Академический Документы
Профессиональный Документы
Культура Документы
Chapter six
Wide Area Networks (WANs)
A Wide Area Network (WAN) is used to interconnect Local Area Networks (LANs) that are
separated by a large geographical distance. A Wide Area Network predominately operates at the
OSI 1Physical and 2Data link layers. The WAN provides a data path between routers and the
LANs that each router supports. A WAN subscriber must know how to interface to the WAN
providers service. Mapping associates the Layer 3 logical address with the Layer 2 WAN address.
There are many types of WAN services that are available to the WAN subscriber.
WANs are designed to:
WAN devices:
1. NIC
2. MODEM
3. Repeater
4. Hub
5. Bridge
6. Switch
7. Router
8. Brouter
9. Gateway
Mezgebe M. [UU]
Page 1
A sample NIC
The role of the NIC is to:
Control the flow of data between the computer and the cabling system.
Receive incoming data from the cable and translate it into bytes that can be understood by
the computer's central processing unit (CPU).
Stated at a more technical level, the NIC contains the hardware and firmware (software routines
stored in read-only memory, ROM) programming that implements the Logical Link Control and
Media Access Control functions in the data-link layer of the OSI reference model(OSI reference
model will be discussed in chapter 5).
Mezgebe M. [UU]
Page 2
The NIC takes data that is traveling in parallel as a group and restructures it so that it will flow
through the 1-bit-serial path of the network cable. Figure 2 shows a server converting parallel data
to serial data on the network. This is accomplished through the translation of the computer's digital
signals into electrical or optical signals that can travel on the network's cables. The component
responsible for this is the transceiver (transmitter/receiver).
Mezgebe M. [UU]
Page 3
In addition to transforming data, the NIC also has to advertise its own location, or address, to the
rest of the network to distinguish it from all the other cards on the network.
A committee of the Institute of Electrical and Electronics Engineers (IEEE) assigns blocks of
addresses to each NIC manufacturer. The manufacturers hardwire these addresses into chips on
the card by a process known as "burning" the address into the card. With this process, each NIC
and therefore each computerhas a unique address on a network.
The NIC also participates in several other functions in sequence as it takes data from the computer
and gets it ready for the network cable:
The computer and NIC must communicate in order to move data from the computer to the card.
The NIC signals the computer, requesting the computer's data.
The computer's bus moves the data from the computer's memory to the NIC.
Because data can often move faster on the bus or the cable than the NIC can handle, the data is
sent to the card's buffer, a reserved portion of RAM. Here it is held temporarily during both the
transmission and reception of data.
Network Cabling and Connectors
The network interface card performs three important functions in coordinating activities between
the computer and the cabling:
To select the appropriate NIC for your network, you first need to determine the type of cabling
and cabling connectors it will have.
As discussed in the previous lesson, each type of cable has different physical characteristics that
the NIC must accommodate. Each card is built to accept at least one type of cable. Coaxial, twistedpair, and fiber-optic are the most common cable types.
Some NICs have more than one interface connector. For example, it is not uncommon for a NIC
to have a thinnet, thicknet, and twisted-pair connector.
A thicknet network connection uses a 15-pin attachment unit interface (AUI) cable to connect the
15-pin (DB-15 ,DB stands for data bus) connector on the back of the NIC to an external transceiver.
Mezgebe M. [UU]
Page 4
As discussed earlier in Lesson 1, the external transceiver uses a vampire tap to connect to the
thicknet cable. Figure 3 shows a 15-pin AUI connection. A thicknet network connection uses a
15-pin attachment unit interface (AUI) cable to connect the 15-pin (DB-15) connector on the back
of the NIC to an external transceiver
So far, this lesson has focused on standard network interface cards. In the majority of situations,
you will be using one of these cards to connect each computer to the physical network. In reality,
some situations will require the use of specialized network connections and therefore require
specialized network cards. The remainder of this lesson introduces you to three varieties of these
specialized cards.
Wireless NICs
Some environments require an alternative to cabled computer networking. Wireless NICs are
available that support the major network operating systems.
Wireless NICs often come with many features. These include:
Installation software.
These NICs can be used to create an all-wireless LAN or to add wireless stations to a cabled LAN.
Usually, these NICs are used to communicate with a component called a wireless concentrator that
acts as a transceiver to send and receive signals.
Mezgebe M. [UU]
Page 5
Fiber-Optic NICs
"Fiber to the desktop" has become a catch phrase for the computing industry. As transmission
speeds increase to accommodate the bandwidth-hungry applications and multimedia data streams
that are common on today's intranets, fiber-optic network cards allow direct connections to highspeed fiber-optic networks. These cards have recently become cost-competitive, and it's expected
that their use will someday be commonplace.
Remote-Boot PROMs
In some environments, security is such an important consideration that workstations do not have
individual floppy-disk drives. Without these, users are not able to copy information to floppy or
hard disks and, therefore, cannot take any data from the worksite.
However, because computers normally start from either a floppy or a hard disk, there has to be
another source for the software that initially starts (boots) the computer and connects it to a
network. In these environments, the NIC can be equipped with a special chip called a remote-boot
Mezgebe M. [UU]
Page 6
PROM (programmable read-only memory) that contains the hardwired code that starts the
computer from the server and connects the user to the network.
With remote-boot PROMs, diskless workstations can join the network when they start.
PCMCIA NIC
PC Memory card international Association (PCMCIA) is a nonprofit association formed in 1989,
with more than 320 members in the computer and electronic industries, that developed a standard
for credit card-sized plug-in adapters designed for portable computers as shown in the following
figure.
Modem
A modem is a device that makes it possible for computers to communicate over a telephone line.
When computers are too far apart to be joined by a standard computer cable, a modem can enable
communication between them.
Computers cannot simply be connected to each other over a telephone line, because computers
communicate by sending digital electronic pulses (electronic signals), and a telephone line can
send only analog waves (sound).
Mezgebe M. [UU]
Page 7
As shown in Figure below, the modem at the sending end converts the computer's digital signals
into analog waves and transmits the analog waves onto the telephone line. A modem at the
receiving end converts the incoming analog signals back into digital signals for the receiving
computer.
In other words, a sending modem MOdulates digital signals into analog signals, and a receiving
modem DEModulates analog signals back into digital signals.
The following are different types of modem that you might face in the real world
1. Internal Modem
2. Cable Modem
A Modem that sends and receives signals through a coaxial cable connected to a cable television
system, rather than through conventional telephone lines.
Mezgebe M. [UU]
Page 8
3. External modem
Repeaters
As signals travel along a cable, they degrade and become distorted in a process called
"attenuation." If a cable is long enough, attenuation will finally make a signal unrecognizable.
Installing a repeater enables signals to travel farther.
Page 9
Mezgebe M. [UU]
Page 10
Mezgebe M. [UU]
Page 11
HUB/CONCENTRATOR
One network component that has become standard equipment in networks is the hub.
Active Hubs
Most hubs are active; that is, they regenerate and retransmit signals in the same way as a repeater
does. Because hubs usually have eight to twelve ports for network computers to connect to, they
are sometimes called multi-port repeaters. Active hubs require electrical power to run.
Passive Hubs
Some types of hubs are passive; examples include wiring panels or punch-down blocks. They act
as connection points and do not amplify or regenerate the signal; the signal passes through the hub.
Passive hubs do not require electrical power to run.
Hybrid Hubs
Advanced hubs that will accommodate several different types of cables are called hybrid hubs.
The following figure shows a main hub (the hybrid) with three sub-hubs.
Mezgebe M. [UU]
Page 12
Hub Considerations
Hub-based systems are versatile and offer several advantages over systems that do not use hubs.
Hub-based topologies include the following benefits:
A hub can be used as the central hardware component in a star topology. Hubs can also be used to
expand the size of a LAN. Although using hubs won't convert a LAN into a WAN, connecting or
adding hubs to a LAN can effectively increase the number of workstations. This method of
growing a LAN is popular, but does come with many design limitations. Figure 3.4.1 shows how
several 10BaseT hubs can be connected to expand a network.
Mezgebe M. [UU]
Page 13
Figure 3.4.2 shows how several token-ring hubs can be connected to expand a
network.
Mezgebe M. [UU]
Page 14
Cables attach the individual clients and servers to the MSAU, which works like other passive hubs.
Figure below shows a hub in which the internal wiring circulates the token in a clockwise direction.
The internal ring automatically converts to an external ring at each connection point when a
computer is connected.
Figure Hub showing the internal ring and clockwise token path
Hub Capacity
An IBM MSAU has 10 connection ports. It can connect up to eight computers. However, a Token
Ring network is not limited to one ring (hub). Each ring can have up to 33 hubs.
Each MSAU-based network can support as many as 72 computers that use unshielded wire or up
to 260 computers that use shielded wire.
Other vendors offer hubs with more capacity; the capacity depends on the vendor and the hub
model.
When one Token Ring is fullthat is, when every port on an MSAU has a computer connected to
itadding another ring (MSAU) can enlarge the network.
The only rule that must be followed is that each MSAU must be connected in such a way so that
it becomes part of the ring. Figure 3.4.5 shows 1, 2, and 3 MSAU connected and maintaining a
logical ring. An MSAU's ring-in and ring-out connection points make use of patch cables to
Mezgebe M. [UU]
Page 15
connect many MSAUs on top of each other while still forming a continuous ring inside the
MSAUs.
BRIDGE
Like a repeater, a bridge can join segments or workgroup LANs. Figure 2.5.1 shows a bridge
connecting two network segments. However, a bridge can also divide a network to isolate traffic
or problems. For example, if the volume of traffic from one or two computers or a single
department is flooding the network with data and slowing down the entire operation, a bridge could
isolate those computers or that department.
Bridges can be used to:
Split an overloaded network into two separate networks, reducing the amount
of traffic on each segment and making each network more efficient.
Mezgebe M. [UU]
Page 16
Mezgebe M. [UU]
Page 17
If the destination is not listed in the routing table, the bridge forwards the packets
to all segments.
If the destination is listed in the routing table, the bridge forwards the packets to
that segment (unless it is the same segment as the source).
A bridge works on the principle that each network node has its own address. A bridge forwards
packets based on the address of the destination node.
Bridges actually have some degree of intelligence in that they learn where to forward data. As
traffic passes through the bridge, information about the computer addresses is stored in the bridge's
RAM. The bridge uses this RAM to build a routing table based on source addresses.
Initially, the bridge's routing table is empty. As nodes transmit packets, the source address is copied
to the routing table. With this address information (See Figure 2.5.2); the bridge learns which
computers are on which segment of the network.
Creating the Routing Table Bridges build their routing tables based on the addresses of
computers that have transmitted data on the network. Specifically, bridges use source addresses
the address of the device that initiates the transmissionto create a routing table.
Mezgebe M. [UU]
Page 18
When the bridge receives a packet, the source address is compared to the routing table. If the
source address is not there, it is added to the table. The bridge then compares the destination
address with the routing-table database.
If the destination address is in the routing table and is on the same segment as the source
address, the packet is discarded. This filtering helps to reduce network traffic and isolate
segments of the network.
If the destination address is in the routing table and not in the same segment as the source
address, the bridge forwards the packet out of the appropriate port to reach the destination
address.
If the destination address is not in the routing table, the bridge forwards the packet to all
its ports except the one on which it originated.
In summary, if a bridge knows the location of the destination node, it forwards the packet to it. If
it does not know the destination, it forwards the packet to all segments.
Segmenting Network Traffic A bridge can segment traffic because of its routing table. As shown
in Figure 2.5.3, a computer on segment 1 (the source), sends data to another computer (the
destination) also located in segment 1. If the destination address is in the routing table, the bridge
can determine that the destination computer is also on segment 1. Because the source and
destination computers are both on segment 1, the packet does not get forwarded across the bridge
to segment 2.
Mezgebe M. [UU]
Page 19
Remote Bridges
Because bridges can be such powerful tools in expanding and segmenting networks, they are often
used in large networks that have widely dispersed segments joined by telephone lines.
Only one bridge is necessary to link two cable segments. However, where two separate LANs are
located at a great distance from each other (See Figure 2.5.4), they can be joined into a single
network. Implementing two remote bridges connected with synchronous modems to a dedicated,
data-grade telephone line can do this.
Mezgebe M. [UU]
Page 20
Mezgebe M. [UU]
Page 21
Bridges have all of the features of repeaters, but also accommodate more nodes. They provide
better network performance than repeaters. Because bridged networks have been divided, fewer
computers compete for available resources on each segment.
To look at it another way, if a large Ethernet network were divided into two segments connected
by a bridge, each new network would carry fewer packets, have fewer collisions, and operate more
efficiently. Although each network would be separate, the bridge would pass appropriate traffic
between them.
Implementing a bridge
A bridge can be either a separate, stand-alone piece of equipment (an external bridge) or it can be
installed in a server. If the network operating system (NOS) supports it, one or more network
interface cards (NICs), making an internal bridge, can be installed.
Network administrators like to use bridges because they are:
Relatively inexpensive.
Switch
A switch is the next rung up the evolutionary ladder from bridges. In modern star-topology
networking, when you need bridging functionality you often buy a switch. But bridging is not the
only benefit of switch implementation.
segmentation, which means that every node connected to a switched port receives its own
dedicated bandwidth.
Switches are multiport bridges. Sometimes they are called smart hubs or switching hub. They
filter traffic between the ports on the switch by using the MAC address of computers transmitting
through them. Switches can be used when greater performance is needed or when collisions need
to be reduced. The following figure illustrates a switched network.
Mezgebe M. [UU]
Page 22
Router
In an environment that consists of several network segments with differing protocols and
architectures, a bridge might be inadequate for ensuring fast communication among all segments.
A network this complex needs a device that not only knows the address of each segment, but can
also determine the best path for sending data and filtering broadcast traffic to the local segment.
Such a device is called a "router."
Mezgebe M. [UU]
Page 23
Routers work at the network layer of the OSI reference model. This means they can switch and
route packets across multiple networks. They do this by exchanging protocol-specific information
between separate networks. Routers read complex network addressing information in the packet
and, because they function at a higher layer in the OSI reference model than bridges, they have
access to additional information.
Routers can provide the following functions of a bridge:
Routers have access to more of the information in packets than bridges have and use this
information to improve packet deliveries. Routers are used in complex networks because they
provide better traffic management. Routers can share status and routing information with one
another and use this information to bypass slow or malfunctioning connections.
How Routers Work
Routers maintain their own routing tables, usually consisting of network addresses; host addresses
can also be kept if the network architecture calls for it. To determine the destination address for
incoming data, the routing table includes:
As shown in Figure 2.6.1, a router uses its data-routing table to select the best route for the data
based on costs and available paths.
Note: Remember that routing tables were also discussed in the context of bridges. The routing
table maintained by a bridge contains MAC-sublayer addresses for each node, whereas the routing
table maintained by a router contains network numbers. Although manufacturers of both types of
Mezgebe M. [UU]
Page 24
equipment have chosen to use the term "routing table," it has a different meaning for bridges than
it does for routers.
Routers require specific addresses. They understand only the network numbers that allow them to
communicate with other routers and local NIC addresses. Routers do not talk to remote computers.
Figure 2.6.1 Routers talk to other routers, but not to remote computers
When routers receive packets destined for a remote network, they send them to the router that
manages the destination network. In some ways this is an advantage because it means routers can:
Because routers must perform complex functions on each packet, routers are slower than most
bridges. As packets are passed from router to router, data-link layer source and destination
addresses are stripped off and then re-created. This enables a router to route a packet from a TCP/IP
Ethernet network to a server on a TCP/IP Token Ring network.
Mezgebe M. [UU]
Page 25
Because routers read only addressed network packets, they do not allow corrupted data to get
passed onto the network. Because they do not pass corrupted data or broadcast data storms, routers
put little stress on networks.
Routers do not look at the destination node address; they look only at the network address. Routers
will pass information only if the network address is known. This ability to control the data passing
through the router reduces the amount of traffic between networks and allows routers to use these
links more efficiently than bridges.
Using the router-addressing scheme, administrators can break one large network into many
separate networks, and because routers do not pass or even handle every packet, they act as a safety
barrier between network segments. This can greatly reduce the amount of traffic on the network
and the wait time experienced by users.
Routable Protocols Not all protocols are routable. Protocols that are routable
include:
DECnet.
OSI.
DDP (AppleTalk).
Mezgebe M. [UU]
Page 26
Routers are available that can accommodate multiple protocols such as IP and
DECnet in the same network.
Choosing Paths Unlike bridges, routers can accommodate multiple active paths between LAN
segments and choose among redundant paths. Because routers can link segments that use
completely different data packaging and media-access schemes, there are often several paths
available for the router to use. This means that if one router does not function, the data can still be
passed over alternate routes.
A router can listen to a network and identify which parts are busiest. It uses this information to
determine which path to send data over. If one path is very busy, the router identifies an alternative
path and sends data over that one.
A router decides the path the data packet will follow by determining the number of hops between
internetwork segments. Like bridges, routers build routing tables and use these in routing
algorithms such as the following:
Types of Routers
The two major types of routers are:
Mezgebe M. [UU]
Page 27
Static.
Static routers require an administrator to manually set up and configure the
routing table and to specify each route.
Dynamic.
Dynamic routers are designed to discover routes automatically and therefore require a
minimal amount of setup and configuration. More sophisticated than static routers, they
examine information from other routers and make packet-by-packet decisions about how
to send data across the network.
Table 2.2 compares and contrasts the characteristics of static and dynamic
routers.
Table 2.2 Characteristics of the Two Types of Routers
Static routers
Dynamic routers
Brouter
Mezgebe M. [UU]
Page 28
A brouter, as the name implies, combines the qualities of both a bridge and a
router. A brouter can act as a router for one protocol and as a bridge for all
the others.
Gateway
In general, the role of the gateway is to overcome problems associated with protocol
incompatibility. This is a problem, which most often occurs when totally different systems,
usually developed independently, need to be linked.
Note:
Gateways are available as stand-alone devices or in the form of PCs functioning as
gateway servers
Hence, in short gateway performs protocol translation between two dissimilar networks
(LANS).
E.g. a token ring LAN to Ethernet LAN
Mezgebe M. [UU]
Page 29