Related Topics 7 Levels of Application Integration Links |
Contents Asynchronous Transfer Mode (ATM) Integrated Services Digital Network (ISDN) Network
access controller (NAC) Customer Information Control System (CICS) OLTP (online transaction processing) Media Access Control (MAC) Address Open Systems Interconnection (OSI) Reference Model Very Small Aperture Terminal (VSAT) |
Ethernet Ethernet is the most widely-installed local area network (LAN) technology. Specified in a standard, IEEE 802.3, Ethernet was originally developed by Xerox and then developed further by Xerox, DEC, and Intel. An Ethernet LAN typically uses coaxial cable or special grades of twisted pair wires. Ethernet is also used in wireless LANs. The most commonly installed Ethernet systems are called 10BASE-T and provide transmission speeds up to 10 Mbps. Devices are connected to the cable and compete for access using a Carrier Sense Multiple Access with Collision Detection (CSMA/CD) protocol. Fast Ethernet or 100BASE-T provides transmission speeds up to 100 megabits per second and is typically used for LAN backbone systems, supporting workstations with 10BASE-T cards. Gigabit Ethernet provides an even higher level of backbone support at 1000 megabits per second (1 gigabit or 1 billion bits per second). 10-Gigabit Ethernet provides up to 10 billion bits per second. |
|
Token
Ring
A token ring network is a local area network (LAN) in which all computers are
connected in a ring or star topology and a binary digit- or token-passing
scheme is used in order to prevent the collision of data between two
computers that want to send messages at the same time. The token ring protocol
is the second most widely-used protocol on local area networks after Ethernet.
The IBM Token Ring protocol led to a standard version, specified as IEEE
802.5. Both protocols are used and are very similar. The IEEE 802.5 token
ring technology provides for data transfer rates of either 4 or 16 megabits
per second. Very briefly, here is how it works:
The token scheme can also
be used with bus topology
LANs. The standard for the token ring protocol is Institute of
Electrical and Electronics Engineers (IEEE) 802.5. The Fiber Distributed-Data
Interface (FDDI) also uses a token ring protocol. |
|
Virtual
Private Network (VPN)
A virtual private network (VPN) is a private data network that
makes use of the public telecommunication infrastructure, maintaining privacy
through the use of a tunneling protocol and security procedures. A virtual
private network can be contrasted with a system of owned or leased lines that
can only be used by one company. The idea of the VPN is to give the company
the same capabilities at much lower cost by using the shared public
infrastructure rather than a private one. Phone companies have provided
secure shared resources for voice messages. A virtual private network makes
it possible to have the same secure sharing of public resources for data.
Companies today are looking at using a private virtual network for both
extranets and wide-area intranets. Using a virtual private
network involves encrypting data before sending it through the public network
and decrypting it at the receiving end. An additional level of security
involves encrypting not only the data but also the originating and receiving
network addresses. Microsoft, 3Com, and several other companies have
developed the Point-to-Point Tunneling Protocol (PPTP) and Microsoft has extended Windows NT to support it. VPN software is
typically installed as part of a company's firewall
server. |
|
Frame
Relay
Frame relay is a telecommunication service designed for
cost-efficient data transmission for intermittent traffic between local area
networks (LANs) and between end-points in a
wide area network (WAN). Frame relay puts data in a
variable-size unit called a frame and leaves any necessary error correction
(retransmission of data) up to the end-points, which speeds up overall data
transmission. For most services, the network provides a permanent virtual
circuit (PVC), which means that the customer sees a continous, dedicated
connection without having to pay for a full-time leased line, while the
service provider figures out the route each frame travels to its destination
and can charge based on usage. An enterprise can select a level of service
quality - prioritizing some frames and making others less important. Frame
relay is offered by a number of service providers, including AT&T. Frame
relay is provided on fractional T-1 or full T-carrier system carriers. Frame
relay complements and provides a mid-range service between ISDN, which offers bandwidth at 128
Kbps, and Asynchronous Transfer Mode (ATM),
which operates in somewhat similar fashion to frame relay but at speeds from
155.520 Mbps or 622.080 Mbps. Frame relay is based on the older X.25
packet-switching technology which was designed for transmitting analog data
such as voice conversations. Unlike X.25 which was designed for analog
signals, frame relay is a fast packet technology, which means that the
protocol does not attempt to correct errors. When an error is detected in a
frame, it is simply "dropped." (thrown away). The end points are
responsible for detecting and retransmitting dropped frames. (However, the
incidence of error in digital networks is extraordinarily small relative to
analog networks.) Frame relay is often used to connect local area networks with
major backbones as well as on public wide area networks and also in private
network environments with leased lines over T-1 lines. . It requires a
dedicated connection during the transmission period. It's not ideally suited
for voice or video transmission, which requires a steady flow of
transmissions. However, under certain circumstances, it is used for voice and
video transmission. Frame relay relays packets at the Data Link layer of the Open
Systems Interconnection (OSI) model rather than at the Network layer. A frame
can incorporate packets from different protocols such as Ethernet
and X.25. It is variable in size and can
be as large as a thousand bytes or more. |
|
Asynchronous Transfer Mode (ATM) ATM (asynchronous transfer mode) is a dedicated-connection switching technology that organizes digital data into 53-byte cell units and transmits them over a physical medium using digital signal technology. Individually, a cell is processed asynchronously relative to other related cells and is queued before being multiplexed over the transmission path. Because ATM is designed to be easily implemented by hardware (rather than software), faster processing and switch speeds are possible. The prespecified bit rates are either 155.520 Mbps or 622.080 Mbps. Speeds on ATM networks can reach 10 Gbps. Along with Synchronous Optical Network (SONET) and several other technologies, ATM is a key component of broadband ISDN (BISDN). |
|
Integrated Services Digital Network (ISDN) ISDN (Integrated Services Digital Network) is a set of CCITT/ITU
standards for digital transmission over ordinary telephone copper wire as
well as over other media. Home and business users who install an ISDN adapter
(in place of a modem) can see highly-graphic Web pages arriving very quickly
(up to 128 Kbps). ISDN requires adapters at both ends of the transmission so
your access provider also needs an ISDN adapter. ISDN is generally available
from your phone company in most urban areas in the United States and Europe. There are two levels of service: the Basic Rate Interface (BRI),
intended for the home and small enterprise, and the Primary Rate Interface
(PRI), for larger users. Both rates include a number of B-channels and a
D-channels. Each B-channel carries data, voice, and other services.
Each D-channel carries control and signaling information. The Basic Rate Interface consists of two 64 Kbps B-channels and
one 16 Kbps D- channel. Thus, a Basic Rate user can have up to 128 Kbps
service. The Primary Rate consists of 23 B-channels and one 64 Kpbs D-channel
in the United States or 30 B-channels and 1 D-channel in Europe. Integrated Services Digital Network in concept is the
integration of both analog or voice data together with digital data over the
same network. Although the ISDN you can install is integrating these on a
medium designed for analog transmission, broadband
ISDN (BISDN) will extend the integration of both services throughout the rest
of the end-to-end path using fiber optic and radio media. Broadband ISDN will
encompass frame relay service for high-speed
data that can be sent in large bursts, the Fiber Distributed-Data Interface
(FDDI), and the Synchronous Opical Network (SONET). BISDN will support
transmission from 2 Mbps up to much higher, but as yet unspecified, rates. |
|
BroadbandIn general, broadband refers to telecommunication in which a
wide band of frequencies is available to transmit information. Because a wide
band of frequencies is available, information can be multiplexed and sent on
many different frequencies or channels within the band concurrently, allowing
more information to be transmitted in a given amount of time (much as more
lanes on a highway allow more cars to travel on it at the same time). Related
terms are wideband (a synonym), baseband (a
one-channel band), and narrowband (sometimes meaning just wide
enough to carry voice, or simply "not broadband," and sometimes
meaning specifically between 50 cps and 64 Kpbs). Various definers of broadband have assigned a
minimum data rate to the term. Here are a few:
It is generally agreed that Digital Subscriber Line (DSL) and cable TV are broadband
services in the downstream direction. |
|
Digital Subscriber Line (DSL) DSL (Digital Subscriber Line) is a technology for bringing
high-bandwidth information to homes and small businesses over ordinary copper
telephone lines. xDSL refers to different variations of DSL, such as ADSL,
HDSL, and RADSL. Assuming your home or small business is close enough to a
telephone company central office that offers DSL service, you may be able to
receive data at rates up to 6.1 megabits (millions of bits) per second (of a
theoretical 8.448 megabits per second), enabling continuous transmission of
motion video, audio, and even 3-D effects. More typically, individual
connections will provide from 1.544 Mbps to 512 Kbps downstream and about 128
Kbps upstream. A DSL line can carry both data and voice signals and the data
part of the line is continuously connected. DSL installations began in 1998
and will continue at a greatly increased pace through the next decade in a
number of communities in the U.S. and elsewhere. Compaq, Intel, and Microsoft
working with telephone companies have developed a standard and
easier-to-install form of ADSL called G.lite that is accelerating deployment.
DSL is expected to replace ISDN in
many areas and to compete with the cable modem in bringing multimedia and 3-D
to homes and small businesses. Asymmetrical
Digital Subscriber Line (ADSL) uses the plain twisted pair wiring already carrying
phone service to subscribers' homes to transmit video signals and high-speed
data to the home. ADSL uses adaptive digital filtering to overcome noise and
other problems on the line. Initially, the telephone companies hoped to use
ADSL to provide Video on Demand service in competition with cable
pay-per-view and neighborhood video rental stores. But ADSL can also offer a
wide range of other applications, including Internet service, work-at-home
access to corporations, and interactive services, such as home shopping and
home banking. In addition, ADSL could make at-home educational access
affordable for consumers. |
|
X.25
Protocol
The X.25 protocol, adopted as a standard by the Consultative
Committee for International Telegraph and Telephone (CCITT), is a
commonly-used network protocol. The X.25 protocol allows computers on
different public networks (such as CompuServe, Tymnet, or a TCP/IP network)
to communicate through an intermediary computer at the network layer level.
X.25's protocols correspond closely to the data-link and physical-layer
protocols defined in the Open Systems Interconnection (OSI) communication
model. |
|
SwitchIn telecommunications, a switch is a network device that selects
a path or circuit for sending a unit of data to its next destination. A
switch may also include the function of the router, a
device or program that can determine the route and specifically what adjacent
network point the data should be sent to. In general, a switch is a simpler
and faster mechanism than a router, which requires knowledge about the
network and how to determine the route. Relative to the layered Open Systems Interconnection (OSI)
communication model, a switch is usually associated with layer 2, the
Data-Link layer. However, some newer switches also perform the routing
functions of layer 3, the Network layer. Layer 3 switches are also sometimes
called IP switches. On larger networks, the trip from one switch point to another in
the network is called a hop. The time a switch takes to figure out
where to forward a data unit is called its latency. The price paid for
having the flexibility that switches provide in a network is this latency.
Switches are found at the backbone and gateway levels of a
network where one network connects with another and at the subnetwork level
where data is being forwarded close to its destination or origin. The former
are often known as core switches and the latter as desktop
switches. In the simplest networks, a switch is not required for messages
that are sent and received within the network. For example, a local area
network may be organized in a token ring or bus
arrangement in which each possible destination inspects each message and
reads any message with its address. Circuit-Switching
version Packet-Switching
A network's paths can be used exclusively for a certain duration
by two or more parties and then switched for use to another set of parties.
This type of "switching" is known as circuit-switching
and is really a dedicated and continuously connected path for its duration.
Today, an ordinary voice phone call generally uses circuit-switching. Most data today is sent, using digital signals, over networks
that use packet-switching. Using packet-switching, all network
users can share the same paths at the same time and the particular route a
data unit travels can be varied as conditions change. In packet-switching, a
message is divided into packets, which are units of a certain number
of bytes. The network addresses of the sender and of the destination are
added to the packet. Each network point looks at the packet to see where to
send it next. Packets in the same message may travel different routes and may
not arrive in the same order that they were sent. At the destination, the
packets in a message are collected and reassembled into the original message. |
|
Router
On the Internet, a router is a device or, in some cases,
software in a computer, that determines the next network point to which a
packet should be forwarded toward its destination. The router is connected to
at least two networks and decides which way to send each information packet
based on its current understanding of the state of the networks it is
connected to. A router is located at any gateway (where one network
meets another), including each Internet point-of-presence. A router is often
included as part of a network switch. A router may create or maintain a table of the available routes
and their conditions and use this information along with distance and cost
algorithms to determine the best route for a given packet. Typically, a
packet may travel through a number of network points with routers before
arriving at its destination. Routing is a function associated with the
Network layer (layer 3) in the standard model of network programming, the
Open Systems Interconnection (OSI) model. A layer-3 switch is a switch that
can perform routing functions. An edge router is a router that interfaces with an asynchronous
transfer mode (ATM) network. A brouter is a
network bridge combined with a router. |
|
Network
access controller (NAC)
A device that provides access to a network either
for another network or for remote callers. |
|
Customer Information Control System (CICS) CICS (Customer Information Control System) is an online transaction processing (OLTP) program from IBM that, together with the COBOL programming language, has formed over the past several decades the most common set of tools for building customer transaction applications in the world of large enterprise mainframe computing. A great number of the legacy applications still in use are COBOL/CICS applications. Using the application programming interface (API) provided by CICS, a programmer can write programs that communicate with online users and read from or write to customer and other records (orders, inventory figures, customer data, and so forth) in a database (usually referred to as "data sets") using CICS facilities rather than IBM's access methods directly. Like other transaction managers, CICS can ensure that transactions are completed and, if not, undo partly completed transactions so that the integrity of data records is maintained. IBM markets or supports a CICS product for OS/390, UNIX, and Intel PC operating systems. Some of IBM's customers use IBM's Transaction Server to handle e-business transactions from Internet users and forward these to a mainframe server that accesses an existing CICS order and inventory database. |
|
OLTP (online transaction processing) OLTP (online transaction processing) is a class of program that
facilitates and manages transaction-oriented applications, typically for data
entry and retrieval transactions in a number of industries, including
banking, airlines, mailorder, supermarkets, and manufacturers. Probably the
most widely installed OLTP product is IBM's CICS (Customer Information Control
System). |
|
Hub
In general, a hub is the central part of a wheel where the
spokes come together. The term is familiar to frequent fliers who travel
through airport "hubs" to make connecting flights from one point to
another. In data communications, a hub is a place of convergence where data
arrives from one or more directions and is forwarded out in one or more other
directions. A hub usually includes a switch of
some kind. (And a product that is called a "switch" could usually
be considered a hub as well.) The distinction seems to be that the hub is the
place where data comes together and the switch is what determines how and
where data is forwarded from the place where data comes together. Regarded in
its switching aspects, a hub can also include a router. 1) In describing network topologies, a hub topology
consists of a backbone (main circuit) to which a
number of outgoing lines can be attached ("dropped"), each
providing one or more connection port for device to attach to. For Internet
users not connected to a local area network, this is the general topology
used by your access provider. Other common network topologies are the bus
network and the ring network. (Either of these could
possibly feed into a hub network, using a bridge.) 2) As a network product, a hub may include a group of modem
cards for dial-in users, a gateway card for connections to a local area
network (for example, an Ethernet or a token ring),
and a connection to a line (the main line in this example). |
|
Node Anything that is connected to the network. While a node is typically a computer, it can also be something like a printer or CD-ROM tower. |
|
Segment Any portion of a network that is separated, by a switch, bridge or router, from other parts of the network. |
|
Backbone The main cabling of a network that all of the segments connect to. Typically, the backbone is capable of carrying more information than the individual segments. For example, each segment may have a transfer rate of 10 Mbps (megabits per second: 1 million bits a second), while the backbone may operate at 100 Mbps. |
|
Topology The way that each node is physically connected to the network. Common topologies include: Bus - Each node is daisy-chained (connected one right after the other) along the same backbone, similar to Christmas lights. Information sent from a node travels along the backbone until it reaches its destination node. Each end of a bus network must be terminated with a resistor to keep the signal that is sent by a node across the network from bouncing back when it reaches the end of the cable. Ring - Like a bus network, rings have the nodes daisy-chained. The difference is that the end of the network comes back around to the first node, creating a complete circuit. In a ring network, each node takes a turn sending and receiving information through the use of a token. The token, along with any data, is sent from the first node to the second node, which extracts the data addressed to it and adds any data it wishes to send. Then, the second node passes the token and data to the third node, and so forth until it comes back around to the first node again. Only the node with the token is allowed to send data. All other nodes must wait for the token to come to them. Star - In a star network, each node is connected to a central device called a hub. The hub takes a signal that comes from any node and passes it along to all the other nodes in the network. A hub does not perform any type of filtering or routing of the data. It is simply a junction that joins all the different nodes together. Star Bus - Probably the most common network topology in use today, star bus combines elements of the star and bus topologies to create a versatile network environment. Nodes in particular areas are connected to hubs (creating stars), and the hubs are connected together along the network backbone (like a bus network). Quite often, stars are nested within stars. |
|
Local Area Network (LAN) A network of computers that are in the same general physical location, usually within a building or a campus. If the computers are far apart (such as across town or in different cities), then a Wide Area Network (WAN) is typically used. |
|
Network Interface Card (NIC) Every computer (and most other devices) is connected to a network through an NIC. In most desktop computers, this is an Ethernet card (normally 10 or 100 Mbps) that is plugged into a slot on the computer's motherboard. |
|
Media Access Control (MAC) Address This is the physical address of any device, such as the NIC in a computer, on the network. The MAC address has two parts, each 3 bytes long. The first 3 bytes identify the company that made the NIC. The second 3 bytes are the serial number of the NIC itself. |
|
Unicast A transmission from one node addressed specifically to another node. |
|
Multicast When a node sends a packet addressed to a special group address. Devices that are interested in this group register to receive packets addressed to the group. An example might be a Cisco router sending out an update to all of the other Cisco routers. |
|
Broadcast When a node sends out a packet that is intended for transmission to all other nodes on the network. |
|
Open Systems Interconnection (OSI) Reference Model Virtually all communications protocols used today can be analysed using the Open Systems Interconnection (OSI) reference model defined by the International Organisation for Standardisation (ISO). The OSI reference model divides the communications process into seven categories in a layered sequence according to their relation to the user. Layer 1 through Layer 3 pertain to data transport across the network; Layers 4 through 7 deal with end-to-end communications between the message source and the message destination, usually between a client application and a server.
Layers 3 and 4 form the core of most network protocols and usually can be run over a variety of Layer-2-networks. In many cases, rather than being implemented as distinct pieces of software, Layer 5 through Layer 7 are collapsed into a single application. |
|
Bandwidth
Bandwidth technically refers
to the width of a communications channel in kHz or MHz; however, it is often
used to describe the amount of data that can be sent through a network
connection per unit of time. |
|
T-Carrier System
The T-carrier system,
introduced by the Bell System in the U.S. in the 1960s, was the first
successful system that supported digitised voice transmission. The original
transmission rate (1.544 Mbps) in the T-1 line is in common use today in
Internet service provider (ISP) connections to the Internet. Another level,
the T-3 line, providing 44.736 Mbps, is also commonly used by Internet
service providers. Another commonly installed service is a fractional T-1,
which is the rental of some portion of the 24 channels in a T-1 line, with
the other channels going unused. The T-carrier system is
entirely digital, using pulse code modulation and Time-Division Multiplexing.
The system uses four wires and provides duplex capability (two wires for
receiving and two for sending at the same time). The T-1 digital stream
consists of 24 64-Kbps channels that are multiplexed. (The standardized 64
Kbps channel is based on the bandwidth required for a voice conversation.)
The four wires were originally a pair of twisted pair copper wires, but can
now also include coaxial cable, optical fiber, digital microwave, and other
media. A number of variations on the number and use of channels are possible.
In the T-1 system, voice
signals are sampled 8,000 times a second and each sample is digitized into an
8-bit word. With 24 channels being digitized at the same time, a 192-bit
frame (24 channels each with an 8-bit word) is thus being transmitted 8,000
times a second. Each frame is separated from the next by a single bit, making
a 193-bit block. The 192 bit frame multiplied by 8,000 and the additional
8,000 framing bits make up the T-1's 1.544 Mbps data rate. The signaling bits
are the least significant bits in each frame. |
|
Very Small Aperture Terminal (VSAT)
VSAT (Very Small Aperture Terminal) is a satellite
communications system that serves home and business users. A VSAT end user
needs a box that interfaces between the user's computer and an outside
antenna with a transceiver. The tranceiver receives or sends a signal to a
satellite transponder in the sky. The satellite sends and receives signals
from an earth station computer that acts as a hub for
the system. Each end user is interconnected with the hub station via the
satellite in a star topology. For one end user to communicate with another,
each transmission has to first go to the hub station which retransmits it via
the satellite to the other end user's VSAT. VSAT handles data, voice, and
video signals. VSAT is used both by home
users who sign up with a large service such as DirecPC and by private
companies that operate or lease their own VSAT systems. VSAT offers a number
of advantages over terrestrial alternatives. For private applications,
companies can have total control of their own communication system without
dependence on other companies. Business and home users also get higher speed
reception than if using ordinary telephone service or ISDN. |
Home | Network | Security | Software | Solutions | Products
Updated on July 26, 2002
©
Copyright 2002 Allan Low. All rights reserved. Reproduction of this Web Site,
in whole or in part, in any form or medium without express written permission
from the author is prohibited.