CS 55 - Local Area Networks
CS 55 - Local Area Networks
CS 55 - Local Area Networks
CS 55 Computer Networks
Topic 5
1-1
Hardware
LAN Media Topologies and Media Access Control LAN Hardware
Software
LAN System Software Client/Server Architecture
1-2
1-8
1-9
Section Preview
In this section we will study:
The requirements for communication What constitutes a network The various types of networks in common use today The OSI Reference Model Some of the basic terminology of data communications and networks
1-10
1-11
Security
Sensitive data like your credit card number or other secret data should be safeguarded during transmission. The most common mechanism for protecting data during transmission is encryption.
Encryption transforms plain text into an (presumably) undecipherable form called cipher-text.
1-13
Network of Computers
two or more nodes connected by a data communications medium. individual nodes may have terminals attached to them a single node on this network can look just like the terminal network
1-14
Local Area Network (LAN) Metropolitan Area Network (MAN) Wide Area Network (WAN)
1-15
LAN/MAN/WAN Comparison
LAN Distance
Limitedtypically up to 2,500 meters or 2 miles
Hightypically in excess of 10 Mbps 10,100 and 1,000 are standard Locally owned twisted-pair wires, fiber optic cable, wireless (not satellite)
MAN
Limitedtypically up to 200 kilometers or 100 miles
Hightypically 100 Mbps
WAN
Unlimited
Speed
Media
Locally owned and common carrier twisted-pair wires, fiber optic cable
Locally owned and common carrier twisted-pair wires, coaxial cable, fiber optic cable, wireless to include satellite Can be any, but most are desktop computers
Nodes
1-16
1-17
Transport
Network Data Link Physical
Logical Path
Transport
Network Data Link Physical
Physical Path
1-18
1-19
Presentation Layer
The presentation layer is responsible for translating from one format to another.
Session Layer
The session layers major functions are to set up and perhaps monitor a set of dialogue rules by which the two applications can communicate and to bring a session to an orderly conclusion.
1-20
Network Layer
The network layer provides accounting and routing functions.
Physical Layer
The physical layer does not append anything to the message. It simply accepts the message from the data link layer and translates the bits into signals on the medium.
1-21
1-23
1-24
1-25
1-27
1-28
1-30
1-31
1-32
Section Preview
In this section we will study:
Reasons organizations use networks Popular network applications Distinguishing features of LANs Situations in which a LAN can be useful Added management responsibilities when using a LAN LAN selection criteria
1-33
Communication
We use data communications networks for communications, but the objects that are communicating are not always people. A person-to-person communication may be an electronic conversation with the two parties exchanging messages in real time. An application-to-application dialogue may be the transfer of a file from one node to another.
1-34
Downsizing
In some companies, LANs have been used to downsize the data processing hardware, software, and personnel requirements.
1-36
1-37
Spreadsheets
Using spreadsheets on a LAN, users can easily share templates, and multiple users can access, modify, and print completed spreadsheets. A LAN can provide the setting for widespread sharing. At the same time, the LAN can also provide protection against unauthorized changes to spreadsheets.
1-38
Database Management
A database management system (DBMS) gives you the ability to define, use, and manage data. With LA-oriented databases, users share the database. This reduces the amount of redundant data storage that occurs when individuals maintain their own databases on stand-alone systems.
Presentation Services
Graphics hardware and software can be rather expensive. A LAN allows these expensive resources to be shared, providing a costeffective way of distributing graphics capabilities.
1-39
Electronic Mail
Todays e-mail systems allow correspondents to exchange communications containing text, graphics, and voice images in batch or real-time mode. For many companies, e-mail has become a primary mode of communications.
1-42
LAN Characteristics
Transparent Use Mixed Hardware and Software Limited Geographical Area High Speed Resource Sharing LAN Media Communication Protocols Local Ownership
1-43
Number of Workstations
Each LAN is physically capable of supporting some maximum number of workstations. If you exceed that maximum number, you must make some provision for extending the maximum number.
Type of Workstations
The LAN hardware and software must be compatible with the workstation used and their operating systems.
1-44
Type of Use
Many concurrent users may increase the LAN workload.
1-45
Speed
It is important that you select a LAN capable of meeting your performance goals. Common LAN speeds available for microcomputers are 4, 10, 16, 100, and 1,000 Mbps, and the trend is for increasing speeds.
Applications
If an application uses an interface not supported by a particular LAN, then the application probably will not work on that network. Moreover some software is not LAN compatible.
1-46
Device connectivity
Some organizations need to attach special devices to the LAN, for example, a plotter or scanner. LAN interfaces for such devices may not be available on some LANs or on some LAN file servers.
Manageability
During the selection process, you must ensure that your LAN will have the necessary management tools or that third-party tools are available. Third-party tools are those written by someone other than the LAN vendor.
1-48
Security
Data in a LAN is shared. Sharing should not, however, imply that all users should have unlimited access to all data. The LAN software must have the ability to control access to data.
1-49
Recurring Costs
1-50
Diagnose problems
Carry out recovery as necessary Educate users Plan capacity needs Monitor the network for problems and to gather statistics for capacity planning
1-51
1-52
Section Preview
In this section we will study:
What makes up a LAN system Several of the Leading LAN media Characteristics of LAN media Error sources, detection, and correction
1-53
1-54
Wireless Media
uses radio waves of different frequencies or infrared light broadcast through space does not need a wire or cable conductor to transmit signals
1-56
Conducted Media
Twisted-Pair Wires
Twisted-pair wires are classified in several ways by American wire gauge (AWG) rating by shielding, either unshielded twisted-pair (UTP) or shielded twisted-pair (STP) by categories that define the wires rated acceptable speed and error characteristics
AWG Rating
The AWG rating is a measure of the thickness of the copper conductor in the cable. The higher the AWG rating, the smaller the diameter of the wire. Twisted-pair wiring for LANs have an AWG rating of 22-26.
1-57
1 Mbps
Telephones
2
3 4
4 Mbps
10 Mbps 16 Mbps
1.5
2 3
Ethernet, fast ethernet, and gigabit ethernet LANs, CDDI LANs and asynchronous transfer mode (ATM)
1-59
Coaxial Cable
Most early microcomputer-based LAN implementations used coaxial cable as the medium. Coaxial cable comes packaged in a variety of ways, but essentially it consists of one or two central data transmission wires surrounded by an insulating layer, a shielding layer, and an outer jacket. Coaxial cable is most commonly used in two types of LANs, ethernet and ARCNET.
1-60
Outer Insulation
Mesh Shielding
Insulation
Conductor
1-61
1-62
Plastic Covering
Glass Cladding
Glass Conductor
1-63
Wireless Media
Broadcast Radio
When broadcast radio is used with local area networks, cables connecting each microcomputer are eliminated.
Microwave Radio
For networks where installation of conducted media is difficult or too expensive, microwaves provide a highspeed medium alternative.
1-65
1016 1015 1014 1013 1012 1011 1010 109 108 107 106 105 104 103 102 101
X rays, gamma rays Ultraviolet light Visible light Infrared light Millimeter waves Microwaves UHF television VHF television VHF TV (high band) FM radio VHF TV (low band) Short-wave radio AM radio
1-66
1-67
Speed
Response time Aggregate data rate
Expandability
Some LAN media, for example, coaxial cable, are easier to expand than others, for example, fiber optic cables.
1-68
Security
Although most of the hacker incidents reported relate to wide area networks, similar concerns occur on LANs.
Distance
Before deploying a medium, LAN designers need to determine the distances that need to be covered and ensure that the wiring configuration or wireless configuration does not exceed the distance limitations of the technology being used.
1-69
Application
In some applications, the characteristics of the required equipment may dictate the type of medium and interfaces to be used.
1-70
Error Characteristics
Less capable than other conducted media Better than unshielded; less capable than fiber optic or coaxial cables Good; less capable than fiber optic cable
Excellent
Subject to interference Good Subject to interference Objects can block transmission
1-71
Error Sources
White Noise
White noise, also referred to as thermal noise and Gaussian noise, result from the normal movements of electrons and is present in al transmission media at temperatures above absolute zero.
Impulse Noise
In LANs, it can be caused by lightning striking the medium, by jarring loose connections, or by transient electrical impulses such as those occurring on a shop floor.
Crosstalk
Crosstalk occurs when signals from one channel distort or interfere with the signals of a different channel.
1-72
Attenuation
Attenuation is the weakening of a signal as a result of distance and characteristics of the medium.
1-73
Error Detection
Parity Check
A parity check (also known as vertical redundancy check [VRC]) involves adding a bitknown as the parity bitto each character during transmission.
Error Correction
Message Acknowledgment
The mechanism used to effect retransmission is the positive or negative acknowledgment, often referred to as ACK and NAK, respectively.
Retry Limit
To cut down on continual retransmission of messages, a retry limittypically between 3 and 100can be set. A retry limit of five means that a message received in error will be retransmitted five times; if it is not successfully received by the fifth try, the receiving station either disables the link or disables the sending station itself.
1-76
1-77
Section Preview
In this section we will study:
LAN topologies Media access control protocols Common ways in which topologies and media access control protocols are combined LAN standards Strengths and weaknesses of different LAN configurations
1-78
LAN Topologies
The term topology derives from a mathematics field that deals with points and surfaces in spacethat is, with the layout of objects in space. The LAN topology is the physical layout of the network. LANs have three basic topologies: ring, bus, and star.
1-79
Ring Topology
Data Flow
1-80
Bus Topology
1-81
Star Topology
Wiring Hub
1-82
Delineation of Data
A data link protocol must define or delineate where the data portion of the transmitted message begins and ends. This can be accomplished in two basic ways: by framing the data with certain control characters or by using a standard message format wherein data is identified by its position within the message.
1-84
Addressing
Communication between two network nodes is accomplished through an addressing scheme. Networks use a hierarchical addressing scheme, with the hierarchy being application, network node, and network.
1-85
Code Independence
Code independence means that any data code, such as ASCII or EBCDIC, can be transmitted.
1-86
MAC Protocols
LAN technology adheres to two primary MAC protocols: token passing and contention. Contention
In a pure contention MAC protocol, each network node has equal access to the medium. Variations of this protocol exist, some of which allow for node priorities.
Token Passing
Token passing is used on both bus and ring topologies. Token passing is a round-robin protocol in which each node gets an equal opportunity to transmit. With token passing, the right to transmit is granted by a token that is passed from one node to another.
1-87
LAN Standards
Standards exist covering most aspects of LAN technology Implementing according to established standards generally results in the availability of components from multiple vendors, competition among vendors, and lower prices. The organizations most active in setting standards for LAN topologies and MAC protocols are the IEEE and ANSI.
1-88
IEEE Standards
The 802 Committee established by the IEEE is divided into subcommittees, each of which addresses specific LAN issues and architecture.
High-Level Interface Logical Link Control CSMA/CD Token Bus Token Ring MANs Broadband Technical Advisory Group Fiber Optic Technical Advisory Group Integrated Data and Voice Networks LAN Security Wireless LANs Demand Priority Access Method Data Transport over Cable TV Short-Distance Wireless Networks Broadband Wireless Access
1-89
Network Layer
Data Link Layer Physical Layer OSI Reference Model Layers
1-90
Bus B, Unidirectional
1-91
240
Frequency (Nhz) 200 160 120 80 Voice or Data Channel 40 0 Low-Speed Data Channel High-Speed Data Channel
1-92
CSMA/CD
Equal access for all nodes.
Access window can be unpredictable. Maximum wait time to transmit is unpredictable and depends on collisions Average wit time to transmit is unpredictable. Network congestion may cause collisions and reduce network efficiency. A node may be able to transmit immediately. One node may be able to monopolize the network. A node can transmit when the network is quiet. Unpredictable performance for large, busy networks due to possibility of collisions.
1-93
1-94
1-95
LAN Hardware
1-96
Section Preview
In this section we will study:
Servers Backup devices Workstation hardware LAN adapters Printers Miscellaneous hardware
1-97
Server Platforms
File Services
File Servers A file server allows users to share files. Only one copy of application software like word processing, spreadsheet, or database must reside on a file server. Individual clients share these applications. Database Servers The database server was developed to solve problems like passing an entire file over the medium. The most common example of a database server is the SQL server. Structured query language (SQL) is a standard database definition, access, and update language for relational databases.
1-98
1-99
Client Spooler
Print Monitor
Router
1-100
Compatibility
The server platform you choose must be compatible with the topology, MAC protocol, applications, and system software on the network.
1-103
1-104
Backup Devices
Floppy Diskette Drives
The major disadvantages of this backup method is the low capacity and speed of the backup media.
Hard-Disk Drives
The arguments for and against this alternative are much the same as those for diskettes. The major difference is that the capacity of harddisk drives is greater than that of diskettes.
1-105
1-106
1-107
Backup Functions
Back up all files Incremental backup
Differential backup
Back up all files modified since a particular date Back up by directory Back up automatically by time or calendar Back up all but a list of files to be excluded Start backup from workstation or server
1-108
Workstations
Diskless Workstations
A diskless workstation does not have any local disk drives. Instead, a diskless workstation has its boot logic in a read-only memory (ROM) chip located on the LAN adapter. Because diskless workstations have no disk drives, they are inherently less expensive than those with disks.
LAN Adapters
If you have chosen an architecture, medium, and media access control protocol, you have narrowed the options for LAN adapters, also known as a network interface card (NIC). LAN adapters provide the connection between the medium and the bus of the workstation or server. LAN adapters are designed to support a specific protocol using a specific medium, although a few can support two or three different medium types.
1-110
Printers
One major factor that affects the success of a LAN is printer support. Some LANs have restrictions regarding the distribution of printers and the number of printers that can be supported by one server. A printer driver is a software module that determines how to format data for proper printing on a specific type of printer. The printers you intend to use must be supported by the software drivers provided by the LAN operating system or printer vendor.
1-111
Making Connections
The objective of network connectionthat is, connecting a computer to the LAN mediumis to provide a data path between the medium and the computers memory. The interface or connection to the medium is called the communications interface unit (CIU), and the interface or connection to the computers bus is called the bus interface unit (BIU).
1-113
1-114
Ethernet Controller
Encoder/ Decoder
RAM
Cable
1-115
Software Introduction
1-116
Section Preview
In this section we will study:
The distinction between the different classes of software The generic requirements of workstation software The generic requirements of server software Software requirements for shared access How software can be protected on a LAN Some of the standards covering LAN software The need for and general provisions of software license agreements
1-117
Classes of Software
Application Software Operating System Software
Memory management The OS manages memory and allocates it among itself and the requesting processes according to a memory management scheme adopted by the OS designers File management The OS provides the ability to organize bits into files, files into directories, and so on User interface Creating user environments is an OS function I/O interfaces The OS and file management system translate the request to access a file into an address the disk can act on
1-118
Database Management
A database management system (DBS) extends the OS file management capabilities. A DBMS provides software that allows the user or database administrator to: Define records, files, and file relationships Access, update, and delete data in the database Set up security Establish, maintain, and use a data dictionary Use host language interfaces that allow the database to be manipulated by standard programming languages
1-120
Development Software
Development software includes text editors, text formatters, compilers, interpreters, link editors, cross-reference programs, testing utilities, and related programs and utilities
Network Redirector
Disk Drive
Operating System
LAN Medium
1-123
Network Request
LAN Medium
1-124
Database Read Write to Printer Download Application Database Read Write to Printer Write to Printer
1-125
1-126
A Contention Problem
Karen's Application
Record A
Juan issues a read request for Record A
Record A
Juan's Application
Read Record A
Database
Pending Request
1-127
Shared, update
Shared, read-only
Denied
Denied
Granted
Granted
Granted
Granted
1-128
Application 1 reads Record A with lock Application 2 issues a read request to Record A Record A is locked by Application 1, so Application 2 must wait
Record A
Record A
Application 2
Read Record A
Database
Pending Request
1-129
Deadlock Situation
Application 1 has read and locked Record A
Application 1
Application 2 has read and locked Record B Application 1 is waiting for Application 2 to release Record B Application 2 is waiting for Application 1 to release Record A Application 1 and 2 are deadlocked and will wait forever
Record A
Application 2
Record B
Database
Pending Request
1-130
Software Standards
Most of the LANs in operation today are called open networks, meaning that they adhere to a set of standards formulated by organizations such as ISO, ANSI, IEEE, and EIA. These standards are placed in the public domain and are called open standards.
1-131
Software Protection
Software is protected in seven basic ways:
The code is kept secret so other software houses cannot use special algorithms developed by the company to write a competing system. The code is copyrighted to prevent another company from copying the code and writing a competing system. Legislation penalizing those who do not adhere to the copyright and license restrictions is enforced. The software is copy-protected to deter someone from making an illegal copy. License agreements are used to establish the terms of ownership and use. The software requires WAN/Internet verification before it is activated. The software requires a special hardware device to run.
1-132
Corporate licenses
A corporate license gives the corporation unlimited use of the software at all locations. Some companies restrict a corporate license to all locations within one country. Sometimes, the right to reproduce documentation is also granted.
1-135
1-137
Section Preview
In this section we will study:
Generic LAN system software functions Workstation system software functions Server system software functions Printer software Backup software
1-138
Server/Workstation Communications
The first problem the workstation must address is connecting to a server. Once a client has a server connection, the user at the client can log onto the network. Depending on the LAN OS being used, a user can log onto a single server, a collection of resources called a domain, or the entire corporate network. Regardless of the environmentsingle server, domain, or network directorythe users network software must find a server resource that can authenticate the logon request.
1-139
IP Type Time Packet Fragment Header Source Destination Version Header of Identification Flags to Protocol Length Offset Checksum Address Address Length Service Live
IP Header
Checksum Length
Transport Packet Destination Destination Destination Source Source Source Control Type Network Node Socket Network Node Socket
IPX Header
1-141
Address
A12B634A DDC3958B DD84A124 A12C583D 29837CAB 834AB3E7
Server Type
File File File SQL File File
Hops
1 2 0 1 1 0
5602C0A1
Printer
1-143
1-144
Properties
Network address Full name Location Telephone E-mail address Operator name
Interface
Manufacturer
1-145
Client/Server Dialogue
Once the client and server have connected, a client/server dialogue can begin. When an application requests a service from the OS, it does so by issuing a signal called an interrupt. The redirector reacts to the interrupt and decides whether it is a LAN request or a local request. The redirector must know which interrupts to intercept. Once the redirector has the request, it must formulate a server message to indicate which service is to be provided. It formats a message with the proper request codes and sends the message to the LANCom process.
1-146
Redirector Implementations
Client Operating System
Redirector
Application Program
LANCom
Redirector receives application requests and routes local request to the client OS and network request to LAN communication process.
1-147
Redirector
Application Program
LANCom
1-148
Disk Configurations
One of the functions of an OS is to implement a file system. This involves allocating and deallocating disk space and keeping track of space allocated to each file. Partitioning sometimes it is beneficial to divide a single disk drive in two or more partitions; each partition can be managed separately
1-149
Multiple Disk Volumes or Volume Sets Most LAN OSs allow multiple partitions or disks to be combined to form a single logical partition. A volume created from multiple partitions is called a volume set. RAID Level 0Striping without parity Another capability provided with some LAN OSs is called a Redundant Array of Inexpensive Disks (RAID) Level 0 or striping without parity. Multiple partitions on different disks can be combined to proved a single logical disk; striping with parity differs from a volume just described in that data is written to all partitions simultaneously.
1-150
Fault Tolerance
A LAN with fault tolerance allows the server to survive some failures that would ordinarily be disabling. Fault tolerance usually is provided by a combination of backup hardware components and software capable of using the backup hardware. A level of fault tolerance also can be provided by using redundant arrays of inexpensive disks (RAID). There are six levels of RAID, but for fault tolerance we are concerned only with RAID Level 1 and RAID Level 5.
1-151
Controller 1
Controller 2
File 1 File 2
1
File 1 File 2
2
1-152
4
1-153
Disk Drive
Disk Drive
1-154
1-156
1-157
Backup Software
The software used to perform the backups is as important as the hardware. Backup software is responsible for reading the files being backed up and writing them to the backup device. Backup devices often come with a backup/restore program (both capabilities are contained on one program), and most LAN system software includes a backup/restore module. Some LAN administrators choose to purchase a separate, more functional backup system than the LAN or backup device versions.
1-158
Client/Server Architecture
1-159
Section Preview
In this section we will study:
What is client/server? Client/server history Client/server advantages and disadvantages Client/server technology Client/server standards Client/server database implementations
1-160
What Is Client/Server?
A client is a software module that relies on a server software module for some of an applications processing requirements. The server performs the work necessary to complete the request and returns the result to the client. Client/server computing is:
a modular approach to application design an architecture for software deployment and sharing a hardware-independent approach to application design
1-161
Database Logic
Business Logic
Presentation Logic
Disk drives
Application
Terminal
1-163
1-165
Client/Server on a Network
File/Print Server Database (SQL) Server Clients
Bus. Logic
Pres. Logic
1-166
Client/Server Models
Server Client
Database Logic
Database Server Model Server
Business Logic
Presentation Logic
Client
Client
Presentation Logic
1-168
P2
P1
Main
Program
1-169
Procedure Call
Client Computer
Server Computer
1-170
SQL Server
With SQL server technology, the database processing is done on the server. In file server technology, the database processing is the responsibility of the client. The advantages of the SQL server technology are as follows:
Less data is transmitted over the network. Database processing that can be optimized for that task is performed on the server. If database processing demands increase, more powerful SQL servers can be installed to accommodate the increased workload. Processing is distributed over multiple computers, each of which can be optimized for the tasks it performs.
1-171
Business Logic
Com. Interface
Vendor B
1-172
Client/Server Standards
Client/server standards have been formulated to allow open systems and provide a mechanisms for interoperability of clients and servers. The standards being formed include:
how clients and servers communicate with each other how clients find the server or servers that perform their needed functions
Interfaces between clients and servers have come to be called middleware. Middleware is responsible for making the connection between clients and servers.
Examples of middleware and its standardization efforts are:
distributed computing environment (DCE) specifications
object request broker (ORB) open database connectivity (ODBC)
1-175
In an effort to trim the costs associated with software evolution, some companies are adopting the use of thin clients and server clusters.
1-176
File/Print Servers
Application Servers
What is a repeater, a bridge, a switch, a router and a gateway? In what OSI layer does each of these devices functions? Submit: a 2-4 page write-up of your findings (be brief but concise!) Due: 19/26 Jan. 2002
Tip: For starters, read the Frequently Asked Questions (FAQ) for each area. Where can you access USENET News? A lot of sites in the Internet:
Example: http://www.google.com (then click on Groups)