NETWORK ESSENTIALS 70-058

Peer-to-peer network

Benefits

Drawbacks

Server-based network

Benefits

Drawbacks


Le modèle OSI

Modèle hierarchique car chaque couche offre certains services aux couches supérieures.

Couche physique

La couche physique assure la transmission des données sous forme de signaux électriques sur un circuit de communication.

-L'inité d'information manipulée est le bit

Couche liaison

La couche liaison est responsable de la transmission sans erreur de blocs d'information sur des liaison de données. La couche de liaison est subdivisé en la sous-couche Logicla Link Control et la sous-couche Media Access Control.

The logical Link Sublayer controls data link communications, and defines the use of logical interface points, called Service Access Points (SAPs), that other computers can use to transfer information from the LLC sublayer to the upper OSI layers.

The Media Access Control sublayer provides shared access for multiple NICs with the physical layer. The MAC has direct communication with a computer’s NIC and is responsible for ensuring error-free data trnasmission between computers on a network.

-Forme les trames

-Résous les problèmes de trames endommagées, perdues et dupliquées.

-Exerce le contrôle de flux qui consiste à contraindre l'émetteur à ne pas envoyer plus de données que le récepteur ne peut en accepter.

-L'unité d'information manipulé est le trame.

Protocole de ce niveau: BISYNC, HDLC, LLC, SDLC, LAPB.

Couche réseau

La couche réseau est responsable de l'acheminement des paquets de données qui transistent à l'intérieur du réseau.

-Routage des paquets

-Controle de congestion pour éviter des perte de paquets par engorgement de certains chemins.

Couche transport

La couche transport gère le transport des informations de bout en bout au travers du réseau.

-responsable de l'émission, découpage des données en plus petit paquet et à la reception réassemble les paquets

-Services supplémentaires de traitement d'erreurs

-Controle de flux de bout en bout.

-C'est la première couche de haut niveau qui assure la transition entre les couches de traitement 5, 6, 7 et celles de transmission 1,2,3.

-Protocole TCP/IP et ITP (internet transport protocol)

La couche session

La couche session est responsable de la mise en place et du controle du dialogue entre des utilisateurs sur différentes machines.

-gestion du dialogue

-synchronisation

mapping d'adresse

La couche présentation

La couche présentation est responsable de la représentation des données échangées par les applications.

-encogdage des données

-compression de données

-chiffrememnt (encryptage)

-EX: ASCII, EBCDIC,DES (Data Encryption Standard)

La couche d'application

La couche d'application fournit les protocoles permettant aux utilisateurs d'accéder au réseau

-Compréhension et exécution des commandes

-Normalisation des bases de données et des commandes de système d'exploitation.

-Terminal virtuel, X400 pour la messagerie électronique.

IEEE 802 specifications

    1. Internetworking
    2. Logical Link Control (LLC)
    3. Carrier-Sense Multiple Access with Collision Detection (CSMA/CD)
    4. Token bus LAN
    5. Token ring LAN
    6. Metropolitan Area Network (MAN)
    7. Bradband Technical Advisory Group
    8. Fiber Optic Technical Advisory Group
    9. Integrated Voice and Data Networks
    10. Network Security Technical Advisory Group
    11. Wireless Networks
    12. Demand Priority Acess LAN.

Network protocols

Network protocols provide the following services : Addressing and routing information, error checking, requesting retrnasmissions, and establishing rules for communicating in a particular netwroking environment. These service are called link services.

DDP (Delivery Datagram Protocol) : Apple’s data transport protocol that is used in AppleTalk.

IP (Internet Protocol) : Part of the TCP/IP protocol suite that provides addressing and routing information.

IPX (Internetwork Packet Exchange) : Novell’s netware protocol used for packet routing and forwarding.

NetBEUI : It provides transport services for NetBIOS.

Transport protocols

Responsible for ensuring reliable data delivery between computers.

ATP (AppleTalk Transaction Protocol) and NBP (Name Binding Protocol) : AppleTalk’s sessions and data transport protocols.

NetBIOS/NetBEUI : NetBIOS establishes and manages communications between computers; NetBEUI provides data transport services for that communication.

SPX (Sequenced Packet Exchange) : Novell’s connectio-oriented protocol that is used to guarantee data delivery.

TCP (Transmission Control Protocol) : The portion of the TCP/IP protocol suite that is responsible for reliable delivery of data.

Application Protocols

Responsible for application-to-application services.

AFP (AppleTalk File Protocol) : Apple’s remote file management protocol.

FTP (File Transfer Protocol) : Another member of the TCP/IP protocol suite that is used to provide file transfer services.

NCP (Netware Core Protocol) : Novell’s client shells and redirectors.

NFS (Network File System) : A client/server file system protocol primarily used to share directories with UNIX systems.

SMB (Server Message Block) : A protocol that sits above the NetBEUI and NetBIOS that defines and formats commands for information passing between networked computers.

SMTP (Simple Mail Transfer Protocol) : Member of the TCP/IP protocol responsible for transfering mail.

SNMP (Simple Network Management Protocol) : Member of the TCP/IP protocol that is used to manage and monitor network devices.

Protocols

NetBEUI

NetBEUI is a simple Network layer transport protocol that was developed to support NetBIOS networks. Like NetBIOS, NetBEUI is not routable, so it really has no place on an enterprise network. NetBEUI is the fastest transport protocol available to Windows NT It’s great for fast transmission, but is not usable across routed networks. Benefits of NetBEUI include: speed, good error protection, ease of implementation, and low memory over-head. Some disadvantages are: It's not routable, it has very little support for cross-platform applications, and it has very few troubleshooting tools available.

TCP/IP

TCP/IP is the most widely used protocol suite in networking today. This is due in part to the vast growth of the global Internet. TCP/IP is able to span wide areas and is very flexible. In addition, it provides cross-platform support, routing capabilities, as well as support for the Simple Network Management Protocol (SNMP), the Dynamic Host Configuration Protocol (DHCP), the Windows Internet Name Service (WINS), the Domain Name Service (DNS), and a host of other useful protocols. However, TCP/IP's rich set of features are provided at the expense of additional overhead, which may make it too cumbersome for some networks or applications.

AppleTalk

It should come as no surprise that the AppleTalk protocol is used for communication with Macintosh computers. By enabling AppleTalk, you allow Mac clients to store and access files located on a Windows NT Server, print to Windows NT printers, and vice versa. An item of note: You must first install the Windows NT Services For Macintosh before you, can install AppleTalk. Also, Mac support is only available from an NTFS partition.

APPC

The Advanced Program-to-Program Communication (APPQ protocol, developed by IBM, is a peer-to-peer protocol used in IBM's Systems Network Architecture (SNA) for use on AS/400-series computers.

X.25

X.25 is a set of wide-area protocols that are used in packet- switching networks. It was created to connect remote terminals to mainframes. Although many other wide-area communications types are available in the United States, X.25 is still widely used in Europe.

HDLC

High-level Data Link Control (HDLQ is a flexible, bit-oriented data link protocol that is based on IBM's Synchronous Data Link Control (SDLQ. It has been standardized by the ISO. HDLC can support half- or fullduplex transmission, circuit- or packet-switched networks, peer-to-peer or client/server networks, and transmission over cable or wireless media.

 

XNS

The Xerox Network System (XNS) was created by Xerox for use in Ethernet networks. XNS is the basis for Novell's IPX/SPX, but it is seldom found in today's networks.

Cable type

CAT

Max. Tranfer rate

Description

1

 

Analogic telephony

2

4 Mbps

UTP for data networking

3

10 Mbps

UTP for data networking

4

16 Mbps

UTP for data networking

5

100 Mbps

UTP for data networking

UTP and STP have the same 100 m cable length restriction.

 

Coaxial cable types

Type

Name

RG-8 & RG-11

Thinknet (50 ohms)

RG-58

Thinnet (50 ohms)

rg-58/u

Thinnet, solid copper center conductor

rg-58 a/u

Thinnet, wide-strand center conductor

rg-58 c/u

Thinnet, military grade

rg-59

Broadband/Cable television (75 ohms)

rg-59 /u

Broadband/Cable television (50 ohms)

RG-62

ARCNet (93 ohms)

Cable type comparaisons

Type

(Nodes/segment

&

Nodes/network)

Speed

Distance

Instalation

Interference

Cost

10BaseT

(2 & 1024)

10Mbps

100m

Easy

Highly susceptible

Least expensive

100BaseT

(2 & 1024)

100Mbps

100m

Easy

Highly susceptible

More expensive that 10BaseT

STP

16 to 155 Mbps

100m

Moderatrly easy

Somewhat resistant

More Expensive than Thinnet or UTP

10Base2

(30 & 900)

10 Mbps

185m

Medium difficult

Somewhat resistant

Inexpensive

10Base5

(100 & 1024)

10 Mbps

500m

More difficult than Thinnet

More resistant than most cable

More expensive than most cable

Fiber Optic

100 Mbps to 2 Gbps

2k

Most difficult

Not susceptible

Most expensive type of cable.

NDIS and ODI

Network Device Network Specification (NDIS) as its implementation of the device interface concept, specifically to reside between the NIC driver (Media Access Control) and the protocol stack in the Data Link layer of the OSI reference model. NDIS allows for the binding of multiple protocols to a single NIC, or binds multiple protocols to multiple NIC.

Novell and Apple developped Open Datalink Interface (ODI) which is Novell’s implementation of NDIS.

Common interrupts and I/O addresses

Common Use

IRQ

I/O

System timer

0

N/A

Keyboard

1

N/A

Secondary IRQ controller or video adapter

2

N/A

COM2 or COM4

3

2F0 to 2FF

COM1 or COM3

4

3f0 to 3ff

Usally unassigned (LPT2 or Sound Card)

5

N/A

Floppy disk controller

6

N/A

LPT1

7

N/A

Realtime clock

8

N/A

Usally unassigned (Cascade for IRQ2)

9

370 to 37f

Usally unassigned (Primary SCSI controller)

10

N/A

Usally unassigned (Secondary SCSI controller)

11

N/A

PS/2 Mouse

12

N/A

Math coprocessor

13

N/A

Primary hard disk controller

14

N/A

Usally unassigned (Secondary hard disk controller)

15

N/A

Base Memory Address : Represent the location in RAM of space used as a buffer to store incoming and outgoing data frames.

Transceiver : On a NIC, it is the physical interface between itself and the network.

Répétiteur / Repeater

Hub

 

Pont / Bridge

 

Bridges read the target destionation’s MAC address from each incoming data packet, the examine the bridging table to determine what to do with the packet.

The bridge functions bassically as a repeater.

2 types of bridge

Translation bridge

Translates different mediaq-access methods, allowing the translation bridge to link various network types. (Ethernet and Token-ring network).

 

Transparent bridge

Learns over time where to direct packets it receives. It does this continually building bridging tables, adding new entries when they become necessary.

 

Passerelle

Allows for communications between dissimilar systems on the network. Can also translates protocols.

Effectue des transformations mineures sur les trames pour rendre les formats de trames compatible. IEEE 802 et X25

2 modes de connexion : connexion (Établissement de circuits entre la source et la destination), et sans connexion (Par datagramme)

Agit au niveau de la couche réseau et supérieure.

Routers

Functions at the Network layer and can link 2 or more network segments (or subnet). It uses the network address information found in the Network layer area of the data packet. After obtaining this address information, the router uses the routing table of network address to determine where to forward the packet. There are 2 types of routing devices:

Static routers: Use routing tables that a network administrator must create and update manually.

Dynamic routers: Build and update their own routing tables.

Brouters

It's a bridge and a router. When a brouter receives a packet, it checks to see if the packet was sent in either a routable or a non-routable protocol. If it is a routable protocol packet, the brouter will perform a routing function, sending the packet to its destination outside the local segment, if necessary.

In contrast, if the packet contains a non-rotable protocol, the brouter performs a bridging function, using MAC address to find the proper recipient on the local segment.

A brouter operates at the Data Link and Network layers.

Gateway

Allows for communications between dissimilar systems on the network. It also translates protocols. The gateway operates at the application layer.

Network Topologies

Hybrids

IEEE 802

    1. Division of the data link layer: MAC & LLC. LLC sublayer is responsible for maintaining a link when two computers are sending data across the network. The LLC exposes Services Access Points (SAPs), which allow computers to communicate with the upper layers of the network stack.
    2. Ethernet CSMA/CD: Carrier sense: The computer listens to the network to see if a carrier signal is present. If there is no carrier signal, the computer sends its data transmission. Multiple Access: All connected computers can transmit at a given time. Collision Detection: If two computers do transmit at the same time, the computers that sent the data have the ability to detect the collision and will each resend their data after a random interval.

 

    1. Token-ring networks use a token-passing method to provide equal access to the network for all computers. Computers cannot transmit data unless they have a token. Token ring networks use a larger data frame than Ethernet networks. This allows token-ring networks to transfer large data blocks more efficiently than Ethernet netwoks.

AppleTalk

Used by Apple MacIntosh computers. The cabling is called LocalTalk. LocaTalk uses a network media-access method called Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) which means that the computer broadcast a warning before it transmits to the network.

ARCNet

Attached Resource Computer Network (ARCNet) uses a token-passing method in a logical ring. The token is passed to the next-highest numerical station number. ARCNet is no longer a popoluar networking method because you manually configure the ARCNet cards, and ARCNet speeds are a were 2.5Mbps. It uses RG-62 (93 ohms) cabling and it can be wired as a star, bus or a star-bus and it uses a logical-ring media-access method.

FDDI

Fiber Distributed Data Interface (FDDI) uses fiber cable and token-passing media-access mecanism to create a fast and reliable network. Spped is up to 100Mbps for 500 nodes over a distance of 100 KM (62 miles). It can be implemented on a dual ring configuration to ensure redundancy: The primary and secondary ring.

Network layout principles

Cabling considerations

 

10BaseT Ethernet restrictions

10Base2 Ethernet restrictions

10BaseFL Fiber Optic Inter-repeater Link (FOIRL) restrictions

Token-ring restrictions

ARCNet restrictions

Twisted-pairs: 120m

Active hub and active hub: 600m

Planning for successful Deployment

Network Operating System

A true multitasking OS is able to support as many simultaneous processes as there are CPUs. However, when a computer only has one CPU, multitasking can be simulated through a technique called time slicing.

Time slicing involves dividing CPU computing cycles between multiple tasks. You do this by giving each task a certain amount of process cycles, then halting that task to make the next task active. This process repeats until each task is finished.

There are 2 types of multitasking:

Preemptive

The operating system controls which processes are allowed access to the CPU and for how long. Ounce the assigned time slice expires, the current process halted and the next process is given its computing time.

Cooperative

The operating system cannot stop a process; once CPU control is given to a process, it retains control until the process is complete. During this time, no other process is allowed to access the CPU.

Redirectors

There are actually 2 types of redirectors in use on any network: The client redirector and the server redirector. Both redirectos operate at the presentation layer. When a client makes a request for a network application or service, the redirector intercepts that request and examines it to determine if the resource is local or remote. If the resource is local, the redirector forwards the request to the CPU for immediate processing. If the request is for the network, the redirector forwards the request across the network to the appropriate server.

Designator

A designator is a piece of software that manages the assignment of drive letters to both local and remote network resources or shared drives, which aids in network resource interaction.

Type of network architecture

Managing network performance

Data reads and writes

The number of bytes read and written to the server.

 

Queue commands

The number of commands that are awaiting execution is one measure of how busy the server is.

 

Collision per second

Tells you something about your network's physical topology.

 

Security error

High rates of failed logons, failed access to objects and failed changes to security settings may indicate a security risk on the network.

 

Server sessions

You can tell a bit about server activity by observing the rate at which connections to the server are made and how those connections are broken, whether by a normal logoff, by an error or by a server timeout. More RAM in the server may levitate the problem or you may need to update hardware.

 

Memory use

Soft page faults

Occur when data is removed from a program's working set and is moved to another area in the physical disk.

Hard page fault

Occur when the data has gone unused for so long or there is such a shortage of physical memory that program data is actually stored on the hard disk.

 

Hard disk

Sector sparing

Fault tolerance technique where the hardware or the operating system checks the integrity of the disks prio to write operations. If it discovers a bad sector during a write operation, the bad sector is mapped out (Marked unusable) and the data is written to a good sector. This technique only works on SCSI disk, unless the file system supports sector sparing (Like NTFS)

 

WAN

Leased WAN links generally use one of the following technologies to make the necessary connections:

Switching (as in switched connections) refers to finding a path for data transmission across a number of potential links between sender and receiver. On the other hand, analog and digital connections require a fixed connection to exist, at least for the duration of each communication session. Switching methods include both circuit switching and packet switching.

Circuit Switching

When you call someone, the phone company maps out and reserves a single communications line between you and the person you are calling. However, if you call the same party numerous times in a day, you probably won't be connected through the same set of lines.

Circuit-switched networks can be inexpensive but they are generally slow and not exceptionally efficient for transmitting data, especially in large amounts, or when delivery time is a serious concern (for voice or video traffic, for instance).

Analog Connectivity

The Public Switched Telephone Network (PSTN) can provide data communications as well as voice communications.

Analog transmission consists of sending streams of continuously modulated data, rather than two signals (one for zeros and another for ones), as with digital transmissions.

There are two predominant types of analog lines used for data communications:

Digital connectivity

DDS lines use a point-to-point synchronous method that can transmit at 2.4,4.8, 9.6, and 56 Kbps. high- speed digital lines offer nearly error-free transmission. Such lines are available in numerous forms, including full and fractional T1, T3, and Switched 56.

Packet Switching

Data sent via packet switching is broken down into small pieces of information called packets. Each packet consists of a piece of the data to be transmitted and certain header information that contains the destination address. Packets are sent one at a time, and rely on special network protocols to find a path between sender and receiver, and to deliver them to their proper destinations. It's highly likely that not all packets will travel the same route from source to destination, nor will they arrive in the same order as they were sent. If a packet gets lost or damaged during transmission, it is a relatively easy task to ship out a replacement. But, it is pretty certain that all packets will ultimately arrive at their proper destinations, and be reassembled into whatever original form the sent data may have taken.

X.25 Networks

The actual PDN connection may pass through a computer with an X.25 interface, or through a standalone device called a packet assembler/disassembler (PAD).

Because of its error checking and retransmission of erroneous or lost data packets, X.25 is one of the slowest of the advanced WAN technologies, but it is also one of the most broadly available and affordable options. It remains pervasive outside Europe and the United States.

ISDN Networks

The Integrated Services Digital Network (ISDN) primary goal is to integrate voice and data services by replacing analog telephone lines with digital equivalents that are suited for both voice and all kinds of digital traffic, including data, Video, and other digital data streams.

Although ISDN is available in many locations, it is used considerably less than PSTN lines. This is due in part to the higher costs of ISDN connections, but also because ISDN does not always offer a sufficient boost to bandwidth compared to PSTN lines (which can support data throughput as high as 115 Kbps including compression). ISDN offers nominal bandwidth of 64 Kbps per channel, and most ISDN lines offer nominal bandwidth of 128 Kbps, because channels are often used in pairs (with compression, some vendors claim throughput as high as 400-plus Kbps across two ISDN bearer channels).

You may purchase ISDN in two different forms:

ISDN is a dial-up technology that furnishes voice and data at speeds up to 128 Kbps. Although it took a long time to get to the marketplace, it now enjoys widespread use as a source for Internet connectivity.

Frame Relay

Frame relay uses variable-length packets in a packet-switching environment. It establishes a logical path that's called a Permanent Virtual Circuit (PVC) between end-points. PVCs take fixed paths, so a PVC is the equivalent of a dedicated line in a packet-switched network. The path is fixed, so network nodes don't have to waste time calculating routes. Frame relay connections operate at speeds between 56 Kbps and 1.544 Mbps because they use PVCs, and there is no built-in error checking. Frame relay services are gaining popularity: They are much faster than other networking systems at performing basic packet-switching operations, and customers can specify exactly what amount of bandwidth they

want to pay for.

Frame relay costs less than a dedicated line or an ATM connection and provides data transmission rates of up to 1.544 Mbps over conventional or fiber optic media.

T1 And T3 Lines

T1 is a point-to-point transmission technology that consists of 24 64-Kbps channels for a total transmission capability of 1.544 Mbps. Each of the channels may be used as a separate voice or data communications channel, or channels may be combined to provide higher transmission rates.

A faster commercial T-carrier line is called a T3. It is the equivalent of 28 T1 lines and handles a data rate of 44.736 Mbps. A T3 is the highest capacity leased-line service available from most communications carriers, and is designed to transport large amounts of data at high speeds between two points.

T1 lines are the most common high-speed connectivity in use today. They can transmit up to 1.544 Mbps. One nice feature is that a user can lease a fraction of the TI line as needed.T3 lines are 28 times the size of aT1 (roughly 45 Mbps), and can be consumed in fractions as well.

Switched 56

a Switched 56 line is nothing more than a circuit- switched version of a standard 56-Kbps DDS leased line. As customers pay only for connection time, resulting costs are usually significantly lower than those of a dedicated line.

Switched 56 is merely a circuit-switched version of a standard 56Kbps line. This is good for customers because they only have to pay for what they use.

Asynchronous Transfer Mode (ATM)

ATM is an advanced packet- switching technology that transmits data over LANs or WANs in fixed-length 53-byte chunks, called cells, at speeds of up to 622 Mbps. ATM can accommodate voice, data, fax, realtime video, CD-quality audio, imaging, and multimegabit data transmission.

Unlike frame relay, which uses variable-sized packets, ATM cells have a fixed length of 53 bytes. Of these 53 bytes, 48 bytes contain data and 5 contain header information. Because data packets of uniform length are much easier to transport than random-sized packets, ATM can use network equipment to switch, route, and move cells much more quickly than the same equipment could handle randomly sized frames.

ATM is a packet-switched technology that transmits data in fixed length, 53-byte cells. Theoretically capable of speeds of 1.2 (OC24) and even 2A Gbps (OC-48), it usually transmits in the 155 Mbps (OC-3) to 622 (OC-1 2) Mbps range.

 

FDDI

FDDI is not like a regular Token Ring network because more than one computer at a time can transmit a token so that multiple tokens can circulate on the ring at any one time. The token-passing system is used in a dual-ring setting. Traffic in the FDDI network consists of two similar data streams moving in opposite directions around two counter-rotating rings. FDDI's dual-ring architecture increases its reliability.

SONET

Synchronous Optical Network. SONET is a fiber optic WAN technology used to deliver voice, data, and video at speeds in multiples of 51.84 Mbps. SONET'S main goals were to create a method by which all carriers could interconnect, and to unify differing standards used in Europe, the United States, and Asia especially Japan.

SONET is a fiber Optic WAN technology used to deliver voice, data, and video at speed up to 622 Mbps, and beyond.

SMDS

Switched Multimegabit Data Services. Like ATM, SMDS uses a fixed-length cell of 53 bytes for data transmission. Like ATM and frane relay, it provides no error checking, leaving that up to devices at the connection points.

Abbreviation

Expanded form

Transmission rate

Applies to

Remarks

BRI

Basic rate interface

2 64Kbps channels

ISDN

Total bandwidth 144 Kbps (2B + 16 Kbps data channel)

DS0

Digital service level 0

64 Kbps

Digital telephony

Defines basic digital channel used to classify capacities of digital lines and trunks

DS1

Digital service level 1

1.544 Mbps(US)

2.048 Mbps (out. US)

Digital telephony

In the United States, based on a Bell standard,same asTI; 2,048 speed based on ITU standard

DS3

Digital service level 3

44.736 Mbps

Digital telephony

Same as T3, equivalent to 28TI s

E1

European trunk line, level 1

2.048 Nbps

Digital telephony

Equivalent to TI in most of the world, but the E stands for Europe in the abbreviation

T1

Level 1 trunk line

1.544 Mbps

Digital telephony

Uses two pairs of

TP phone cable.

Used in the United

States, Canada,

Hong Kong,Japan

Often rounded to

45 Mbps

T3

Level 3 trunk line

44.736 Mbps

Digital telephony

Permits direct electrical-tooptical mapping

OC-1

Optical carrier level 1

51.840 Mbps

ATM, SONET

 

OC-3

Optical carrier level 3

155 Mbps

ATM, SONET

 

OC-12

Optical carrier level 12

622 Mbps

ATM, SONET

 

OC-24

Optical carrier level 24

1.2 Gbps

ATM, SONET

 

OC-48

Optical carrier level 48

2.4 Gbps

ATM, SONET

 

PRI

Primary rate interface

1.544 Mbps

ATM, SONET

23-B + 64 Kbps channel, same overall bandwidth as a T1, DSI

Swithed 56

Switched 56

56 Kbps

Digital telephony

On-demand, moderate-speed

digital telephone service

 

Special Tools