Technology Guide: Network

 

 

 

Related Topics

 

Improving Server Performance

 

System Selection

 

7 Levels of Application Integration

 

All About Storage

 

 

Links

 

searchnetworking.com

 

howstuffworks.com

 

Contents

 

Ethernet

Token Ring

Virtual Private Network (VPN)

Frame Relay

Asynchronous Transfer Mode (ATM)

Integrated Services Digital Network (ISDN)

Broadband

Digital Subscriber Line (DSL)

X.25 Protocol

Switch

Router

Network access controller (NAC)

Customer Information Control System (CICS)

OLTP (online transaction processing)

Hub

Node

Segment

Backbone

Topology

Local Area Network (LAN)

Network Interface Card (NIC)

Media Access Control (MAC) Address

Unicast

Multicast

Broadcast

Open Systems Interconnection (OSI) Reference Model

Bandwidth

T-Carrier System

Very Small Aperture Terminal (VSAT)

 

 

Ethernet

 

Ethernet is the most widely-installed local area network (LAN) technology. Specified in a standard, IEEE 802.3, Ethernet was originally developed by Xerox and then developed further by Xerox, DEC, and Intel. An Ethernet LAN typically uses coaxial cable or special grades of twisted pair wires. Ethernet is also used in wireless LANs. The most commonly installed Ethernet systems are called 10BASE-T and provide transmission speeds up to 10 Mbps. Devices are connected to the cable and compete for access using a Carrier Sense Multiple Access with Collision Detection (CSMA/CD) protocol.

Fast Ethernet or 100BASE-T provides transmission speeds up to 100 megabits per second and is typically used for LAN backbone systems, supporting workstations with 10BASE-T cards. Gigabit Ethernet provides an even higher level of backbone support at 1000 megabits per second (1 gigabit or 1 billion bits per second). 10-Gigabit Ethernet provides up to 10 billion bits per second.

 

Token Ring

 

A token ring network is a local area network (LAN) in which all computers are connected in a ring or star topology and a binary digit- or token-passing scheme is used in order to prevent the collision of data between two computers that want to send messages at the same time. The token ring protocol is the second most widely-used protocol on local area networks after Ethernet. The IBM Token Ring protocol led to a standard version, specified as IEEE 802.5. Both protocols are used and are very similar. The IEEE 802.5 token ring technology provides for data transfer rates of either 4 or 16 megabits per second. Very briefly, here is how it works:

  1. Empty information frames are continuously circulated on the ring.
  2. When a computer has a message to send, it inserts a token in an empty frame (this may consist of simply changing a 0 to a 1 in the token bit part of the frame) and inserts a message and a destination identifier in the frame.
  3. The frame is then examined by each successive workstation. If the workstation sees that it is the destination for the message, it copies the message from the frame and changes the token back to 0.
  4. When the frame gets back to the originator, it sees that the token has been changed to 0 and that the message has been copied and received. It removes the message from the frame.
  5. The frame continues to circulate as an "empty" frame, ready to be taken by a workstation when it has a message to send.

The token scheme can also be used with bus topology LANs.

The standard for the token ring protocol is Institute of Electrical and Electronics Engineers (IEEE) 802.5. The Fiber Distributed-Data Interface (FDDI) also uses a token ring protocol.

 

Virtual Private Network (VPN)

 

A virtual private network (VPN) is a private data network that makes use of the public telecommunication infrastructure, maintaining privacy through the use of a tunneling protocol and security procedures. A virtual private network can be contrasted with a system of owned or leased lines that can only be used by one company. The idea of the VPN is to give the company the same capabilities at much lower cost by using the shared public infrastructure rather than a private one. Phone companies have provided secure shared resources for voice messages. A virtual private network makes it possible to have the same secure sharing of public resources for data. Companies today are looking at using a private virtual network for both extranets and wide-area intranets.

Using a virtual private network involves encrypting data before sending it through the public network and decrypting it at the receiving end. An additional level of security involves encrypting not only the data but also the originating and receiving network addresses. Microsoft, 3Com, and several other companies have developed the Point-to-Point Tunneling Protocol (PPTP) and Microsoft has extended Windows NT to support it. VPN software is typically installed as part of a company's firewall server.

 

Frame Relay

 

Frame relay is a telecommunication service designed for cost-efficient data transmission for intermittent traffic between local area networks (LANs) and between end-points in a wide area network (WAN). Frame relay puts data in a variable-size unit called a frame and leaves any necessary error correction (retransmission of data) up to the end-points, which speeds up overall data transmission. For most services, the network provides a permanent virtual circuit (PVC), which means that the customer sees a continous, dedicated connection without having to pay for a full-time leased line, while the service provider figures out the route each frame travels to its destination and can charge based on usage. An enterprise can select a level of service quality - prioritizing some frames and making others less important. Frame relay is offered by a number of service providers, including AT&T. Frame relay is provided on fractional T-1 or full T-carrier system carriers. Frame relay complements and provides a mid-range service between ISDN, which offers bandwidth at 128 Kbps, and Asynchronous Transfer Mode (ATM), which operates in somewhat similar fashion to frame relay but at speeds from 155.520 Mbps or 622.080 Mbps.

Frame relay is based on the older X.25 packet-switching technology which was designed for transmitting analog data such as voice conversations. Unlike X.25 which was designed for analog signals, frame relay is a fast packet technology, which means that the protocol does not attempt to correct errors. When an error is detected in a frame, it is simply "dropped." (thrown away). The end points are responsible for detecting and retransmitting dropped frames. (However, the incidence of error in digital networks is extraordinarily small relative to analog networks.)

Frame relay is often used to connect local area networks with major backbones as well as on public wide area networks and also in private network environments with leased lines over T-1 lines. . It requires a dedicated connection during the transmission period. It's not ideally suited for voice or video transmission, which requires a steady flow of transmissions. However, under certain circumstances, it is used for voice and video transmission.

Frame relay relays packets at the Data Link layer of the Open Systems Interconnection (OSI) model rather than at the Network layer. A frame can incorporate packets from different protocols such as Ethernet and X.25. It is variable in size and can be as large as a thousand bytes or more.

 

Asynchronous Transfer Mode (ATM)

 

ATM (asynchronous transfer mode) is a dedicated-connection switching technology that organizes digital data into 53-byte cell units and transmits them over a physical medium using digital signal technology. Individually, a cell is processed asynchronously relative to other related cells and is queued before being multiplexed over the transmission path.

Because ATM is designed to be easily implemented by hardware (rather than software), faster processing and switch speeds are possible. The prespecified bit rates are either 155.520 Mbps or 622.080 Mbps. Speeds on ATM networks can reach 10 Gbps. Along with Synchronous Optical Network (SONET) and several other technologies, ATM is a key component of broadband ISDN (BISDN).

 

Integrated Services Digital Network (ISDN)

 

ISDN (Integrated Services Digital Network) is a set of CCITT/ITU standards for digital transmission over ordinary telephone copper wire as well as over other media. Home and business users who install an ISDN adapter (in place of a modem) can see highly-graphic Web pages arriving very quickly (up to 128 Kbps). ISDN requires adapters at both ends of the transmission so your access provider also needs an ISDN adapter. ISDN is generally available from your phone company in most urban areas in the United States and Europe.

There are two levels of service: the Basic Rate Interface (BRI), intended for the home and small enterprise, and the Primary Rate Interface (PRI), for larger users. Both rates include a number of B-channels and a D-channels. Each B-channel carries data, voice, and other services. Each D-channel carries control and signaling information.

The Basic Rate Interface consists of two 64 Kbps B-channels and one 16 Kbps D- channel. Thus, a Basic Rate user can have up to 128 Kbps service. The Primary Rate consists of 23 B-channels and one 64 Kpbs D-channel in the United States or 30 B-channels and 1 D-channel in Europe.

Integrated Services Digital Network in concept is the integration of both analog or voice data together with digital data over the same network. Although the ISDN you can install is integrating these on a medium designed for analog transmission, broadband ISDN (BISDN) will extend the integration of both services throughout the rest of the end-to-end path using fiber optic and radio media. Broadband ISDN will encompass frame relay service for high-speed data that can be sent in large bursts, the Fiber Distributed-Data Interface (FDDI), and the Synchronous Opical Network (SONET). BISDN will support transmission from 2 Mbps up to much higher, but as yet unspecified, rates.

 

Broadband

In general, broadband refers to telecommunication in which a wide band of frequencies is available to transmit information. Because a wide band of frequencies is available, information can be multiplexed and sent on many different frequencies or channels within the band concurrently, allowing more information to be transmitted in a given amount of time (much as more lanes on a highway allow more cars to travel on it at the same time). Related terms are wideband (a synonym), baseband (a one-channel band), and narrowband (sometimes meaning just wide enough to carry voice, or simply "not broadband," and sometimes meaning specifically between 50 cps and 64 Kpbs).

Various definers of broadband have assigned a minimum data rate to the term. Here are a few:

  • Newton's Telecom Dictionary: "...greater than a voice grade line of 3 KHz...some say [it should be at least] 20 KHz."
  • Jupiter Communications: at least 256 Kbps.
  • IBM Dictionary of Computing: A broadband channel is "6 MHz wide."

It is generally agreed that Digital Subscriber Line (DSL) and cable TV are broadband services in the downstream direction.

 

Digital Subscriber Line (DSL)

 

DSL (Digital Subscriber Line) is a technology for bringing high-bandwidth information to homes and small businesses over ordinary copper telephone lines. xDSL refers to different variations of DSL, such as ADSL, HDSL, and RADSL. Assuming your home or small business is close enough to a telephone company central office that offers DSL service, you may be able to receive data at rates up to 6.1 megabits (millions of bits) per second (of a theoretical 8.448 megabits per second), enabling continuous transmission of motion video, audio, and even 3-D effects. More typically, individual connections will provide from 1.544 Mbps to 512 Kbps downstream and about 128 Kbps upstream. A DSL line can carry both data and voice signals and the data part of the line is continuously connected. DSL installations began in 1998 and will continue at a greatly increased pace through the next decade in a number of communities in the U.S. and elsewhere. Compaq, Intel, and Microsoft working with telephone companies have developed a standard and easier-to-install form of ADSL called G.lite that is accelerating deployment. DSL is expected to replace ISDN in many areas and to compete with the cable modem in bringing multimedia and 3-D to homes and small businesses.

 

Asymmetrical Digital Subscriber Line (ADSL) uses the plain twisted pair wiring already carrying phone service to subscribers' homes to transmit video signals and high-speed data to the home. ADSL uses adaptive digital filtering to overcome noise and other problems on the line. Initially, the telephone companies hoped to use ADSL to provide Video on Demand service in competition with cable pay-per-view and neighborhood video rental stores. But ADSL can also offer a wide range of other applications, including Internet service, work-at-home access to corporations, and interactive services, such as home shopping and home banking. In addition, ADSL could make at-home educational access affordable for consumers.

 

X.25 Protocol

 

The X.25 protocol, adopted as a standard by the Consultative Committee for International Telegraph and Telephone (CCITT), is a commonly-used network protocol. The X.25 protocol allows computers on different public networks (such as CompuServe, Tymnet, or a TCP/IP network) to communicate through an intermediary computer at the network layer level. X.25's protocols correspond closely to the data-link and physical-layer protocols defined in the Open Systems Interconnection (OSI) communication model.

 

Switch

In telecommunications, a switch is a network device that selects a path or circuit for sending a unit of data to its next destination. A switch may also include the function of the router, a device or program that can determine the route and specifically what adjacent network point the data should be sent to. In general, a switch is a simpler and faster mechanism than a router, which requires knowledge about the network and how to determine the route.

Relative to the layered Open Systems Interconnection (OSI) communication model, a switch is usually associated with layer 2, the Data-Link layer. However, some newer switches also perform the routing functions of layer 3, the Network layer. Layer 3 switches are also sometimes called IP switches.

On larger networks, the trip from one switch point to another in the network is called a hop. The time a switch takes to figure out where to forward a data unit is called its latency. The price paid for having the flexibility that switches provide in a network is this latency. Switches are found at the backbone and gateway levels of a network where one network connects with another and at the subnetwork level where data is being forwarded close to its destination or origin. The former are often known as core switches and the latter as desktop switches.

In the simplest networks, a switch is not required for messages that are sent and received within the network. For example, a local area network may be organized in a token ring or bus arrangement in which each possible destination inspects each message and reads any message with its address.

Circuit-Switching version Packet-Switching

A network's paths can be used exclusively for a certain duration by two or more parties and then switched for use to another set of parties. This type of "switching" is known as circuit-switching and is really a dedicated and continuously connected path for its duration. Today, an ordinary voice phone call generally uses circuit-switching.

Most data today is sent, using digital signals, over networks that use packet-switching. Using packet-switching, all network users can share the same paths at the same time and the particular route a data unit travels can be varied as conditions change. In packet-switching, a message is divided into packets, which are units of a certain number of bytes. The network addresses of the sender and of the destination are added to the packet. Each network point looks at the packet to see where to send it next. Packets in the same message may travel different routes and may not arrive in the same order that they were sent. At the destination, the packets in a message are collected and reassembled into the original message.

 

Router

On the Internet, a router is a device or, in some cases, software in a computer, that determines the next network point to which a packet should be forwarded toward its destination. The router is connected to at least two networks and decides which way to send each information packet based on its current understanding of the state of the networks it is connected to. A router is located at any gateway (where one network meets another), including each Internet point-of-presence. A router is often included as part of a network switch.

A router may create or maintain a table of the available routes and their conditions and use this information along with distance and cost algorithms to determine the best route for a given packet. Typically, a packet may travel through a number of network points with routers before arriving at its destination. Routing is a function associated with the Network layer (layer 3) in the standard model of network programming, the Open Systems Interconnection (OSI) model. A layer-3 switch is a switch that can perform routing functions.

An edge router is a router that interfaces with an asynchronous transfer mode (ATM) network. A brouter is a network bridge combined with a router.

 

Network access controller (NAC)

 

A device that provides access to a network either for another network or for remote callers.

 

Customer Information Control System (CICS)

 

CICS (Customer Information Control System) is an online transaction processing (OLTP) program from IBM that, together with the COBOL programming language, has formed over the past several decades the most common set of tools for building customer transaction applications in the world of large enterprise mainframe computing. A great number of the legacy applications still in use are COBOL/CICS applications. Using the application programming interface (API) provided by CICS, a programmer can write programs that communicate with online users and read from or write to customer and other records (orders, inventory figures, customer data, and so forth) in a database (usually referred to as "data sets") using CICS facilities rather than IBM's access methods directly. Like other transaction managers, CICS can ensure that transactions are completed and, if not, undo partly completed transactions so that the integrity of data records is maintained.

IBM markets or supports a CICS product for OS/390, UNIX, and Intel PC operating systems. Some of IBM's customers use IBM's Transaction Server to handle e-business transactions from Internet users and forward these to a mainframe server that accesses an existing CICS order and inventory database.

 

OLTP (online transaction processing)

 

OLTP (online transaction processing) is a class of program that facilitates and manages transaction-oriented applications, typically for data entry and retrieval transactions in a number of industries, including banking, airlines, mailorder, supermarkets, and manufacturers. Probably the most widely installed OLTP product is IBM's CICS (Customer Information Control System).

 

Hub

In general, a hub is the central part of a wheel where the spokes come together. The term is familiar to frequent fliers who travel through airport "hubs" to make connecting flights from one point to another. In data communications, a hub is a place of convergence where data arrives from one or more directions and is forwarded out in one or more other directions. A hub usually includes a switch of some kind. (And a product that is called a "switch" could usually be considered a hub as well.) The distinction seems to be that the hub is the place where data comes together and the switch is what determines how and where data is forwarded from the place where data comes together. Regarded in its switching aspects, a hub can also include a router.

1) In describing network topologies, a hub topology consists of a backbone (main circuit) to which a number of outgoing lines can be attached ("dropped"), each providing one or more connection port for device to attach to. For Internet users not connected to a local area network, this is the general topology used by your access provider. Other common network topologies are the bus network and the ring network. (Either of these could possibly feed into a hub network, using a bridge.)

2) As a network product, a hub may include a group of modem cards for dial-in users, a gateway card for connections to a local area network (for example, an Ethernet or a token ring), and a connection to a line (the main line in this example).

 

Node

 

Anything that is connected to the network. While a node is typically a computer, it can also be something like a printer or CD-ROM tower.

 

Segment

 

Any portion of a network that is separated, by a switch, bridge or router, from other parts of the network.

 

Backbone

 

The main cabling of a network that all of the segments connect to. Typically, the backbone is capable of carrying more information than the individual segments. For example, each segment may have a transfer rate of 10 Mbps (megabits per second: 1 million bits a second), while the backbone may operate at 100 Mbps.

 

Topology

 

The way that each node is physically connected to the network. Common topologies include:

Bus - Each node is daisy-chained (connected one right after the other) along the same backbone, similar to Christmas lights. Information sent from a node travels along the backbone until it reaches its destination node. Each end of a bus network must be terminated with a resistor to keep the signal that is sent by a node across the network from bouncing back when it reaches the end of the cable.

Ring - Like a bus network, rings have the nodes daisy-chained. The difference is that the end of the network comes back around to the first node, creating a complete circuit. In a ring network, each node takes a turn sending and receiving information through the use of a token. The token, along with any data, is sent from the first node to the second node, which extracts the data addressed to it and adds any data it wishes to send. Then, the second node passes the token and data to the third node, and so forth until it comes back around to the first node again. Only the node with the token is allowed to send data. All other nodes must wait for the token to come to them.

Star - In a star network, each node is connected to a central device called a hub. The hub takes a signal that comes from any node and passes it along to all the other nodes in the network. A hub does not perform any type of filtering or routing of the data. It is simply a junction that joins all the different nodes together.

Star Bus - Probably the most common network topology in use today, star bus combines elements of the star and bus topologies to create a versatile network environment. Nodes in particular areas are connected to hubs (creating stars), and the hubs are connected together along the network backbone (like a bus network). Quite often, stars are nested within stars.

 

Local Area Network (LAN)

 

A network of computers that are in the same general physical location, usually within a building or a campus. If the computers are far apart (such as across town or in different cities), then a Wide Area Network (WAN) is typically used.

 

Network Interface Card (NIC)

 

Every computer (and most other devices) is connected to a network through an NIC. In most desktop computers, this is an Ethernet card (normally 10 or 100 Mbps) that is plugged into a slot on the computer's motherboard.

 

Media Access Control (MAC) Address

 

This is the physical address of any device, such as the NIC in a computer, on the network. The MAC address has two parts, each 3 bytes long. The first 3 bytes identify the company that made the NIC. The second 3 bytes are the serial number of the NIC itself.

 

Unicast

 

A transmission from one node addressed specifically to another node.

 

Multicast

 

When a node sends a packet addressed to a special group address. Devices that are interested in this group register to receive packets addressed to the group. An example might be a Cisco router sending out an update to all of the other Cisco routers.

 

Broadcast

 

When a node sends out a packet that is intended for transmission to all other nodes on the network.

 

Open Systems Interconnection (OSI) Reference Model

 

Virtually all communications protocols used today can be analysed using the Open Systems Interconnection (OSI) reference model defined by the International Organisation for Standardisation (ISO).  The OSI reference model divides the communications process into seven categories in a layered sequence according to their relation to the user.  Layer 1 through Layer 3 pertain to data transport across the network; Layers 4 through 7 deal with end-to-end communications between the message source and the message destination, usually between a client application and a server.

 

  • Layer 1: Physical
  • Layer 2: Data Link
  • Layer 3: Network
  • Layer 4: Transport
  • Layer 5: Session
  • Layer 6: Presentation
  • Layer 7: Applications

 

Layers 3 and 4 form the core of most network protocols and usually can be run over a variety of Layer-2-networks.  In many cases, rather than being implemented as distinct pieces of software, Layer 5 through Layer 7 are collapsed into a single application.

 

Bandwidth

Bandwidth technically refers to the width of a communications channel in kHz or MHz; however, it is often used to describe the amount of data that can be sent through a network connection per unit of time.

 

T-Carrier System

The T-carrier system, introduced by the Bell System in the U.S. in the 1960s, was the first successful system that supported digitised voice transmission. The original transmission rate (1.544 Mbps) in the T-1 line is in common use today in Internet service provider (ISP) connections to the Internet. Another level, the T-3 line, providing 44.736 Mbps, is also commonly used by Internet service providers. Another commonly installed service is a fractional T-1, which is the rental of some portion of the 24 channels in a T-1 line, with the other channels going unused.

The T-carrier system is entirely digital, using pulse code modulation and Time-Division Multiplexing. The system uses four wires and provides duplex capability (two wires for receiving and two for sending at the same time). The T-1 digital stream consists of 24 64-Kbps channels that are multiplexed. (The standardized 64 Kbps channel is based on the bandwidth required for a voice conversation.) The four wires were originally a pair of twisted pair copper wires, but can now also include coaxial cable, optical fiber, digital microwave, and other media. A number of variations on the number and use of channels are possible.

In the T-1 system, voice signals are sampled 8,000 times a second and each sample is digitized into an 8-bit word. With 24 channels being digitized at the same time, a 192-bit frame (24 channels each with an 8-bit word) is thus being transmitted 8,000 times a second. Each frame is separated from the next by a single bit, making a 193-bit block. The 192 bit frame multiplied by 8,000 and the additional 8,000 framing bits make up the T-1's 1.544 Mbps data rate. The signaling bits are the least significant bits in each frame.

 

Very Small Aperture Terminal (VSAT)

 

VSAT (Very Small Aperture Terminal) is a satellite communications system that serves home and business users. A VSAT end user needs a box that interfaces between the user's computer and an outside antenna with a transceiver. The tranceiver receives or sends a signal to a satellite transponder in the sky. The satellite sends and receives signals from an earth station computer that acts as a hub for the system. Each end user is interconnected with the hub station via the satellite in a star topology. For one end user to communicate with another, each transmission has to first go to the hub station which retransmits it via the satellite to the other end user's VSAT. VSAT handles data, voice, and video signals.

VSAT is used both by home users who sign up with a large service such as DirecPC and by private companies that operate or lease their own VSAT systems. VSAT offers a number of advantages over terrestrial alternatives. For private applications, companies can have total control of their own communication system without dependence on other companies. Business and home users also get higher speed reception than if using ordinary telephone service or ISDN.

 

 

 

Home | Network | Security | Software | Solutions | Products

 

Updated on July 26, 2002

 

© Copyright 2002 Allan Low. All rights reserved. Reproduction of this Web Site, in whole or in part, in any form or medium without express written permission from the author is prohibited.

1