transmissions are distorted more than data by the wire’s quality of service Disadvantage: Voice transmissions are subject to distortion if the connection is too noisy To prevent delays, disorder, and distortion, a voice connection requires more dedicated bandwidth Technical obstacles have prevented Internet telephony from becoming widespread Billing network-based calls is a challenge because their costs depend on many factors Three categories of VoIP technology: Phone-to-phone 1. A user picks up his phone to make a call 2. His phone is connected to a local telephone switch, which handles call routing for his business 3. The phone switch accepts his voice signals and passes them on to a gateway 4. The gateway connects the PSTN with a TCP/IP network (like the Internet) 5. The gateway digitises the analogue signals, compresses the data, & assembles them into packets 6. The packets traverse the network and are accepted by another gateway at the receiving end 7. The receiving gateway reverses what the transmitting gateway did 8. The voice signal is passed to another telephone switch, to which the other phone is connected Both gateways perform their functions simultaneously, so VoIP is full-duplex PC-to-phone 1. A PC with a microphone, speaker, & appropriate software initiates calls over its network connection 2. Voice signals are converted to digital data by the PC’s software, and transmitted through the PC’s NIC and over the network, like any other data 3. At the receiving end, the gateway accepts the data and translates it into voice signals 4. The voice signals are transmitted to a telephone switch to which a traditional phone is connected PC-to-PC 1. A PC with a microphone, speaker, & appropriate software transforms voice signals into digital data 2. The data are transmitted over the network 3. On the other end, another PC with the same setup accepts the call from the network During the call, users speak into the microphone and listen via the speakers An IP address essentially becomes a phone number Integrity and availability Integrity refers to the soundness of a network’s programs, data, services, devices, and connections Availability refers to how consistently and reliably a file / system can be accessed Things that can compromise integrity & availability: security breaches, natural disasters, power flaws, human error, malicious intruders Guidelines for protecting your network: Prevent anyone other than the network administrator from opening / changing the system files Monitor the network for unauthorised access / changes Record authorised system changes in a change management system Install redundant components Perform regular health checks on the network Monitor system performance, error logs, and the system log book regularly Keep backups, boot disks, and emergency repair disks current and available Implement and enforce security and disaster recovery policies Viruses Programs that replicate themselves so as to infect more computers Can damage files / systems, annoy users with flashing messages, cause the computer to beep, or may cause no harm and remain unnoticed forever Types of viruses Virus type Boot sector viruses Description Reside on the boot sector of a floppy disk How it spreads When you start the computer with an infected floppy disk, the virus is transferred to the boot 36 Damage Inability of the file system to access some workstation files sector on the hard disk Can travel between computers that use different operating systems Macro viruses Word-processing / spreadsheet program macro File-infected viruses Attach themselves to executable files When the infected file runs, the virus copies itself to memory, and later attaches itself to other files Network virus Designed to take advantage of network vulnerabilities Worms Technically not viruses, but programs that run independently and travel between computers Propagate via network protocols, commands, messaging programs, and data links May be transmitted by any type of file transfer, including email Trojan horses Technically not viruses, but programs that claim to do something useful and instead harm your computer By downloading .exe files Missing options from application menus, damaged / changed / missing files… (Don’t affect performance or behaviour) Damaged files, file size increases, changed icons, strange messages… You need to disinfect your computer and reinstall all software Any type of anomaly, ranging from strange pop-up messages to file damage Don’t alter other programs in the same way that viruses do, but they may carry viruses. Symptoms: any type of anomaly, ranging from strange pop-up messages to file damage E.g. a file that’s supposed to be a game could reformat your hard disk instead Virus characteristics Encryption Virus-scanning software may search files for a recognisable string of characters that identify a virus If the virus is encrypted, it may thwart the antivirus program’s attempts to detect it Stealth Some viruses hide themselves to prevent detection Typically, stealth viruses disguise themselves as legitimate programs or replace part of a legitimate program’s code with their destructive code Polymorphism Viruses change their characteristics every time they are transferred, making them harder to identify May use complicated algorithms and incorporate nonsensical commands to achieve change The most sophisticated and potentially dangerous type of virus Time-dependence ‘Time bombs’ are programmed to activate on a particular date Virus protection Antivirus software Virus symptoms: increases in file sizes, slow programs, unusual error messages, unexpected loss of memory, fluctuations in display quality… Functions that antivirus software should perform: Detect viruses through signature scanning (comparing a file’s content with known virus signatures) Detect viruses through integrity checking (comparing current characteristics of files & disks against an archived version to discover any changes) Detect viruses by monitoring unexpected file changes / virus-like behaviours Receive regular updates and modifications from a centralised network console Consistently report only valid viruses, rather than false alarms. Heuristic scanning is a fallible scanning technique Popular antivirus packages: (McAffe’s) VirusScan, (Norton’s) AntiVirus, etc… 37 Antivirus policies Every computer should have virus detection & cleaning software that regularly scans for viruses Users shouldn’t be allowed to alter / disable the antivirus software Users should know what to do if their antivirus program detects a virus Have an antivirus team that focuses on maintaining the antivirus measures in place Users should be prohibited from installing any unauthorised software on their systems Organisations should impose penalties on users who don’t follow the antivirus policy Virus hoaxes Typically demand that you pass a virus alert to everyone you know, propagating the rumour Fault tolerance The capacity for a system to continue performing despite an unexpected malfunction Failure = when something doesn’t work as planned Fault = when the malfunction of a system component is involved (Can result in a failure) The goal of fault-tolerant systems is to prevent faults from progressing to failures Ways of achieving fault tolerance: An uninterruptible power supply provides high fault tolerance Two servers can mirror each other, taking over for the partner if it should fail (Fail-over = when one component assumes the duties of an identical one) Provide redundant elements to compensate for faults in critical components Environment Analyse the physical environment (heat, moisture, break-ins, natural disasters…) Make sure the telco closets and equipment rooms are air-conditioned and at the right humidity Power Power flaws Surge A momentary increase in voltage due to distant lightning / electrical problems Several surges can degrade a computer’s power supply Line noise A fluctuation in voltage levels caused by other devices on the network or EMI E.g. if you turn on the printer and the lights dim Over time, electrical line noise will damage your PC’s internal circuit boards Brownout A momentary decrease in voltage (also known as a sag) Can be caused by an overtaxed electrical system Blackout A complete power loss May or may not cause significant damage to the network Uninterruptible power supply (UPS) A battery-operated power source directly attached to devices and to a power supply Prevents undesired features of the wall outlet’s A/C power from harming the device Standby UPS Provides continuous voltage by switching immediately to the battery when loss of power is detected Upon restoration of the power, it switches the device back to using A/C power again Disadvantage: In the brief amount of time that it takes the UPS to discover that the power has faltered, a sensitive device (like a server) may have already detected the power loss and shut down Advantage: Cost significantly less than online UPSs Online UPS Uses the A/C power from the wall outlet to continuously charge its battery, while providing power to a network device through its battery Advantage: Offers the best kind of power redundancy available Advantage: No risk of momentarily losing service, because the server need never switch power Advantage: Can deal with noise, surges, and sags before the power reaches the device Factors to consider when choosing a UPS: Amount of power needed (The more power required, the more powerful the UPS needed) Period of time to keep a device running (Most UPSs can support a device for 15 to 20 minutes) 38 Line conditioning (Surge suppression protects against surges and line conditioning; Filtering guards against line noise) Cost Generators Use if your organisation can’t withstand a power loss of any duration Can be powered by diesel, liquid propane gas, natural gas, or steam Don’t provide surge protection, but provide clean (free from noise) electricity Topology A mesh topology offers the best fault tolerance SONET rings can easily recover from a fault because they are self-healing Connectivity ‘Hot swappable’ refers to identical components (in the same device) that automatically assume the functions of their counterpart if one suffers a fault E.g. If a router’s processor fails, the redundant processor will automatically take over processing Faults may also affect the connecting links E.g. If your T1 connection fails, it doesn’t matter whether your router has redundant NICs Load balancing = an automatic distribution of traffic over multiple links / processors to optimise response Servers Critical servers often contain redundant NICs, processors, and hard disks Server mirroring A fault-tolerance technique where one server duplicates the transactions & data storage of another The servers involved must be identical machines using identical components You need a link between the servers, and software running on both servers that allows them to synchronise their actions continually (and let one server take over in the event of a failure) Advantage: The servers involved can stand side by side (or be geographically far apart) Disadvantage: The time it takes for a mirrored server to assume the functionality of the failed server Disadvantage: The toll on the network as data are copied between sites Server clustering A fault-tolerance technique that links multiple servers together to act as a single server Clustered servers share processing duties and appear as a single server to users More cost-effective than mirroring, because servers can perform services independently of others To detect failures, clustered servers regularly poll each other on the network If they don’t receive a response, the clustering software initiates the fail-over Unlike with mirroring, users won’t notice the switch (transparent fail-over and recovery processes) Advantage: Each server can perform its own data processing, improving performance Disadvantage: The clustered servers must be geographically close Storage RAID (Redundant Array of Inexpensive Disks) The multiple disks in a RAID drive appear as a single logical drive Advantage: a single failure won’t cause a catastrophic loss of data Typically used on servers, but not on workstations because of its cost RAID level 0 - disk striping Data are written in blocks across all disks in the array Not fault-tolerant, because if one disk fails, the data in it is accessible Improves performance by utilising multiple disk controllers Multiple disk controllers allow several instructions to be sent to the disks simultaneously RAID level 1 - disk mirroring Provides redundancy: data from one disk are copied to another disk If one disk fails, the disk array controller will switch to the disk that was mirroring the failed one Advantages: Simplicity, and automatic & complete data redundancy Disadvantage: Costly, because it requires two identical disks Disadvantage: Not too efficient, because it relies on software to do the mirroring, taxing the CPU RAID levels 2 & 4 Rarely used, because they are less reliable / efficient than the other levels 39 RAID level 3 - disk striping with parity ECC = error correction code Parity = the mechanism used to verify the integrity of data When data are written, a parity bit is assigned to each data byte When data are read, the parity is checked, and if it doesn’t match, damage is assumed Parity error checking = comparing the parity of data read with the type of parity used by the system A RAID level 3 system can automatically correct parity errors Advantage: High data transfer rate when reading / writing Disadvantage: Parity info appears on a single disk, representing a single point of failure RAID level 5 - disk striping with distributed parity The most popular, highly fault-tolerant data storage technique used today Data are written in small blocks across several disks, and parity error checking info is distributed Advantage: Can write data more rapidly, because the parity info can be written by any one of the several disk controllers in the array Advantage: Uses several disks for parity information, making it more fault-tolerant Advantage: You can replace failed disks with good ones without any interruption of service Network Attached Storage (NAS) A specialised storage device (or group) that provides centralised fault-tolerant data storage Differs from RAID in that it maintains its own interface to the LAN, rather than relying on a separate server to connect it to the network and control its functions Advantage over a file server: a NAS device contains its own file system that is optimised to save and serve files. Because of this optimisation, NAS reads & writes faster than other types of servers Advantage: Can be easily expanded without interrupting service Although NAS is a separate device with its own file system, it still can’t communicate directly with clients on the network: 1. When using NAS, the client requests a file from its usual file server over the LAN 2. The server then requests the file from the NAS device on the network 3. The NAS device retrieves the file and transmits it to the server, which transmits it to the client Appropriate for small or medium sized enterprises that require fault tolerance and fast data access Also appropriate for organisations that use a mix of different operating systems Storage Area Networks (SAN) Distinct networks of storage devices that communicate directly with each other and other networks Multiple storage devices are connected to multiple, identical servers If one storage device within a SAN suffers a fault, data is automatically retrieved from elsewhere If one server in a SAN suffers a fault, another server steps in to perform its functions Extremely fault-tolerant and fast Fibre Channel = a network transmission method that relies on fibre-optic media and its own, proprietary protocol Fibre Channel connects devices within the SAN and also connects the SAN to other networks Because it depends on Fibre Channel, a SAN is not limited to the speed of the client/server network for which it provides data storage Since the SAN doesn’t belong to the client/server network, it doesn’t have to contend with the normal overhead of that network (like broadcasts and acknowledgements) A SAN frees the client/server network from the traffic-intensive duties of backing up & restoring data Advantage: Highly scalable (You can easily add further storage and devices) Advantage: Faster than NAS devices Disadvantage: High cost Disadvantage: More complex than NAS or RAID systems Best suited to environments with huge quantities of data that must always be quickly available Typically used to house multiple databases Data backup Tape backups The most popular method for backing up networked systems, because it’s simple and cheap On small networks, standalone tape drives can be attached to each server On large networks, one large centralised tape backup device can manage all subsystem backups Extremely large environments may require robots to retrieve and circulate tapes from a vault 40 Online backups Usually, online backup providers require you to install their client software Online backups implement strict security measures to protect the data in transit Disadvantage: The cost of this service can vary widely Disadvantage: It may be difficult to verify that your data has been backed up successfully Backup strategy Full backup: All data on all servers are copied to a storage medium Incremental backup: Only data that have changed since the last backup are copied Differential backup: Only data that have changed since the last backup are copied, and that information is then marked for subsequent backup, regardless of whether it has changed Backup rotation scheme = a plan that specifies when and how often backups will occur Grandfather-father-son scheme = a popular backup rotation scheme which uses daily (son), weekly (father), and monthly (grandfather) backup sets You should ensure that backup activity is recorded in a backup log From time to time you should attempt to recover some critical files from your backup media Disaster recovery The process of restoring your data after an outage that affects more than a single system In a disaster recovery plan, consider the worst-case scenarios, rather than minor outages The plan should outline multiple contingencies, in case the best options won’t do Issues that the data recovery team should address: Contact names for emergency coordinators who will execute the disaster recovery response Details on which data and servers are being backed up and how data can be recovered Details on network topology, redundancy, and agreements with national service carriers Regular strategies for testing the disaster recovery plan A plan for managing the crisis, including regular communications with employees and customers Project management The project plan Project management software: Microsoft Project, Plan View, PrimaVera Project Planner Elements of a project plan: Task breakdown Large tasks are broken down into smaller subtasks Dependencies You must specify which tasks depend on the completion of other ones before you can begin them Predecessor = a task that must be completed before another task can begin Timeline Identify how long each task will take, with priorities Allow extra time for especially significant tasks A Gantt chart depicts when projects begin and end along a horizontal timeline One technique for making the project fit into a tight time frame is to work backwards Resources Staff, materials, and money Owner = the person(s) responsible for tasks, who must ensure the project is completed on time Milestones Reference points that mark the completion of major tasks Useful in large projects because they provide a quick indication of a project’s relative success Project participants Project sponsors = people in authority who supervise everyone involved in the project Sponsors can ask for budget increases, deadline extensions, and help negotiate vendor contracts A sponsor may be the person who originated the idea for the project Stakeholder = any person who may be affected by the project 41 Funding A project budget is usually set at the beginning, and approved by a hierarchy of managers Communications Reasons why communications are critical: To ensure that a project’s goals are understood by participants, stakeholders, and sponsors To keep a project’s timeline and budget on track To encourage teamwork among participants To allow you to learn from previous mistakes To prevent finger pointing if a task is not completed correctly / on time To avoid duplication of errors To prepare stakeholders for the effects of the change Methods of communication: Weekly status meetings and daily status briefings for each team Weekly messages to stakeholders about the project’s progress Monthly reports that compare the anticipated and actual spending & timelines Distribution lists to share email correspondence A Web page containing an archive of meeting minutes Processes Process management = planning for and handling the steps needed to accomplish a goal in a systematic way Processes that can be managed: change, support, training, delegation, problem resolution… Contingency planning The process of identifying steps that will minimise the risk of (endangering) unforeseen events Analyse the organisation’s history to identify potential threats Possible measures to take: Order more hardware components than you think you need Ensure that your vendors have extra components on hand Document each piece of hardware & software ordered Rely on a pilot network to test your project’s goals If the technology required to implement the project is new to participants, ask a consulting company with expertise in that technology to be available for questions in case you need help Testing and evaluation Once you have reached a project milestone, you must verify that you are on the right path Establish a testing plan that includes relevant methods and criteria A test plan should address at least the following issues: Was the change nominally successful? Did the change fully accomplish its purpose? If the change didn’t fully accomplish its purpose, did it partially accomplish its goal? Did the change result in unexpected consequences? Did the change point to a need for additional changes? Managing network implementation Implementation steps 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. Determine whether the proposed change is feasible, given time, resource and budget constraints If a change is feasible and desirable, identify specific goals for the project Assess the current state of the network, including physical and logical topology, protocols… Assess the requirements as expressed by stakeholders Create a project plan that includes tasks and subtasks, dependencies, resource allocation, timelines, and milestones, and specify necessary hardware & software purchases If possible, build a pilot network based on your recommendations If the pilot network shows promise, begin to implement the changes on a larger scale If possible, release the changes to a group of users who will evaluate the success of the changes If the evaluation indicates that the changes were successful, release the changes to all users Update your network baseline documentation to reflect the changes 42 Determining project feasibility A feasibility study outlines the costs & benefits of the project and predicts if it will be a success Setting project goals Begin with a broad goal, then narrow it down into specific goals The feasibility study should help determine whether you can achieve the project goals on time A lack of well-defined goals can result in misunderstandings, lack of focus, lack of proper resource allocation, and an uncertainty about whether the project’s outcomes constituted success Baselining Baselining = the practice of measuring and recording a network’s current state of operation Includes keeping a history of performance measurements, like response times & no. of collisions Also involves tracking the physical & logical topology, no. of devices, OSs and protocols in use… Critical to network implementations because it provides the basis for determining which changes may improve the network and also for later evaluating how successful those improvements were Assessing needs and requirements Needs assessment = the process of clarifying the reasons underlying a proposed change People must be interviewed to compare perceptions to factual data Some questions that can be asked: Is the expressed need valid, or does it mark a different need? Can the need be resolved? Is the need important enough to allocate resources to its resolution? If fulfilled, will the need result in additional needs? Will fulfilling it satisfy other needs? Do users affected by the need agree that change is a good answer? User requirements A good technique for beginning to clarify user requirements is user interviews Sort out which needs have a greater priority, and how to address those in the minority Some questions to ask: What makes you think this need should be addressed? How quickly do you think this need must be addressed? Can you suggest ways we can meet this need? What kind of priority would you place on this need? Are you willing to ignore other needs to have this need met? Performance requirements Take the same approach as with interviewing users about their needs Some questions to ask: Where do current performance bottlenecks exist? What kind of performance is optimal? What priority would you assign to improving performance? What measures can bring current performance levels to your recommended level? How will performance improvements affect access, availability, customer needs, security… How will you ensure that measures taken to improve performance are successful? Availability requirements Interview technical staff (to find out how availability can best be achieved) and management staff (to find out what types of availability are most important) Questions to ask the technical staff: Where do current availability flaws / vulnerabilities exist? What kind of availability is acceptable? (99.5%? 99.9%?) What priority would you assign to improving availability? What measures can boost current availability to your recommended percentage? How will availability improvements affect access, performance, customer needs, security… Questions to ask the management staff: What is the cost of one hour of down time during business hours? What is the cost of one hour of down time during off-hours? What is your ideal availability percentage? What part of the application or access is most important to keep available? What priority would you assign to improving availability? How much are you willing to spend to ensure that the network remains available? 43 Integration & scalability requirements Consider how the proposed change might affect the network’s integration and ability to grow Integration & scalability requirements are less likely to represent the primary reason for changes than are customer, performance, or security needs Questions to ask the technical staff: How and where is the network’s growth currently limited? What needs to change to accommodate growth or new hardware / software? In what ways do you expect the network to grow over the next two years? How will improving scalability and integration affect customers, performance, security, availability? How would you prioritise your suggested measures for accommodating growth? Questions to ask the management staff: In what ways do you expect the network (and organisation) to grow over the next 1 5 years? Which of these growth directions is your top priority? What type of hardware and software do you expect to adopt in coming months and years? How much are you willing to spend to optimally position the network and systems for growth? Would you place a higher priority on positioning the network for growth / facilitating better systems integration or on improving security, availability, usability, or performance? Security requirements Security needs are typically identified by the technical staff Ask management staff how they would prioritise security improvements and how much they would be willing to pay to improve network / systems security Questions to ask the technical staff: What type of security must be improved (hardware, software, user, facilities)? Why does security need to be improved? To what extent does security need to be improved? Will the improvement require extra staff, hardware, software, or consulting services? What is the priority of security improvements? How will security improvements affect network access, performance, or scalability? Using a pilot network Pilot network = a small-scale network that stands in for the larger network It shouldn’t be connected to your live network, in case it inadvertently causes harm Document what you learn about the new technology’s features and idiosyncrasies As you evaluate your results against your predefined test criteria, note where your results show success or failure Tips for creating a more realistic and useful pilot network: Include at least one of each type of device that might be affected by the change Use the same transmission methods and speeds as employed on your network Try to emulate the number of segments, protocols, and addressing schemes in your network Always implement the same server & client software and configurations as in your current network Test the pilot network for at least two weeks to verify that its characteristics meet your criteria Preparing users You must notify users of impending changes so that if something goes wrong they won’t be caught off guard Things to explain to users: How their access to the network will be affected How their data will be protected during the change Whether you will provide any means for users to access the network during the change Whether the change will require users to learn new skills Highlighted facts = those that appeared in the October 2004 exam. 44