good networking concept

Upload: raj-kumar

Post on 05-Apr-2018

216 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/31/2019 Good Networking Concept

    1/37

    1 Introduction

    Computer network is a group of two or more computers that are interconnected

    to share resources (data, hardware, software...) Two computers are said to be

    interconnected if they are able to exchange information.

    Experts in the field of networking debate whether two computers that are connected

    together using some form of communications medium constitute a network but we

    will take above definition as relevant.

    Network may involve other devices such as routers, switches, network printers, IP

    telephones etc. so, in general, we speak about nodes of a network.

    Main purpose of networks is to transfer data from source to destination. Data is

    transferred by different types of signal and represented with sequence of bits (onesand zeros). Various physical media can be used for transmission of signal: coaxial

    cable, twisted pair, fiber optics and air.

    Suppose that we want to transfer data from host A to host B over the network. Data

    may be e-mail, .mp3 file, web page etc. Furthermore that data have to

    be segmented into smaller pieces of information, transferred over the network

    and delivered to host B without errors.

    Objective of this book is to try to explain this basic procesess in computer networks

    and why they are important.

    Network is organized hierarchically. Main concepts of hierarchical systems are:

    concept oflayers

    concept ofinterface

    concept ofprotocol

    concept ofheader

    concept offragmentation

    Communication protocol is a set of uniquely defined syntactic and semantic rules for

    exchanging information between two entities that includes:

    syntax of the information;

    semantics of the information;

    rules for the exchange of information

    Entity may be computer, software, mobile phone, sensor etc.

  • 7/31/2019 Good Networking Concept

    2/37

    Communication architecture is a set of protocols that enables communication

    between two entities.

    We will talk about these concepts and architectures later. For now let's explain

    concept of layers. The concept of layers is used to describe communication from one

    node of network to another.

    A conversation between two people provides a good opportunity to use a layered

    approach to analyze information flow. In a conversation, each person wishing to

    communicate begins by creating an idea. Then a decision is made on how to properly

    communicate the idea.

    For example, a person could decide to speak or sing, and what language to use.

    Finally the idea is delivered. The person creates the sound which carries the message.

    This process can be broken into separate layers that may be applied to all

    conversations. The top layer is the idea that will be communicated. The middle layer

    is the decision on how the idea is to be communicated. The bottom layer is thecreation of sound to carry the communication.

    The same method of layering explains how a computer network distributes

    information from a source to a destination.

    We use models to describe communication in networks. Two models that will be

    explained in this book are OSI model and TCP/IP model.

    ..

    2 Network Topology

    Network topology is a usually schematic description of the arrangement of a network,

    including its nodes and connecting lines. There are two ways of defining network

    geometry: the physical topology and the logical (or signal) topology.

    Physical topology is the physical layout of the network, how the cables are

    arranged and how the computers are connected.

    Logical topology refers to the nature of the paths the signals follow from nodeto node.

    In many instances, the logical topology is the same as the physical topology. But this

    is not always the case. For example, some networks are physically laid out in a star

    configuration, but they operate logically as bus networks.

  • 7/31/2019 Good Networking Concept

    3/37

    Network topology is technically a part of graph theory. Distances between nodes,

    physical interconnections, transmission rates, and/or signal types may differ in two

    networks and yet their topologies may be identical.

    There are several common physical topologies, as described below and as shown in

    the Figure 1.

    Figure 1: Physical topologies

    Bus - Topology in which all of the nodes of the network are connected to a common

    transmission medium which has exactly two endpoints (this is the "bus", which is also

    commonly referred to as the backbone, or trunk) all data that is transmitted between

    nodes in the network is transmitted over this common transmission medium and is

    able to be received by all nodes in the network virtually simultaneously. The two

    endpoints of the common transmission medium are normally terminated with a device

    called a terminator that exhibits the characteristic impedance of the transmission

    medium and which dissipates or absorbs the energy that remains in the signal to

    prevent the signal from being reflected or propagated back onto the transmission

    medium in the opposite direction, which would cause interference with and

    degradation of the signals on the transmission medium.

    Star - Topology in which each of the nodes of the network is connected to a central

    node with a point-to-point link in a "hub" and "spoke" fashion, the central node being

    the "hub" and the nodes that are attached to the central node being the "spokes" (e.g.,

    a collection of point-to-point links from the peripheral nodes that converge at a central

    node) all data that is transmitted between nodes in the network is transmitted to this

    central node, which is usually some type of device that then retransmits the data to

    some or all of the other nodes in the network, although the central node may also be a

    simple common connection point without any active device to repeat the signals.

  • 7/31/2019 Good Networking Concept

    4/37

    Ring - Topology in which each of the nodes of the network is connected to two other

    nodes in the network and with the first and last nodes being connected to each other,

    forming a ring all data that is transmitted between nodes in the network travels from

    one node to the next node in a circular manner and the data generally flows in a single

    direction only.

    Mesh - Topology in which each of the nodes of the network is connected to each of

    the other nodes in the network with a point-to-point link this makes it possible for

    data to be simultaneously transmitted from any single node to all of the other nodes.

    The physical fully connected mesh topology is generally too costly and complex for

    practical networks, although the topology is used when there are only a small number

    of nodes to be interconnected.

    Tree (or hierarchical) - Topology in which a central "root" node (the top level of the

    hierarchy) is connected to one or more other nodes that are one level lower in the

    hierarchy (i.e., the second level) with a point-to-point link between each of the secondlevel nodes and the top level central "root" node, while each of the second level nodes

    that are connected to the top level central "root" node will also have one or more other

    nodes that are one level lower in the hierarchy (i.e., the third level) connected to it,

    also with a point-to-point link, the top level central "root" node being the only node

    that has no other node above it in the hierarchy the hierarchy of the tree is

    symmetrical, each node in the network having a specific fixed number, f, of nodes

    connected to it at the next lower level in the hierarchy, the number, f, being referred to

    as the "branching factor" of the hierarchical tree.

    Hybrid - The hybrid topology is a type of network topology that is composed of one

    or more interconnections of two or more networks that are based upon different

    physical topologies mentioned above.

    3 Reference Models

    Reference model is an abstract representation of the entities and relationships

    involved in a problem space, and forms the conceptual basis for the development of

    more concrete models and ultimately implementations. It serves as an abstract

    template for the development of more specific models in a given domain, and allowsfor comparison between complying models.

    It will be talked about two models: OSI model and TCP/IP model (protocol suite).

  • 7/31/2019 Good Networking Concept

    5/37

    3.1 The OSI Reference Model

    The Open Systems Interconnection reference model (OSI reference model or OSI

    model for short) is a layered, abstract description for communications and computer

    network protocol design, developed as part of the Open Systems Interconnection

    (OSI) initiative. It is also called the OSI seven layer model. The layers, described

    below and shown in Figure 2 are, from bottom to top: Physical, Data Link, Network,

    Transport, Session Presentation and Application layer. A layer is a collection of

    related functions that provides services to the layer above it and receives service from

    the layer below it. The layers are defined in such a manner so that changes in one

    layer do not require changes in the other layers. By partitioning the communcation

    functions into layers, the problem is much more manageable.

    Figure 2: OSI model layers

    Physical layer Concerned with transmission of unstructured bit stream over the

    physical link. It invokes such parameters as signal voltage swing and bit duration. It

    deals with the mechanical, electrical, procedural characteristics to establish, maintain

    and deactivate the physical link

    Data Link layer Provides reliable transfer of data across the physical link. It sends

    blocks of data (frames) with the necessary synchronization, error control and flow

    control.

    Network layer Provides upper layers with independence from the data transmission

    and switching technologies used to connect systems. It is responsible for establishing,

    maintaining and terminating connections.

  • 7/31/2019 Good Networking Concept

    6/37

    Transport layer Provides reliable, transparent transfer of data between end points.

    It provides end-to-end error recovery and flow control.

    Session layer Provides the control structure for communication between

    applications. It establishes, manages and terminates connections (sessions) between

    cooperating applications.

    Presentation layer Performs transformations on data to provide a standardized

    application interface and to provide common communications services. It provides

    services such as encryption, text compression and reformatting.

    Application layer Provides services to the users, FTP, HTTP, TELNET, etc.

    3.2 The TCP/IP Reference Model

    TCP/IP originated out of the investigative research into networking protocols that theUS Department of Defense (DoD) initiated in 1969. In 1968, the DoD Advanced

    Research Projects Agency (ARPA) began researching the network technology that is

    called packet switching.

    The original focus of this research was that the network be able to survive loss of

    subnet hardware, with existing conversations not being broken off. In other words,

    DoD wanted connections to remain intact as long as the source and destination nodes

    were functioning, even if some of the machines or transmission lines in between were

    suddenly put out of operation. The network that was initially constructed as a result of

    this research to provide a communication that could function in wartime., then calledARPANET, gradually became known as the Internet. The TCP/IP protocols played an

    important role in the development of the Internet. In the early 1980s, the TCP/IP

    protocols were developed. In 1983, they became standard protocols for ARPANET.

    Because of the history of the TCP/IP protocol suite, it's often referred to as the DoD

    protocol suite or the Internet protocol suite.

  • 7/31/2019 Good Networking Concept

    7/37

    Figure 3: TCP/IP model

    layers

    Network Access Layer The lowest layer of the TCP/IP protocol hierarchy. It

    defines how to use the network to transmit an IP datagram. Unlike higher-levelprotocols, Network Access Layer protocols must know the details of the underlying

    network (its packet structure, addressing, etc.) to correctly format the data being

    transmitted to comply with the network constraints. The TCP/IP Network Access

    Layer can encompass the functions of all three lower layers of the OSI reference

    Model (Physical, Data Link and Network layers).

    As new hardware technologies appear, new Network Access protocols must be

    developed so that TCP/IP networks can use the new hardware. Consequently, there

    are many access protocols - one for each physical network standard.Access protocol is a set of rules that defines how the hosts access the shared medium.

    Access protocol have to be simple, rational and fair for all the hosts.

    Functions performed at this level include encapsulation of IP datagrams into the

    frames transmitted by the network, and mapping of IP addresses to the physical

    addresses used by the network. One of TCP/IP's strengths is its universal addressing

    scheme. The IP address must be converted into an address that is appropriate for the

    physical network over which the datagram is transmitted.

    Internet layer Provides services that are roughly equivalent to the OSI Network

    layer. The primary concern of the protocol at this layer is to manage the connections

    across networks as information is passed from source to destination. The Internet

    Protocol (IP) is the primary protocol at this layer of the TCP/IP model.

    Transport layer It is designed to allow peer entities on the source and destination

    hosts to carry on a conversation, just as in the OSI transport layer. Two end-to-end

    transport protocols have been defined here TCP and UDP Both protocols will be

    dicussed later.

    Application Layer includes the OSI Session, Presentation and Application layers as

    shown in the Figure 4. An application is any process that occurs above the Transport

    Layer. This includes all of the processes that involve user interaction. The application

    determines the presentation of the data and controls the session. There are numerous

    application layer protocols in TCP/IP, including Simple Mail Transfer Protocol

    (SMTP) and Post Office Protocol (POP) used for e-mail, Hyper Text Transfer

    Protocol (HTTP) used for the World-Wide-Web, and File Transfer Protocol (FTP).

    Most application layer protocols are associated with one or more port number. Port

    numbers will be dicussed later.

  • 7/31/2019 Good Networking Concept

    8/37

    Figure 4: OSI and TCP/IP

    4 Basic Definitions in Data Networks

    In this chapter some basic definitions in data networks will be discussed including

    types of switching, header, interface, protocol, PDU, SDU, encapsulation, network

    math and metric units etc.

    4.1 Circuit-Switching, Message-Switching and Packet-Switching

    Circuit switching network establishes a fixed bandwidth circuit (channel) betweennodes before the users may communicate, as if the nodes were physically connected

    with an electrical circuit. The bit delay is constant during the connection, as opposed

    to packet switching, where packet queues may cause varying delay.

    Each circuit cannot be used by other callers until the circuit is released and a new

    connection is set up. Even if no communication is taking place in a dedicated circuit

    then, that channel still remains unavailable to other users. Channels that are available

    for new calls to be set up are said to be idle. Telephone network is example of circuit

    switching system.

    Virtual circuit switching is a packet switching technology that may emulate circuit

    switching, in the sense that the connection is established before any packets aretransferred, and that packets are delivered in order.

    Message switching was the precursor of packet switching, where messages were

    routed in their entirety, one hop at a time. It was first introduced in 1961. Nowadays,

    message switching systems are mostly implemented over packet-switched or circuit-

    switched data networks. E-mail is example of a message switching system.

  • 7/31/2019 Good Networking Concept

    9/37

    Packet switching is a communications paradigm in which packets (discrete blocks of

    data) are routed between nodes over data links shared with other traffic. The term

    "packets" refers to the fact that the data stream from your computer is broken up into

    packets of about 200 bytes (on average), which are then sent out onto the network.

    Each packet contains a "header" with information necessary for routing the packet

    from source to destination. Each packet in a data stream is independent.

    The main advantage of packet-switching is that it permits "statistical multiplexing" on

    the communications lines. The packets from many different sources can share a line,

    allowing for very efficient use of the fixed capacity. With current technology, packets

    are generally accepted onto the network on a first-come, first-served basis. If the

    network becomes overloaded, packets are delayed or discarded ("dropped").

    4.2 Communication between Hosts in Packet-Switched

    Networks

    All communications on a network originate at a source, and are sent to a destination.

    The information sent on a network is referred to as data or data packets. Let host A be

    a source and let host B be a destination.

    As shown in the Figure 5 real communication happens through physical medium

    while logical communication between host A and host B takes place on logical link

    between two peer layers. Hosts A and B communicate using peer to peer protocol of

    corresponding layer.

  • 7/31/2019 Good Networking Concept

    10/37

    Figure 5: Communication between hosts

    If host A wants to send data to host B, the data must first be packaged through a

    process called encapsulation. (Figure 6).

    Encapsulation wraps data with the necessary protocol information before networktransit. Therefore, as the data packet moves down through the layers of the OSI

    model, it receives headers, trailers, and other information.

    Once the data is sent from the source, it travels through the application layer down

    through the other layers. The packaging and flow of the data that is exchanged goes

    through changes as the layers perform their services for end users.

    Network must perform the following five conversion steps in order to encapsulate

    data:

    1. Build the data As a user sends text file or an e-mail message,its alphanumeric characters are converted to data that cantravel across the network.

    2. Package the data for end-to-end transport The data ispackaged for transport over the network. By using segments,the transport function ensures that the hosts at both ends of thenetwork can reliably communicate.

  • 7/31/2019 Good Networking Concept

    11/37

    3. Add the network IP address to the header The data is putinto a packet or datagram that contains a packet header withsource and destination logical (IP) addresses. These addresseshelp network devices send the packets across the network alongthe best path.

    4. Add the data link layer header and trailer Each networkdevice have to put the packet into a frame. The frame allowsconnection to the next directly-connected network device on thelink. Each device in the chosen network path requires framing inorder for it to connect to the next device.

    5. Convert to bits for transmission The frame have to beconverted into a pattern of ones and zeros (bits) fortransmission on the physical medium. A clocking functionenables the devices to distinguish these bits as they travel

    across the medium. The medium can vary along the path used.For example, web page can originate on a server, cross acampus backbone, and go out a WAN link until it reaches itsdestination on a remote LAN.

    Figure 6: Encapsulation and Decapsulation

    As shown in the Figure 6. host B performs inverse process called decapsulation. First

    on physical layer it decodes bits and then each layer cuts its header and sends the data

    packet to the upper layer. In the end we have original data sent by host A. Each pair of

  • 7/31/2019 Good Networking Concept

    12/37

    adjacent layers communicate through interface. The interface defines which

    operations and services the lower layer makes available to the upper one.

    PDU (Protocol Data Unit) is information that is used by peer to peer protocol.

    SDU (Service Data Unit) is information that is sent through interface of pair of

    adjacent layers. (Figure 7)

    Figure 7: Data Unit and Header

    4.3 Bandwidth, Throughput and Delay

    Bandwidth (in digital systems) between two given nodes is the maximal amount of

    data per unit time that can be transmitted from one node to the other. Digital

    bandwidth is synonymous with bit rate and data rate.

    The actual bandwidth of a network is determined by a combination of the physical

    media and the technologies chosen for signaling and detecting network signals.Current information about the physics of unshielded twisted-pair (UTP) copper cable

    puts the theoretical bandwidth limit at over 1 Gbps. However, in practice the actual

    bandwidth is determined by the signaling methods, NICs, and other network

    equipment that is chosen. Therefore, the bandwidth is not determined solely by the

    limitations of the medium.

    Throughput defines how much useful data can be transmitted per unit time. It is

    equal to the bandwidth if there is no protocol. However, in most practical cases the

    throughput is less than the bandwidth for two reasons:

    protocol overhead: protocols use some bytes to transmitprotocol information. This reduces the throughput

    protocol waiting times: some protocols may force you to waitfor some event.

  • 7/31/2019 Good Networking Concept

    13/37

    Delay in data networks is generally the round trip delay (also called Round Trip Time

    - RTT) for a packet within the network. Network delay is composed of the following

    parts:

    Processing delay - time routers take to process the packet

    header. Queuing delay - time the packet sits in routing queues. Transmission delay - time it takes to push the packet's bits

    onto the link Propagation delay - the time taken by the front of a signal to

    reach the destination. Propagation of an electromagnetic signalis the speed of light (also called celerity). It depends on thewavelength and the medium in which the signal is propagating.For example propagation of signal in twisted pair is 0.66c wherec is speed of light.

    There is a certain minimum level of delay that will be experienced due to the time it

    takes to transmit a packet serially through a link. Onto this is added a more variable

    level of delay due to network congestion. Network delays can range from a few

    milliseconds to several hundred milliseconds.

    4.4 Network Math and Metric Units

    Computers can only understand and use data that is in this two-state or binary format.

    The ones and zeros are used to represent the two possible states of an electronic

    component in a computer. 1 is represented by an ON state, and 0 is represented by an

    OFF state. They are referred to as binary digits orbits. The word bit is a shortening of

    the words "Binary digIT".

    Bit is basic unit of (digital) information.

    A binary 0 might be represented by 0 volts and binary 1 might be represented by +5

    volts. Volt [V] is the standard unit of measurement for electrical potential. It defines

    the "force" of electricity.

    Bits and binary numbers are natural to computers and other digital devices. Humans

    use the decimal number system, which is relatively simple when compared to the long

    series of ones and zeros used by computers. So the binary numbers need to be

    converted to decimal numbers.

    Byte is a grouping of eight bits. In a computer, one byte represents a single

    addressable storage location.

  • 7/31/2019 Good Networking Concept

    14/37

    Base-10 Number System (Decimal Number System) - The easiest way to

    understand bits is to compare them to something we know: digits. A digit is a single

    place that can hold numerical values between 0 and 9. Digits are normally combined

    together in groups to create larger numbers. For example, 7 214 has four digits. It is

    understood that in the number 7 214, the 4 is filling the "1s place" while the 1 is

    filling the 10s place, the 2 is filling the 100s place and the 7 is filling the 1 000s place.

    We could express things this way if we wanted to be explicit:

    (7 * 1000) + (2 * 100) + (1 * 10) + (4 * 1) = 7000 + 200 + 10 + 4 = 7214

    Another way to express it would be to use powers of 10. So:

    (7 * 103) + (2 * 102) + (1 * 101) + (4 * 100) = 7000 + 200 + 10 + 4 = 7214

    What we can see from this expression is that each digit is a placeholder for the next

    higher power of 10, starting in the first digit with 10 raised to the power of zero.

    There is nothing that forces us to have 10 different values in a digit. Our base-10

    number system likely grew up because we have 10 fingers, but if we happened to

    evolve to have five fingers instead, we would probably have a base-5 number system.

    We can have base-n number systems, where n is number of digits used. In fact, there

    are lots of good reasons to use different bases in different situations.

    Base-2 Number System (Binary Number System) A binary number is composed

    of only ones and zeros, for example: 1101. How do we figure out what the value of

    the binary number 1101 is? We do it in the same way we did it above for 7 214 but weuse a base of 2 instead of a base of 10. So:

    1101(2) = (1 * 23) + (1 * 22) + (0 * 21) + (1 * 20) = 8 + 4 + 0 + 1 = 13 (10)

    We can see that in binary numbers, each bit holds the value of increasing powers of 2.

    That makes counting in binary pretty easy. Starting at zero and going through 16,

    counting in decimal and binary looks as shown in Table 1:

    Table 1: Binary Counting

    Decimal Number Binary Number

    0 0

    1 1

    2 10

  • 7/31/2019 Good Networking Concept

    15/37

    3 11

    4 100

    5 101

    6 110

    7 111

    8 1000

    9 1001

    10 1010

    11 1011

    12 1100

    13 1101

    14 1110

    15 1111

    16 10000

    etc.

    When we look at sequence shown in Table 1, 0 and 1 are the same for decimal and

    binary number systems. At the number 2, you see carrying first take place in the

    binary system. If a bit is 1 and you add 1 to it the bit becomes 0 and the next bit

    becomes 1. In the transition from 15 to 16 this effect rolls over through 4 bits, turning

    1111 into 10000.

    With one byte (8 bits), we can represent 256 values ranging from 0 to 255, as shown

    in Table 2:

    Table 2: 256 values with 8 bits

    Decimal Number 8-bit Binary Number

    0 00000000

    1 00000001

  • 7/31/2019 Good Networking Concept

    16/37

    2 00000010

    ...

    253 11111101

    254 11111110

    255 11111111

    Generally, with n bits we can represent 2n values ranging from 0 to 2n-1.

    Base-16 Number System (Hexadecimal Number System or Hex) - A number

    system with a base of 16. Written using the symbols 09 and AF, or af. Its primary

    purpose is to represent the binary code in a format easier for humans to read, and acts

    as a form of shorthand, in which one hexadecimal digit stands in place of four bits.For example, the decimal number 157, whose binary representation is 10011101 is 9D

    in hexadecimal. (9(16) =1001(2), D(16) = 1101(2))

    Logical Operations Now we will provide a brief explanation of the common

    logical operations AND, OR, NOT and XOR (eXclusive OR). Logical operations are

    performed between two bits (except for NOT operation). Bits can be either 1 or 0, and

    these operations are essential to performing network math operations.

    In the "truth tables" below the p and q are input bits.

    AND operation - The logical AND operation compares 2 bits and if they are both 1,

    then the result is 1, otherwise, the result is 0.

    Table 3: Logical AND operation

    p q p AND q

    0 0 0

    0 1 0

    1 0 0

    1 1 1

    OR operation - The logical OR operation compares 2 bits and if either or both bits are

    1, then the result is 1, otherwise, the result is 0.

  • 7/31/2019 Good Networking Concept

    17/37

    Table 4: Logical OR operation

    p q p OR q

    0 0 0

    0 1 1

    1 0 1

    1 1 1

    NOT operation - The logical NOT operation simply changes the value of a single bit.

    If it is a 1, the result is 0; if it is a 0, the result is 1. This operation is different in that

    instead of comparing two bits, it is acting on a single bit.

    Table 5: Logical NOT operation

    p NOT p

    0 1

    1 0

    XOR operation - The logical XOR (eXclusive OR) operation compares 2 bits and if

    exactly one of them is 1 (i.e. if they are different values), then the result is 1;

    otherwise (if the bits are the same) the result is 0

    Table 6: Logical XOR operation

    p q p XOR q

    0 0 0

    0 1 1

    1 0 1

    1 1 0

    Metric units For measuring memory, disk, file, and database sizes, in practice, the

    units have slightly different meanings then in SI system of units. Prefix kilo means

    210 (1024) rather than 103 (1000) because memories are always a power of two. Thus,

    a 1 KB memory contains 1024 bytes, not 1000 bytes. Similarly, a 1 MB memory

  • 7/31/2019 Good Networking Concept

    18/37

    contains 220 (1 048 576) bytes, a 1 GB memory contains 230 (1 073 741 824) bytes,

    and a 1 TB database contains 240 (1 099 511 627 776) bytes. However, a 1 kbps

    communication channel transmits 1000 bits per second and a 1 Gbps LAN runs at 1

    000 000 000 bits/s because speeds are not powers of two. Many people tend to mix up

    these two systems.

    We'll use the symbols KB, MB, and GB for 210, 220, and 230 bytes, respectively, and

    the symbols kbps, Mbps, and Gbps for 103, 106, and 109 bits/s, respectively.

    Table 7: Units of Data Storage

    Unit Definition Example

    Bit (b)Binary digit, 1

    or 0

    On / Off; Open / Closed;

    +5V / 0V

    Byte (B) 8 bitsRepresent the letter "E"

    as ASCII code

    Kilobyte

    (KB)

    1 KB = 1024

    BTypical Email = 2KB

    Megabyte(M

    B)

    1 MB =1024

    KB = 1 048

    576 B

    Floppy Disks = 1,44 MB;

    Typical song in MP3

    format = 5 MB

    Gigabyte(GB)

    1 GB = 1024

    MB = 1 073

    741 824 B

    Typical Hard Drive = 40GB or greater

    Terabyte

    (TB)

    1 TB = 1024

    GB = 1 099

    511 627 776

    B

    Database; Amount of

    data theoretically

    transmittable in optical

    fiber in one second

    5 Classification of Networks by Scale

    In Chapter 2 we discussed classification of networks by their topology. Another

    important criterion for classifying networks is their scale (physical size). As shown in

    Figure 8 there are:

    http://networking.layer-x.com/p020000-1.htmlhttp://networking.layer-x.com/p020000-1.html
  • 7/31/2019 Good Networking Concept

    19/37

    Personal Area Network (PAN)

    Local Area Network (LAN)

    Metropolitan Area Network (MAN)

    Wide Area Networks (WAN)

    Personal Area Network (PAN) - The interconnection of devices within the range ofan individual person, typically within a range of 10 meters. For example, a wireless

    network connecting a computer with its keyboard, mouse or printer is a PAN. Also, a

    PDA that controls the user's hearing aid or pacemaker fits in this category. Another

    example of PAN is a Bluetooth. Typically, this kind of network could also be

    interconnected without wires to the Internet or other networks.

    Local Area Network (LAN) - Privately-owned networks covering a small geographic

    area, like a home, office, building or group of buildings (e.g. campus). They are

    widely used to connect computers in company offices and factories to share resources

    (e.g., printers) and exchange information. LANs are restricted in size, which meansthat the worst-case transmission time is bounded and known in advance. Knowing this

    bound makes it possible to use certain kinds of designs that would not otherwise be

    possible. It also simplifies network management. Traditional LANs run at speeds of

    10 Mbps to 100 Mbps, have low delay (microseconds or nanoseconds), and make very

    few errors. Newer LANs operate at up to 10 Gbps.

    Metropolitan Area Network (MAN) - Covers a larger geographical area than is a

    LAN, ranging from several blocks of buildings to entire cities. MANs can also depend

    on communications channels of moderate-to-high data rates. A MAN might be owned

    and operated by a single organization, but it usually will be used by many individuals

    and organizations. MANs might also be owned and operated as public utilities. They

    will often provide means for internetworking of LANs. Metropolitan Area Networks

    can span up to 50km, devices used are modem and wire/cable.

    Wide Area Networks (WAN) - Computer network that covers a large geographical

    area, often a country or continent. (any network whose communications links cross

    metropolitan, regional, or national boundaries). Less formally, a network that uses

    routers and public communications links. Routers will be discussed later.

  • 7/31/2019 Good Networking Concept

    20/37

    Figure 8: Networks by Scale

    6 Networking Devices

    In addition to the hosts, LANs may use other devices to control physical access to the

    shared medium, extend the maximum reach of the LAN, switch traffic, and so on.

    Such hardware is in the form of NICs, repeaters, bridges, hubs, switches, routers, and

    gateways.

    A repeater is a network device used to regenerate a signal. It operates within the

    physical layer of the OSI reference model and regenerate analog or digital signals thatare distorted by transmission loss due to attenuation. A repeater does not make

    intelligent decision concerning forwarding packets. Repeater won't be disscused in

    detail.

    6.1 Network Interface Card (NIC)

    Network Interface Cards (NIC), also known as Network Interface Units (NIU) are

    chipsets on printed circuit boards that provide physical access from the node to the

    LAN medium. The NIC is responsible for fragmenting the data transmission and

    formatting the data packets with the necessary header and trailer. A standard IEEE

    NIC contains a unique, hard-coded logical address (MAC address), which it includes

    in the header of each data packet it transmits. The NIC typically has some amount of

    buffer memory, which enables it to absorb some number of bits transmitted by the

    associated device, form the packets, and hold them until such time as the network is

    available.

  • 7/31/2019 Good Networking Concept

    21/37

    In the context of the OSI Reference Model, NICs function at the Physical and Data

    Link layers. The NIC also may contain a microprocessor that can relieve the attached

    device of some routine computational functions.

    The NIC can take a number of forms, including a circuit board that fits into the

    expansion slot of a desktop PC, a PCMCIA card, or a stand-alone device.Transceivers (transmitter/receivers) are used in LANs to receive a carrier signal and

    then transmit it on its way. They are embedded in NICs.

    Figure 9: Fast Ethernet NIC

    6.2 Hub

    Hubs can be either active or passive. Passive hubs act simply as cable-connecting

    devices, while active hubs also serve as signal repeaters and are called "multiport

    repeaters". The first generation of hubs (1984) acted as LAN concentrators and

    repeaters, with a single internal collapsed backbone bus for connecting like LANs.

    The second generation accommodated multiple LAN architectures over separate ports,

    with rudimentary network management and configuration capabilities included as

    well.

    Multiple hubs can be interconnected with various media, depending on bandwidth

    requirements and distances involved.

  • 7/31/2019 Good Networking Concept

    22/37

    Hubs operate at the Physical Layer, with a hint of the Data Link Layer of the OSI

    Reference Model.

    Figure 10: 4-port Ethernet Hub

    6.3 Bridge

    Bridges are relatively simple devices that connect LANs of the same architecture (e.g.

    Ethernet to Ethernet). Bridges operate at the lower two layers of the OSI Reference

    Model, providing Physical Layer and Data Link Layer connectivity. A bridge, at the

    most basic level, acts simply to extend the physical reach of a LAN, passing traffic

    from one LAN segment to another based on the destination MAC address. In otherwords, bridges act as LAN repeaters where specified distance limitations are

    exceeded. Bridges have buffers so they can store and forward frames in the event that

    the destination link is congested with traffic. Two-port bridges are the most common

    configuration.

    A key advantage of bridges is their inherent simplicity. As protocol-dependent

    devices, they don't perform complex processes on the data frames traveling through

    them, neither do they attempt to evaluate the network as a whole to make end-to-end

    routing decisions. Bridges simply read the destination MAC address of the incoming

    frame and forward it along its way to the next link. Bridges can be cascaded, orconnected in series, link by link. As bridges are so simple, they are inexpensive and

    fast. Such bridges can support multiple LANs and LAN segments connected by

    multiple media.

    In contemporary networking a switch generally would be used instead of bridge.

  • 7/31/2019 Good Networking Concept

    23/37

    6.4 Switch

    Switches are network devices with basic frame store-and-forward capabilities that can

    support multiple simultaneous transmissions. Switches are also called "multiport

    bridges" (Figure 11) . Switches have the ability to read the target MAC addresses of

    the frames and forward them only to the appropriate port associated with the target

    device. Device may be directly attached to the switch, or may be connected to a hub

    that connects to the switch.

    Switches may use several methods of operation:

    Cut-Through: A cut-through switch quickly reads the MACaddress of the frame and quickly flows the frame through theswitching matrix bit by bit

    Store and Forward: A store-and-forward switch temporarilybuffers, or stores, the frame as it is presented to the incomingswitch port, examining the entire frame for errors through a CRCcheck before forwarding it through the switching matrix to theoutput port. While cut-through switching is faster and lessexpensive, it carries with it the risk of the propagation of erroreddata and the resulting potential for negative impact on overallthroughput, as errored frames ultimately have to beretransmitted. Store-and-forward switching generally ispreferred over cut-through switching.

    Fragment Free: A third, and less common, method isfragment-free switching, which is similar to cut-through exceptfor the fact that the switch stores the first 64 octets of the framebefore forwarding it. As most errors occur at the beginning of aframe, this approach eliminates the possibility that runt frames,that is, truncated frames, will be transmitted.

    Switches operate at the Physical and Data Link Layers of the OSI Reference Model

    Layers 1 and 2, respectively. Switches read the destination addresses of the frames,

    filtering and forwarding as appropriate, based on MAC addresses (Layer 2 address).

    Switches are fast and relatively inexpensive. Some switches make routing decisionsbased on IP addresses (Layer 3 address). Layer 3 switching involves a combination of

    switching and routing. This involves more complex routing decisions that are made in

    the context of the network as a whole yet not at the level of complexity that

    characterizes a router.

  • 7/31/2019 Good Networking Concept

    24/37

    A switch does a great deal to reduce congestion and in a number of ways. First, a

    switch can support multiple simultaneous transmissions. Second, switches serve to

    segment a network through filtering, as they forward traffic only to the port associated

    with the link to which the target device is connected. Thereby, that traffic does not

    contribute to congestion on other links or segments. Third, a switch can be equipped

    to buffer incoming frames until internal bus resources are available to process them. A

    switch also can be equipped to buffer outgoing frames until such time as the link to

    the next switch becomes available. Fourth, a switch can exercise a flow control

    mechanism, whereby it can advise a device to stop transmitting when its buffers are in

    danger of overflowing and then advise the device to resume transmission when the

    pressure on resources has been relieved. Fifth, store-and-forward and fragment-free

    switches variously eliminate or reduce the number of errored frames. Finally, a switch

    supports full-duplex transmission, thereby eliminating data collisions associated with

    CSMA in an Ethernet environment, assuming that the station is directly connected to

    the switch rather than through a hub. This approach is the current best practice.

    The cost of switches has dropped dramatically in recent years to the point that they

    often compete effectively against hubs. But switch costs are sensitive to factors such

    as the type and speed of the transmission media interfaces, the number and speed of

    the ports, the number and size of the buffers, the number and speed of the internal

    buses, the complexity of the internal switching matrix, and the complexity of the

    switching or routing logic.

    Figure 11: 48-port Fast Ethernet Cisco Switch

    6.5 Router

    Routers are highly intelligent network devices that can support connectivity between

    both like and disparate LANs and can provide access to various WANs, such asFrame Relay, IP and ISDN. (Figure 12)

    Routers typically operate at the bottom three layers of the OSI model using the

    Physical Layer, Data Link Layer, and Network Layer to provide connectivity,

    addressing, and switching. Routers also have the capability to operate at all seven

    layers of the OSI Reference Model, if so equipped.

  • 7/31/2019 Good Networking Concept

    25/37

    In addition to supporting filtering and encapsulation, routers route traffic based on a

    high level of intelligence that enables them to consider the network as a whole. This is

    in stark contrast to bridges, hubs, and switches, which view the network simply on a

    link-by-link basis. (Note: Layer 3 switches cross the line into the routing domain,

    although at a relatively simple level.) Routing considerations might include

    destination address, payload type, packet priority level, least-cost route, minimum

    route delay, minimum route distance, and route congestion level. Routers also are

    self-learning, as they can communicate their existence to other devices and can learn

    of the existence of new routers, nodes, and LAN segments. Routers constantly

    monitor the condition of the network as a whole, thereby dynamically adapting to

    changes in the condition of the network from edge to edge. Routers are multiport

    devices with high-speed ports running at rates up to 155 Mbps or more and with high-

    speed internal buses that can be on the order of 1 Gbps in the aggregate. Additionally,

    routers typically provide some level of redundancy so they are less susceptible to

    catastrophic failure.

    Routers are unique in their ability to route data based on programmable network

    policy. Policy-based routers can provide various levels of service based on factors

    such as the identification of the user, the terminal and the type of payload. From one

    edge of the network to the other, an edge router can select the most appropriate path

    through the various switches or routers positioned in the core. An important part of

    this process often is that of dividing the network into multiple subnets . Users

    associated with a subnet may be afforded access to only a limited subset of network

    resources in the form of sites, links, hosts, files, databases, and applications. In

    addition to being limited in terms of access to such a resource, users of another subnetmay be prevented from receiving data from it. In effect, even the very existence of

    those resources is masked from view. Creation of such isolated subnets may serve for

    reasons of security or simply as a means of avoiding unnecessary congestion.

    Routers are available that sense a network failure and reestablish the connection via

    an alternate means, which may include a totally different network and service.

    Figure 12: Cisco Router

  • 7/31/2019 Good Networking Concept

    26/37

    6.6 Gateway

    Gateways can perform all of the functions of switches and routers as well as

    accomplish protocol conversion at all seven layers of the OSI Reference Model. (As

    shown in Figure 13). Generally consisting of software residing in a host computer

    equivalent in processing power to a midrange or mainframe, gateway technology is

    expensive but highly functional.

    Protocol conversion, rather than encapsulation, can serve to fully convert from

    Ethernet to Token Ring or any other standard or proprietary protocol. Additionally,

    protocol conversion can address higher layers of the OSI model, perhaps through

    Layer 7, the Application Layer. As the process of protocol conversion is complex,

    gateways tend to operate rather slowly as compared to switches and routers. As a

    result, they impose additional latency on packet traffic and may create bottlenecks of

    congestion during periods of peak usage. In a large and complex network routers tend

    to be positioned at the edges of the network where they can be used to full advantage.

    Therefore, they make complex and time-consuming decisions and invoke complex

    and time-consuming processes only where required. Switches tend to be positioned

    within the core of the network because they can operate with greater speed.

    Figure 13: Networking devices and OSI model

    Now we can conclude that switch creates separate collision domains and router

    creates separate broadcast domains. All ports of hub are one collision domain.

  • 7/31/2019 Good Networking Concept

    27/37

    A collision domain is defined as a single CSMA/CD network segment in which there

    will be a collision if two computers attached to the system both transmit at the same

    time.

    A broadcast domain is a logical division of a computer network, in which all nodes

    can reach each other by broadcast at the data link layer. (Figure 14)

    Figure 14: Collision Domain and Broadcast Domain

    7 The Physical Layer

    In this chapter we will look at the lowest layer of the OSI model - the physical layer.

    It defines connector and interface specifications, as well as the medium (cable)

    requirements. Its purpose is to transport a raw bit stream from one host to another.

  • 7/31/2019 Good Networking Concept

    28/37

    Electrical, mechanical, functional, and procedural specifications are provided for

    sending a bit stream on a computer network.

    We will cover two kinds of transmission media: guided (copper wire and fiber optics)

    and wireless (terrestrial radio).

    7.1 Twisted Pair

    One of the oldest and still most common transmission media is twisted pair. As shown

    in Figure 15 a twisted pair consists of two insulated copper wires, typically about 1

    mm thick. The wires are twisted together in a helical form. Twisting is done because

    two parallel wires constitute a fine antenna. When the wires are twisted, the waves

    from different twists cancel out, so the wire radiates less effectively.

    Twisted pairs can be used for transmitting either analog or digital signals. The

    bandwidth depends on the thickness of the wire and the distance traveled, but severalMb/s can be achieved for a few kilometers in many cases. The frequency range of

    twisted-pair cables is approximately 0 to 1 MHz. Due to their adequate properties and

    low cost, twisted pairs are widely used and are likely to remain so for years to come.

    Twisted pair cables are often shielded in attempt to prevent electromagnetic

    interference. Because the shielding is made of metal, it may also serve as a ground.

    However, usually a shielded or a screened twisted pair cable has a special grounding

    wire added called a drain wire. This shielding can be applied to individual pairs, or to

    the collection of pairs. When shielding is applied to the collection of pairs, this is

    referred to as screening. The shielding must be grounded for the shielding to work. Incontrast to FTP (foiled twisted pair) and STP (shielded twisted pair) cabling, UTP

    (unshielded twisted pair) cable is not surrounded by any shielding. It is the primary

    wire type for telephone usage and computer networking, especially as patch cables.

    UTP comes in several varieties:

    Category 3: Was the earliest successful implementation of UTP.Its primarily used for voice and lower-speed data applications.Its rated for a maximum of 10 Mbps.

    Category 4: Never achieved the popularity of Cat 3 or Cat 5.Its primarily used for voice and lower-speed data at a maximumof 16 Mbps.

    Category 5: As Fast Ethernet became a standard, Cat 5became the basis for most high-speed data implementations.Cat 5 runs at a maximum of 100 Mbps.

    Category 5e: With the need for higher speeds, Gigabit Ethernethas become the new replacement for Fast Ethernet. To make it

  • 7/31/2019 Good Networking Concept

    29/37

    work, Cat 5e extends the life of Cat 5 cable. It can run at amaximum of 1,000 Mbps.

    Category 6: Cat 5e can run at gigabit speeds, but with 10-Gigabit Ethernet on the horizon, Cat 5e has stretched the Cat 5standard to its limits. Cat 6 can currently run at 1,000 Mbps (1Gbps). The Category 6 specification was released for publicationvery recently, however as designed, Category 6 cabling will beable to support speeds up to at least 10 Gbps.

    Nowdays Cat 5e and Cat 6 should be used.

    Figure 15: UTP pairs (cable)

    UTP connector - The standard connector for UTP cabling is an RJ-45 connector.

    This is a plastic connector that looks like a large telephone-style connector (see Figure

    16). A slot allows the RJ-45 to be inserted only one way. RJ stands for Registered

    Jack.

    Figure 16: RJ-45

    connector

  • 7/31/2019 Good Networking Concept

    30/37

    7.2 UTP Cable Termination Standards EIA/TIA 568A and EIA/TIA

    568B

    In 1985 many companies from the telecommunications industry, becoming concerned

    about the lack of a third party premises cabling standard and their governing body the

    CCIA (Computer Communications Industry Association) requested that the EIA

    (Electronics Industry Association) develop this standard.

    The first draft of the standard wasnt released until July of 1991 this was given the

    name EIA/TIA-568. The new standard provided backward compatibility for phones

    that used two pairs instead of just one enabling them to operate on pairs 1 and 2. Later

    in 1991 a Technical Systems Bulletin (TSB-36) was released with references to

    category 4 and 5 cables. Twelve months later TSB-40 was published addressing

    higher speed UTP for hardware connecting, this was revised in January of 1994 to

    include RJ-45 modular jacks and fly leads. At this time EIA/TIA-568 was also revisedand renamed EIA/TIA 568A, the existing AT&T standard 258A was included and

    referred to as EIA/TIA 568B. As both these standards were popular and widely used

    they were both adopted into the International Standards titled Generic Cabling for

    Customer Premises Cabling (ISO/IEC 11801:1995).

    By looking at the specifications shown in Figure 17 we see that the only difference is

    that the green and orange pairs are terminated to different pins, there is no difference

    as to what signal is used on what pin, only what colour wire is terminated onto it.

    Technically the standards are the same, they operate in the same manner and neither

    one is technically superior to another when used in Ethernet applications.

  • 7/31/2019 Good Networking Concept

    31/37

    Figure 17: EIA/TIA 568A and 568B

    7.3 Types of Cables and Connecting a Networking Devices

    Straight-Through Cable - Four-pair, eight-wire, straight-through cable, which meansthat the color of wire on Pin 1 on one end of the cable is the same as that of Pin 1 on

    the other end. Pin 2 is the same as Pin 2, and so on. The cable is wired to either

    EIA/TIA T568B or T568A standards for 10BASE-T Ethernet, which determines what

    color wire is on each pin.

    Crossover Cable - A crossover cable means that the second and third pairs on one

    end of the cable will be reversed on the other end. The pin-outs are T568A on one end

    and T568B on the other end. All 8 conductors (wires) should be terminated with RJ-

    45 modular connectors. Crossover cable conforms to the structured cabling standards.

    If the crossover cable is used between switches, it's considered to be part of the"vertical" cabling. Vertical cabling is also called backbone cabling. A crossover cable

    can be used as a backbone cable to connect two or more switches in a LAN, or to

    connect two isolated hosts to create a mini-LAN. This will allow the connection of

    two hosts or a server and a host without the need for a hub between them. This can be

    very helpful for testing and training. To connect more than two hosts, a switch is

    needed.

    Rollover Cable - A 4-pair "rollover" cable. This type of cable is typically 3.05 m long

    but can be as long as 7.62 m. A rollover cable can be used to connect a host or dumb

    terminal to the console port on the back of a router or switch. Both ends of the cablehave RJ-45 connectors on them. One end plugs directly into the RJ-45 console

    management port on the back of the router or switch. Plug the other end into an RJ-

    45-to-DB9 terminal adapter. This adapter converts the RJ-45 to a 9-pin female D

    connector for attachment to the PC or dumb terminal serial (COM) port. A DB25

    terminal adapter is also available to connect with a PC or dumb terminal. This adapter

    uses a 25 pin connector. Figure 18 shows a rollover console cable kit.

  • 7/31/2019 Good Networking Concept

    32/37

    Figure 18: Rollover Console Cable Kit

    Cable is called a rollover because the pins on one end are all reversed on the other end

    as though one end of the cable was rotated or rolled over. Figure 19 shows how to

    connect networking devices.

  • 7/31/2019 Good Networking Concept

    33/37

    Figure 19: Connecting a Networking Devices

    7.4 Fiber Optics

    An optical transmission system has three key components: the light source, thetransmission medium, and the detector. Conventionally, a pulse of light indicates a 1

    bit and the absence of light indicates a 0 bit. The transmission medium is an ultra-thin

    fiber of glass or plastic. The detector generates an electrical pulse when light falls on

    it. By attaching a light source to one end of an optical fiber and a detector to the other,

    we have a unidirectional data transmission system that accepts an electrical signal,

    converts and transmits it by light pulses, and then reconverts the output to an electrical

    signal at the receiving end. Higher bandwidth links can be achieved using optical

    fibers. One of the best substances used to make optical fibers is ultrapure fused silica.

    These fibers are more expensive than regular glass fibers. Plastic fibers are normally

    used for short-distance links where higher losses are tolerable.

    Optical fiber links are used in all types of networks, LAN and WAN. The frequency

    range of fiber optics is approximately 180 THz to 330 THz. There are two types of

    fiber optics cables:

    Multimode fiber

  • 7/31/2019 Good Networking Concept

    34/37

    Single-mode fiber

    Multimode fiber - Light rays can only enter the core if their angle is inside the

    numerical aperture of the fiber. Once the rays have entered the core of the fiber, there

    are a limited number of optical paths that a light ray can follow through the fiber.

    These optical paths are called modes. If the diameter of the core of the fiber is largeenough so that there are many paths that light can take through the fiber, the fiber is

    called "multimode" fiber. Single-mode fiber has a much smaller core that only allows

    light rays to travel along one mode inside the fiber.

    Fiber-optic cable used for networking consists of two glass fibers encased in separate

    sheaths. One fiber carries transmitted data from host A to host B. The second fiber

    carries data from host B to host A. The fibers are similar to two one-way streets going

    in opposite directions. This provides a full-duplex communication link. Fiber-optic

    circuits use one fiber strand to transmit and one to receive. Typically, these two fiber

    cables will be in a single outer jacket until they reach the point at which connectors

    are attached.

    Until the connectors are attached, there is no need for shielding, because no light

    escapes when it is inside a fiber. There are no crosstalk issues with fiber. It is very

    common to see multiple fiber pairs encased in the same cable. One cable can contain 2

    to 48 or more separate fibers. Fiber can carry many more bits per second and carry

    them farther than UTP can.

    Usually, five parts make up each fiber-optic cable. The parts are the core, the

    cladding, a buffer, a strength material, and an outer jacket.

    The core is the light transmission element at the center of the optical fiber. All the

    light signals travel through the core. A core is typically glass made from a

    combination of silicon dioxide and other elements. Multimode uses a type of glass,

    called graded index glass for its core. This glass has a lower index of refraction

    towards the outer edge of the core. The outer area of the core is less optically dense

    than the center and light can go faster in the outer part of the core. This design is used

    because a light ray following a mode that goes straight down the center of the core

    does not have as far to travel as a ray following a mode that bounces around in the

    fiber. All rays should arrive at the end of the fiber together. Then the receiver at the

    end of the fiber receives a strong flash of light rather than a long, dim pulse.

    Surrounding the core is the cladding. Cladding is also made of silica but with a lower

    index of refraction than the core. Light rays traveling through the fiber core reflect off

    this core-to-cladding interface as they move through the fiber by total reflection.

    Standard multimode fiber-optic cable is the most common type of fiber-optic cable

  • 7/31/2019 Good Networking Concept

    35/37

    used in LANs. A standard multimode fiber-optic cable uses an optical fiber with either

    a 62.5 or a 50m core and a 125m diameter cladding. This is commonly designated

    as 62.5/125 or 50/125 micron optical fiber.

    Surrounding the cladding is a buffer material that is usually plastic. The buffer

    material helps shield the core and cladding from damage. There are two basic cabledesigns. They are the loose-tube and the tight-buffered cable designs. Most of the

    fiber used in LANs is tight-buffered multimode cable. Tight-buffered cables have the

    buffering material that surrounds the cladding in direct contact with the cladding. The

    most practical difference between the two designs is the applications for which they

    are used. Loose-tube cable is primarily used for outside-building installations, while

    tight-buffered cable is used inside buildings. The strength material surrounds the

    buffer, preventing the fiber cable from being stretched when installers pull it. The

    material used is often Kevlar, the same material used to produce bulletproof vests.

    The final element is the outer jacket. The outer jacket surrounds the cable to protectthe fiber against abrasion, solvents, and other contaminants. The color of the outer

    jacket of multimode fiber is usually orange.

    Infrared Light Emitting Diodes (LEDs) types of light source usually used with

    multimode fiber. LEDs are cheap to build and require somewhat less safety concerns

    than lasers. However, LEDs cannot transmit light over cable as far as the lasers.

    Multimode fiber (62.5/125) can carry data distances of up to 2 km.

    Single-mode fiber - Consists of the same parts as multimode. The outer jacket of

    single-mode fiber is usually yellow. The major difference between multimode andsingle-mode fiber is that single-mode allows only one mode of light to propagate

    through the smaller, fiber-optic core. The single-mode core is eight to ten m in

    diameter. Nine-micron cores are the most common. A 9/125 marking on the jacket of

    the single-mode fiber indicates that the core fiber has a diameter of 9 microns and the

    surrounding cladding is 125 m in diameter.

    An infrared laser is used as the light source in single-mode fiber. The ray of light it

    generates enters the core at a 90-degree angle. The data carrying light ray pulses in

    single-mode fiber are essentially transmitted in a straight line right down the middle

    of the core. This greatly increases both the speed and the distance that data can be

    transmitted.

    Single-mode fiber is capable of higher bandwidth and greater cable run distances than

    multimode fiber. Single-mode fiber can carry LAN data up to 3 km. Although this

    distance is considered a standard, newer technologies have increased this distance.

    Multimode is only capable of carrying up to 2 km. Lasers and single-mode fibers are

  • 7/31/2019 Good Networking Concept

    36/37

    more expensive than LEDs and multimode fiber. Because of these characteristics,

    single-mode fiber is often used for inter-building connectivity. Multimode and single-

    mode fibers are shown in Figure 20.

    Warming: The laser light used with single-mode has a longer wavelength than can be

    seen. The laser can seriously damage eyes. Do not look at the near end of a fiberthat is connected to a device at the far end. Do not look into the transmit port on a

    NIC, switch, or router. Remember to keep protective covers over the ends of fiber and

    inserted into the fiber-optic ports of switches and routers. Be very careful!

    Figure 20: Multimode and Single-mode Fiber

    7.5 Wireless Links and Transmission

    Nowdays there are people who need to be on-line all the time. For these mobile users,

    twisted pair and fiber optics are of no use. They need to get data for their laptop or

    wristwatch computers without being tethered to the terrestrial communication

    infrastructure. For these users, wireless communication is the answer. Computer

    networks can take advantage of the wireless infrastructure where physical wirescannot be laid out.

    Some people believe that the future holds only two kinds of communication: fiber and

    wireless. All nonmobile computers, telephones, printers, and so on will use fiber, and

    all mobile ones will use wireless.

  • 7/31/2019 Good Networking Concept

    37/37

    One of the key challenges in wireless networking is the efficient utilization of the

    available transmission spectrum. Because the frequency spectrum available for

    wireless communication is limited, frequencies must be reused within the same

    geographic area. The spectrum used for wireless communications typically ranges up

    to several GHz. Security is also a concern in wireless networks. The open-air interface

    makes it difficult to prevent snooping.

    The link-level design techniques involve making trade-offs among the various

    parameters relevant to the link layer. The optimum design would involve the use of

    minimum bandwidth and transmit power while maintaining a high data rate, low

    latency, and low bit error rates (BER). These design challenges must be achieved in

    the presence of channel imperfections, such as interference.

    Wireless links use devices as an antenna for transmitting signals through vacuum,

    space, air, or substances. Electromagnetic waves can be propagated through the first

    three, as well as through water and wood. The frequency range depends on the type ofsubstance.

    Radio waves are easy to generate, can travel long distances, and can penetrate

    buildings easily, so they are widely used for communication, both indoors and

    outdoors. Radio waves are omnidirectional, meaning that they travel in all directions

    from the source, so the transmitter and receiver don't have to be carefully aligned

    physically.

    The properties of radio waves are frequency dependent. At low frequencies, radio

    waves pass through obstacles well, but the power falls off sharply with distance fromthe source, roughly as 1/r2 in air. At high frequencies, radio waves tend to travel in

    straight lines and bounce off obstacles. They are also absorbed by rain. At all

    frequencies, radio waves are subject to interference from motors electrical equipment.

    Due to radio's ability to travel long distances, interference between users is a problem.

    For this reason governments tightly license the use of radio transmitters.