Skip to main content

Summary of Module 5

Summary
Ethernet is the most widely used LAN technology and can be implemented on a variety of media. Ethernet technologies provide a variety of network speeds, from 10 Mbps to Gigabit Ethernet, which can be applied to appropriate areas of a network. Media and connector requirements differ for various Ethernet implementations.


The connector on a network interface card (NIC) must match the media. A bayonet nut connector (BNC) connector is required to connect to coaxial cable. A fiber connector is required to connect to fiber media. The registered jack (RJ-45) connector used with twisted-pair wire is the most common type of connector used in LAN implementations. Ethernet

When twisted-pair wire is used to connect devices, the appropriate wire sequence, or pinout, must be determined as well. A crossover cable is used to connect two similar devices, such as two PCs. A straight-through cable is used to connect different devices, such as connections between a switch and a PC. A rollover cable is used to connect a PC to the console port of a router.

Repeaters regenerate and retime network signals and allow them to travel a longer distance on the media. Hubs are multi-port repeaters. Data arriving at a hub port is electrically repeated on all the other ports connected to the same network segment, except for the port on which the data arrived. Sometimes hubs are called concentrators, because hubs often serve as a central connection point for an Ethernet LAN.

A wireless network can be created with much less cabling than other networks. The only permanent cabling might be to the access points for the network. At the core of wireless communication are devices called transmitters and receivers. The transmitter converts source data to electromagnetic (EM) waves that are passed to the receiver. The receiver then converts these electromagnetic waves back into data for the destination. The two most common wireless technologies used for networking are infrared (IR) and radio frequency (RF).

There are times when it is necessary to break up a large LAN into smaller, more easily managed segments. The devices that are used to define and connect network segments include bridges, switches, routers, and gateways.

A bridge uses the destination MAC address to determine whether to filter, flood, or copy the frame onto another segment. If placed strategically, a bridge can greatly improve network performance.

A switch is sometimes described as a multi-port bridge. Although there are some similarities between the two, a switch is a more sophisticated device than a bridge. Switches operate at much higher speeds than bridges and can support new functionality, such as virtual LANs.

Routers are responsible for routing data packets from source to destination within the LAN, and for providing connectivity to the WAN. Within a LAN environment the router controls broadcasts, provides local address resolution services, such as ARP and RARP, and may segment the network using a subnetwork structure.

Computers typically communicate with each other by using request/response protocols. One computer issues a request for a service, and a second computer receives and responds to that request. In a peer-to-peer network, networked computers act as equal partners, or peers. As peers, each computer can take on the client function or the server function. In a client/server arrangement, network services are located on a dedicated computer called a server. The server responds to the requests of clients.

WAN connection types include high-speed serial links, ISDN, DSL, and cable modems. Each of these requires a specific media and connector. To interconnect the ISDN BRI port to the service-provider device, a UTP Category 5 straight-through cable with RJ-45 connectors, is used. A phone cable and an RJ-11 connector are used to connect a router for DSL service. Coaxial cable and a BNC connector are used to connect a router for cable service.

In addition to the connection type, it is necessary to determine whether DTE or DCE connectors are required on internetworking devices. The DTE is the endpoint of the user’s private network on the WAN link. The DCE is typically the point where responsibility for delivering data passes to the service provider. When connecting directly to a service provider, or to a device such as a CSU/DSU that will perform signal clocking, the router is a DTE and needs a DTE serial cable. This is typically the case for routers. However, there are cases when the router will need to be the DCE.

Comments

Popular posts from this blog

OSI layers / Peer-to-peer communications / TCP/IP model

OSI layers 2.3.4 This page discusses the seven layers of the OSI model. The OSI reference model is a framework that is used to understand how information travels throughout a network. The OSI reference model explains how packets travel through the various layers to another device on a network, even if the sender and destination have different types of network media. In the OSI reference model, there are seven numbered layers, each of which illustrates a particular network function. - Dividing the network into seven layers provides the following advantages: • It breaks network communication into smaller, more manageable parts. • It standardizes network components to allow multiple vendor development and support. • It allows different types of network hardware and software to communicate with each other. • It prevents changes in one layer from affecting other layers. • It divides network communication into smaller parts to make learning it easier to understand. In the foll...

Advantages and disadvantages of link-state routing

Advantages and disadvantages of link-state routing 2.1.5  This page lists the advantages and disadvantages of link-state routing protocols. The following are advantages of link-state routing protocols:  Link-state protocols use cost metrics to choose paths through the network. The cost metric reflects the capacity of the links on those paths. Link-state protocols use triggered updates and LSA floods to immediately report changes in the network topology to all routers in the network. This leads to fast convergence times. Each router has a complete and synchronized picture of the network. Therefore, it is very difficult for routing loops to occur. Routers use the latest information to make the best routing decisions. The link-state database sizes can be minimized with careful network design. This leads to smaller Dijkstra calculations and faster convergence. Every router, at the very least, maps the topology of it...

Ports for services

Ports for services 10.2.2  Services running on hosts must have a port number assigned to them so communication can occur. A remote host attempting to connect to a service expects that service to use specific transport layer protocols and ports. Some ports, which are defined in RFC 1700, are known as the well-known ports. These ports are reserved in both TCP and UDP.  These well-known ports define applications that run above the transport layer protocols. For example, a server that runs FTP will use ports 20 and 21 to forward TCP connections from clients to its FTP application. This allows the server to determine which service a client requests. TCP and UDP use port numbers to determine the correct service to which requests are forwarded. The next page will discuss ports in greater detail.