Routers and serial connections
5.2.3
Friday, January 8, 2010
WAN serial connections
WAN serial connections
5.2.2 This page will discuss WAN serial connections.
For long distance communication, WANs use serial transmission. This is a process by which bits of data are sent over a single channel. This process provides reliable long distance communication and the use of a specific electromagnetic or optical frequency range.
Frequencies are measured in terms of cycles per second and expressed in Hz. Signals transmitted over voice grade telephone lines use 4 kHz. The size of the frequency range is referred to as bandwidth. In networking, bandwidth is a measure of the bits per second that are transmitted.
For a Cisco router, physical connectivity at the customer site is provided by one of two types of serial connections. The first type is a 60-pin connector. The second is a more compact ‘smart serial’ connector. The provider connector will vary depending on the type of service equipment.
If the connection is made directly to a service provider, or a device that provides signal clocking such as a channel/data service unit (CSU/DSU), the router will be a data terminal equipment (DTE) and use a DTE serial cable. Typically this is the case. However, there are occasions where the local router is required to provide the clocking rate and therefore will use a data communications equipment (DCE) cable. In the curriculum router labs one of the connected routers will need to provide the clocking function. Therefore, the connection will consist of a DCE and a DTE cable.
The next page will discuss routers and serial connections
5.2.2 This page will discuss WAN serial connections.
For long distance communication, WANs use serial transmission. This is a process by which bits of data are sent over a single channel. This process provides reliable long distance communication and the use of a specific electromagnetic or optical frequency range.
Frequencies are measured in terms of cycles per second and expressed in Hz. Signals transmitted over voice grade telephone lines use 4 kHz. The size of the frequency range is referred to as bandwidth. In networking, bandwidth is a measure of the bits per second that are transmitted.
For a Cisco router, physical connectivity at the customer site is provided by one of two types of serial connections. The first type is a 60-pin connector. The second is a more compact ‘smart serial’ connector. The provider connector will vary depending on the type of service equipment.
If the connection is made directly to a service provider, or a device that provides signal clocking such as a channel/data service unit (CSU/DSU), the router will be a data terminal equipment (DTE) and use a DTE serial cable. Typically this is the case. However, there are occasions where the local router is required to provide the clocking rate and therefore will use a data communications equipment (DCE) cable. In the curriculum router labs one of the connected routers will need to provide the clocking function. Therefore, the connection will consist of a DCE and a DTE cable.
The next page will discuss routers and serial connections
Cabling WANs / WAN physical layer
WAN physical layer
5.2.1 This page describes the WAN physical layer.
The physical layer implementations vary based on the distance of the equipment from each service, the speed, and the type of service. Serial connections are used to support WAN services such as dedicated leased lines that run PPP or Frame Relay. The speed of these connections ranges from 2400 bps to T1 service at 1.544 Mbps and E1 service at 2.048 Mbps.
ISDN offers dial-on-demand connections or dial backup services. An ISDN Basic Rate Interface (BRI) is composed of two 64 kbps bearer channels (B channels) for data, and one delta channel (D channel) at 16 kbps used for signaling and other link-management tasks. PPP is typically used to carry data over the B channels.
As the demand for residential broadband high-speed services has increased, DSL and cable modem connections have become more popular. Typical residential DSL service can achieve T1/E1 speeds over the telephone line. Cable services use the coaxial cable TV line. A coaxial cable line provides high-speed connectivity that matches or exceeds DSL. DSL and cable modem service will be covered in more detail in a later module.
The next page will describe WAN serial connections.
5.2.1 This page describes the WAN physical layer.
The physical layer implementations vary based on the distance of the equipment from each service, the speed, and the type of service. Serial connections are used to support WAN services such as dedicated leased lines that run PPP or Frame Relay. The speed of these connections ranges from 2400 bps to T1 service at 1.544 Mbps and E1 service at 2.048 Mbps.
ISDN offers dial-on-demand connections or dial backup services. An ISDN Basic Rate Interface (BRI) is composed of two 64 kbps bearer channels (B channels) for data, and one delta channel (D channel) at 16 kbps used for signaling and other link-management tasks. PPP is typically used to carry data over the B channels.
As the demand for residential broadband high-speed services has increased, DSL and cable modem connections have become more popular. Typical residential DSL service can achieve T1/E1 speeds over the telephone line. Cable services use the coaxial cable TV line. A coaxial cable line provides high-speed connectivity that matches or exceeds DSL. DSL and cable modem service will be covered in more detail in a later module.
The next page will describe WAN serial connections.
Tuesday, December 29, 2009
Client/server
Client/server
5.1.13 This page will describe a client/server environment.
In a client/server arrangement, network services are located on a dedicated computer called a server. The server responds to the requests of clients. The server is a central computer that is continuously available to respond to requests from clients for file, print, application, and other services. Most network operating systems adopt the form of a client/server relationship. Typically, desktop computers function as clients and one or more computers with additional processing power, memory, and specialized software function as servers.
Servers are designed to handle requests from many clients simultaneously. Before a client can access the server resources, the client must be identified and be authorized to use the resource. Each client is assigned an account name and password that is verified by an authentication service. The authentication service guards access to the network. With the centralization of user accounts, security, and access control, server-based networks simplify the administration of large networks.
The concentration of network resources such as files, printers, and applications on servers also makes it easier to back-up and maintain the data. Resources can be located on specialized, dedicated servers for easier access. Most client/server systems also include ways to enhance the network with new services that extend the usefulness of the network.
The centralized functions in a client/server network has substantial advantages and some disadvantages. Although a centralized server enhances security, ease of access, and control, it introduces a single point of failure into the network. Without an operational server, the network cannot function at all. Servers require a trained, expert staff member to administer and maintain. Server systems also require additional hardware and specialized software that add to the cost.
This page concludes this lesson. The next lesson will discuss cabling WANs. The first page focuses on the WAN physical layer.
5.1.13 This page will describe a client/server environment.
In a client/server arrangement, network services are located on a dedicated computer called a server. The server responds to the requests of clients. The server is a central computer that is continuously available to respond to requests from clients for file, print, application, and other services. Most network operating systems adopt the form of a client/server relationship. Typically, desktop computers function as clients and one or more computers with additional processing power, memory, and specialized software function as servers.
Servers are designed to handle requests from many clients simultaneously. Before a client can access the server resources, the client must be identified and be authorized to use the resource. Each client is assigned an account name and password that is verified by an authentication service. The authentication service guards access to the network. With the centralization of user accounts, security, and access control, server-based networks simplify the administration of large networks.
The concentration of network resources such as files, printers, and applications on servers also makes it easier to back-up and maintain the data. Resources can be located on specialized, dedicated servers for easier access. Most client/server systems also include ways to enhance the network with new services that extend the usefulness of the network.
The centralized functions in a client/server network has substantial advantages and some disadvantages. Although a centralized server enhances security, ease of access, and control, it introduces a single point of failure into the network. Without an operational server, the network cannot function at all. Servers require a trained, expert staff member to administer and maintain. Server systems also require additional hardware and specialized software that add to the cost.
This page concludes this lesson. The next lesson will discuss cabling WANs. The first page focuses on the WAN physical layer.
Host connectivity / Peer-to-peer
Host connectivity
5.1.11 This page will explain how NICs provide network connectivity.
The function of a NIC is to connect a host device to the network medium. A NIC is a printed circuit board that fits into the expansion slot on the motherboard or peripheral device of a computer. The NIC is also referred to as a network adapter. On laptop or notebook computers a NIC is the size of a credit card.
NICs are considered Layer 2 devices because each NIC carries a unique code called a MAC address. This address is used to control data communication for the host on the network. More will be learned about the MAC address later. NICs control host access to the medium.
In some cases the type of connector on the NIC does not match the type of media that needs to be connected to it. A good example is a Cisco 2500 router. This router has an AUI connector. That AUI connector needs to connect to a UTP Category 5 Ethernet cable. A transceiver is used to do this. A transceiver converts one type of signal or connector to another. For example, a transceiver can connect a 15-pin AUI interface to an RJ-45 jack. It is considered a Layer 1 device because it only works with bits and not with any address information or higher-level protocols.
NICs have no standardized symbol. It is implied that, when networking devices are attached to network media, there is a NIC or NIC-like device present. A dot on a topology map represents either a NIC interface or port, which acts like a NIC.
The next page discusses peer-to-peer networks.
Peer-to-peer
5.1.12 This page covers peer-to-peer networks.
When LAN and WAN technologies are used, many computers are interconnected to provide services to their users. To accomplish this, networked computers take on different roles or functions in relation to each other. Some types of applications require computers to function as equal partners. Other types of applications distribute their work so that one computer functions to serve a number of others in an unequal relationship.
Two computers generally use request and response protocols to communicate with each other. One computer issues a request for a service, and a second computer receives and responds to that request. The requestor acts like a client and the responder acts like a server.
In a peer-to-peer network, networked computers act as equal partners, or peers. As peers, each computer can take on the client function or the server function. Computer A may request for a file from Computer B, which then sends the file to Computer A. Computer A acts like the client and Computer B acts like the server. At a later time, Computers A and B can reverse roles.
In a peer-to-peer network, individual users control their own resources. The users may decide to share certain files with other users. The users may also require passwords before they allow others to access their resources. Since individual users make these decisions, there is no central point of control or administration in the network. In addition, individual users must back up their own systems to be able to recover from data loss in case of failures. When a computer acts as a server, the user of that machine may experience reduced performance as the machine serves the requests made by other systems.
Peer-to-peer networks are relatively easy to install and operate. No additional equipment is necessary beyond a suitable operating system installed on each computer. Since users control their own resources, no dedicated administrators are needed.
As networks grow, peer-to-peer relationships become increasingly difficult to coordinate. A peer-to-peer network works well with ten or fewer computers. Since peer-to-peer networks do not scale well, their efficiency decreases rapidly as the number of computers on the network increases. Also, individual users control access to the resources on their computers, which means security may be difficult to maintain. The client/server model of networking can be used to overcome the limitations of the peer-to-peer network.
The next page discusses a client/server network.
5.1.11 This page will explain how NICs provide network connectivity.
The function of a NIC is to connect a host device to the network medium. A NIC is a printed circuit board that fits into the expansion slot on the motherboard or peripheral device of a computer. The NIC is also referred to as a network adapter. On laptop or notebook computers a NIC is the size of a credit card.
NICs are considered Layer 2 devices because each NIC carries a unique code called a MAC address. This address is used to control data communication for the host on the network. More will be learned about the MAC address later. NICs control host access to the medium.
In some cases the type of connector on the NIC does not match the type of media that needs to be connected to it. A good example is a Cisco 2500 router. This router has an AUI connector. That AUI connector needs to connect to a UTP Category 5 Ethernet cable. A transceiver is used to do this. A transceiver converts one type of signal or connector to another. For example, a transceiver can connect a 15-pin AUI interface to an RJ-45 jack. It is considered a Layer 1 device because it only works with bits and not with any address information or higher-level protocols.
NICs have no standardized symbol. It is implied that, when networking devices are attached to network media, there is a NIC or NIC-like device present. A dot on a topology map represents either a NIC interface or port, which acts like a NIC.
The next page discusses peer-to-peer networks.
Peer-to-peer
5.1.12 This page covers peer-to-peer networks.
When LAN and WAN technologies are used, many computers are interconnected to provide services to their users. To accomplish this, networked computers take on different roles or functions in relation to each other. Some types of applications require computers to function as equal partners. Other types of applications distribute their work so that one computer functions to serve a number of others in an unequal relationship.
Two computers generally use request and response protocols to communicate with each other. One computer issues a request for a service, and a second computer receives and responds to that request. The requestor acts like a client and the responder acts like a server.
In a peer-to-peer network, networked computers act as equal partners, or peers. As peers, each computer can take on the client function or the server function. Computer A may request for a file from Computer B, which then sends the file to Computer A. Computer A acts like the client and Computer B acts like the server. At a later time, Computers A and B can reverse roles.
In a peer-to-peer network, individual users control their own resources. The users may decide to share certain files with other users. The users may also require passwords before they allow others to access their resources. Since individual users make these decisions, there is no central point of control or administration in the network. In addition, individual users must back up their own systems to be able to recover from data loss in case of failures. When a computer acts as a server, the user of that machine may experience reduced performance as the machine serves the requests made by other systems.
Peer-to-peer networks are relatively easy to install and operate. No additional equipment is necessary beyond a suitable operating system installed on each computer. Since users control their own resources, no dedicated administrators are needed.
As networks grow, peer-to-peer relationships become increasingly difficult to coordinate. A peer-to-peer network works well with ten or fewer computers. Since peer-to-peer networks do not scale well, their efficiency decreases rapidly as the number of computers on the network increases. Also, individual users control access to the resources on their computers, which means security may be difficult to maintain. The client/server model of networking can be used to overcome the limitations of the peer-to-peer network.
The next page discusses a client/server network.
Bridges / Switches
Bridges
5.1.9 This page will explain the function of bridges in a LAN.
There are times when it is necessary to break up a large LAN into smaller and more easily managed segments. This decreases the amount of traffic on a single LAN and can extend the geographical area past what a single LAN can support. The devices that are used to connect network segments together include bridges, switches, routers, and gateways. Switches and bridges operate at the data link layer of the OSI model. The function of the bridge is to make intelligent decisions about whether or not to pass signals on to the next segment of a network.
When a bridge receives a frame on the network, the destination MAC address is looked up in the bridge table to determine whether to filter, flood, or copy the frame onto another segment. This decision process occurs as follows:
• If the destination device is on the same segment as the frame, the bridge will not send the frame onto other segments. This process is known as filtering.
• If the destination device is on a different segment, the bridge forwards the frame to the appropriate segment.
• If the destination address is unknown to the bridge, the bridge forwards the frame to all segments except the one on which it was received. This process is known as flooding. If placed strategically, a bridge can greatly improve network performance.
The next page will describe switches.
Switches
5.1.10 This page will explain the function of switches.
A switch is sometimes described as a multiport bridge. A typical bridge may have only two ports that link two network segments. A switch can have multiple ports based on the number of network segments that need to be linked. Like bridges, switches learn information about the data packets that are received from computers on the network. Switches use this information to build tables to determine the destination of data that is sent between computers on the network.
Although there are some similarities between the two, a switch is a more sophisticated device than a bridge. A bridge determines whether the frame should be forwarded to the other network segment based on the destination MAC address. A switch has many ports with many network segments connected to them. A switch chooses the port to which the destination device or workstation is connected. Ethernet switches are popular connectivity solutions because they improve network speed, bandwidth, and performance.
Switching is a technology that alleviates congestion in Ethernet LANs. Switches reduce traffic and increase bandwidth. Switches can easily replace hubs because switches work with the cable infrastructures that are already in place. This improves performance with minimal changes to a network.
All switching equipment perform two basic operations. The first operation is called switching data frames. This is the process by which a frame is received on an input medium and then transmitted to an output medium. The second is the maintenance of switching operations where switches build and maintain switching tables and search for loops.
Switches operate at much higher speeds than bridges and can support new functionality, such as virtual LANs.
An Ethernet switch has many benefits. One benefit is that it allows many users to communicate at the same time through the use of virtual circuits and dedicated network segments in a virtually collision-free environment. This maximizes the bandwidth available on the shared medium. Another benefit is that a switched LAN environment is very cost effective since the hardware and cables in place can be reused.
The Lab activity will help students understand the price of a LAN switch.
5.1.9 This page will explain the function of bridges in a LAN.
There are times when it is necessary to break up a large LAN into smaller and more easily managed segments. This decreases the amount of traffic on a single LAN and can extend the geographical area past what a single LAN can support. The devices that are used to connect network segments together include bridges, switches, routers, and gateways. Switches and bridges operate at the data link layer of the OSI model. The function of the bridge is to make intelligent decisions about whether or not to pass signals on to the next segment of a network.
When a bridge receives a frame on the network, the destination MAC address is looked up in the bridge table to determine whether to filter, flood, or copy the frame onto another segment. This decision process occurs as follows:
• If the destination device is on the same segment as the frame, the bridge will not send the frame onto other segments. This process is known as filtering.
• If the destination device is on a different segment, the bridge forwards the frame to the appropriate segment.
• If the destination address is unknown to the bridge, the bridge forwards the frame to all segments except the one on which it was received. This process is known as flooding. If placed strategically, a bridge can greatly improve network performance.
The next page will describe switches.
Switches
5.1.10 This page will explain the function of switches.
A switch is sometimes described as a multiport bridge. A typical bridge may have only two ports that link two network segments. A switch can have multiple ports based on the number of network segments that need to be linked. Like bridges, switches learn information about the data packets that are received from computers on the network. Switches use this information to build tables to determine the destination of data that is sent between computers on the network.
Although there are some similarities between the two, a switch is a more sophisticated device than a bridge. A bridge determines whether the frame should be forwarded to the other network segment based on the destination MAC address. A switch has many ports with many network segments connected to them. A switch chooses the port to which the destination device or workstation is connected. Ethernet switches are popular connectivity solutions because they improve network speed, bandwidth, and performance.
Switching is a technology that alleviates congestion in Ethernet LANs. Switches reduce traffic and increase bandwidth. Switches can easily replace hubs because switches work with the cable infrastructures that are already in place. This improves performance with minimal changes to a network.
All switching equipment perform two basic operations. The first operation is called switching data frames. This is the process by which a frame is received on an input medium and then transmitted to an output medium. The second is the maintenance of switching operations where switches build and maintain switching tables and search for loops.
Switches operate at much higher speeds than bridges and can support new functionality, such as virtual LANs.
An Ethernet switch has many benefits. One benefit is that it allows many users to communicate at the same time through the use of virtual circuits and dedicated network segments in a virtually collision-free environment. This maximizes the bandwidth available on the shared medium. Another benefit is that a switched LAN environment is very cost effective since the hardware and cables in place can be reused.
The Lab activity will help students understand the price of a LAN switch.
Subscribe to:
Posts (Atom)