| 4 comments ]

The goal of this chapter is to introduce some fundamental concepts and terminology that are the foundation for the other material in the book. After a brief introduction to networks in general, we delve into the communication protocols that are used by network devices; this necessarily includes a discussion of the infamous Open Systems Interconnection (OSI) model. LANs and WANs are described, as are the various devices found in a network. This is followed by an introduction to TCP/IP, used extensively in the Internet. Routing and addressing, including IP addresses, are explored. The two types of switching—Layer 2 and Layer 3 switching—are described. Spanning Tree Protocol (STP) and its operation are introduced, followed by a discussion of VLANs. The chapter concludes with a comprehensive example, tying together many of the concepts covered. You are encouraged to review any of the material in this chapter that you are not familiar with before reading the rest of the book, because these ideas are critical to understanding the more complex technologies covered in the other chapters.

Add a note here Introduction to Networks

Add a note hereIn the 1960s and 1970s, before the PC was invented, a company would typically have only one central computer—a mainframe. Users connected to the mainframe through terminals on their desks. These terminals had no intelligence of their own—their only function was to display a text-based user interface provided by the mainframe. For this reason, they were usually called dumb terminals. The only network was the connection between the terminals and the mainframe.

Add a note hereIn 1981, the IBM PC was released—an event that changed the industry significantly. The PC had intelligence of its own, allowing users to do tasks on their desktops that previously required a mainframe. Networks were introduced to interconnect these distributed PCs.

Add a note hereThe term network is used in many ways. For example, people network with one another, telephones are networked in the public telephone system, and data networks connect different computers. These uses of the term have a common thread: Networks make it possible for people or devices to communicate with each other.

Add a note hereA data network is a network that allows computers to exchange data. The simplest data network is two PCs connected through a cable. However, most data networks connect many devices.

Add a note here An internetwork is a collection of individual networks connected by networking devices and that function as a single large network. The public Internet is the most common example—it is a single network that connects millions of computers. Internetworking refers to the industry and products that are involved in the design, implementation, and administration of internetworks.

Add a note hereThe first networks were LANs; they enabled multiple users in a relatively small geographic area to exchange files and messages and to access shared resources such as printers and disk storage. WANs were introduced to interconnect these LANs so that geographically dispersed users could also share information. The “LANs and WANs” section later in this chapter further describes these two types of networks.


Note

Add a note hereThe “Acronyms and Abbreviations” appendix near the end of the book lists many of the acronyms that appear in this book.


Protocols and the OSI Model

Add a note hereThis section describes the OSI model and protocols used in internetworking. As an introduction, imagine that you are in Toronto and you want to send an e-mail to your friend in San Francisco. Successfully sending and receiving e-mail involves doing many things, including the following:

  • Add a note hereYou must type the message in your e-mail application.

  • Add a note hereYou must address the message in your e-mail application.

  • Add a note hereYou must click the Send button in your e-mail application to start sending the message.

  • Add a note hereYou must use the correct type of connections and wires to connect your PC to your local network.

  • Add a note hereYour PC must put the data on the wire.

  • Add a note hereYour PC must be able to connect to the Internet, and you must provide any necessary login information.

  • Add a note hereNetwork devices must find the best path through the Internet so that the e-mail is received by the right person.

Add a note hereThe following section introduces the OSI model, a model that describes all these communication functions and their relationships with each other.

Add a note here The OSI Model

Add a note here The ISO standards committee created a list of all the network functions required for sending data (such as an e-mail) and divided them into seven categories. This model is known as the OSI seven-layer model. The OSI seven-layer model was released in 1984; it is illustrated in Figure 1-1.

Image from book
Add a note hereFigure 1-1: Each of the Seven Layers of the OSI Model Represents Functions Required for Communication

Note

Add a note hereYou might also have heard people talk about OSI Layers 8 and 9. Although they are not official, Layer 8 is commonly known as the political layer, and Layer 9 is the religious layer. These lightheartedly represent all the other issues you might encounter in an IT project.

Add a note hereAs also shown in Figure 1-1, the seven layers can be thought of in two groups: the upper layers and the lower layers. The term upper layers often refers to Layers 5 through 7, and the term lower layers often refers to Layers 1 through 4, although this terminology is relative. The term upper layer also refers to any layer above another layer.

Add a note here The upper layers are concerned with application issues—for example, the interface to the user and the format of the data. The lower layers are concerned with transport issues—for example, how the data traverses the network and the physical characteristics of that network.

Add a note here Protocols

Add a note hereA protocol is a set of rules. The OSI model provides a framework for the communication protocols used between computers. Just as we need rules of the road—for example, so that we know that a red light means stop and a green light means go—computers also need to agree on a set of rules to successfully communicate. Two computers must use the same protocol to communicate. Computers that try to use different protocols would be analogous to speaking in Italian to someone who understands only English—it would not work.

Add a note hereMany different networking protocols are in use, in a variety of categories. For example, LAN and WAN protocols (at the lower two OSI layers) specify how communication is accomplished across various media types. Routed protocols (at Layer 3) specify the data’s format and how it is carried throughout a network, and routing protocols (some of which also operate at Layer 3) specify how routers communicate with one another to indicate the best paths through the network.

Add a note hereThe most widely used network protocol suite today is the TCP/IP suite, named after two of the protocols within the suite. This network protocol suite is used in many places, including the backbone of the Internet and within organization’s networks. Novell’s NetWare, Apple Corporation’s AppleTalk, and IBM’s System Network Architecture are other examples of network protocol suites.

Add a note here The OSI Layers

Add a note hereThe following sections briefly describe each of the seven layers of the OSI model, starting at the lowest layer. Appendix C, “Open System Interconnection (OSI) Reference Model,” delves deeper into the details of the OSI model.

Physical Layer—Layer 1

Add a note here The OSI physical layer defines specifications such as the electrical and mechanical conditions necessary for activating, maintaining, and deactivating the physical link between devices. Specifications include voltage levels, maximum cable lengths, connector types, and maximum data rates. The physical layer is concerned with the binary transmission of data. This binary data is represented as bits (which is short for binary digits). A bit has a single binary value, either 0 or 1.

Data Link Layer—Layer 2

Add a note hereLayer 2, the data link layer, defines the format of data that is to be transmitted across the physical network. It indicates how the physical medium is accessed, including physical addressing, error handling, and flow control. The data link layer sends frames of data; different media have different types of frames.

Add a note hereFor LANs, the Institute of Electrical and Electronics Engineers (IEEE) split Layer 2 into two sublayers: Logical Link Control (LLC) and Media Access Control (MAC).

Add a note hereThe LLC sublayer (defined by the IEEE 802.2 specification) allows multiple network layer (Layer 3) protocols to communicate over the same physical data link by allowing the Layer 3 protocol to be specified in the LLC portion of the frame.

Add a note hereSome examples of MAC sublayer protocols are IEEE 802.3 Ethernet and IEEE 802.5 Token Ring. The MAC sublayer specifies the physical MAC address that uniquely identifies a device on a network. Each frame that is sent specifies a destination MAC address; only the device with that MAC address should receive and process the frame. Each frame also includes the MAC address of the frame’s source.


Note

Add a note hereYou might be interested in some IEEE trivia: The IEEE 802 committee was formed in February (the second month) of 1980, and thus was called “802.” The IEEE 802.3 standard, for example, was ratified in the IEEE annex building 3 in Geneva at that time.

Network Layer—Layer 3

Add a note hereThe network layer is responsible for routing, which allows data to be properly forwarded across a logical internetwork (consisting of multiple physical networks). Logical network addresses (as opposed to physical MAC addresses) are specified at Layer 3. Layer 3 protocols include routed and routing protocols. The routing protocols determine the best path that should be used to forward the routed data through the internetwork to its destination.

Add a note hereThe network layer sends datagrams (or packets); different routed protocols have different types of datagrams.

Transport Layer—Layer 4

Add a note hereLayer 4, the transport layer, is concerned with end-to-end connections between the source and the destination. The transport layer provides network services to the upper layers.

Add a note hereConnection-oriented reliable transport establishes a logical connection and uses sequence numbers to ensure that all data is received at the destination. Connectionless best-effort transport just sends the data and relies on upper-layer error detection mechanisms to report and correct problems. Reliable transport has more overhead than best-effort transport.

Add a note hereMultiplexing allows many applications to use the same physical connection. For example, data is tagged with a number that identifies the application from which it came. Both sides of the connection then can interpret the data in the same way.

Add a note hereThe transport layer sends segments.

Upper Layers—Layers 5 Through 7

Add a note here From the lower layers’ perspective, the three upper layers represent the data that must be transmitted from the source to the destination; the network typically neither knows nor cares about the contents of these layers. For completeness, the following briefly describes the functions of these layers:

  • Add a note hereThe session layer, Layer 5, is responsible for establishing, maintaining, and terminating communication sessions between applications running on different hosts.

  • Add a note hereThe presentation layer, Layer 6, specifies the format, data structure, coding, compression, and other ways of representing the data to ensure that information sent from one host’s application layer can be read by the destination host.

  • Add a note hereFinally, the application layer, Layer 7, is the closest to the end user; it interacts directly with software applications that need to communicate over the network.

Add a note here Communication Among OSI Layers

Add a note hereThis section describes how communication among the seven OSI layers is accomplished. When you send an e-mail from Toronto to your friend in San Francisco, you can think of your e-mail application sending a message to the e-mail application on your friend’s computer. In OSI model terms, information is exchanged between peer OSI layers—the application layer on your computer is communicating with the application layer on your friend’s computer. However, to accomplish this, the e-mail must go through all the other layers on your computer; for example, it must have the correct network layer address, be put in the correct frame type, and so on. The e-mail must then go over the network, and then go back through all the layers on your friend’s computer, until it finally arrives at your friend’s e-mail application.

Add a note hereControl information from each layer is added to the e-mail data before it passes to lower layers; this control information is necessary to allow the data to go through the network properly. Thus, the data at each layer is encapsulated, or wrapped in, the information appropriate for that layer, including addressing and error checking. The right side of Figure 1-2 illustrates the following encapsulation process:

  • Add a note hereAt Layer 4, the e-mail is encapsulated in a segment.

  • Add a note hereAt Layer 3, this segment is encapsulated in a packet.

  • Add a note here At Layer 2, this packet is encapsulated in a frame.

  • Add a note hereFinally, at Layer 1, the frame is sent out on the wire (or air, if wireless is used) in bits.

Click to collapse
Add a note hereFigure 1-2: Data Is Encapsulated as It Goes Down Through the Layers and Is Unencapsulated as It Goes Up

Add a note hereThe grouping of data used to exchange information at a particular OSI layer is known as a protocol data unit (PDU). Thus, the PDU at Layer 4 is a segment, at Layer 3 is a packet, and at Layer 2 is a frame.

Add a note hereNotice how the overall size of the information increases as the data goes down through the lower layers. When data is received at the other end of the network, this additional information is analyzed and then removed as the data is passed to the higher layers toward the application layer. In other words, the data is unencapsulated, or unwrapped; this process is shown on the left side of Figure 1-2.


Note

Add a note hereCisco sometimes uses the word decapsulate instead of unencapsulate.


Note

Add a note hereFor simplicity, Figure 1-2 shows only two systems, one in San Francisco and one in Toronto, and does not show the details of e-mail protocols or e-mail servers. Later sections in this chapter describe what happens when intermediate devices, such as routers, are encountered between the two systems.

Add a note here At each layer, different protocols are available. For example, the packets sent by IP are different from those sent by IPX because different protocols (rules) must be followed. Both sides of peer layers that are communicating must support the same protocol.


LANs and WANs

Add a note hereLANs were first used between PCs when users needed to connect with other PCs in the same building to share resources. A LAN is a high-speed, yet relatively inexpensive, network that allows connected computers to communicate. LANs have limited reach (hence the term local-area network), typically less than a few hundred meters, so they can connect only devices in the same room or building, or possibly within the same campus.

Add a note hereA LAN is an always-on connection—in other words, you don’t have to dial up or otherwise connect to it when you want to send some data. LANs also usually belong to the organization in which they are deployed, so no incremental cost is typically associated with sending data. A variety of LAN technologies are available, some of which are shown in the center of Figure 1-3 and briefly described here:

  • Add a note hereEthernet and IEEE 802.3, running at 10 megabits per second (Mbps), use a carrier sense multiple access collision detect (CSMA/CD) technology. When a CSMA/CD device has data to send, it listens to see whether any of the other devices on the wire (multiple access) are transmitting (carrier sense). If no other device is transmitting, this device starts to send its data, listening all the time in case another device erroneously starts to send data (collision detect).

  • Add a note hereFast Ethernet (at 100 Mbps), covered by the IEEE 802.3u specification, also uses the CSMA/CD technology.

  • Add a note hereGigabit Ethernet (running at 1 gigabit per second [Gbps]) is covered by the IEEE 802.3z and 802.3ab specifications and uses the CSMA/CD technology.

  • Add a note hereWireless LAN (WLAN) standards, defined by the IEEE 802.11 specifications, are capable of speeds up to 54 Mbps under the 802.11g specification. (A new standard, 802.11n, planned to be ratified in 2007, will be capable of higher speeds.) WLANs use a carrier sense multiple access collision avoidance (CSMA/CA) mechanism (versus the CSMA/CD mechanism used by the wired Ethernet standards).

Click to collapse
Add a note hereFigure 1-3: A Variety of LAN and WAN Standards

Add a note here WANs interconnect devices that are usually connected to LANs and are located over a relatively broad geographic area (hence the term wide-area network). Compared to a LAN, a typical WAN is slower, requires a connection request when you want to send data, and usually belongs to another organization (called a service provider). You pay the service provider a fee (known as a tariff) for the use of the WAN; this fee could be a fixed monthly amount, or it could be variable based on usage and distance.

Add a note hereJust as you find many types of LANs, many types of WANs are also available, some of which are illustrated on the right side of Figure 1-3. Like LANs, WANs function at the lower two layers of the OSI model. A few, such as ISDN, also function at Layer 3. The service you use depends on many factors, including what is available where you are and, of course, the cost of the service. Some of the common WAN technologies include the following:

  • Add a note here Packet-switched network: A network that shares the service provider’s facilities. The service provider creates permanent virtual circuits and switched virtual circuits that deliver data between subscribers’ sites. Frame Relay is an example of a packet-switched network.

  • Add a note here Leased line: A point-to-point connection reserved for transmission. Common data link layer protocols used in this case are PPP and High-Level Data Link Control (HDLC).

  • Add a note here Circuit-switched network: A physical path reserved for the duration of the connection between two points. ISDN Basic Rate Interface (BRI) is an example of this type of network.

Add a note hereTwo other technologies, digital subscriber line (DSL) and cable, connect residential and business premises to service providers’ premises:

  • Add a note here DSL: Uses unused bandwidth on traditional copper telephone lines to deliver traffic at higher speeds than traditional modems allow. The most common DSL implementation is asymmetric DSL (ADSL). It is called asymmetric because the download speed is faster than the upload speed, reflecting the needs of most users and more efficiently using the available bandwidth on standard two-wire telephone lines. ADSL allows regular telephone traffic to simultaneously share the line with high-speed data traffic so that only one telephone line is required to support both high-speed Internet and normal telephone services.

  • Add a note here Cable: Uses unused bandwidth on cable television networks to deliver data at higher speeds than traditional modems allow.


Note

Add a note hereThese and other WAN technologies are discussed in Chapter 5, “Designing Remote Connectivity.”