NETWORK ESSENTIALS 70-058
Peer-to-peer network
Benefits
Drawbacks
Server-based network
Benefits
Drawbacks
Le modèle OSI
Modèle hierarchique car chaque couche offre certains services aux couches supérieures.
Couche physique
La couche physique assure la transmission des données sous forme de signaux électriques sur un circuit de communication.
-L'inité d'information manipulée est le bit
Couche liaison
La couche liaison est responsable de la transmission sans erreur de blocs d'information sur des liaison de données. La couche de liaison est subdivisé en la sous-couche Logicla Link Control et la sous-couche Media Access Control.
The logical Link Sublayer controls data link communications, and defines the use of logical interface points, called Service Access Points (SAPs), that other computers can use to transfer information from the LLC sublayer to the upper OSI layers.
The Media Access Control sublayer provides shared access for multiple NICs with the physical layer. The MAC has direct communication with a computer’s NIC and is responsible for ensuring error-free data trnasmission between computers on a network.
-Forme les trames
-Résous les problèmes de trames endommagées, perdues et dupliquées.
-Exerce le contrôle de flux qui consiste à contraindre l'émetteur à ne pas envoyer plus de données que le récepteur ne peut en accepter.
-L'unité d'information manipulé est le trame.
Protocole de ce niveau: BISYNC, HDLC, LLC, SDLC, LAPB.
Couche réseau
La couche réseau est responsable de l'acheminement des paquets de données qui transistent à l'intérieur du réseau.
-Routage des paquets
-Controle de congestion pour éviter des perte de paquets par engorgement de certains chemins.
Couche transport
La couche transport gère le transport des informations de bout en bout au travers du réseau.
-responsable de l'émission, découpage des données en plus petit paquet et à la reception réassemble les paquets
-Services supplémentaires de traitement d'erreurs
-Controle de flux de bout en bout.
-C'est la première couche de haut niveau qui assure la transition entre les couches de traitement 5, 6, 7 et celles de transmission 1,2,3.
-Protocole TCP/IP et ITP (internet transport protocol)
La couche session
La couche session est responsable de la mise en place et du controle du dialogue entre des utilisateurs sur différentes machines.
-gestion du dialogue
-synchronisation
mapping d'adresse
La couche présentation
La couche présentation est responsable de la représentation des données échangées par les applications.
-encogdage des données
-compression de données
-chiffrememnt (encryptage)
-EX: ASCII, EBCDIC,DES (Data Encryption Standard)
La couche d'application
La couche d'application fournit les protocoles permettant aux utilisateurs d'accéder au réseau
-Compréhension et exécution des commandes
-Normalisation des bases de données et des commandes de système d'exploitation.
-Terminal virtuel, X400 pour la messagerie électronique.
IEEE 802 specifications
Network protocols
Network protocols provide the following services : Addressing and routing information, error checking, requesting retrnasmissions, and establishing rules for communicating in a particular netwroking environment. These service are called link services.
DDP (Delivery Datagram Protocol) : Apple’s data transport protocol that is used in AppleTalk.
IP (Internet Protocol) : Part of the TCP/IP protocol suite that provides addressing and routing information.
IPX (Internetwork Packet Exchange) : Novell’s netware protocol used for packet routing and forwarding.
NetBEUI : It provides transport services for NetBIOS.
Transport protocols
Responsible for ensuring reliable data delivery between computers.
ATP (AppleTalk Transaction Protocol) and NBP (Name Binding Protocol) : AppleTalk’s sessions and data transport protocols.
NetBIOS/NetBEUI : NetBIOS establishes and manages communications between computers; NetBEUI provides data transport services for that communication.
SPX (Sequenced Packet Exchange) : Novell’s connectio-oriented protocol that is used to guarantee data delivery.
TCP (Transmission Control Protocol) : The portion of the TCP/IP protocol suite that is responsible for reliable delivery of data.
Application Protocols
Responsible for application-to-application services.
AFP (AppleTalk File Protocol) : Apple’s remote file management protocol.
FTP (File Transfer Protocol) : Another member of the TCP/IP protocol suite that is used to provide file transfer services.
NCP (Netware Core Protocol) : Novell’s client shells and redirectors.
NFS (Network File System) : A client/server file system protocol primarily used to share directories with UNIX systems.
SMB (Server Message Block) : A protocol that sits above the NetBEUI and NetBIOS that defines and formats commands for information passing between networked computers.
SMTP (Simple Mail Transfer Protocol) : Member of the TCP/IP protocol responsible for transfering mail.
SNMP (Simple Network Management Protocol) : Member of the TCP/IP protocol that is used to manage and monitor network devices.
Protocols
NetBEUI
NetBEUI is a simple Network layer transport protocol that was developed to support NetBIOS networks. Like NetBIOS, NetBEUI is not routable, so it really has no place on an enterprise network. NetBEUI is the fastest transport protocol available to Windows NT It’s great for fast transmission, but is not usable across routed networks. Benefits of NetBEUI include: speed, good error protection, ease of implementation, and low memory over-head. Some disadvantages are: It's not routable, it has very little support for cross-platform applications, and it has very few troubleshooting tools available.
TCP/IP
TCP/IP is the most widely used protocol suite in networking today. This is due in part to the vast growth of the global Internet. TCP/IP is able to span wide areas and is very flexible. In addition, it provides cross-platform support, routing capabilities, as well as support for the Simple Network Management Protocol (SNMP), the Dynamic Host Configuration Protocol (DHCP), the Windows Internet Name Service (WINS), the Domain Name Service (DNS), and a host of other useful protocols. However, TCP/IP's rich set of features are provided at the expense of additional overhead, which may make it too cumbersome for some networks or applications.
AppleTalk
It should come as no surprise that the AppleTalk protocol is used for communication with Macintosh computers. By enabling AppleTalk, you allow Mac clients to store and access files located on a Windows NT Server, print to Windows NT printers, and vice versa. An item of note: You must first install the Windows NT Services For Macintosh before you, can install AppleTalk. Also, Mac support is only available from an NTFS partition.
APPC
The Advanced Program-to-Program Communication (APPQ protocol, developed by IBM, is a peer-to-peer protocol used in IBM's Systems Network Architecture (SNA) for use on AS/400-series computers.
X.25
X.25 is a set of wide-area protocols that are used in packet- switching networks. It was created to connect remote terminals to mainframes. Although many other wide-area communications types are available in the United States, X.25 is still widely used in Europe.
HDLC
High-level Data Link Control (HDLQ is a flexible, bit-oriented data link protocol that is based on IBM's Synchronous Data Link Control (SDLQ. It has been standardized by the ISO. HDLC can support half- or fullduplex transmission, circuit- or packet-switched networks, peer-to-peer or client/server networks, and transmission over cable or wireless media.
XNS
The Xerox Network System (XNS) was created by Xerox for use in Ethernet networks. XNS is the basis for Novell's IPX/SPX, but it is seldom found in today's networks.
Cable type
CAT |
Max. Tranfer rate |
Description |
1 |
|
Analogic telephony |
2 |
4 Mbps |
UTP for data networking |
3 |
10 Mbps |
UTP for data networking |
4 |
16 Mbps |
UTP for data networking |
5 |
100 Mbps |
UTP for data networking |
UTP and STP have the same 100 m cable length restriction.
Coaxial cable types |
|
Type |
Name |
RG-8 & RG-11 |
Thinknet (50 ohms) |
RG-58 |
Thinnet (50 ohms) |
rg-58/u |
Thinnet, solid copper center conductor |
rg-58 a/u |
Thinnet, wide-strand center conductor |
rg-58 c/u |
Thinnet, military grade |
rg-59 |
Broadband/Cable television (75 ohms) |
rg-59 /u |
Broadband/Cable television (50 ohms) |
RG-62 |
ARCNet (93 ohms) |
Cable type comparaisons |
|||||
Type (Nodes/segment & Nodes/network) |
Speed |
Distance |
Instalation |
Interference |
Cost |
10BaseT (2 & 1024) |
10Mbps |
100m |
Easy |
Highly susceptible |
Least expensive |
100BaseT (2 & 1024) |
100Mbps |
100m |
Easy |
Highly susceptible |
More expensive that 10BaseT |
STP |
16 to 155 Mbps |
100m |
Moderatrly easy |
Somewhat resistant |
More Expensive than Thinnet or UTP |
10Base2 (30 & 900) |
10 Mbps |
185m |
Medium difficult |
Somewhat resistant |
Inexpensive |
10Base5 (100 & 1024) |
10 Mbps |
500m |
More difficult than Thinnet |
More resistant than most cable |
More expensive than most cable |
Fiber Optic |
100 Mbps to 2 Gbps |
2k |
Most difficult |
Not susceptible |
Most expensive type of cable. |
NDIS and ODI
Network Device Network Specification (NDIS) as its implementation of the device interface concept, specifically to reside between the NIC driver (Media Access Control) and the protocol stack in the Data Link layer of the OSI reference model. NDIS allows for the binding of multiple protocols to a single NIC, or binds multiple protocols to multiple NIC.
Novell and Apple developped Open Datalink Interface (ODI) which is Novell’s implementation of NDIS.
Common interrupts and I/O addresses |
||
Common Use |
IRQ |
I/O |
System timer |
0 |
N/A |
Keyboard |
1 |
N/A |
Secondary IRQ controller or video adapter |
2 |
N/A |
COM2 or COM4 |
3 |
2F0 to 2FF |
COM1 or COM3 |
4 |
3f0 to 3ff |
Usally unassigned (LPT2 or Sound Card) |
5 |
N/A |
Floppy disk controller |
6 |
N/A |
LPT1 |
7 |
N/A |
Realtime clock |
8 |
N/A |
Usally unassigned (Cascade for IRQ2) |
9 |
370 to 37f |
Usally unassigned (Primary SCSI controller) |
10 |
N/A |
Usally unassigned (Secondary SCSI controller) |
11 |
N/A |
PS/2 Mouse |
12 |
N/A |
Math coprocessor |
13 |
N/A |
Primary hard disk controller |
14 |
N/A |
Usally unassigned (Secondary hard disk controller) |
15 |
N/A |
Base Memory Address : Represent the location in RAM of space used as a buffer to store incoming and outgoing data frames.
Transceiver : On a NIC, it is the physical interface between itself and the network.
Répétiteur / Repeater
Hub
Pont / Bridge
Bridges read the target destionation’s MAC address from each incoming data packet, the examine the bridging table to determine what to do with the packet.
The bridge functions bassically as a repeater.
2 types of bridge
Translation bridge
Translates different mediaq-access methods, allowing the translation bridge to link various network types. (Ethernet and Token-ring network).
Transparent bridge
Learns over time where to direct packets it receives. It does this continually building bridging tables, adding new entries when they become necessary.
Passerelle
Allows for communications between dissimilar systems on the network. Can also translates protocols.
Effectue des transformations mineures sur les trames pour rendre les formats de trames compatible. IEEE 802 et X25
2 modes de connexion : connexion (Établissement de circuits entre la source et la destination), et sans connexion (Par datagramme)
Agit au niveau de la couche réseau et supérieure.
Routers
Functions at the Network layer and can link 2 or more network segments (or subnet). It uses the network address information found in the Network layer area of the data packet. After obtaining this address information, the router uses the routing table of network address to determine where to forward the packet. There are 2 types of routing devices:
Static routers: Use routing tables that a network administrator must create and update manually.
Dynamic routers: Build and update their own routing tables.
Brouters
It's a bridge and a router. When a brouter receives a packet, it checks to see if the packet was sent in either a routable or a non-routable protocol. If it is a routable protocol packet, the brouter will perform a routing function, sending the packet to its destination outside the local segment, if necessary.
In contrast, if the packet contains a non-rotable protocol, the brouter performs a bridging function, using MAC address to find the proper recipient on the local segment.
A brouter operates at the Data Link and Network layers.
Gateway
Allows for communications between dissimilar systems on the network. It also translates protocols. The gateway operates at the application layer.
Network Topologies
Hybrids
IEEE 802
AppleTalk
Used by Apple MacIntosh computers. The cabling is called LocalTalk. LocaTalk uses a network media-access method called Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) which means that the computer broadcast a warning before it transmits to the network.
ARCNet
Attached Resource Computer Network (ARCNet) uses a token-passing method in a logical ring. The token is passed to the next-highest numerical station number. ARCNet is no longer a popoluar networking method because you manually configure the ARCNet cards, and ARCNet speeds are a were 2.5Mbps. It uses RG-62 (93 ohms) cabling and it can be wired as a star, bus or a star-bus and it uses a logical-ring media-access method.
FDDI
Fiber Distributed Data Interface (FDDI) uses fiber cable and token-passing media-access mecanism to create a fast and reliable network. Spped is up to 100Mbps for 500 nodes over a distance of 100 KM (62 miles). It can be implemented on a dual ring configuration to ensure redundancy: The primary and secondary ring.
Network layout principles
Cabling considerations
10BaseT Ethernet restrictions
10Base2 Ethernet restrictions
10BaseFL Fiber Optic Inter-repeater Link (FOIRL) restrictions
Token-ring restrictions
ARCNet restrictions
Twisted-pairs: 120m
Active hub and active hub: 600m
Planning for successful Deployment
Network Operating System
A true multitasking OS is able to support as many simultaneous processes as there are CPUs. However, when a computer only has one CPU, multitasking can be simulated through a technique called time slicing.
Time slicing involves dividing CPU computing cycles between multiple tasks. You do this by giving each task a certain amount of process cycles, then halting that task to make the next task active. This process repeats until each task is finished.
There are 2 types of multitasking:
Preemptive
The operating system controls which processes are allowed access to the CPU and for how long. Ounce the assigned time slice expires, the current process halted and the next process is given its computing time.
Cooperative
The operating system cannot stop a process; once CPU control is given to a process, it retains control until the process is complete. During this time, no other process is allowed to access the CPU.
Redirectors
There are actually 2 types of redirectors in use on any network: The client redirector and the server redirector. Both redirectos operate at the presentation layer. When a client makes a request for a network application or service, the redirector intercepts that request and examines it to determine if the resource is local or remote. If the resource is local, the redirector forwards the request to the CPU for immediate processing. If the request is for the network, the redirector forwards the request across the network to the appropriate server.
Designator
A designator is a piece of software that manages the assignment of drive letters to both local and remote network resources or shared drives, which aids in network resource interaction.
Type of network architecture
Managing network performance
Data reads and writes
The number of bytes read and written to the server.
Queue commands
The number of commands that are awaiting execution is one measure of how busy the server is.
Collision per second
Tells you something about your network's physical topology.
Security error
High rates of failed logons, failed access to objects and failed changes to security settings may indicate a security risk on the network.
Server sessions
You can tell a bit about server activity by observing the rate at which connections to the server are made and how those connections are broken, whether by a normal logoff, by an error or by a server timeout. More RAM in the server may levitate the problem or you may need to update hardware.
Memory use
Soft page faults
Occur when data is removed from a program's working set and is moved to another area in the physical disk.
Hard page fault
Occur when the data has gone unused for so long or there is such a shortage of physical memory that program data is actually stored on the hard disk.
Hard disk
Sector sparing
Fault tolerance technique where the hardware or the operating system checks the integrity of the disks prio to write operations. If it discovers a bad sector during a write operation, the bad sector is mapped out (Marked unusable) and the data is written to a good sector. This technique only works on SCSI disk, unless the file system supports sector sparing (Like NTFS)
WAN
Leased WAN links generally use one of the following technologies to make the necessary connections:
Switching (as in switched connections) refers to finding a path for data transmission across a number of potential links between sender and receiver. On the other hand, analog and digital connections require a fixed connection to exist, at least for the duration of each communication session. Switching methods include both circuit switching and packet switching.
Circuit Switching
When you call someone, the phone company maps out and reserves a single communications line between you and the person you are calling. However, if you call the same party numerous times in a day, you probably won't be connected through the same set of lines.
Circuit-switched networks can be inexpensive but they are generally slow and not exceptionally efficient for transmitting data, especially in large amounts, or when delivery time is a serious concern (for voice or video traffic, for instance).
Analog Connectivity
The Public Switched Telephone Network (PSTN) can provide data communications as well as voice communications.
Analog transmission consists of sending streams of continuously modulated data, rather than two signals (one for zeros and another for ones), as with digital transmissions.
There are two predominant types of analog lines used for data communications:
Digital connectivity
DDS lines use a point-to-point synchronous method that can transmit at 2.4,4.8, 9.6, and 56 Kbps. high- speed digital lines offer nearly error-free transmission. Such lines are available in numerous forms, including full and fractional T1, T3, and Switched 56.
Packet Switching
Data sent via packet switching is broken down into small pieces of information called packets. Each packet consists of a piece of the data to be transmitted and certain header information that contains the destination address. Packets are sent one at a time, and rely on special network protocols to find a path between sender and receiver, and to deliver them to their proper destinations. It's highly likely that not all packets will travel the same route from source to destination, nor will they arrive in the same order as they were sent. If a packet gets lost or damaged during transmission, it is a relatively easy task to ship out a replacement. But, it is pretty certain that all packets will ultimately arrive at their proper destinations, and be reassembled into whatever original form the sent data may have taken.
X.25 Networks
The actual PDN connection may pass through a computer with an X.25 interface, or through a standalone device called a packet assembler/disassembler (PAD).
Because of its error checking and retransmission of erroneous or lost data packets, X.25 is one of the slowest of the advanced WAN technologies, but it is also one of the most broadly available and affordable options. It remains pervasive outside Europe and the United States.
ISDN Networks
The Integrated Services Digital Network (ISDN) primary goal is to integrate voice and data services by replacing analog telephone lines with digital equivalents that are suited for both voice and all kinds of digital traffic, including data, Video, and other digital data streams.
Although ISDN is available in many locations, it is used considerably less than PSTN lines. This is due in part to the higher costs of ISDN connections, but also because ISDN does not always offer a sufficient boost to bandwidth compared to PSTN lines (which can support data throughput as high as 115 Kbps including compression). ISDN offers nominal bandwidth of 64 Kbps per channel, and most ISDN lines offer nominal bandwidth of 128 Kbps, because channels are often used in pairs (with compression, some vendors claim throughput as high as 400-plus Kbps across two ISDN bearer channels).
You may purchase ISDN in two different forms:
ISDN is a dial-up technology that furnishes voice and data at speeds up to 128 Kbps. Although it took a long time to get to the marketplace, it now enjoys widespread use as a source for Internet connectivity.
Frame Relay
Frame relay uses variable-length packets in a packet-switching environment. It establishes a logical path that's called a Permanent Virtual Circuit (PVC) between end-points. PVCs take fixed paths, so a PVC is the equivalent of a dedicated line in a packet-switched network. The path is fixed, so network nodes don't have to waste time calculating routes. Frame relay connections operate at speeds between 56 Kbps and 1.544 Mbps because they use PVCs, and there is no built-in error checking. Frame relay services are gaining popularity: They are much faster than other networking systems at performing basic packet-switching operations, and customers can specify exactly what amount of bandwidth they
want to pay for.
Frame relay costs less than a dedicated line or an ATM connection and provides data transmission rates of up to 1.544 Mbps over conventional or fiber optic media.
T1 And T3 Lines
T1 is a point-to-point transmission technology that consists of 24 64-Kbps channels for a total transmission capability of 1.544 Mbps. Each of the channels may be used as a separate voice or data communications channel, or channels may be combined to provide higher transmission rates.
A faster commercial T-carrier line is called a T3. It is the equivalent of 28 T1 lines and handles a data rate of 44.736 Mbps. A T3 is the highest capacity leased-line service available from most communications carriers, and is designed to transport large amounts of data at high speeds between two points.
T1 lines are the most common high-speed connectivity in use today. They can transmit up to 1.544 Mbps. One nice feature is that a user can lease a fraction of the TI line as needed.T3 lines are 28 times the size of aT1 (roughly 45 Mbps), and can be consumed in fractions as well.
Switched 56
a Switched 56 line is nothing more than a circuit- switched version of a standard 56-Kbps DDS leased line. As customers pay only for connection time, resulting costs are usually significantly lower than those of a dedicated line.
Switched 56 is merely a circuit-switched version of a standard 56Kbps line. This is good for customers because they only have to pay for what they use.
Asynchronous Transfer Mode (ATM)
ATM is an advanced packet- switching technology that transmits data over LANs or WANs in fixed-length 53-byte chunks, called cells, at speeds of up to 622 Mbps. ATM can accommodate voice, data, fax, realtime video, CD-quality audio, imaging, and multimegabit data transmission.
Unlike frame relay, which uses variable-sized packets, ATM cells have a fixed length of 53 bytes. Of these 53 bytes, 48 bytes contain data and 5 contain header information. Because data packets of uniform length are much easier to transport than random-sized packets, ATM can use network equipment to switch, route, and move cells much more quickly than the same equipment could handle randomly sized frames.
ATM is a packet-switched technology that transmits data in fixed length, 53-byte cells. Theoretically capable of speeds of 1.2 (OC24) and even 2A Gbps (OC-48), it usually transmits in the 155 Mbps (OC-3) to 622 (OC-1 2) Mbps range.
FDDI
FDDI is not like a regular Token Ring network because more than one computer at a time can transmit a token so that multiple tokens can circulate on the ring at any one time. The token-passing system is used in a dual-ring setting. Traffic in the FDDI network consists of two similar data streams moving in opposite directions around two counter-rotating rings. FDDI's dual-ring architecture increases its reliability.
SONET
Synchronous Optical Network. SONET is a fiber optic WAN technology used to deliver voice, data, and video at speeds in multiples of 51.84 Mbps. SONET'S main goals were to create a method by which all carriers could interconnect, and to unify differing standards used in Europe, the United States, and Asia especially Japan.
SONET is a fiber Optic WAN technology used to deliver voice, data, and video at speed up to 622 Mbps, and beyond.
SMDS
Switched Multimegabit Data Services. Like ATM, SMDS uses a fixed-length cell of 53 bytes for data transmission. Like ATM and frane relay, it provides no error checking, leaving that up to devices at the connection points.
Abbreviation |
Expanded form |
Transmission rate |
Applies to |
Remarks |
BRI |
Basic rate interface |
2 64Kbps channels |
ISDN |
Total bandwidth 144 Kbps (2B + 16 Kbps data channel) |
DS0 |
Digital service level 0 |
64 Kbps |
Digital telephony |
Defines basic digital channel used to classify capacities of digital lines and trunks |
DS1 |
Digital service level 1 |
1.544 Mbps(US) 2.048 Mbps (out. US) |
Digital telephony |
In the United States, based on a Bell standard,same asTI; 2,048 speed based on ITU standard |
DS3 |
Digital service level 3 |
44.736 Mbps |
Digital telephony |
Same as T3, equivalent to 28TI s |
E1 |
European trunk line, level 1 |
2.048 Nbps |
Digital telephony |
Equivalent to TI in most of the world, but the E stands for Europe in the abbreviation |
T1 |
Level 1 trunk line |
1.544 Mbps |
Digital telephony |
Uses two pairs of TP phone cable. Used in the United States, Canada, Hong Kong,Japan Often rounded to 45 Mbps |
T3 |
Level 3 trunk line |
44.736 Mbps |
Digital telephony |
Permits direct electrical-tooptical mapping |
OC-1 |
Optical carrier level 1 |
51.840 Mbps |
ATM, SONET |
|
OC-3 |
Optical carrier level 3 |
155 Mbps |
ATM, SONET |
|
OC-12 |
Optical carrier level 12 |
622 Mbps |
ATM, SONET |
|
OC-24 |
Optical carrier level 24 |
1.2 Gbps |
ATM, SONET |
|
OC-48 |
Optical carrier level 48 |
2.4 Gbps |
ATM, SONET |
|
PRI |
Primary rate interface |
1.544 Mbps |
ATM, SONET |
23-B + 64 Kbps channel, same overall bandwidth as a T1, DSI |
Swithed 56 |
Switched 56 |
56 Kbps |
Digital telephony |
On-demand, moderate-speed digital telephone service |
Special Tools