CHAPTER 7

                    ELEMENTS OF NETWORK CONNECTIVITY

 

Lesson 1:  Connectivity Devices . . . ……   268

Lesson 2:  Connection Services . ……….    297

 

 

 

Introduction

 

This chapter discusses the uses of modems, repeaters, bridges, routers, brouters and gateways

and concludes with a look at remote access computing.  It will discuss how you can expand

a network across the street, or around the world.

 

 

Lesson 1:  Connectivity Devices

 

These devices will begin with the most basic of communication device the modem.  Modems

are in most computers you purchase today, plus if you connect to the Internet or use a FAX

machine, you are using a modem.    Devices that expand a LANs include repeaters, bridges,

routers, brouters, and gateways.

 

 

Modem Technology

 

A modem is a device that makes it possible for computers to communicate over a telephone line,

plain and simple as that.  When computers are too far apart to be joined by a standard computer

cable, a modem can enable communication between them.  Modems are cheap and plentiful, but

too slow and unreliable for long-term solutions, a faster dedicated line will work better.

 

Basic Modem Functions

 

Computers cannot simply be connected to each other over a telephone line, because computer

 communicate by sending digital electronic pulses, and a telephone line can send only analog

 waves.

 

A digital signal has a binary form.  The signal can have a value of either 0 or 1.  An Analog signal

can be pictured as a smooth rounded curvy line that can represent an infinite range of values.  A

modem at the sending end converts the computer’s digital signals into analog waves and transmits

the analog waves onto the telephone line.    A modem at the receiving end converts the incoming

analog signals back into digital signals for the receiving computer.

 

In other words, a sending modem Modulates digital signals into analog signals, and a receiving

modem Demodulates the analog signals back into digital signals.

 

NOTE:  To use digital lines, you must install a special digital card in the computer.

 

 

======================================================================

 

netnotes7.html                                                PAGE 2                                                      2001/10/03

 

 

Modem Hardware

 

Modems are known as DCE, Data Communications Equipment and share the following characteristics:

 

A serial (RS-232) communication interface

An RJ-11 telephone-line (a four-wire telephone plug)

 

Modems are can be external or internal.  An internal modem is more common, and a better way to go.

An internal modem, is installed in a computer’s expansion slot like any other circuit board.  An external

modem, is a small box that is connected to the computer by a serial (RS-232) cable running from the

computer’s serial port RJ11C connector to connect to the wall.

 

DTE stands for Data Terminal Equipment.

 

                                    **** C:\DEMOS, 1-7 EXCELLENT ***

                                          **** REVIEW A FEW TIMES ****

 

 

Modem Standards

 

Modems must be standardized so they can be compatible.  Below are some of the common industry

standards:

 

1.                   Hayes-Compatible – In the early 1980’s this company developed the Hayes

                      Smartmodem.  All modems were measured against

                      standards for the Hayes.  Early Hayes modems sent

                      data at 300 bits per second.   Hayes modems were

                      compatible, very good but very expensive.  Hayes

                      Standards are still used today, but Hayes are now out of

                      Business.  Other manufacturers currently offer speeds

          of up to 56,600 bps or more.

 

2.                   International Standards --  The ITU International Telecommunications Union,

                     developed the standards for modems.  They called them

                     the V series.

 

 

Modem Performance

 

Bps and Baud rate are not the same.  Baud rate is the speed at which the sound waves that carries

a bit of data over the telephone lines oscillates.    Baud rate does not apply as much any more

because modems have increased their speed, so much.

 

 

 

======================================================================

 

netnotes7.html                                                PAGE 3                                                      2001/10/03

 

 

 

CCITT changed to ITU, meets every 4 years to discuss standards for Modem Compressions.  Each large

company usually have a representative on the panel.  For example, IBM, Hewlett Packard, Microsoft etc.

 

 

Types of Modems

 

Just for information basis, the high pitch sounds you hear on a modem before it connects is the negotiating,

the sending and receiving are communication to verify that they are sending the information in the same manner.

 

Modems send data at 100 bits/second, quite slow, whereas a computer in the classroom can send data at

100 bytes/second.

 

The two types of communications methods for modems are Asynchronous and Synchronous.

 

(Async) is the most commonly used, because it uses regular telephone lines.  Modems that send  the data using

Async uses about 20% as overhead.

Below is a sample of  an Asynchronous serial data stream: 

 

 

 

S

T

A

R

T

 

 

 

BYTE N

 

 

S

T

O

P

 

S

T

A

R

T

 

 

 

BYTE 3

 

 

S

T

O

P

 

S

T

A

R

T

 

 

 

BYTE 2

 

 

S

T

O

P

 

S

T

A

R

T

 

 

 

BYTE 1

 

 

S

T

O

P

 

 

Both the sending and receiving devices must agree on the start and stop bit sequence.  The receiving

computer uses the start and stop bits markers to schedule its timing functions so it is ready to receive

the next byte of data.

 

Communication is not synchronized.  It is simple, the sending computer just send the data, and the

receiving computer just receives the data.  The receiving computer then checks the data to ensure it

matches what was sent.  Asnyc is cheaper and more common than sync.

 

Async transmission over telephone lines can happen at up to 28,800 bps., however if you boost the

signal it can reach 115,200 bps.

 

 

                                    **** DEMOS C:\DEMOS    8-10 ****

                                    ***** EXCELLENT, do again ****

 

 

 

======================================================================

 

netnotes7.html                                                PAGE 4                                                      2001/10/03

 

 

Error Control

 

Because of the potential for error, async can include a special bit called a parity bit, which is used in

an error-checking and correction scheme called parity checking.  The number of bits sent must match

the number of bits received.

 

 

Improving Transmission Performance

 

1)         Signaling or channel speed describes how fast the bits are encoded onto the    

Communication channel.

2)         Throughput measures the amount of useful information going across the channel.

 

NOTE:  Although compressing data can improve performance, it is not an exact science.  A text

file for example can be compressed more effectively than a complex graphic file.  It is even possible

to have a compressed file that is actually larger than the original.

 

 

Coordinating the Standards

 

Async, or serial modems are less expensive than synchronous modems because the async modem

does not need the circuitry and the components to handle the timing involved in synchronous

transmission that synchronous modems require.

 

 

 

Synchronous Communication  (usually only on Mainframe)

 

Relies on a timing scheme coordinated between two devices to separate groups of bits and transmit

them in blocks known as frames.  Because the transmission of the frames is timed, start/stop bits are

not required.  The transmission stops at the end of one frame and starts again with a new one.  This

is more efficient than async. especially if the packets are large.  When small packets are sent, this

increase in efficiency is less noticeable.

 

 

S

Y

N

C

 

 

 

BYTE N

 

 

BYTE 3

 

 

BYTE 2

 

 

BYTE 1

 

S

Y

N

C

 

 

 

 

======================================================================

 

netnotes7.html                                                PAGE 5                                                      2001/10/03

 

 

 

Synchronous

 

 

Synchronous protocols perform a number of jobs that asynchronous protocols do not:

 

1)         format data into blocks

2)         add control Information

3)         Check the information to provide error control

 

 

The Primary protocols in synchronous communication are:

 

1)         Synchronous Data Link Control (SDLC)

2)         High-level Data Link Control (HDLC)

3)         Binary Synchronous Communications Protocol (bisync)

 

 

Note:  Synchronous communication is used in almost all digital and network communications.   For

example if you were using digital lines to connect remote computers, you would use synchronous

modems rather than asynchronous modems to connect the computer to the digital line.    Generally,

their high cost and complexity have kept synchronous modems out of the home market.  This form

is very uncommon, unless you are working on a Mainframe.  Also, if one of the clocks it out it will

not work.  To Perfectionalist.!!!

 

 

 

Asymmetric Digital Subscriber Line (ADSL)

 

This technology converts the existing twisted-pair telephone lines into access paths for multimedia

and high-speed data communications.  These new connections can transmit more than 8Mbps to

the subscriber and up to 1 Mbps from the subscriber.

 

This technology needs special hardware, including an ADSL modem on each end of the connection. 

It requires broadband cabling, which is only use in a few locations, and there is a limit into the

connection length.

 

NOTE:  ADSL is known as a physical layer transmission protocol for unshielded twisted-pair media.

 

 

                                      *** C:\DEMOS   #11-15***

                           *** EXCELLENT  DO OVER AT HOME ****

 

 

======================================================================

 

netnotes7.html                                                PAGE 6                                                      2001/10/03

 

 

Expanding a Network Using Components

 

As companies grow, so do the needs of the current LANS.  You know your LAN is too small when:

 

1)         The cable begins to get crowded with network traffic.

2)         Print jobs include longer wait times

3)         Traffic-generating applications, such as databases, experience increased response times.

 

Each topology has its limits, but there are some components you can add to increase

the size of the network within its existing environment.

 

1)         Segment existing LANs so that each segment becomes its own LAN

2)         Join two separate LANs.

3)         Connect to other LAN’s and computing environments to join them into a

            Larger comprehensive WAN.

 

The components that enable engineers to accomplish these goals are:

 

Hubs                                        Routers

Repeaters                                Brouters

Bridges                                    Gateways

 

 

HUBS

 

A  hub can be used to expand a LAN, but it cannot be used to expand a LAN to a WAN. 

Connecting a Hub to a LAN can effectively increase the number of workstations.    Hubs cannot

 switch between cable types or access methods.  A hug cannot convert from a LAN to A WAN.

 

NOTE:  It is important to be careful when connecting hubs.  Crossover cables are wired differently

than standard patch cables, and one will not work correctly in place of the other.    Crossover cables

are used to connect 2 computers and not 2 hubs.

 

 

REPEATERS

 

As signals travel along a cable, they degrade and become distorted in the process called attenuation. 

If a repeater is installed it can in a way boost the signal as it travels farther.  Repeater boosts the

packet, works at the physical layer of the OSI model.  It does not filter the data, sends everything

good and bad.   A repeater must be using the same access methods.  For example, it cannot go

from Ethernet to Token Ring.  But, it can adapt to different cable types, it can go from coaxial to

10 Base T Twisted-Pair.

 

 

 

======================================================================

 

netnotes7.html                                                PAGE 7                                                      2001/10/03

 

 

 

NOTE:  The following does not use up the signal, Patch Cables/Extender/Barrel Connection.  This will

extend a LAN, but it is not a good long-term solution.

 

 

How they work:

 

A repeater works at the physical layer of the OSI reference model, and it regenerates the network’s

signal and resend them out on other segments.

 

        For a repeater to work, both segments that the repeater joins must use the same

        Access method.  The two most common access methods are CSMA/CD and token

        Passing.  A repeater cannot connect to a segment using CSMA/CD to a segment

        using the token-passing access method.    In other words the repeater cannot

        translate an Ethernet packet into a Token Ring packet.

 

        Some considerations, repeaters are the cheapest way to expand a Network.  When

        the need arises to extend the physical network beyond its distance or node limit-

        ations, consider using a repeater to link segments if neither segment is generating

        much traffic or limiting costs is a major consideration.

 

 

        Repeaters send every bit of data from one cable segment to another, even if the data

        Consists of malformed packets or packets not destined for use on the network.

        That means that problems can spread through the network from the repeater, much

        as a virus spreads.

 

        Repeaters will also pass a broadcast storm along from one segment to the next,

        back and forth along the network. Broadcast storms overload the bandwidth limit.

        This will really slow down the network.

 

 

When to use a Repeater:

 

1)         Connect two segments of similar or dissimilar media.

2)         Regenerate the signal to increase the distance transmitted

3)         Pass all traffic in both directions.

4)         Connect two segments in the most cost-effective manner

 

 

NOTE:  SUMMARY – Repeaters improve the networks performance by dividing

                                        the network into segments, thereby  reducing the number of computers

                                        per segment.   Don’t forget the 5-4-3 rule.

 

 

 

======================================================================

 

netnotes7.html                                                PAGE 8                                                      2001/10/03

 

 

DO NOT USE A REPEATER IF:

 

There is heavy network traffic

Segments are using different access methods

Data filtering is needed.

 

 

BRIDGES

 

Like a repeater, a bridge can join segments or workgroup LAN’s.  If you have a problem area on

the LAN, you can separate those computers by using a Bridge.  This is what Bridges can be used for:

 

1)         Expand the length or a segment

2)         Allow for an increase number of computers on the network

3)         Reduce traffic bottlenecks, where computers are excessively attached.

4)         Divide an overloaded network into two networks.

5)         Link unlike physical media such as twisted-pair and coaxial Ethernet.

 

 

How Bridges Work

 

Because bridges work at the data-link layer of the OSI model,  all info at the higher levels is not

available to them. 

 

 

A MAC-layer Bridge:

 

1)         Listens to all traffic

2)         Checks the source and destination address of each packet

3)         Builds a routing table, as information becomes available

4)         Forwards packets in the following way:

a)         If the destination is not on the table, the bridge forwards the packet to all

Segments

b)         If the destination is on the table, the bridge forwards the packet to that

Segment.

 

A Bridge works on the principle that each network node has its own address.  A bridge forwards

packets based on the address of the destination node.

 

Bridges actually have some degree of intelligence, in that they learn where to send data.  The bridge

uses the computers RAM to store information.  The bridge uses the RAM to build a routing table

based on source addresses.  At the start the Bridges routing table will be empty, but as nodes

transmit packets it will start to fill up the table.

 

 

======================================================================

 

netnotes7.html                                                PAGE 9                                                      2001/10/03

 

 

Creating a Routing Table

 

Bridges build their routing tables based on the addresses of computer that have transmitted data on the

network.  Bridges use source addresses, the address of the device that initiates the transmission to

create a routing table.

 

When the bridge receives a packet, the source address is compared to the routing table.  If the

address is notthere it is added.  The bridge then compares the destination address with the

routing-table database.

 

 

1)         If the destination address is in the routing table and is on the same segment as the

source address, the packet is discarded.  This filtering helps to reduce network

traffic and isolate segments of the network.

2)         If the destination address is in the routing table and not in the same segment

as the source address, the bridge forwards the packet out of the appropriate

port to reach the destination address.

3)         If the destination address is not in the routing table, the bridge forwards the

packet to all its ports except the one on which it originated.

 

SUMMARY     If a bridge knows the location of the destination node, it

                                     forwards the packet to it.  If it does not know the destination, it

                                     forwards the packet to all segments.

 

   

 

Segmenting Network Traffic

 

A Bridge can segment traffic because of its routing table.  Therefore, bridges can use

routing tables to reduce the traffic on the network by controlling which packets get forwarded to

other segments.  This control theory is known as “segmenting network traffic”.

 

If the Bridge knows the MAC address, it will send the packet if it is in the LAN.

The Bridge sends through a broadcast, and it resides in the Data-Link Layer of the OSI.

A Bridge can extend a Network by 185M, it builds up MAC addresses, and puts them in the table.

The spanning-tree algorithm reads the Bridge Manual upon installation, just a little tid-bit of

information for on the job!!!

 

Bridges can be used on a dedicated phone line.  A bridge rebuilds the packet and repackages it. 

There are fewer collisions.  The bridge also has the capability of transforming multiple NICs into a

bridge.  A bridge is inexpensive, it is more than a hub, but less than a router.

 

You can have several Bridges in a network.

 

 

======================================================================

 

netnotes7.html                                                PAGE 10                                                    2001/10/03

 

 

Remote Bridges

 

Bridges can connect networks through the telephone lines.  Only one bridge is necessary to link

two cable segments.  If you implement two remote bridges connected with synchronous modems

to a dedicated, data-grade telephone line will do this. 

 

 

Differentiating between Bridges and Repeaters

 

Bridges work at the higher layer than repeaters.  Bridges are more intelligent.  This means that

bridges can send data packets over long distances using a variety of long-distance media.

 

 

Bridge Considerations

 

Bridges have the features of repeaters, but can have more nodes.  They provide better network

performance than repeaters.  Because bridged networks have been divided, fewer computers

compete for available resources on each segment.  In otherwords, it you had an Ethernet network

divided by bridges, each segment would have less data collision, there would be less overall traffic

on the network, and the operating system would work more efficiently.    Although each network

would be separate, the bridge would pass appropriate traffic between them.

 

 

Implementing a Bridge

 

A bridge can be a stand alone piece of equipment or it can be installed in the server. 

Network administrator like to use bridges because they are:

 

Simple to install and transparent to users

Flexible and adaptable

Relatively inexpensive

 

 

 

 

 

======================================================================

 

netnotes7.html                                                PAGE 11                                                    2001/10/03

 

 

 

ROUTERS

 

Routers are used in more complex systems then say a bridge.  A router knows the address

of each segment, but can also determine the best path.  It is similar to a type if air traffic controller.

 

A router filters and will not send out bad packets, it will kill them.  A router is a better traffic

controller than a bridge, but a little slower.  The router resides on the Network layer, and can

bypass routes if there is a faster path, so it is in an essence smart!!!

 

The router works at the level of the Network layer of the OSI model.  This enable them to switch

packets and route them across multiple networks.  Routers have access to more information

than bridges, that is why they can make in a sense more decision making than bridges.  Router

can provide the following:

 

1)         Filtering and isolating traffic

2)         Connecting Network segments

 

 

If using RIP:

 

A router can be a cost saver, because there are less hops, and it finds a cheaper route.  Satellite

routes can only be used if regular routes are not available, but don’t forget you usually get charged

for accessing a satellite.  NT only supports RIP.

 

OSPF – Open Shortest Path First, you can advise the router, it is built into the logistics, that it is not

to use for example the satellite route, too expensive. Don’t  forget if it is a static RIP run for the hills,

may have to manually enter the router.  Also, routers do not use broadcasts.

 

                                        NONROUTABLE PROTOCOLS

 

 

   NetBEUI and LAT

 

 

 

 

How Routers Work

 

Routers maintain their own routing tables, usually consisting of network addresses, host addresses can

also be kept if the network architecture calls for it.  To find out the destination address of an incoming

packet the router does the following:

 

1)         All known network addresses

2)         Instructions for connection to other networks

3)         The possible path between routers

4)         The costs of sending data over those paths

 

 

======================================================================

 

netnotes7.html                                                PAGE 12                                                    2001/10/03

 

 

 

NOTE:  The routing table can be maintained in two different ways, by bridge or by via router.  When

the routing table is maintained by a bridge it contains MAC-sublayer addresses for each node, whereas

when maintained by a router contains network numbers.  Although Manufacturers still call both a routing

table, it has a different meaning for bridges than it does for router, since there is different information

stored in each type of table.

 

Routers require specific addresses.  They understand only the network numbers that allow them to

communicate with other routers and local NIC addresses.  Routers talk to other Routers, but not to

remote computers.

 

When routers receive packets destined for a remote network, they send them to them to the router

that manages the destination network.  In some ways this is an advantage because it means routers can:

 

1)         Segment large networks into smaller ones

2)         Acts a safety barriers between segments

3)         Prohibits broadcast storms, because broadcasts are not forwarded

 

 

Routers can be slower than bridges because they have more things to perform.  As packets are passed

from router to router, data-link layer source and destination addresses are stripped off and then

re-created.  This allows a router to route a packet form different protocols.  For example, it can route

from a TCP/IP Ethernet network to a server on a TCP/IP Token ring Network.

 

Because routers read only addressed network packets, they do not allow corrupted data to get passed

onto the networks.  This prevents the event of passing broadcast storms over the network, so they are a

type of security benefit also.

 

Routers do not look at the destination node address; they look only at the network address.  Routers will

pass information only if the network address is known.  The router therefore can control the flow of data,

making it more efficient and quicker than a bridge.

 

Using the router-addressing scheme, administrators can break one large network into many separate

networks.  This reduces traffic on the lines, and will reduce wait time for the users.

 

 

 

 

======================================================================

 

netnotes7.html                                                PAGE 13                                                    2001/10/03

 

 

 

Routable Protocols

 

       

Not all protocols are routable, here is a list of routable protocols:

 

DECnet

Internet Protocol (IP)

Internetwork Packet exchange (IPX)

OSI

Xerox Network System (XNS)

DDP (AppleTalk)

 

 

Not routable protocols are:

 

Local Area Transport Protocol (LAT), a protocol from Digital Equipment Corp.

NetBEUI (Net BIOS Extended User Interface)

 

 

Choosing Paths

 

Unlike bridges, routers can accommodate multiple active paths between LAN segments and choose

among redundant paths.  Because routers can link segments that use completely different data

packaging and media-access schemes, there are often several paths available for the router to use. 

This means that if one router does not function, the data can still be passed over alternate routes.

 

A router can also listen to a network to see where it is the busiest.  It will use this information, and

send the data on a less congested path.  A router decides the path the data packet will follow by

determining the number of hops between internetwork segments.  Like bridges, routers build routing

tables and use these in routing algorithms such as the following:

 

1)         OSPF (“open shortest path first”) is a link-state routing algorithm.  They control

the routing process and allow routers to respond quickly to changes in the network.

 

2)         RIP (Routing Information Protocol) uses distance-vector algorithms to

Determine routes.  TCP/IP and IPX support RIP

3)         NetWare Link Services Protocol (NLSP) is a link-state algorithm to be used with

IPX.

 

 

 

======================================================================

 

netnotes7.html                                                PAGE 14                                                    2001/10/03

 

 

 

TTL Time to Live, example can be TTL + 1, and TTL + 1, and TTL + 1, therefore now 3 for TTL. 

This is used between Routers, and every time a router hops it adds 1 to the TTL to keep track of things. 

For example to get to Australia on the Internet you would need only 4 to 5 hops on routers to get there.

 

 

Type of Routers

 

There are two types of routers, static and dynamic.  Static routers need an administrator to set up and

configure each routing table, and set out the routes taken.  If you accept a job with a static router run

for the hills, lots of manual entering.  If you loose the router, you have to manually enter it all.  Static

 routers can be considered more secure because the administrator specifies each route.

 

Dynamic routers are designed to discover routes automatically, therefore take little time to setup or

configure.  They can filter out incoming addresses.  Routers filter better than bridges.

 

 

Difference between Bridges and Routers

 

Bridges and routers can be confusing even for engineers with LAN and WAN experience because

they appear to do the same things:  both forward packets between networks and send data across

WAN links. 

 

A question is often asked how do I decide when to use a bridge and when to use a router?

 

The bridge, which works at the MAC sublayer of the OSI data-link layer sees only a node address. 

To be more specific, a bridge looks for a node’s MAC-sublayer address in each packet.  If the

 bridge recognizes the address, it keeps the packet local or forwards it to the appropriate segment. 

If the bridge does not recognize the address it forwards the packet to all segments except the one

through which the packet arrived.

 

 

Broadcasting

 

Bridges send all broadcasts through the network, therefore creating a lot of chatter.  Whereas the

router which works at the network layer of OSI takes more information into account than the bridge

does,  determining not only what to forward but where to forward it.  The router determines which

protocol to use as well.  The router is more intelligent, drawing on all of its knowledge to send the

packet the quickest and more efficient route.

 

 

======================================================================

 

netnotes7.html                                                PAGE 15                                                    2001/10/03

 

 

BROUTER

 

 

A brouter is a combination of a bridge and a router.  A brouter can act as a router for one protocol and

as a bridge for all the others.  The brouter uses the MAC IP address.  A brouter can router selected

routable protocols, and bridge nonroutable protocols.

 

 

 

GATEWAYS

 

A gateway is a translator, plain and simple.  Gateways can be very slow, they are usually set-up as a

separate computer.  Gateways requires RAM, CPU and bandwidth.  Gateways must has the same

access methods on each end of the line. 

 

A gateway links two systems that do not use the same:

 

Communication protocols

Data-formatting structures

Languages

Architecture

 

Gateways interconnect heterogeneous networks, for example, they can connect Microsoft Windows

NT Server to IBM’s Systems Network Architecture (SNA).  Gateways change the format of the

data to make it conform to the application program at the receiving end.

 

Some gateways use all seven layers of the OSI model, but gateways typically perform protocol

conversion at the application layer.

 

 

 

Lesson 2:  Connection Services

 

 

Carriers

 

A modem is useless unless it can communicate with another component.  All modem communication

takes place over some kind of communication line or cable.  

 

 

 

 

======================================================================

 

netnotes7.html                                                PAGE 16                                                    2001/10/03

 

 

The issue is simple:  it is difficult and expensive to move data quickly over long distances.  The three

factors an administrator must take into account when considering how to implement modem communications are:

 

 

Throughput

Distance

Cost

 

There are two types of modem connections:

 

1)         Dial-up Lines

Are common telephone lines.  They are slow, and require users to make a connection for

each communication.  Some digital lines can support data transmissions speeds of up to 56 Kbps

using error correction.

 

 

2)         Leased (Dedicated) Lines

They provide full-time, dedicated connections 24/7. The quality of the line is often higher. 

They range in speed from 56Kbps to 45 Mbps or more.

VPNs are Virtual private networks.

 

 

 

RAS (Remote Access Service)

 

A RAS and a DUN (Dial-up Network) can convert a LAN to a WAN.  Because many Internet service

providers use telephone-line access, a RAS server often serves as an Internet interface for its network. 

A Windows NT Server allows 256 inbound connections, whereas Windows NT Workstation client

allows only one.

 

RAS Connections

 

The physical connection to a RAS server can be made using several different media.  These include the following:

 

PSTN   This service is otherwise known as the public telephone system

 

X.25     This packet-switched network service can be used to make dial-up or

             direct connections.

 

ISDN    This service provides high-speed remote access, but at greater cost than dial-up

             Connection.  An ISDN connection requires an ISDN card in place of a modem.

 

 

======================================================================

 

netnotes7.html                                                PAGE 17                                                    2001/10/03

 

 

 

RAS Protocols

 

RAS supports three connection protocols:

 

SLIP   (Serial Line Interface Protocol) does not support dynamic IP addressing or the

            NetBEUI or IPX protocols, it cannot encrypt logon information, and it is

            Supported only by RAS clients.

 

PPP    (Point-to-Point) is better than SLIP, it supports IPX, NetBEUI, AppleTalk,

            and DECnet protocols.  It also supports encrypted passwords.

 

PPTP  (Point-to-Point Tunneling) is an essential to VPN technology.  PPTP very

            secure transmission over TCP/IP networks, it is encrypted.  This enables

            highly private network links over the public Internet.

 

 

 

 

WANs OVERVIEW

 

Most WANs are combinations of LANs and other types of communication components connected

by communication links called WAN links.  WAN links include:

 

Packet-switching networks

Fiber-optic cable

Microwave transmitters

Satellite links

Cable television coaxial systems (broadband uses analog)

 

 

 

Communications between LANs will involve one of the following transmission technologies:

 

Analog                        Uses (PSTN) Public Switched Telephone Network

 

Digital                         Used for voice-grade communications, will be using ADSL,

                                    technology is coming in the future.

 

Packet Switching         

 

 

 

======================================================================

 

netnotes7.html                                                PAGE 18                                                    2001/10/03

 

 

 

Digital Connectivity     

 

When organizations require fast, secure transmissions they turn to DDS or Digital Data Service Lines. 

DDS provides point-to-point sync communications at 2.4, 4.8, 9.7 or 56 Kbps.  Point-to-Point digital

circuits are dedicated circuits that are provided by several telecommunications carriers.  The carrier

guarantees full-duplex bandwidth by setting up a permanent link from each endpoint to the LAN.

 

The main advantage of digital lines are they provide 99.99999% error free transmissions.

Digital lines are available in DDS, T1, T3, T4 and switched 56.

 

Because DDS uses digital communication, it does not require modems.  Instead, DDS sends data from a

bridge or router through a device called a Channel Service Unit/Data Service Unit (CSU/DSU).  This

device converts the standard digital signals that the computer generates into the type of digital signals

 (bipolar) that are put on the sync communication environment.  It also contains electronics to protect

the DDS service provider’s network.

 

 

 

T1

 

For higher digital data speeds, T1 service is commonly used.  It is Point-to-Point transmission, that uses

two-wire pairs to transmit a full-duplex signal at a rate of 1.544 Mbps.  T1 transmits digital voice, data

and video signals.

Multiplexing (Muxing),  for a diskless workstation you send to a MUX.

 

T1 uses technology called multiplexing. Several signals from different sources are collected into a

component called a multiplexer and fed into one cable for transmission.

A T1 cable can carry 1.544 megabits of data per second.  T1 has 23 B Channels =1.54Mbps.

 

 

T3

 

Provide voice and data-grade service from 6 Mbps to 45 Mbps.  These offer the highest-capacity

leased-line service available today.

 

 

Switch 56

 

Works if you have a LAN to LAN connection up to 56 Kbps.  You can set your usage time, for

example 9-5 M-F.  Each computer using this service must be equipped with a CSU/DSU

(Channel Service Unit/Data Service Unit) that can dial up another Switched 56 site.

 

 

 

======================================================================

 

netnotes7.html                                                PAGE 19                                                    2001/10/03

 

 

Virtual Circuits

 

Many packet-switching networks use Virtual Circuits.  SVC or Switched Virtual

Circuits, the end computers use a specific route.  PVC Permanent virtual Circuits,

Are similar to leased line, except the customer only pays for the pays for time used.

 

 

 

Sending Data across a WAN

 

As an administrator you can use these technologies to send data:

 

X.25  (guaranteed delivery, using a PAD, but very slow, checks at each NODE)

Frame relay  (Uses PTP)

ATM (Asynchronous Transfer Mode)

ISDN (Integrated Services Digital Network)

FDDI (Fiber Distributed Data Interface)

SONET (Synchronous Optical Network)

SMDS  (Switched Multimegabit Data Service)

 

 

FDDI

 

Fiber Distributed Data Interface, is high speed token-ring network that uses fiber-optic.

There are two rings one is redundant, or a back-up.  The main or primary ring is used most of the

time.  The token takes as many packets as it can hold, and then it goes an transmits them

separately.  You need a FDDI router to run a FDDI system.

 

FDDI (Hub) can be set-up as a star (star-wired ring)

 

FDDI hardware and software, Windows NT2000 does not come with software.  The contractor

would have to supply the H/W and software, and you would have to get a

reputable subcontractor for the fiber-optic cable installation.

 

FDDI uses beaconing, if a cable is removed it sends out beacons to see where the break is in the

cable.  Always have at least 3 metres of extra cable at each end of the network.

 

 

SONET 

 

Sonet is at the physical layer of the OSI.

 

 

======================================================================

 

netnotes7.html                                                PAGE 20                                                    2001/10/03

 

 

 

Page 322 Case Study 7.

 

1)         Check the users, ensure that all users are down, not just one.

2)         Check all local H/W cables, before calling in service people.  Check your

Hubs.

3)         Call your other LAN, see it they are up and running.

4)         Call support if all looks okay on your end, see if a part of the line

is down. 

 

 

 

 

 N

  I

 C

 

 

 

 

E

X

P

A

N

S

I

O

N

 

 

 

S

L

O

T

S

 

 

 

 

 

 

 

R

A

M

 

 

R

A

M

 

NetBEUI

 

 

 

 CPU