Lesson #1: Exploring Networking Essentials
|
![]() |
![]() |
![]() |
---|
Of the two types
of twisted pair cable, UTP is by far the most commonly used. The original specification
for running Ethernet on UTP is called 10Base-T. The 10Base-T name
stands for 10 Mbps, baseband signaling (the signaling method used by Ethernet networks), over
twisted pair cable.
Other Ethernet specifications include 10Base5, which
uses a thick coaxial cable, 10Base2, which uses a thin
coaxial cable media, and faster (higher bandwidth) UTP based Ethernet specifications
like 100Base-TX Fast Ethernet (100 Mbps) and 1000Base-T Gigabit Ethernet (1000 Mbps). Today,
10Base5 is obsolete and 10Base2 is seldom installed in new Ethernet networks and
usually seen only in in high EMI areas. Fiber optic standards like
10Base-FL, 100Base-FX, 1000Base-LX, and 1000Base-SX
allow Ethernet to run over fiber optic links.
An extension of the popular 10Base-T Ethernet standard, Fast Ethernet
transports data at 100 Mbps. With rules defined by the
IEEE 802.3µ standard, Fast Ethernet leverages the familiar
Ethernet technology and retains the CSMA/CD protocol of 10 Mbps Ethernet.
Three types of Fast Ethernet are available: 100Base-TX,
which runs over Category 5 UTP; 100Base-T4 which runs over existing
Category 3 UTP; and 100Base-FX, which operates over
multimode fiber optic cabling.
Another major LAN technology in use is Token Ring. Token Ring
rules are defined in the IEEE 802.5 specification.
Like Ethernet, the Token Ring protocol provides services at the Physical and Data Link
Layers of the OSI model. Token Ring networks can be run at two different data
rates, 4 Mbps or 16 Mbps.
The access method used on Token Ring networks is called
token passing. Token passing is a deterministic access method
in which collisions are prevented by assuring that only one station can transmit at
any given time.
This is accomplished by passing a special packet called a token from one station to another around a ring. A station can only send packets when it gets the free token. When a station gets a free token and transmits a packet, the packet travels in one direction around the ring, passing all of the other stations along the way. As with Ethernet, the packet is usually addressed to a single station, and when it passes by that station the packet is copied. The packet continues to travel around the ring until it returns to the sending station, which removes it and sends a free token to the next station around the ring.
Token Ring networks use what is called a logical ring topology. However, it is actually implemented in what can best be described as a star wired ring that implements a logical ring on a physical star topology.
The ring topology used in Token Ring networks is a logical
ring topology that physically is a star topology. Each station is connected
to a Token Ring wiring concentrator (MAU) by a shielded twisted pair
(STP) cable with two wire pairs. One pair serves as
the "inbound" portion of the ring (also known as the receive pair) and the other
pair serves as the "outbound" or transmit pair.
In Token Ring LANs, each station is connected to a Token Ring wiring concentrator, called a Multistation Access Unit (MAU), using an individual run of shielded twisted pair cable. Like Ethernet hubs, MAUs are located in wiring closets.
Fiber Distributed Data Interface, commonly known as FDDI,
provides data transport usually at 100 Mbps. Fiber is preferred in many
networks because it can be used over much greater distances than UTP cable.
Like Token Ring, FDDI uses a token passing media access method. It is also
usually configured in a collapsed ring, or physical star, topology. FDDI is
used primarily as a backbone, a segment of network that links several
individual workgroup or department LANs together in a single building. It is
also used to link several building LANs together in a campus environment.
LANs are complex systems that implement many different services
in order to provide communication between all of the types of devices that can be
connected to them. A communications model called the Open Systems Interconnect
(OSI) reference model was developed by the International
Standards Organization (ISO) to define all of the services a
LAN should provide. This model defines seven layers, each of which provides
a subset of all of the LAN services. This layered approach allows small
groups of related services to be implemented in a modular fashion that makes
designing network software much more flexible. A network software module
that implements services at the Network and Transport Layers of the model can
be paired up with different Physical and Data Link Layer modules depending on
the requirements of the user's application.
But the OSI model doesn't say how these services should
actually be implemented in LAN equipment. The "how to" part has been defined
in a number of different protocols that have been developed by international
standards bodies, individual LAN equipment vendors, and ad hoc groups of interested
parties. These protocols typically define how to implement a group of services
in one or two layers of the OSI model. For example, Ethernet and Token Ring
are both protocols that define different ways to provide the services called for in
the Physical and Data Link Layers of the OSI model. They have both been
approved by the Institute of Electrical and Electronics Engineers
(IEEE), an international communications standards body.
The International Standards Organization (ISO), the primary standard-setting
body in the data communications industry, developed the framework for LAN standards
called the Open Systems Interconnect (OSI) reference model. This reference
model represents a standard approach to communicate information throughout a network
so that a variety of independently developed computer and communications devices can
interoperate.
Because they are approved and published by the IEEE, both the Ethernet and Token Ring protocols are said to be industry standards. Any company can acquire the specifications and design Ethernet or Token Ring NICs. Users can purchase an Ethernet NIC, for example, from any vendor and be assured that it will operate in a network with Ethernet NICs from other vendors. This degree of interoperability is highly desirable. However, there are many more protocols for providing services at the higher layers of the OSI model and very few of them have been approved by an international standards bodies. In fact, most upper layer LAN protocols are incorporated into proprietary network operating systems, such as Novell's NetWare, IBM's LAN Server, and Microsoft's LAN Manager. A user has to buy only that vendor's products in order to be assured that they will interoperate on a LAN.
Ethernet and Token Ring technologies are just one part of a complete LAN. They provide the services specified in the Physical and Data Link Layers of the OSI model, but several other services must be added on top of the connectivity of Ethernet or Token Ring. Network operating systems (NOS) are most often used to provide the additional communications services.
An NOS defines client and server systems. Clients are
individual user workstations (hosts) attached to the network where application
programs are run and data is generated. Servers have shared network resources
that provide hard disk space for users to store files, printer services, and a
number of other network services. The network operating system provides a
set of protocols in software that run on both server and client systems and allow
them to communicate with each other, share files, printers, and other network
resources.
LAN technology is evolving. In the early 1980s LANs were strictly local area networks, linking small groups of computers in company departments. As workgroup LANs proliferated over the past 20 years, users began connecting them to form internetworks, first with bridges and later with routers. Today's networks typically comprise a combination of workgroup and campus hubs, Wi-Fi access points, bridges, and routers. Switches are used to build collission free LANs and are becoming more prevalent than hubs.
The next few years will see networks evolve to include more sophisticated LAN switches (and Layer 3 switches) and ever more sophisticated Wi-Fi access points (hubs). Networks will be designed using several different types of components, both old and new. LANs will be built with stackable workgroup switches, which, in turn, will be interconnected by larger modular/blade switches that may incorporate advanced Layer 2/Layer 3 switching functionality. Large networks will include another layer of consolidation with network center bridges linking workgroup switches and access points. Routers will continue to be used as gateways to the wide area network linking other buildings and remote sites.
For networks to deliver the performance today's users require, their many components must work together to deliver seamless connectivity between all of the users computing and networking systems throughout the enterprise. Flexibility to grow, power to support applications, and seamless connectivity are what users expect in the products they choose to build LANs and enterprise networks.
![]() |
academy.delmar.edu/Courses Last modified: 1-Aug-2011 |
![]() |
mpharris@delmar.edu Copyright © 1984-2012 |
---|