Networking Essentials.
Read Case Projects 3-1, 3-2, & 3-3 of the Guide to Networking Essentials.
Determine what type of physical and logical topology will be used for each scenario. Substantively explain the reasoning for your answer.
Create a visual representation of each chosen topology by copying and pasting the shapes provided in Appendix D—such as a bus, ring, star, or mesh—into a Microsoft® Word document. Note that you will need to use the Draw feature in Microsoft® Word to create lines between the shapes, and you may have to use some shapes more than once. Refer to the Figures 3-1 through 3-4 of Guide to Networking Essentials for examples.
FYI: DO NOT AGREE TO COMPLETE THIS ASSIGNMENT UNLESS YOU CAN DO IT CORRECTLY! IF YOU DO NOT HAVE ANY IT EXPERIENCE O
chapter3
Network Topologies and Technologies
After reading this chapter and completing the exercises, you will be able to:
● Describe the primary physical networking topologies in common use ● Describe the primary logical networking topologies in common use ● Describe major LAN networking technologies
109 Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Not so long ago, there was a real choice to be made between available network topologies and technologies when designing and building a new internetwork. Thankfully, this area of networking has gotten simpler rather than more complex, mainly because the choices have narrowed, with inferior or costly solutions becoming obsolete.
This chapter discusses network topologies, which describe both the physical arrangement of cabling or pathways between network devices and the logical manner in which data is trans- ferred from device to device. Next, you learn about network technologies or architectures that describe the methods computers use to transmit data to the networking medium in an orderly fashion. As you’ll see, the topology and technology are often tightly coupled, as certain technologies can be used only with certain topologies. The choices have been limited because only a few technologies and topologies remain as viable options. As is often the case, however, it helps to know where networking started to get an idea of where it might be heading. So even though some information covered in this chapter is obsolete or nearly so, your understanding of these older technologies will help you better understand current and future technologies.
Physical Topologies The word “topology,” for most people, describes the lay of the land. A topographic map, for example, shows the hills and valleys in a region, whereas a street map shows only the roads. A network topology describes how a network is physically laid out and how signals travel from one device to another. However, because the physical layout of devices and cables doesn’t necessarily describe how signals travel from one device to another, network topologies are categorized as physical and logical.
The arrangement of cabling and how cables connect one device to another in a network are considered the network’s physical topology, and the path data travels between computers on a network is considered the network’s logical topology. You can look at the physical topology as a topographic map that shows just the lay of the land along with towns, with only simple lines showing which towns have pathways to one another. The logical topology can be seen as a street map that shows how people actually have to travel from one place to another. As you’ll see, a network can be wired with one physical topology but pass data from machine to machine by using a different logical topology.
All network designs today are based on these basic physical topologies: bus, star, ring, and point-to-point. A bus consists of a series of computers connected along a single cable segment. Computers connected via a central device, such as a hub or switch, are arranged in a star topology. Devices connected to form a loop create a ring. Two devices connected directly to one another make a point-to-point topology. Keep in mind that these topologies describe the physical arrangement of cables. How the data travels along these cables might represent a dif- ferent logical topology. The dominant logical topologies in LANs include switching, bus, and ring, all of which are usually implemented as a physical star (discussed later in “Logical Topologies”).
Physical Bus Topology The physical bus topology, shown in Figure 3-1, is by far the simplest and at one time was the most common method for connecting computers. It’s a continuous length of cable
110 Chapter 3
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
connecting one computer to another in daisy-chain fashion. One of this topology’s strengths is that you can add a new computer to the network simply by stringing a new length of cable from the last computer in the bus to the new machine. However, this strength is countered by a number of weaknesses:
● There’s a limit of 30 computers per cable segment. ● The maximum total length of cabling is 185 meters. ● Both ends of the bus must be terminated. ● Any break in the bus brings down the entire network. ● Adding or removing a machine brings down the entire network temporarily. ● Technologies using this topology are limited to 10 Mbps half-duplex communication
because they use coaxial cabling, discussed in Chapter 4.
Because of the preceding limitations, a physical bus topology is no longer a practical choice, and technology has moved past this obsolete method of connecting computers. However, the original Ethernet technology was based on this topology, and the basis of current LAN technol- ogy has its roots in the physical bus. So your understanding of bus communication aids your general understanding of how computers communicate with each other across a network.
How Data Travels in a Physical Bus Two properties inherent in a physical bus are signal propagation and signal bounce. In any network topology, computers communicate with each other by sending information across the media as a series of signals. When copper wire is the medium, as in a typical physical bus, these signals are sent as a series of electrical pulses that travel along the cable’s length in all directions. The signals continue traveling along the cable and through any connecting devices until they weaken enough that they can’t be detected or until they encounter a device that absorbs them. This traveling across the medium is called signal propagation. However, even if a signal encounters the end of a cable, it bounces back and travels in the other direction until it weakens or is otherwise impeded.
When a signal hits the end of a cable and bounces back up the cable’s length, it interferes with signals following it, much like an echo. Imagine if you were trying to communicate
Figure 3-1 A physical bus topology network Courtesy of Course Technology/Cengage Learning
3
Physical Topologies 111
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
in an empty room with hard walls that caused your voice to echo continuously. The echo from the first words out of your mouth would garble the sound of words that followed, and your message would be unintelligible. The term used when electricity bounces off the end of a cable and back in the other direction is called signal bounce or reflection. To keep signal bounce from occurring, you do what you would to keep excessive echo from occurring; you install some type of material at both ends of the medium to absorb the signal. In a physical bus, you install a terminator, which is an electrical component called a resistor that absorbs the signal instead of allowing it to bounce back up the wire.
Physical Bus Limitations Now that you know more about how a physical bus works, the previous list of weaknesses needs some additional explanation. The limitation of 30 sta- tions per cable segment means only 30 computers can be daisy-chained together before the signal becomes too weak to be passed along to another computer. As an electrical signal encounters each connected workstation, some of its strength is absorbed by both the cabling and the connectors until the signal is finally too weak for a computer’s NIC to interpret. For the same reason, the total length of cabling is limited to 185 meters, whether there’s 1 con- nected station or 30 connected stations. The network can be extended in cable length and number of workstations by adding a repeater to the network, which, as you know, regener- ates the signal before sending it out.
At all times, both ends of the bus must be terminated. An unterminated bus results in signal bounce and data corruption. When a computer is added or removed from the network, both ends are no longer terminated, resulting in an interruption to network communication.
For a small network of only a few computers, you might think a bus topology is fine, until you consider the last weakness listed: maximum bandwidth of 10 Mbps half-duplex com- munication. A physical bus uses coaxial cable (a cabling type discussed in Chapter 4, similar to what’s used in cable TV connections), which is limited to a top speed of 10 Mbps and communication in only half-duplex mode. Most of today’s networks use twisted-pair cabling, which can operate at 100 Mbps or faster and run in full-duplex mode, so communi- cation between devices is much faster.
For all these reasons, the physical bus topology has long since fallen out of favor and been replaced largely by the star topology, discussed next.
Physical Star Topology The physical star topology uses a central device, such as a hub or switch, to interconnect computers in a LAN (see Figure 3-2). Each computer has a single length of cable going from its NIC to the central device.
Some advantages of a physical star topology are the following:
● Much faster technologies are used than in a bus topology. ● Centralized monitoring and management of network traffic is possible. ● Network upgrades are easier.
A physical star is the topology of choice for these reasons and more. With a central device, communication options are available that simply aren’t possible with a physical bus. For example, the central device can be a 100 Mbps hub, which increases a physical bus’s top
112 Chapter 3
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
speed tenfold, or a switch, making it possible for multiple communication sessions to occur simultaneously and in full-duplex mode.
As a budding network administrator, being able to monitor and manage your network with a central device is a big advantage over what was possible with a physical bus topology. Today’s hubs and switches can include software that collects statistics about your network traffic patterns and even alerts you when excessive errors or unusually high traffic rates are occurring on your network. You don’t get these features in a $19.99 hub or switch, but enterprise-level devices can be equipped with several network management tools.
As long as your current cabling and installed NICs support it, your network can be upgraded quickly and easily from a ponderous 10 Mbps hub-based LAN to a blazing fast 100 Mbps or even 1000 Mbps switched network simply by replacing the central device. In addition, if your NICs must also be upgraded, you can upgrade in steps because most devices support multiple speeds. So if you want to upgrade from 100 Mbps to 1000 Mbps, you can replace the central device with a switch that supports both speeds, and then upgrade NICs as time and money allow. The switch transmits and receives on each port at the speed supported by the NIC connected to that port.
What happens if the number of workstations you need to connect exceed the number of ports on the central device? In this case, you can connect hubs or switches, as you learned in Chapter 2. When several hubs or switches must be connected, usually one device is used as the central connecting point, forming an extended star.
Extended Star The extended star topology, shown in Figure 3-3, is the most widely used in networks containing more than just a few computers. As the name implies, this topology is a star of stars. A central device, usually a switch, sits in the middle. Instead of attached computers forming the star’s arms, other switches (or hubs) are connected to the central switch’s ports. Computers and peripherals are then attached to these switches or
Switch
Figure 3-2 A physical star topology network Courtesy of Course Technology/Cengage Learning
3
Physical Topologies 113
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
hubs, forming additional stars. The extended star is sometimes referred to as a “hierarchical star” because there are two or more layers of stars, all connecting back to the central star.
The extended star can be used to connect many computers, with the central device running at a very fast speed to shuttle data between the LAN’s outer stars. This topology is most effective when the center of the star is running at a much faster speed than other devices; for example, the central device can run at 1000 Mbps while other devices run at 100 Mbps.
How Data Travels in a Physical Star The details of how data travels from com- puter to computer in a physical star depend on the type of central device. Data transmission starts at a device at the end of one of the central device’s arms. From there, it travels along the network medium’s length until it arrives at the central device. As you know from learn- ing how hubs and switches work, the transmission path differs, depending on the device. Other devices, such as multistation access units (MAUs) used in token ring networks, move data differently. The type of central device, therefore, determines the logical topology, discussed later in this chapter.
Physical Star Disadvantages With all the clear advantages of a physical star, you might wonder whether there are any disadvantages. None outweigh the advantages, but it’s worth mentioning that the central device represents a single point of failure. In other words, if the hub or switch fails or someone kicks the power cord out of the outlet, down goes the entire network. Thankfully, these devices tend to be reliable and are usually placed out of the way of everyday foot traffic. That being said, they do fail from time to time, and having a spare on hand is a good idea.
When a physical bus was still the norm and the physical star was just coming on the net- working scene in the late 1980s, it was often argued that because each computer must be
Switch
Switch
SwitchSwitch
Switch
Figure 3-3 An extended star topology network Courtesy of Course Technology/Cengage Learning
114 Chapter 3
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
cabled directly to the central device, instead of a bus’s daisy-chain arrangement, more cable was required to connect computers. This point is indeed true, and at the time, the amount of cabling needed was a factor in designing a network with a bus or star arrangement. By the time the star network’s advantages were fully realized in the mid-1990s, however, the cabling cost difference had diminished substantially, and the advantages clearly outweighed the minor cost disadvantage.
Physical Ring Topology A physical ring topology is like a bus, in that devices are daisy-chained one to another, but instead of terminating each end, the cabling is brought around from the last device back to the first device to form a ring. This topology had little to no following in LANs as a way to connect computers. It was used, however, to connect LANs with a technology called Fiber Distributed Data Interface (FDDI). FDDI was most often used as a reliable and fast network backbone, which is cabling used to communicate between LANs or between hubs or switches. In Figure 3-4, the devices used to connect buildings form a ring, but computers on each LAN are connected with a physical star topology.
The physical ring also had reliability issues because data had to be forwarded from one station to the next. Unlike a bus, inwhich data travels in all directions and is terminated at both ends, a ring doesn’t have any beginning or end. So each station must reproduce data and pass it along to the next station until it reaches the destination or the originator of the data. In other words, data always travels in one direction. If any station in the ring fails, data can no longer be passed along, and the ring is broken.
Technologies such as FDDI overcome some problems with a physical ring network by creating a dual ring, in which data can travel in both directions so that a single device failure doesn’t break the entire ring. However, this technology is costly, and although it was used extensively in the 1990s and early 2000s because it was fast (100 Mbps) and reliable, 100 Mbps and 1000 Mbps Ethernet have largely supplanted it with an extended star technology.
Building A Building B
Building C
LAN switch FDDI hub
Figure 3-4 A physical ring topology is usually used to connect LANs Courtesy of Course Technology/Cengage Learning
3
Physical Topologies 115
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Point-to-Point Topology As its name implies, a point-to-point topology is a direct link between two devices. It’s most often used in WANs, in which a device on a business’s network has a dedicated link to a telecommunication provider, such as the local phone company. The connection then hooks into the phone company’s network to provide Internet access or a WAN or MAN link to a branch office. The advantage of this type of topology is that data travels on a dedicated link, and its bandwidth isn’t shared with other networks. The disadvantage is that this topology tends to be quite expensive, particularly when used as a WAN link to a distant branch office.
Point-to-point topologies are also used with wireless networks in what’s called a wireless bridge. This setup can be used to connect two buildings without using a wired network (see Figure 3-5) or to extend an existing wireless network.
A rudimentary LAN can also be set up with a point-to-point topology by connecting a cable between the NICs on two computers. Of course, this method allows only two computers on the network, but it can be used effectively for transferring files from one computer to another in the absence of a hub or switch.
So as you can see, point-to-point topologies are used for specialized purposes. They aren’t commonly used in LANs; they’re used more often in WANs and large internetworks.
Mesh Topology Amesh topology connects each device to every other device in a network. You can look at a mesh topology as multiple point-to-point connections for the purposes of redundancy and fault tolerance. Figure 3-6 shows a full mesh topology between four locations, with the switch in each location providing connectivity to multiple computers. Each switch is connected to every other switch, which is called a “full mesh.” If each switch were connected to only two other switches, it would be called a “partial mesh.” In either case, the purpose of creating a mesh topology is to ensure that if one or more connections fail, there’s another path for reaching all devices on the network. For example, in Figure 3-6, two connections could fail, but all devices could still communicate with one another. This type of topology is used mostly commonly in large internetworks andWANs, where routers or switches in multiple buildings or towns are connected in a partial or full mesh. Parts of the Internet are also designed with a partial mesh topology, in which major ISPs are connected so that even if one ISP’s network fails, data can bypass this part of the network to get to its destination.
Mesh topologies, although reliable, are also expensive because of the additional cabling and ports required. In most cases, the ports used to connect devices are the highest speed available, such as 1 Gbps or 10 Gbps, and they often use expensive fiber-optic cabling for connecting buildings.
Figure 3-5 A point-to-point wireless topology Courtesy of Course Technology/Cengage Learning
116 Chapter 3
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Logical Topologies As mentioned, a network’s logical topology describes how data travels from computer to com- puter. In some cases, as with a physical bus and physical ring, the logical topology mimics the physical arrangement of cables. In other cases, as with a physical star, the electronics in the central device determine the logical topology.
A network’s logical topology reflects the underlying network technology (covered later in “Network Technologies”) used to transfer frames from one device to one another. Table 3-1 summarizes the main logical topologies, the technologies using them, and the physical topolo- gies for implementing them.
Chicago
Los Angeles Phoenix
New York
WAN link
Figure 3-6 Switches in each building are connected in a full mesh topology Courtesy of Course Technology/Cengage Learning
3
Table 3-1 Logical topologies and associated network technologies and physical topologies
Logical topology
Network technology
Physical topology Description
Bus Ethernet Bus or star A logical bus topology can be implemented as a physical bus (although this topology is nowobsolete).When a logical bus is implemented as a physical star usingwired Ethernet, the center of thestar is anEthernethub.Whatever thephysical topology is, data transmitted from a computer is received by all other computers.
Wireless LANs Star Wireless LANs use a physical star topology because they connect through a central access point. However, only one device can
Logical Topologies 117
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
You have seen what a logical bus looks like when implemented as a physical bus. All computers are daisy-chained to one another, and network signals travel along the cable’s length in all directions, much like water flowing through interconnected pipes. When a logical bus is implemented as a physical star, the sameprocess occurs, but the pathways are hidden inside the central hub. Figure 3-7 shows what a logical bus might look like when implemented with a hub.
transmit at a time and all devices hear the transmission, so a wireless LAN can be considered a logical bus topology.
Ring Token ring Star Token ring networks use a central device called a multistation access unit (MAU or MSAU). Its electronics form a logical ring, so data is passed from computer to computer in order, until it reaches the destination device.
FDDI Ring As discussed, FDDI devices are connected in a physical ring, and data passes from device to device until it reaches the destination.
Switched Ethernet Star A switched logical topology using a physical star topology running Ethernet is by far themost common topology/technology combination now and likely will be well into the future. A switched topology creates dynamic connections or circuits between two devices whenever data is sent. This topology is sometimes considered a switched point-to-point topology because a circuit is established between two points as needed to transfer data (like turning on a switch), and then the circuit is broken when it’s no longer needed (like turning off a switch).
Signal Signal
Signal Signal
Logical bus inside a network hub
Figure 3-7 A logical bus implemented as a physical star Courtesy of Course Technology/Cengage Learning
Table 3-1 Logical topologies and associated network technologies and physical topologies (continued )
Logical
topology Network technology
Physical topology Description
118 Chapter 3
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
A logical bus is sometimes called a “shared media topology” because all stations must share the bandwidth the media provides.
A logical ring using a physical star implements the ring inside the central device’s electronics, which is an MAU in the token ring technology. Data is passed from one node or computer to another until it reaches the destination device (see Figure 3-8). When a port has no device connected to it, it’s simply bypassed, and data is sent out the next connected port.
A switched topology works something like what’s shown in Figure 3-9. Although there’s always an electrical connection between the computer and switch, when no data is being transferred, there’s no logical connection or circuit between devices. However, when the switch receives a frame, a logical circuit is made between the source and destination devices until the frame is transferred.
Figure 3-8 A logical ring implemented as a physical star Courtesy of Course Technology/Cengage Learning
3
PC 6PC 5PC 4
No packets being transmitted
PC 1 PC 2
PC 1 and PC 6 communicate while PC 2 and PC 5 communicate
PC 3
Figure 3-9 The logical functioning of a switch Courtesy of Course Technology/Cengage Learning
Logical Topologies 119
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
To better understand how these logical topologies work, it helps to know the network technology that drives each topology (discussed later in “Network Technologies”).
Hands-On Project 3-1: Building a Physical Star Topology Network
Time Required: 20 minutes
Objective: Build a physical star topology network.
Required Tools/Equipment: Three workstations named Computer1, Computer2, and Com- puter3; a hub; and three patch cables. Workstations should be configured with an IP address or automatic IP address assignment. Each station should have Wireshark installed.
Description: In this project, you build a small physical star topology; this task can be done in groups of three or more or as an instructor demonstration. After each station is connected to the hub, you ping another station to verify connectivity. Next, you use Wireshark to cap- ture ping packets so that you can determine the network’s logical topology.
1. Power on the hub.
2. Connect each workstation to the hub with the supplied cables.
3. Inspect the hub and the workstation NIC to verify that you have a good connection with the hub. Write down how you determined whether the connection with the hub is good:
4. On each workstation, open a command prompt window, and then type ipconfig and press Enter to determine your IP address. Write down the IP address of each computer: ● IP address of Computer1:
● IP address of Computer2:
● IP address of Computer3:
5. Ping each computer to verify that you can communicate with it. If the pings aren’t suc- cessful, check that the IP addresses you wrote down are correct and the connection with the hub is good, and then try again.
6. Make sure you coordinate the rest of the project, starting with this step, with students at the other computers. Start Wireshark, and start a capture session by clicking the inter- face name listed in the Interface List section.
7. At the command prompt, ping the next computer. For example, if you’re at Computer1, ping Computer2; if you’re at Computer2, ping Computer3; and if you’re at Computer3, ping Computer1.
120 Chapter 3
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
8. Based on which packets Wireshark captured, what’s your logical topology?
9. Exit Wireshark, close all open windows, and leave the computers running if you’re con- tinuing to the next project.
Network Technologies A network technology, as the phrase is used here, can best be described as the method a net- work interface uses to access the medium and send data frames and the structure of these frames. Other terms include network interface layer technologies, network architectures, and Data Link layer technologies. What it comes down to is whether your network uses Ethernet, 802.11 wireless, token ring, or some combination of these and other technologies to move data from device to device in your network. Most LANs are now based on a combination of Ethernet and 802.11 wireless. WANs use technologies specifically designed to carry data over longer distances, such as frame relay, FDDI, Asynchronous Transfer Mode (ATM), and others.
The network technology sometimes, but not always, defines frame format and which media types can be used to transfer frames. For example, different Ethernet speeds specify a mini- mum grade of copper or fiber-optic cabling that must be used as well as the connectors attached to the ends of cables. FDDI requires fiber-optic cabling, but other technologies, such as frame relay, can run on a variety of media types.
This book focuses on LAN technologies with particular emphasis on Ethernet and 802.11 wireless because they’re the most commonly used. Some WAN technologies are also described briefly in this chapter and in more detail in Chapter 12.
Network Technologies and Media Because some of the network technologies discussed in this chapter specify the types of media they require to operate, the following sections summarize the most common media types. However, you can find more details on network media in Chapter 4.
Unshielded Twisted Pair Unshielded twisted pair (UTP) is the most common media type in LANs. It consists of four pairs of copper wire, with each pair tightly twisted together and contained in a plastic sheath or jacket (Figure 3-10).
3
Sheath
Figure 3-10 UTP cabling Courtesy of Course Technology/Cengage Learning
Network Technologies 121
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
UTP comes in numbered categories, up to Category 7 as of this writing. The higher the category, the higher the cable’s bandwidth potential. Category 5 Enhanced (Cat 5E) and Category 6 (Cat 6) are the most common in wired LANs, allowing speeds up to 10 Gbps. UTP cabling is used in physical star networks, and the maximum cable length from NIC to hub or switch is 100 meters in LAN applications. UTP cabling is susceptible to electrical interference, which can cause data corruption, so it shouldn’t be used in electrically noisy environments.
Fiber-Optic Cabling Fiber-optic cabling uses extremely thin strands of glass to carry pulses of light long distances and at high data rates. It’s usually used in large internetworks to connect switches and routers and sometimes to connect high-speed servers to the network. Because of its capability to carry data over long distances (several hundred to several thousand meters), it’s also used in WAN applications frequently. Fiber-optic cabling isn’t susceptible to electrical interfer- ence, so unlike UTP, it can be used in electrically noisy environments. It requires two strands of fiber to make a network connection: one for transmitting and one for receiving.
Coaxial Cable Best known for its use in cable TV, coaxial cable is obsolete as a LAN medium, but it’s used as the network medium for Internet access via cable modem. Coaxial cable was the original media used by Ethernet in physical bus topologies, but its limitation of 10 Mbps half-duplex communication made it obsolete for LAN applications after star topologies and 100 Mbps Ethernet became the dominant standard. Coaxial cable in LANs can have lengths of around 200 meters.
Baseband and Broadband Signaling Network technologies can use media to transmit signals in two main ways: baseband and broadband. The baseband transmission method sends digital signals in which each bit of data is represented by a pulse of electricity (on copper media) or light (on fiber-optic media). These signals are sent at a single fixed frequency, using the medium’s entire bandwidth. In other words, when a frame is sent to the medium, it occupies the cable’s entire bandwidth, and no other frames can be sent along with it—much like having cable TV that carries only a single channel. LAN technolo- gies, such as Ethernet and token ring, use baseband transmission. If cable TV used baseband signaling, you would need one cable for each channel!
Thankfully, cable TV and cable modem Internet access use broadband transmission. Instead of digital pulses, broadband systems use analog techniques to encode binary 1s and 0s across a continuous range of values. Broadband signals move across the medium in the form of continuous electromagnetic or optical waves rather than discrete pulses. On broad- band systems, signals flow at a particular frequency, and each frequency represents a chan- nel of data. That’s why broadband systems, such as cable TV and Internet, can carry dozens or hundreds of TV channels plus Internet access on a single cable wire: Each channel oper- ates at a different frequency. In addition, incoming and outgoing Internet data use separate channels operating at different frequencies from TV channels.
Ethernet Networks Ethernet, the most popular LAN technology, has many advantages, including ease of installa- tion, scalability, media support, and low cost. It supports a broad range of transmission speeds, from 10 Mbps to 10 Gbps.
As discussed, Ethernet can operate in a bus or star physical topology and a bus or switched logical topology. It has been in use since the mid-1970s but didn’t mature as a technology until the early to mid-1980s. Ethernet being around for almost 40 years is a testament to the
122 Chapter 3
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
original designers, whose forethought enabled Ethernet to scale from a 3 Mbps technology in its early years to a 10 Gbps and beyond technology today.
Although there are many variations of Ethernet, all forms are similar in their basic operation and frame formatting. What differs in the variations are the cabling, speed of transmission, and method by which bits are encoded on the medium. Because the frame formatting is the same, however, Ethernet variations are compatible with one another. That’s why you often see NICs and Ethernet hubs and switches described as 10/100 or 10/100/1000 devices. These devices can support multiple Ethernet speeds because the underlying technology remains the same, regardless of speed.
Ethernet Addressing Every Ethernet station must have a physical or MAC address. As you learned in Chapter 2, a MAC address is an integral part of network interface elec- tronics and consists of 48 bits expressed as 12 hexadecimal digits. When a frame is sent to the network medium, it must contain both source and destination MAC addresses. When a network interface detects a frame on the media, the NIC reads the frame’s destination address and compares it with its own MAC address. If they match or if the destination address is the broadcast MAC address (all binary 1s or FF:FF:FF:FF:FF:FF in hexadecimal), the NIC reads the frame and sends it to the network protocol for further processing.
Ethernet Frames A frame is the unit of network information NICs and switches work with. It’s the NIC’s responsibility to transmit and receive frames and a switch’s responsibil- ity to forward frames out the correct switch port to get the frame to its destination.
Ethernet frames come in four different formats, or frame types, depending on the network protocol used to send frames, and unfortunately, these frame types are incompatible with one another. They were developed during Ethernet’s early days, before standards were solid- ified. If your network needed to support multiple protocols, such as TCP/IP, IPX/SPX, and AppleTalk, you had to make sure your computers were configured to support all these frame types. Thankfully, TCP/IP has become the dominant network protocol in LANs, so supporting multiple frame types is largely unnecessary, except for networks that still run older Novell NetWare servers. Given this reality, this section examines only the frame type used by TCP/IP: Ethernet II. The other frame types are Ethernet SNAP, Ethernet 802.3, and Ethernet 802.2. For information on these frame types, see Appendix B.
The four Ethernet frame types are incompatible in the same Ether- net standard (such as using both Ethernet II and Ethernet SNAP in 100 Mbps), but each frame type is compatible with the same frame type in different standards. For example, Ethernet II in 10 Mbps Ethernet is compatible with Ethernet II in 100 Mbps and 1000 Mbps Ethernet.
Regardless of frame type, Ethernet networks can accommodate frames between 64 bytes and 1518 bytes. Shorter or longer frames are considered errors. Each frame is composed of the following (see Figure 3-11):
● A 14-byte frame header composed of these three fields:
● A 6-byte Destination MAC Address field ● A 6-byte Source MAC Address field ● A 2-byte Type field
3
Network Technologies 123
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
● A Data field from 46 to 1500 bytes ● A frame trailer (frame check sequence [FCS]) of 4 bytes
You’ve already learned the purpose and format of destination and source MAC addresses. The Type field in the frame header indicates the network protocol in the data portion. For example, this field might indicate that the Data field contains an IP, IPv6, or ARP packet, to name just a few possibilities. The data portion, often referred to as the “frame payload,” contains network protocol header information as well as the actual data an application is transferring. The FCS in the frame trailer is an error-checking code (discussed later in “Ethernet Error Handling”).
There are exceptions to the 1518-byte maximum frame size. For exam- ple, a function of some switches requires an additional 4-byte field in the Ethernet frame, bringing the maximum size to 1522 bytes. In addi- tion, Jumbo frames of up to 9000 bytes are supported by some NICs and switches but aren’t officially supported in the current Ethernet stan- dards. To use Jumbo frames, the feature must be enabled on every device on the LAN and be implemented the same way by these devices.
Ethernet Media Access Before a NIC can transmit data to the network medium, it must adhere to some rules governing how and when the medium can be accessed for trans- mission. The rules ensure that data is transmitted and received in an orderly fashion and all stations have an opportunity to communicate. The set of rules for each networking technol- ogy is referred to as its media access method or media access control. Note that the acronym for “media access control” is MAC, which is where the term “MAC address” comes from.
The media access method Ethernet uses in half-duplex mode is Carrier Sense Multiple Access with Collision Detection (CSMA/CD). To understand this method better, break this term down into parts. “Carrier sense” means to listen. The rules for half-duplex Ethernet state that a device can send or receive data but can’t do both simultaneously. So before a device can send, it must listen to see whether the medium is already busy, much like a group of people having a conversation. Each person listens for a pause in the conversation before speaking up. “Multiple access” simply means that multiple computers can be listen- ing and waiting to transmit at the same time, which brings you to “collision detection.” A collision occurs if two or more devices on the same medium transmit simultaneously. For example, if two people are waiting to chime in on a group conversation, they both hear a lull in the conversation at the same time and speak up simultaneously, causing a “collision” in the conversation. Ethernet’s collision detection method is much like a person’s; Ethernet detects, or “hears,” the other station transmit, so it knows a collision has occurred. The NIC then waits for a random period before attempting to transmit again. Ethernet repeats the “listen before transmitting” process until it transmits the frame without a collision. Sim- ulation 7 on the book’s CD shows a simulation of the CSMA/CD process.
Destination MAC Address (6 bytes)
Source MAC Address (6 bytes) Type (2 bytes)
Data (46–1500 bytes) FCS (4 bytes)
Frame header Data (frame payload)
Frame trailer
Courtesy of Course Technology/Cengage Learning
Figure 3-11 Ethernet II frame format
124 Chapter 3
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Simulation 7: Ethernet operation using CSMA/CD
As you determined in Hand-On Project 2-4, when you attempted to create enough traffic to generate a collision, the CSMA/CD access method is efficient. It takes quite a bit of traffic to generate collisions, especially on a 100 Mbps network. However, the more devices on a logical bus topology and the more data they transmit, the greater the chance of a collision. So although CSMA/CD works well, today’s multimedia-heavy networks have somewhat outgrown it, and Ethernet has adapted to this development.
CSMA/CD is considered a contention-based access method, which means computers are allowed to send whenever they have data ready to send. Obviously, CSMA/CD modifies this rule somewhat by stipulating that the computer must listen first to ensure that no other station is in the process of transmitting.
Collisions and Collision Domains Remember that collisions can occur only in an Ethernet shared-media environment, which means a logical bus topology is in use. In this environment, all devices interconnected by one or more hubs hear all signals generated by all other devices. The signals are propagated from hub to hub until there are no more devices or until a device is encountered that doesn’t use a logical bus topology, such as a switch or a router. The extent to which signals in an Ethernet bus topology network are propagated is called a collision domain. Figure 3-12 shows a network diagram with two
3
Switch
Hub 2
Hub 1
Hub 3
Collision domain Collision domain
Hub 4 Hub 6
Hub 5
Figure 3-12 A network diagram showing two collision domains delimited by a switch Courtesy of Course Technology/Cengage Learning
Network Technologies 125
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
collision domains enclosed in circles. All devices in a collision domain are subject to the possi- bility that whenever a device sends a frame, a collision might occur with another device send- ing a frame at the same time. This fact has serious implications for the number of computers that can reasonably be installed in a single collision domain. The more computers, the more likely it is that collisions occur. The more collisions, the slower network performance is.
Notice in Figure 3-12 that all computers connected to Hubs 1 to 3 are in the same collision domain, and computers connected to Hubs 4 to 6 are in a different collision domain. This is because a switch port delimits the collision domain, which means collisions occurring in one collision domain don’t propagate through the switch.
Although collisions in an Ethernet network are usually associated with hubs, technically it’s possible for a collision to occur with a computer connected to a switch. A collision with a switch can occur only if the NIC connected to the switch port is operating in half-duplex mode. In addition, the collision domain is limited to only the devices connected to a single switch port. The same is true of routers. However, given that an Ethernet frame of maxi- mum size is transmitted on a 10 Mbps switch in just over a millisecond and just over a microsecond on a 100 Mbps switch, the likelihood of a collision with a switch is low.
If a hub is connected to a switch port in an extended star topology, collisions can occur between devices connected to the hub and the switch port. To avoid collisions altogether, use only switches in your network design with computers that have NICs operating in full- duplex mode.
Ethernet Error Handling One reason for Ethernet’s low cost and scalability is its sim- plicity. It’s considered a best-effort delivery system, meaning that when a frame is sent, there’s no acknowledgement or verification that the frame arrived at its intended destina- tion. Ethernet relies on network protocols, such as TCP/IP, to ensure reliable delivery of data. It’s similar to the package delivery guy at a corporation. His job is to take what he’s given to its intended destination; it’s the package receiver’s job to verify its contents and let the sender know it was received.
Ethernet can also detect whether a frame has been damaged in transit. The error-checking code in an Ethernet frame’s trailer is called a Cyclic Redundancy Check (CRC), which is the result of a mathematical algorithm computed on the frame data. The CRC is calculated and placed in the frame trailer before the frame is transmitted. When the frame is received, the calculation is repeated. If the results of this calculation don’t match the CRC in the frame, it indicates that the data was altered in some way, usually from electrical interference. If a frame is detected as damaged, because Ethernet is a best-effort delivery system, it simply discards the frame but doesn’t inform the sending station that an error occurred. Again, it’s the network protocol’s job to ensure that all expected data was actually received. The net- work protocol or, in some cases, the application sending the data is responsible for resend- ing damaged or missing data, not Ethernet.
A collision is the exception to Ethernet’s lack of action when an error occurs. When frames are involved in a collision, Ethernet resends them automatically because all stations detect that a collision has occurred.
126 Chapter 3
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Half-Duplex Versus Full-Duplex Communication As discussed in Chapter 2, half-duplex communication means a station can transmit and receive data but not at the same time, much like a two-way radio. When Ethernet is implemented as a logical bus topology (using hubs), NICs can operate only in half-duplex mode and must use the CSMA/CD access method.
However, a network switch allows half-duplex or full-duplex communication. If a NIC is operating in half-duplex mode while connected to a switch, it must use CSMA/CD. How- ever, the only time a collision can occur in this circumstance is if the switch happens to transmit a frame to the NIC at the same time the NIC is attempting to transmit.
Full-duplex mode, by definition, means a NIC can transmit and receive simultaneously. Therefore, when an Ethernet NIC is operating in full-duplex mode connected to a switch, CSMA/CD isn’t used because a collision can’t occur in full-duplex mode. Because full- duplex mode eliminates the delays caused by CSMA/CD and allows double the network bandwidth, most Ethernet LANs now operate in this mode using switches.
Ethernet Standards Ethernet can operate at different speeds over different types of media, and each variation is associated with an IEEE standard. The following sections discuss many of these standards, some of which are obsolete or had limited use.
Standards Terminology Ethernet standards are generally expressed in one of two ways. One way is using the IEEE document number defining the standard. For example, IEEE 802.3 is the parent document specification for 10 Mbps Ethernet using thick coaxial cable, which was ratified in 1983. All other variations and speeds of Ethernet are subdocu- ments of the original 802.3 specification.
The second way of expressing an Ethernet standard is to use the XBaseY terminology. Most IEEE 802.3 documents describe the transmission speed, type of transmission, and length or type of cabling and are designated with terms such as 100BaseT. In 100BaseT, for example, the “100” designates the speed of transmission (100 Mbps), the “Base” indicates a base- band signaling method, and the “T” specifies twisted-pair cabling. All the BaseT Ethernet standards use a physical star topology. The following sections discuss the major standards and their designations.
10BaseT Ethernet 10BaseT Ethernet, defined by IEEE 802.3i, has been the mainstay of Ethernet networks since the early 1990s. It runs over Category 3 or higher UTP cabling and uses two of the four wire pairs. Because of its slower transmission speed, 10BaseT networks using a logical bus topology (with hubs) are more susceptible to collisions than faster 100BaseT networks are. In addition, the amount of data sent and received by a typical user makes 10BaseT seem slow in typical media-heavy environments compared with the more common 100BaseT and 1000BaseT standards.
If you work for an organization still using hubs, you need to know that there are limits to how many hubs you can string together to connect all computers. The rule for expanding a 10BaseT network with hubs is that no more than four hubs can be placed between two communicating workstations. This rule ensures that all stations on the network can detect a collision. Because of the limited time for signals to propagate through a network, if more
3
Network Technologies 127
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
than four hubs exist between end stations, a collision on one end of the network might not be detected by stations on the other side of the network in time for them to react properly. If switches rather than hubs are used, there’s no such limitation because a collision on a switch can take place only between the switch and a single workstation.
A business network still using 10BaseT should upgrade to 100 or 1000BaseT to take full advan- tage of current technology. A home or small-office network that uses the network mainly for sharing Internet access and transferring documents can still use 10BaseT effectively if its Internet connection is considerably slower than 10 Mbps. However, 10BaseT is essentially an obsolete technology, and networks using 10BaseT should upgrade as soon as circumstances permit.
100BaseTX Ethernet 100BaseTX (often referred to as simply “100BaseT”), defined by IEEE 802.3u, is the most commonly used Ethernet variety today. It runs over Category 5 or higher UTP cable and uses two of the four wire pairs: one to transmit data and the other to receive data. There are other varieties of 100BaseT Ethernet (discussed later in this section), but 100BaseTX is the standard that’s usually in mind when discussing 100 Mbps Ethernet. It’s also sometimes called Fast Ethernet.
An important consideration when designing a 100BaseTX network with hubs is the total number of hubs allowed between end stations. There are two types of 100BaseTX hubs: class I and class II. Class I hubs can have only one hub between communicating devices; class II hubs can have a maximum of two hubs between devices. This limitation is designed to ensure that when a collision occurs on a hub-based network, all stations in the collision domain have enough time to hear the collision and respond appropriately. If a 100BaseTX network uses mainly hubs to connect computers, a switch is often used in the center of an extended star to interconnect multiple hubs, as shown in Figure 3-13, to avoid this limita- tion. If you’re using only switches in your network, this limitation doesn’t apply. You’ll probably see hubs of any type only in older network installations; all new designs and upgrades use switches of at least 100 Mbps.
100BaseFX Ethernet In environments that aren’t conducive to using copper wiring to carry network data (such as electrically noisy settings) or where the cable run length exceeds the reach of twisted-pair wiring, the only real choice in a wired network is fiber optics. 100BaseFX (with the F indicating “fiber optic”), which uses two strands of fiber-optic cable, is often the best choice of network technology in these settings. Fiber-optic cable installation is
100BaseT hub
100BaseT hub
Switch
Figure 3-13 Using a switch to interconnect 100BaseTX hubs Courtesy of Course Technology/Cengage Learning
128 Chapter 3
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
still far more expensive than twisted-pair cable, but its advantages of being impervious to elec- trical noise and supporting longer cable segment lengths are worth the cost if the network requires these properties. 100BaseFX is rarely used as a complete replacement for 100BaseTX; instead, it’s typically used as backbone cabling between hubs or switches and to connect wir- ing closets between floors or buildings. It’s also used to connect client or server computers to the network when immunity to noise and eavesdropping is required.
1000BaseT Ethernet 1000BaseT Ethernet, released as the IEEE 802.3ab standard, sup- ports 1000 Mbps Ethernet (usually called Gigabit Ethernet) over Category 5 or higher UTP cable. The 1 Gbps data rate results from sending and receiving data simultaneously (in full- duplex mode) at 250 Mbps in both directions over each of the four wire pairs in Category 5 cable. Therefore, each wire pair can send and receive data at the same time at 250 Mbps, which results in a bandwidth of 1000 Mbps (or 1 Gbps) in each direction in full-duplex mode. To support full-duplex transmission over a single pair of wires, 1000BaseT uses equip- ment called hybrids and cancellers, which combine multiple signals and cancel interference. So if the link operates in half-duplex mode, the channel speed is 1000 Mbps (250 Mbps times four wire pairs). When operating in full-duplex mode, 1000BaseT actually delivers 2 Gbps total bandwidth. In most cases, it runs in full-duplex mode connected to switches.
Unlike 10BaseT and 100BaseT Ethernet, 1000BaseT Ethernet doesn’t dedicate a wire pair to transmitting or receiving. Each wire pair is capable of transmitting and receiving data simul- taneously, thereby making the 1000 Mbps data rate possible in both half-duplex and full- duplex modes. Similarly to 100BaseT, 1000BaseT allows only one hub or repeater between end stations when using half-duplex communication. Most installations use switches that detect the speed of the connected device automatically, whether it’s 10 Mbps, 100 Mbps, or 1000 Mbps. In addition, you’ll be hard-pressed to find a 1000BaseT hub/repeater to pur- chase, making the one-repeater limitation an unlikely problem in new network designs.
1000BaseT Ethernet has gained wide acceptance in corporate data centers to connect servers to central switches and connect power users’ desktop computers. Because 1000BaseT runs over standard Category 5 cable, the upgrade path for companies currently running 100BaseT is fairly simple. NICs and switches that don’t operate at 1000 Mbps must be replaced, but the cabling infrastructure doesn’t need to be. Although Category 5 cable is the minimum requirement, most new installations planning a 1000BaseT network should opt for Cat 5e or Cat 6 cable for their better high-speed transmission properties.
A power user is a network user who often uses the most recent technologies and runs high-end software and hardware that require more network resources than what the average user runs.
10GBaseT Ethernet The 2006 IEEE 802.3an standard defines 10 Gigabit Ethernet as running over four pairs of Category 6A UTP cabling. Unlike the other BaseT Ethernet stan- dards, 10GBaseT operates only in full-duplex mode, so you won’t find any 10 Gbps hubs— only switches. 10GBaseT isn’t likely to find its way into many desktop computers in the near future; a search for 10GBaseT NICs shows their cost at more than $1000 as of this writing. However, as more desktop systems begin operating at 1 Gbps, you might need to equip your network’s servers with 10 Gigabit Ethernet NICs so that they can keep up with desktop systems.
3
Network Technologies 129
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Additional Ethernet Standards Although the standards discussed previously constitute the majority of Ethernet LANs, quite a few other standards exist; some are common, and others are uncommon or obsolete. The following sections describe these other standards and their use in current networks briefly.
100BaseT4 As the name implies, 100BaseT4 Ethernet uses all four pairs of wires bundled in a UTP cable. The one advantage that 100BaseT4 has over 100BaseTX is the capability to run over Category 3 cable. When 100 Mbps speeds became available, many companies wanted to take advantage of the higher bandwidth. However, if the cable plant consisted of only Category 3 cable, there were just two choices: Replace the cabling with higher-grade Category 5 cabling so that 100BaseTX could be used, or use 100BaseT4 Ethernet. One of the biggest expenses of building a network is cable installation, so many organizations chose to get higher speeds with the existing cable plant by using 100BaseT4. Although these differences from 100BaseTX might seem like a good idea, 100BaseT4 never caught on and is essentially obsolete.
1000BaseLX 1000BaseLX uses fiber-optic media; the “L” stands for “long wavelength,” the kind of laser used to send signals across the medium. These lasers operate at wave- lengths between 1270 to 1355 nanometers and work with single-mode fiber (SMF) and mul- timode fiber (MMF). Long-wavelength lasers cost more than short-wavelength lasers but can transmit their signals over longer lengths of cable.
Although the 1000BaseLX standard specifies a maximum cable segment length of 5000 meters, some manufacturers have extended it by using specialized and proprietary optical transceivers. Cisco Systems, for example, offers 1000BaseLH (“LH” stands for “long haul”), which provides a maximum cable segment length of 10,000 meters over SMF cable. For extremely long-distance Gigabit Ethernet communication, 1000BaseZX, another Cisco product, is capable of distances up to 100,000 meters over SMF cable.
1000BaseSX 1000BaseSX uses fiber-optic media; the “S” stands for “short wavelength.” These lasers operate at wavelengths between 770 to 860 nanometers and work only with MMF cable. Short-wavelength lasers can’t cover as much distance as long-wavelength lasers, but they are less expensive (and use cheaper MMF cable).
1000BaseCX 1000BaseCX uses specially shielded, balanced, copper jumper cables; the “C” stands for “copper,” the kind of electrical signaling used. Jumper cables are normally used for interconnections between devices or to link virtual LANs (VLANs) on a switch; these jumper cables might also be called “twinax” (short for “twin-axial”) or “short-haul” copper cables. Segment lengths for 1000BaseCX cables top out at 25 meters, which means they’re used mostly in wiring closets or equipment racks.
10 Gigabit Ethernet: IEEE 802.3ae Standards The 802.3ae standard governing several varieties of 10 Gigabit Ethernet before 10GBaseT was adopted in June 2002. This Ethernet version is much like the others in frame formats and media access method. However, it does have some important technical differences. It’s defined to run only on fiber-optic cabling, but the 10 Gigabit Ethernet standard specifies a maximum distance of 40 kilometers, compared with just 5 kilometers for the 1000BaseLX Gigabit Ethernet. This distance has important implications for WANs and MANs because although most WAN
130 Chapter 3
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
and MAN technologies can be measured in megabits, 10 Gigabit Ethernet provides band- width that can transform how WAN speeds are considered. Like 10GBaseT Ethernet, 802.3ae 10 Gigabit Ethernet technologies run in full-duplex mode only, so the CSMA/CD access method isn’t necessary.
The primary use of 10 Gigabit Ethernet technologies is as the network backbone, intercon- necting servers and network segments running 100 Mbps and 1000 Mbps Ethernet technol- ogies. However, they also have their place in storage area networks (SANs) and, along with 10GBaseT, can be used as the interface for enterprise-level servers.
As this technology matured, a number of implementations were developed that are divided into two basic groups: 10GBaseR for LAN applications and 10GBaseW for WAN applica- tions. The W group of standards uses SONET framing over OC-192 links. (SONET and OC standards are explained in Chapter 12). Both groups have (S)hort range, (L)ong range, and (E)xtended range versions. The short-range versions use MMF fiber-optic cabling, and the long-range and extended-range versions run over SMF fiber-optic cabling. (These fiber-optic types are discussed in Chapter 4.) The following list summarizes the 802.3ae technologies:
● 10GBaseSR—Runs over short lengths (between 26 and 82 meters) on MMF cabling. Applications are likely to include connections to high-speed servers, interconnecting switches, and SANs.
● 10GBaseLR—Runs up to 10 km on SMF cabling and is used for campus backbones and MANs.
● 10GBaseER—Runs up to 40 km on SMF cabling; used primarily for MANs. ● 10GBaseSW—Uses MMF cabling for distances up to 300 meters; used for SONET
campus network applications. ● 10GBaseLW—Uses SMF cabling for distances up to 10 km; used for SONET WAN
applications. ● 10GBaseEW—Uses SMF cabling for distances up to 40 km; used for SONET WAN
applications.
40 Gigabit and 100 Gigabit Ethernet: The 802.3ba Standard IEEE 802.3ba was ratified on June 17, 2010, and vendors are already shipping or announcing products. Some goals for 40 Gigabit Ethernet include the capability to transmit up to 10 kilometers over SMF fiber-optic cabling and at least 7 meters over a special copper wire assembly; for 100 Gigabit Ethernet, goals include transmitting up to 40 km over SMF cabling and 7 meters over copper. The existing frame format is preserved, meaning these new high-speed versions are backward-compatible with slower standards.
Although the 802.3ba task force has completed its work, you can read about how this new standard came to be at www.ieee802.org/ 3/ba/index.html.
As you can see, Ethernet has come a long way since Xerox transmitted at 3 Mbps over coaxial cable, and the journey from 3 Mbps to 10 Gbps isn’t over yet. Table 3-2 summarizes many features and properties of the Ethernet standards discussed in this section.
3
Network Technologies 131
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
What’s Next for Ethernet? Estimations are that Ethernet speeds will continue to increase, with Terabit Ethernet (1000 Gbps) available by 2015. This kind of mind-boggling speed will allow networks to transfer data across a city faster than some CPUs can transfer data to memory. When Internet providers begin using this level of bandwidth to connect to the Internet backbone and when homes and businesses can tap into it, too, extraordinary amounts of information will be at your fingertips. This speed has major implications for the entertainment industry and many other fields. The Ethernet train is revving up, and it promises to be an exhilarating ride.
Table 3-2 Ethernet standards and properties
Ethernet standard
IEEE document #
Transmission speed Cable type
Minimum cable grade
Maximum distance Design notes
10BaseT 802.3i 10 Mbps UTP Cat 3 100 meters Maximum four hubs between stations
100BaseT/TX 802.3u 100 Mbps UTP Cat 5 100 meters Maximum two hubs between stations
100BaseFX 802.3u 100 Mbps MMF or SMF N/A 2 km over MMF, 10 km over SMF
1000BaseT 802.3ab 1000 Mbps UTP Cat 5 (Cat 5e or 6 preferred)
100 meters Maximum one hub between stations
10GBaseT 802.3an 10 Gbps UTP Cat 6A 100 meters Full-duplex only; no hubs
100BaseT4 802.3u 100 Mbps UTP Cat 3 100 meters Obsolete; saw little use
1000BaseLX 802.3z 1000 Mbps MMF or SMF N/A 550 meters over MMF, 5 km over SMF
1000BaseSX 802.3z 1000 Mbps MMF N/A 550 meters
1000BaseCX 802.3z 1000 Mbps Twinax N/A 25 meters Succeeded by 1000BaseT
10GBaseSR 10GBaseLR 10GBaseER 10GBaseSW 10GBaseLW 10GBaseEW
802.3ae 10 Gbps MMF or SMF N/A Varies from 82 meters up to 40 km
Choice of technology depends on application
40 Gigabit Ethernet and 100 Gigabit Ethernet
802.3ba 40 and 100 Gbps
MMF, SMF, and copper assembly
N/A 40 km over SMF, 7 meters over copper
Standard ratified June 17, 2010
132 Chapter 3
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Hands-On Project 3-2: Determining and Changing Your Ethernet Standard
Time Required: 15 minutes
Objective: Determine your Ethernet standard and change your connection speed to use a different standard.
Required Tools/Equipment: Classroom computers connected to a classroom hub or switch. The hub or switch and NICs must be capable of connecting at multiple speeds. For example, if you’re using a 10/100 Mbps switch, and your NICs are capable of 10/100 Mbps, you change the connection speed to the slower rate. If possible, each student should be assigned a separate partner. Separate lab computers and a hub or switch can also be used for this project.
Description: In this project, you view your network connection properties to see at what speed your NIC is operating. Then you send a large ping message and note how long the reply takes. Next, you change the speed, if your NIC driver allows, and perform the same ping to see whether you can detect a time difference.
This project works best with physical computers rather than virtual machines. Even if you change the connection speed on the virtual machine, it transmits bits at the host computer’s connection speed.
1. Log on to your computer as NetAdmin.
2. Open a command prompt window, and then type ipconfig and press Enter. Exchange your IP address with your partner and write down your partner’s IP address. Leave the command prompt window open for later.
3. Click the network connection icon in the taskbar and click Open Network and Sharing Center.
4. In the Network and Sharing Center, click Local Area Connection to open the Local Area Connection Status dialog box (see Figure 3-14).
5. In the Connection section, find the connection speed. Write down this information and, based on the speed listed, the Ethernet variety your computer is running: ● Connection speed: ● Ethernetvariety:
6. At the command prompt, ping your partner by typing ping -l 60000 IPaddress and pressing Enter. The -l 60000 option in the command specifies that the ping message should be 60000 bytes instead of the typical length of 32 bytes. Note the time¼ values in the ping replies and write them down. For example, yours might say “time¼ 2ms,” meaning the reply took 2 milliseconds. Not all times might be the same. Sometimes the first time is slower than the rest. Try pinging a few times to get an idea of the average time. ● Ping reply times:
7. Click the Properties button, and in the Local Area Connection Properties dialog box, click Configure.
3
Network Technologies 133
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
8. Click the Advanced tab. In the Property list box, click Link Speed & Duplex (or a simi- lar name). Figure 3-15 shows the connection options. Not all NICs have the same options, so you might see different options.
9. The default setting is usually Auto Negotiation. Click 10 Mpbs Half Duplex if this option is available, and then click OK. If you were able to set this option, what speed and variety of Ethernet is your computer running now?
● Connection speed: ● Ethernet variety:
Figure 3-14 The Local Area Connection Status dialog box Courtesy of Course Technology/Cengage Learning
134 Chapter 3
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
10. After you and your partner have changed the connection speed to a lower value, repeat the ping command you used in Step 6. Write down the reply times, and state whether they were different:
● Ping reply times at 10 Mbps:
11. Figure 3-16 shows two sets of ping results. The first result was from two computers connected at 1 Gbps (1000 Mbps) in full-duplex mode. The average reply took 5 ms. The second result was with the same computers connected at 10 Mbps half-duplex, and the average reply took 103 ms. Change your connection speed and duplex mode back to Auto Negotiation, and then close all open windows. Leave your computer run- ning for the next project.
Figure 3-15 Settings for the Link Speed & Duplex property Courtesy of Course Technology/Cengage Learning
3
Network Technologies 135
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Hands-On Project 3-3: Viewing an Ethernet Frame
Time Required: 20 minutes
Objective: Capture packets and examine details of the Ethernet II frame format.
Required Tools/Equipment: Classroom computers connected to a classroom hub or switch with Wireshark installed
Description: In this project, you capture some packets and then examine the frame and pro- tocol headers.
1. If necessary, log on to your computer as NetAdmin.
2. Start Wireshark and click Capture Options. In the Capture Filter text box, type icmp, and then click Start.
3. Open a command prompt window, and then type ping IPaddress and press Enter (replacing IPaddress with the IP address of another student’s computer or another device on your network).
4. In Wireshark, click the Stop the running live capture toolbar icon to stop the capture.
5. Click a packet summary in the top pane with ICMP listed in the protocol field.
6. In the middle pane, click to expand the Ethernet II row. It should look similar to Figure 3-17.
Figure 3-16 Ping results at different connection speeds Courtesy of Course Technology/Cengage Learning
136 Chapter 3
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
7. Notice the three fields in the Ethernet II frame: Destination, Source, and Type. The Des- tination and Source fields are the destination and source MAC addresses in the frame. In Figure 3-17, you see Cisco before the destination address and Vmware before the source address because Wireshark attempts to resolve the NIC manufacturer coded in the MAC address’s first six digits. The full MAC address (without manufacturer name) is shown in parentheses. The Type field has the value 0x800, which indicates that the protocol in the frame is IP. Click to expand the Internet Protocol row.
8. Under Internet Protocol, you see details of the IP header, including the destination and source IP addresses. Click to expand the Internet Control Message Protocol row to view details of the ICMP protocol header. (You learn more about IP-related protocols in Chapter 5.)
9. Click to expand the Data portion of the frame, and then click the Data field to see the ICMP message data in hexadecimal in the bottom pane. The right side of this pane shows the translation from hexadecimal to ASCII (human-readable characters); as you can see, it’s just portions of the alphabet repeated. Some Ping programs include more clever data, such as “Hello, are you there?” The actual data in a ping message doesn’t matter; what matters is that the reply contains the same data as the ping request.
10. Exit Wireshark and click Quit without Saving when prompted. Close the command prompt window.
11. Stay logged on if you’re going on to the next project; otherwise, shut down your computer.
802.11 Wi-Fi The 1997 802.11 wireless networking standard, also referred to as Wireless Fidelity (Wi-Fi), has continued to undergo development. With it, manufacturers of wireless networking devices have brought inexpensive, reliable wireless LANs to homes and businesses. The cur- rent standards include 802.11b, 802.11g, and 802.11n running at a 2.4 GHz frequency with speeds of 11 Mbps, 54 Mbps, and up to 600 Mbps, respectively. 802.11a isn’t as prevalent as the other 802.11 standards; it specifies a bandwidth of 54 Mbps at a 5 GHz frequency.
Of these competing standards, 802.11b and 802.11g are the most widespread at this writing because they have been in use the longest. 802.11g is backward-compatible with 802.11b and, therefore, offers a convenient bandwidth upgrade path. 802.11n is the newest Wi-Fi standard, completed in October 2009. It can operate in the 2.4 GHz or 5 GHz frequency range and is backward-compatible with 802.11b and 802.11g. It’s capable of speeds up to 600 Mbps by using the multiple-in, multiple-out (MIMO) technique. This technique uses multiple antennas and divides available frequency ranges into multiple channels to achieve
Figure 3-17 An Ethernet II frame in Wireshark Courtesy of Course Technology/Cengage Learning
Network Technologies 137
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
high speeds. However, 600 Mbps is the maximum bandwidth possible under 802.11n; actual speeds of common devices are typically 100 to 300 Mbps.
Essentially, 802.11 wireless is an extension to Ethernet, using airwaves as the medium. In fact, most 802.11 networks incorporate some wired Ethernet segments. The 802.11 networks can extend from several feet to several hundred feet, depending on environmental factors, such as obstructions and radio frequency interference. The prevalence of people owning 802.11-enabled laptops, iPads, and cell phones has spawned a new mode for accessing the Internet. Many busi- nesses have set up Wi-Fi hot spots, which are localized wireless access areas. You can sit outside your favorite coffee shop, for example, and use a wireless Internet connection with your portable devices. College campuses, too, are using hot spots so that students can sit in a courtyard between classes and access the campus network and the Internet with their Wi-Fi–enabled laptops.
For more information on 802.11 standards, see www.wi-fiplanet.com.
Wi-Fi Modes Wi-Fi networks can operate in one of two modes: infrastructure and ad hoc. Most Wi-Fi networks operate in infrastructure mode, meaning wireless stations connect through a wireless AP before they can begin communicating with other devices. Ad hoc mode, sometimes called peer-to-peer mode, is a wireless mode of operation typically used only in small or temporary installations. There’s no central device, and data travels from one device to another in a line (more or less). If you want to describe ad hoc mode in terms of a physical and logical topology, it most resembles a physical and logical bus. Most of this chapter’s discussion of Wi-Fi focuses on infrastructure mode.
Ad hoc mode should not be used in public environments because it’s less secure than infrastructure mode.
Wi-Fi Communication Channels Wi-Fi networks operate at one of two radio fre- quencies: 2.4 GHz and 5.0 GHz. However, this frequency is not fixed. The 2.4 GHz Wi-Fi variety, which includes 802.11b, g, and n, operates from 2.412 GHz through 2.484 GHz, divided into 14 separate 5 MHz channels (although only the first 11 channels are used in North America, and other regions have channel use restrictions). The 5.0 GHz Wi-Fi variety divides frequencies between 4.915 GHZ and 5.825 GHz into 42 channels of 10, 20, or 40 MHz each, depending on the region of the world where it’s used. The remainder of the dis- cussion about Wi-Fi channels pertains to 2.4 GHz Wi-Fi because it’s the most popular, but most points also apply to the 5.0 GHz varieties.
A wireless channel works somewhat like a TV channel, in which each channel works at a dif- ferent frequency and can, therefore, carry different streams of data. When you configure a wireless AP, you can choose the channel in which it operates (see Figure 3-18). By choos- ing a channel that’s not in heavy use, you can improve reception and throughput rate. However, 2.4 GHz Wi-Fi actually requires 25 MHz to operate correctly, effectively span- ning five channels. So if you’re configuring several Wi-Fi networks, you should choose
138 Chapter 3
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
channels that are five apart; for example, if you configure three Wi-Fi networks in close proximity, choose channels 1, 6, and 11.
Several tools are available that scan channels to see how much activity is on each. You can then configure your AP to operate on a less frequently used channel. Figure 3-19 is an example of the output of the program inSSIDer and shows that a number of Wi-Fi networks were detected. Each one is labeled with its SSID.
Wi-Fi runs in the vast range of frequencies encompassed by microwave radio. For this rea- son, a microwave oven can cause interference in a Wi-Fi network. The result of this interfer- ence can vary from a slight loss in signal strength to disconnection from the network while the oven is running. A change in Wi-Fi channels can sometimes lessen the effects of micro- wave oven interference. In addition, some cordless phones use the same frequencies as Wi-Fi networks. If a cordless phone is causing interference, try changing the channel of the AP, the cordless phone (if possible), or both.
Wi-Fi Security Because the network signals and, therefore, network data, of a Wi-Fi network aren’t constrained by physical media, access to a Wi-Fi network must be secure. The signals from a Wi-Fi network can travel several hundred feet, which means Wi-Fi devices outside your home or business can detect them. A person with a Wi-Fi–enabled device sitting
Figure 3-18 Selecting a Wi-Fi channel on an access point Courtesy of Course Technology/Cengage Learning
3
Network Technologies 139
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
outside your home or business can connect to an unsecured network and use your Internet access to capture packets with a program such as Wireshark—or worse, access files on your computers.
At the least, a Wi-Fi network should be protected by an encryption protocol that makes data unauthorized users capture extremely difficult to interpret. Wi-Fi devices typically support one of these encryption protocols, listed in order of effectiveness: Wired Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA), and Wi-Fi Protected Access 2 (WPA2). Not all devices support all three protocols; in particular, older devices might support only WEP and/or WPA. Wi-Fi encryption is configured on the AP, so to connect to the network, Wi-Fi devices connecting to the AP must be configured for the particular encryption proto- col. Wi-Fi security is discussed in more depth in Chapters 7 and 11.
WEP should be used only when it’s the only option available because its encryption protocols are easily broken.
Wi-Fi Access Method and Operation You have learned about CSMA/CD as the access method in wired forms of Ethernet, but wireless networks have a special problem with this access method. CSMA/CD requires that all stations be able to hear each other so that each station knows when another station is sending data. This requirement is reasonable, but if two stations try to send at the same time, a collision can occur. Fortunately, in a wired network, sending stations hear the collision and attempt to resend the data. If you’ve ever used a push- to-talk handheld radio, you know that when you’re talking, you can’t hear anybody else talk- ing, and vice versa. 802.11 networks work the same way. If a station transmits data, it can’t hear whether any other station is transmitting, so if a collision does occur, the sending station doesn’t detect it. For this reason, 802.11 specifies the Carrier Sense Multiple Access with
Figure 3-19 Wi-Fi network channel activity Courtesy of Course Technology/Cengage Learning
140 Chapter 3
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Collision Avoidance (CSMA/CA) access method, in which an acknowledgement is required for every packet sent, as explained in Chapter 2. With this requirement, if a collision occurs, the sending station knows the packet didn’t arrive safely because there’s no acknowledgement. Simulation 8 on the book’s CD shows a simulation of basic wireless LAN operation.
Simulation 8: Basic wireless LAN operation
Another problem exists in wireless networks that doesn’t happen in wired networks. It’s quite possible that in a three-station wireless network, all workstations can communicate with the AP: For example, workstation A can hear workstation B and workstation B can hear workstation C, but workstation A can’t hear workstation C, perhaps because the two are out of range. This situation is called the “hidden node problem.” CSMA/CA doesn’t work because workstation A never knows whether workstation C is sending, and vice versa. To counteract this problem, the 802.11 standards specify another feature that uses handshaking before transmission. As described in Chapter 2, a station must send the AP a request-to-send (RTS) packet requesting transmission. If it’s okay to transmit, the AP sends a clear-to-send (CTS) message, and the workstation starts its communication. All other devices communicating with the AP hear the exchange of RTS and CTS messages, thus informing them that another device has control of the medium.
The 802.11b standard specifies a transmission rate of 11 Mbps, but this value isn’t absolute. Environmental conditions can prevent transmission at this speed. Therefore, transmission speeds might be dropped incrementally from 11 Mbps to 5.5 Mbps to 2 Mbps and, finally, to 1 Mbps to make a reliable connection. In addition, there’s no fixed segment length for wireless networks because reliable communication relies heavily on the environment—for example, the number of walls between stations and the AP. The other three 802.11 standards behave similarly.
In general, an 802.11 network operating at 2.4 GHz has a maximum distance of 300 feet at full speed with no obstructions. However, this distance can be longer with 802.11n and large, high-quality antennas. Keep in mind that the data rate might suffer as the distance and number of obstructions increase.
For an excellent tutorial on wireless networking, visit www.networkcomputing.com/1115/1115ws22.html.
Hands-On Project 3-4: Configuring an Ad Hoc Wi-Fi Network
Time Required: 20 minutes
Objective: Configure an ad hoc Wi-Fi network.
Required Tools/Equipment: Two or more computers with 802.11 wireless NICs installed. USB wireless NICs work well because they don’t require opening the computer case. Laptops with
3
Network Technologies 141
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
built-in wireless NICs will also do. The 802.11 standard supported doesn’t matter as long as the NICs are compatible with one another. These instructions are written for Windows 7, but some steps can be changed to accommodate Vista. Windows XP requires substantial changes to the steps.
Description: All students go through the steps of creating an ad hoc Wi-Fi network, but only one person in each group can actually create the network. You can work in groups of two to four or more, but each group must use a different ad hoc network name. For example, if each group is assigned a number, the network names can be AdHoc1, AdHoc2, and so forth. After the ad hoc network is created by the first person in each group who does the steps, the other members of the group cancel the creation of the ad hoc network and then connect to the ad hoc network the first group member created.
1. Start your computer and log on as NetAdmin. If the wireless NIC isn’t installed yet, install it according to your instructor’s instructions.
2. After the wireless NIC is installed, click the network connection icon in the taskbar and click Open Network and Sharing Center.
3. In the Network and Sharing Center, click Set up a new connection or network, and then click Next in the welcome window.
4. In the Choose a connection option window, click Set up a wireless ad hoc (computer- to-computer) network, and then click Next. Click Next again.
5. In the Network name text box, type AdHocX (replacing X with your group number). Click the Security type list arrow and click No authentication (Open), as shown in Figure 3-20. Click Next.
6. Only one person can create an ad hoc network with a particular name. After the network is created, anyone else can connect to it. If you’re the first person to create the network, you see a window like Figure 3-21. If the network was already created, you see a window like Figure 3-22. If the network already exists, click Cancel; otherwise, click Close.
Figure 3-20 Creating an ad hoc wireless network Courtesy of Course Technology/Cengage Learning
142 Chapter 3
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
7. In the Network and Sharing Center, click Connect to a network. If you’re the one who created the ad hoc network, you are already connected. If not, click the AdHocX network you’re assigned to, and then click Connect.
3
Figure 3-21 Successful creation of an ad hoc network Courtesy of Course Technology/Cengage Learning
Figure 3-22 The ad hoc network already exists Courtesy of Course Technology/Cengage Learning
Network Technologies 143
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
8. In the Network and Sharing Center, click Change adapter settings. Double-click Wireless Network Connection to view the connection’s status, which includes the connection speed and the SSID (AdHocX). Click Details.
9. In the details window, note your IP address. Share this address with one or more people in your group, and then ping one of your group members to verify that you can com- municate. You won’t be able to communicate with members of other AdHocX net- works. If the ping fails, it’s probably because Windows 7 identified the network as a public network, and Windows Firewall blocked the ping packets. You can turn off the Public profile in the firewall (ask your instructor how to do this) if you want the ping to succeed. Be sure to enable the firewall when you’re finished.
10. Close all open windows. Click the wireless network connection icon in the taskbar. Click the AdHocX network to which you’re connected and click Disconnect. Shortly after all computers are disconnected from an ad hoc network, it’s no longer displayed as an available wireless network.
11. If your wireless NIC is a USB device, you can remove it now. Stay logged on if you’re going on to the next project; otherwise, shut down your computer.
Token Ring Networks Developed by IBM in the mid-1980s, the token ring network technology provides reliable, albeit slow by today’s standards, transport of data. Based on the IEEE 802.5 standard, token ring networks are cabled in a physical star topology but function as a logical ring, as shown earlier in Figure 3-8. Token ring originally operated at 4 Mbps, but this speed increased to 16 Mbps and later to 100 Mbps. A 1000 Mbps standard was approved in 2001, but by that time, the token ring technology had clearly lost out to 100 Mbps Ethernet, and no 1000 Mbps products were ever manufactured in quantity. Most token ring networks used Category 4 or higher UTP.
Token Ring Media Access Token ring uses the token-passing media access method, which is where the technology gets its name. Using this method, a special frame called the “token” passes from one computer to the next. Only the computer holding the token can send data, and a computer can keep the token for only a specific amount of time. If the computer with the token has no data to send, it passes the token to the next computer.
Because only the computer with the token can transmit data, this method prevents collisions. Computers no longer spend time waiting for collisions to be resolved, as they do in a CSMA/ CD network. All computers have equal access to the medium, which makes token-passing networks best suited for time-sensitive environments, such as banking transactions and data- bases requiring precise timestamps. Also, because traffic moves in a specific “direction” around a ring topology, faster access methods (such as 100 Mbps token ring) can circulate two tokens at the same time without fear of collision. (By keeping the two sets of messages from overlapping, both tokens can circulate in order.)
However, token passing has two disadvantages. First, even if only one computer on the network has data to send, it must wait to receive the token. If its data is large enough to warrant two or more “turns” at the token, the computer must wait until the token makes a complete circuit before starting its second transmission. Second, the complicated process of
144 Chapter 3
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
creating and passing tokens requires more expensive equipment than what’s used on CSMA/ CD networks. This additional expense and complication is in part what led to token ring quickly becoming second best in LAN technologies, compared with 100 Mbps and switched Ethernet. Because token ring is no longer a widely used LAN technology, additional operat- ing details about it have been moved to Appendix B.
Fiber Distributed Data Interface Technology Fiber Distributed Data Interface (FDDI) uses the token-passing media access method and dual rings for redundancy. The rings in an FDDI network are usually a physical ring of fiber- optic cable. FDDI transmits at 100 Mbps and can include up to 500 nodes over a distance of 100 kilometers (60 miles). FDDI full-duplex technology, an extension to standard FDDI, can support up to 200 Mbps. Like token ring, FDDI uses token passing; however, FDDI’s token- passing scheme is based on IEEE 802.4 rather than IEEE 802.5. An FDDI network has no hubs; devices generally connect directly to each other. However, devices called “concentra- tors” can serve as a central connection point for buildings or sites in a campus setting.
Much like token ring, FDDI technology lost out to faster versions of Ethernet and is now obsolete for new network designs. It had its heyday in the early to mid-1990s when Ethernet was operating at only 10 Mbps and switched Ethernet was just being developed. If you want to buy FDDI products now, you’ll be purchasing used products, as new products aren’t avail- able. Therefore, details on FDDI have been relegated to Appendix B.
Internet Access Technologies This section describes the Internet access technologies most commonly used by small office/ home office (SOHO) networks to share Internet access for all workstations on the network: cable modem, DSL, and satellite. These technologies are in contrast to the WAN technologies often used by large businesses to access the Internet and communicate with remote offices. WAN technologies are discussed in Chapter 12.
Cable Modem Cable modem networking is a broadband technology used to deliver Internet access to homes and businesses over standard cable television (CATV) coaxial cable. Because it’s a broadband technology, data delivered to a cable modem shares the same cable as the channels delivered to your TV. In fact, Internet data simply travels on a TV channel that’s not used by the cable company. The official standard governing cable modem operation is Data Over Cable Service Interface Specification (DOCSIS). Although cable modems are considerably more complicated than dial-up modems, they are true mod- ems in the sense that they modulate and demodulate signals.
Cable modem networks share some properties of traditional 10Base2 Ethernet. They are shared-media, bus topology networks at the point where data is delivered to a home. Other parts of a cable modem network use high-speed WAN technologies, as shown in Figure 3-23.
Cable modems have exploded in popularity because of the high speeds at which Internet data can be delivered to homes and businesses. With the newest DOCIS 3.0 stan- dard (called Wideband Internet), Internet data can be delivered to customers at speeds up to 60 Mbps, although most ISPs don’t support this standard in all areas as of this writing. Most cable Internet companies still deliver between 1 Mbps and 10 Mbps bandwidth to their customers.
3
Network Technologies 145
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Cable modems use an asymmetrical communication scheme—data rates going to the home (downstream rates) are higher than data rates coming from the home to the cable provider (upstream rates). Upstream data rates can be as much as 10 Mbps but are usually limited to between 256 Kbps and 1 Mbps.
Cable modems provide bandwidth to users as a form of shared media access. That is, all users on a CATV cable segment (usually part of a neighborhood or large building, for example) share available bandwidth. Therefore, more users (or more traffic per user) mean less bandwidth per user because access is shared. One powerful advantage of cable modem access, however, is that distance limitations don’t govern functionality. As long as users have access to cable TV and the cable company offers Internet access on the local cable seg- ment, users can install a cable modem and access the Internet.
Shared access in this context means the medium from your cable connection to the cable company (the ISP) is shared by other users in your location. After data reaches the ISP and goes out to the Internet, the medium is shared by all other Internet users.
Internet
Home
Home
Business
Cable drop
Cable drop
Cable drop
Regional cable head-end site
IP backbone network
Public switched telephone network
Fiber-optic transport Coaxial cable
SONET or ATM network
Distribution hub
Distribution hub
Distribution hub
Figure 3-23 A typical cable modem network Courtesy of Course Technology/Cengage Learning
146 Chapter 3
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Aside from performance issues caused by shared access media in cable modem networks, security was a concern in early cable networks because users who shared the same cable seg- ment could eavesdrop on others’ communication sessions. However, networks complying with the DOCSIS standard use a strong encryption key for each user connection, which ensures privacy and security on the shared portion of the cable network.
Cable Modem Operation From a user’s standpoint, a cable modem is straightfor- ward: Plug the cable from the wall outlet into the cable modem, and then plug a network cable from the cable modem to a PC or router (Figure 3-24).
One reason for the success of cable Internet access is that most people already have cable TV in their homes, so no additional cabling is required, and people are comfortable with cable TV technology. The cable modem, like your TV, has a tuner that “tunes in” the frequencies for upstream and downstream channels for Internet access. From there, these signals are converted (modulated) into the Ethernet signals your computer or router requires. When you send data, the signals are modulated into a form required by the cable medium. A cable modem even has a MAC address, which serves two purposes. The cable company uses it to determine whether your device is allowed on the network, and much like a NIC, a cable modem compares the destination address of incoming data to determine whether the modem should process arriving data.
For a wealth of information on cable modem technologies, see www.cablelabs.com/cablemodem/.
3
Network cable from cable modem to NIC
Cable modem
CATV cable from cable provider
Internet
Figure 3-24 A typical cable modem connection Courtesy of Course Technology/Cengage Learning
Network Technologies 147
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Digital Subscriber Line Digital Subscriber Line (DSL) warrants special mention in this section, as it competes with cable modem technologies for Internet access. This broad- band technology uses existing phone lines to carry voice and data simultaneously. Many variations of DSL are available; the most prominent for home Internet access is Asymmetric DSL (ADSL), named because the download and upload speeds differ substantially, so the data rates aren’t symmetrical. ADSL splits the phone line into two frequency ranges: Frequencies below 4 KHz are used for voice transmission, and frequencies above 4 KHz are used to transmit data. Typical connection speeds for downloading data range from 256 Kbps to 8 Mbps; upload speeds are typically much slower, in the range of 16 Kbps to 640 Kbps.
To deliver digital services, DSL uses the same twisted-pair phone lines that deliver voice ser- vices. Unlike cable modem connections, DSL media aren’t shared in the connection between the user and ISP, so they offer subscribers guaranteed bandwidth. Because bandwidth is guaranteed, however, upstream and downstream data rates are metered. Users must pay more for higher bandwidth connections. Nevertheless, DSL is a great SOHO technology, par- ticularly in areas where cable modem is unavailable. Most DSL connections top out at around 1.5 Mbps bandwidth, but it’s possible to achieve rates of about 6 Mbps downstream.
DSL’s main disadvantage is its distance limitation (measured as the wire runs) between the user’s location and the nearest central office (CO), where a copper-to-fiber interface device links to the telecommunication carrier’s digital backbone. Depending on which vendor’s equipment is used, this distance limitation varies between 17,500 feet (3.31 miles or 5.33 kilometers) and 23,000 feet (4.36 miles or 7.01 kilometers). Therefore, it’s important to measure a connection point’s distance from the local CO to determine whether DSL is a via- ble network option.
Another DSL variation is Symmetric DSL (SDSL), and its upload and download speeds are the same, so if the download speed is 4 Mbps, the upload speed is also 4 Mbps. SDSL is often chosen for businesses operating a Web site because the amount of traffic uploaded and downloaded is likely to be similar.
DSL and cable modems share one important advantage over asynchronous modems— they’re always on. Both technologies maintain constant connections to a remote server on the other side of the connection, so there’s little or no delay to establish a connection, as with a conventional modem. Given the higher bandwidth, faster access, and lower cost of digital connections, it’s no wonder that droves of users are switching from dial-up modems to digital alternatives for SOHO connections.
For more information on DSL, see www.dslreports.com.
Satellite Technologies If neither DSL nor cable modem are available and dial-up speeds are too frustrating, satellite Internet is another option. Speeds are comparable with where cable modem was several years ago and many DSL providers still are: download speeds of 1.5 Mbps and uploads speeds of about 256 Kbps. For quite a bit more money,
148 Chapter 3
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
satellite download speeds can be increased to up to 5 Mbps with 300 Kbps upload speeds. Unfortunately, most satellite offerings have limitations on the daily amount of data that can downloaded, making these options somewhat of a last resort for high-speed Internet.
Early implementations of satellite Internet required a regular dial-up modem for the upstream connection, but that’s no longer the case. Two well-known satellite Internet providers are HughesNet and WildBlue. WildBlue focuses on residential customers only; HughesNet provides service for residential customers and offers some higher bandwidth options for businesses.
WiMAX: Wireless Internet Access Worldwide Interoperability for Microwave Access (WiMAX) comes in two flavors: 802.16-2004 (previously named 802.16d), or fixed WiMAX, and 802.16e, or mobile WiMAX. These standards provide wireless broadband to outlying and rural areas, where last-mile wired connections (connections between a service provider and homes or businesses) are too expensive or impractical because of rough ter- rain, and to mobile users so that they can maintain a high-speed connection while on the road. Fixed WiMAX delivers up to 70 Mbps of bandwidth at distances up to 30 miles, and mobile WiMAX has a coverage area of 3 to 10 miles. Developing standards promise up to 100 Mbps for mobile WiMAX and up to 1 Gbps for fixed WiMAX.
Besides providing wireless network service to outlying areas, fixed WiMAX is being used to deliver wireless Internet access to entire metropolitan areas rather than the limited-area hotspots available with 802.11. It can blanket an area up to a mile in radius, compared with just a few hundred feet for 802.11. Los Angeles has implemented WiMAX in an area of downtown that encompasses a 10-mile radius.
Mobile WiMAX brings broadband Internet roaming to the public. Although fixed WiMAX can create a wider hot spot than 802.11 wireless networks, network users are still confined to the coverage area. After a user leaves the coverage area of a transmitting station, his or her connection is dropped. Mobile WiMAX enables users to roam from area to area with- out losing the connection, which offers mobility much like cell phone users have. It’s consid- ered a fourth-generation (4G) wireless technology, and companies such as Clearwire (in its CLEAR product) are using it to provide Internet access to people who want to stay con- nected while on the move. CLEAR offers typical bandwidth between 3 and 6 Mbps. Several computer manufacturers, such as Dell, Toshiba, and others, offer WiMAX-enabled laptops, or you can buy a USB WiMAX modem to connect a laptop or desktop computer to a WiMAX network. In addition, Clearwire offers CLEAR Spot devices, which create mobile hotspots to connect up to eight Wi-Fi–enabled computers to a CLEAR network.
To read more about this evolving technology, go to www.wimax.com.
3
Network Technologies 149
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Chapter Summary ■ Networks can be described by a physical and logical topology. The physical topology
describes the arrangement of cabling that connects one device to another. The logical topology describes the path data travels between devices. The logical and physical topology can be, and often are, different.
■ The main physical topologies are the bus, star, ring, and point-to-point. A physical bus topology is simple but is no longer in common use because of a number of weak- nesses. A star topology, along with the extended star, is the most common for imple- menting LANs. A physical ring topology isn’t in widespread use now but was used mainly in network backbones. Point-to-point topologies are used primarily in WANs and with wireless bridges. Several point-to-point connections can create a mesh topology for the purpose of redundancy.
■ The main logical topologies are bus, ring, and switched. A logical bus can be imple- mented as a physical star or a physical bus and is used with hub-based Ethernet and Wi-Fi networks. A logical ring can be implemented as a physical ring or a physical star and is most commonly seen in token ring and FDDI networks. The switched topology uses a physical star and is used with Ethernet networks using a switch in the center of a star physical topology.
■ A network technology defines the structure of frames and how a network interface accesses the medium to send frames. It often defines the media types that must be used to operate correctly.
■ The most common network technology for LANs is Ethernet. It’s described in IEEE 802.3 and has many subcategories, including 10BaseT, 100BaseT, and 1000BaseT, that use twisted-pair copper cabling. Ethernet uses the CSMA/CD access method, which is turned off when a full-duplex connection is established. Other Ethernet standards include fiber-optic implementations, such as 100BaseFX and 1000BaseLX, among others.
■ Wi-Fi is a wireless technology based on Ethernet, but it uses the CSMA/CA media access method. The most common Wi-Fi standards are 802.11b, 802.11g, 802.11a, and 802.11n with speeds of 11 Mbps, 54 Mbps, 54 Mbps, and up to 600 Mbps, respectively.
■ Token ring and FDDI are obsolete technologies that used a token-passing access method. Token ring operated at speeds of 4 Mbps and 16 Mbps and ran over twisted- pair cabling, whereas FDDI ran over fiber-optic cabling at 100 Mbps.
■ Internet access technologies include cable modem, DSL, satellite, and WiMAX. Cable modem is among the most common of these technologies, as it’s usually available wherever there’s cable TV access. DSL is widely available, but you must live within a few miles of your phone provider. Satellite is becoming somewhat more common, replacing dial-up in areas that don’t have other high-speed options. WiMAX is fairly new and provides wireless Internet access to outlying areas and can give mobile users in a metropolitan area fast Internet access.
150 Chapter 3
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Key Terms 1000BaseT Ethernet A technology defined by the IEEE 802.3ab standard, supports 1000 Mbps Ethernet (usually called Gigabit Ethernet) over Category 5 or higher UTP cable, using baseband signaling. 100BaseFX 100 Mbps Ethernet using baseband signaling over two strands of fiber-optic cabling. 100BaseTX A technology defined by IEEE 802.3u, it’s the most commonly used Ethernet variety today. It runs over Category 5 or higher UTP cable and uses two of the four wire pairs: one to transmit data and the other to receive data. It runs at 100 Mbps, using baseband signaling. 10BaseT A technology defined by IEEE 802.3i, it’s Ethernet running at 10 Mbps, using baseband signaling over Category 3 or higher twisted-pair cabling. Although still seen in older networks, newer networks use 100BaseT or faster technology. 10GBaseT A technology defined by IEEE 802.3an, it’s 10 Gigabit Ethernet running over four pairs of Category 6A UTP cabling, using baseband signaling. Unlike the other BaseT Ethernet standards, 10GBaseT operates only in full-duplex mode. ad hoc mode Sometimes called peer-to-peer mode, it’s a wireless mode of operation typically used only in small or temporary installations. There’s no central device, and data travels from one device to another to reach the destination device. Asymmetric DSL (ADSL) A DSL variation in which the download and upload speeds differ substantially, so the data rates aren’t symmetrical. Typical connection speeds for downloading data range from 256 Kbps to 8 Mbps; upload speeds are typically much slower, in the range of 16 Kbps to 640 Kbps. See also Digital Subscriber Line (DSL). baseband A type of signaling used in networks, in which each bit of data is represented by a pulse of electricity (on copper media) or light (on fiber-optic media). These signals are sent at a single fixed frequency, using the medium’s entire bandwidth. LAN technologies use baseband signaling. broadband A type of signaling that uses analog techniques to encode binary 1s and 0s across a continuous range of values. Broadband signals move across the medium in the form of continuous electromagnetic or optical waves rather than discrete pulses. Signals flow at a particular frequency, and each frequency represents a channel of data, allowing multiple streams of data on a single wire. TV and cable Internet use broadband signaling. Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) An access control method used by Wi-Fi networks, in which an acknowledgement is required for every packet sent, thereby avoiding most possibilities of a collision (collision avoidance). Carrier Sense Multiple Access with Collision Detection (CSMA/CD) A media access method in which a device must first listen (carrier sense) to the medium to be sure no other device is transmitting. If two devices transmit at the same time (multiple access), a collision occurs and is detected (collision detection). In this case, all devices involved in the collision wait for a random period of time before transmitting again. collision domain The extent to which signals in an Ethernet bus topology network are propagated. All devices connected to a logical bus topology network are in the same collision domain. Switch and router ports delimit collision domains.
3
Key Terms 151
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
collision The result of two or more devices on the same medium transmitting simultaneously when CSMA/CD is the media access method in use. See also Carrier Sense Multiple Access with Collision Detection (CSMA/CD). Cyclic Redundancy Check (CRC) The error-checking code in an Ethernet frame’s trailer; it’s the result of a mathematical algorithm computed on the frame data. When the destination device receives the frame, the calculation is repeated. If the results of this calculation don’t match the CRC in the frame, it indicates the data was altered in some way. Data Over Cable Service Interface Specification (DOCSIS) The official standard governing cable modem operation. Digital Subscriber Line (DSL) A broadband technology that uses existing phone lines to carry voice and data simultaneously. extended star topology An extension of the physical star topology, in which a central switch or hub is the central connecting point for other switches or hubs .that have computers and other network devices attached, forming a star of stars. See also physical star topology. Fiber Distributed Data Interface (FDDI) A technology that uses the token-passing media access method and dual rings for redundancy. The rings in an FDDI network are usually a physical ring of fiber-optic cable. FDDI transmits at 100 Mbps and can include up to 500 nodes over a distance of 100 kilometers. frame types The frame formats that describe the content and length of a frame header. Gigabit Ethernet See 1000BaseT Ethernet. infrastructure mode An operational mode for Wi-Fi networks, in which wireless stations connect through a wireless access point before they can begin communicating with other devices. logical topology The path data travels between computers on a network. The most common logical topologies are switched, bus, and ring. media access control See media access method. media access method A set of rules governing how and when the network medium can be accessed for transmission. The rules ensure that data is transmitted and received in an orderly fashion, and all stations have an opportunity to communicate. Also called media access control. mesh topology A topology in which each device in the network is connected to every other device, providing multiple pathways in the event of a device or cable failure. network backbone The cabling used to communicate between LANs or between hubs or switches. The backbone cabling often runs at a faster speed than the cabling used to connect computers because the backbone must carry data from many computers to other parts of the network. physical bus topology A network topology in which a continuous length of cable connects one computer to another in daisy-chain fashion. There’s no central interconnecting device. physical ring topology A cabling arrangement in which each devices is connected to another device in daisy-chain fashion, and the last device connects back to the first device forming a ring. Used by token ring and FDDI, the physical ring is rarely used now. physical star topology A network topology that uses a central device, such as a hub or switch, to interconnect computers in a LAN. Each computer has a single length of cable going from its NIC to the central device. It’s the most common physical topology in LANs.
152 Chapter 3
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
physical topology The arrangement of cabling and how cables connect one device to another in a network. The most common physical topology is a star, but bus, ring, point- to-point, and mesh topologies are also used. point-to-point topology A topology in which cabling creates a direct link between two devices; used most often in WANs or in wireless networks to create a wireless bridge. reflection See signal bounce. signal bounce The result of electricity bouncing off the end of a cable and back in the other direction. It causes corruption of data as the bouncing signal collides with signals behind it. A terminator at each cable end is needed to prevent signal bounce. Also called reflection. signal propagation Signals traveling across a medium and through any connectors and connecting devices until the signal weakens enough to be undetectable or is absorbed by a termination device. Symmetric DSL (SDSL) A DSL variation in which the download and upload speeds are equivalent, or symmetrical. See also Digital Subscriber Line (DSL). terminator An electrical component called a resistor, placed at the ends of a physical bus network to absorbs the signal instead of allowing it to bounce back up the wire. token ring A technology based on the IEEE 802.5 standard; its cabling is in a physical star topology, but it functions as a logical ring. It uses the token-passing media access method, and only the computer holding the token can send data. wireless bridge An operational mode of wireless networking usually used to connect two wired LANs that are separated from each other in such a way that using physical media is impractical. Can also be used to extend the reach of a wireless network. Wireless Fidelity (Wi-Fi) The name given to the 802.11 series of IEEE standards that define four common varieties of wireless LANs: 802.11a, 802.11b, 802.11g, and 802.11n. Worldwide Interoperability for Microwave Access (WiMAX) A wireless broadband technology defined in 802.16-2004 for fixed WiMAX and 802.16e for mobile WiMAX. WiMAX is considered a fourth-generation (4G) technology for bringing wireless Internet access to remote areas, large areas up to a mile radius, and mobile users.
Review Questions 1. Which of the following describes the arrangement of network cabling between devices?
a. Logical topology
b. Networking technology
c. Physical topology
d. Media access method
2. Which of the following is an advantage of a star topology? (Choose all that apply.)
a. Allows faster technologies than a bus does
b. Requires less cabling than a bus
c. Centralized monitoring of network traffic
d. No single point of failure
3
Review Questions 153
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
3. Which of the following is an example of a technology using a physical ring topology?
a. Token ring
b. FDDI
c. ADSL
d. IEEE 802.5
4. Which technology is likely to be implemented as a point-to-point physical topology?
a. Wi-Fi infrastructure mode
b. FDDI
c. Ethernet
d. Wireless bridge
5. Which of the following describes a hub-based Ethernet network?
a. Physical bus
b. Logical bus
c. Physical switching
d. Logical star
6. Which of the following is a characteristic of a logical ring topology? (Choose all that apply.)
a. It’s used by Ethernet.
b. One technology uses an MAU.
c. It’s used by FDDI.
d. Some technologies use a token.
e. It’s the most popular logical topology.
7. Which best describes a typical wireless LAN?
a. Logical ring topology
b. Logical switching topology
c. Logical bus topology
d. Logical star topology
8. Which of the following is a characteristic of a switched logical topology? (Choose all that apply.)
a. Uses a physical bus topology
b. Creates dynamic connections
c. Sometimes called a shared-media topology
d. Uses a physical star topology
9. Which of the following is a characteristic of unshielded twisted-pair cabling? (Choose all that apply.)
a. Consists of four wires
b. Commonly used in physical bus topologies
154 Chapter 3
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
c. Has a distance limitation of 100 meters
d. Susceptible to electrical interference
10. Which of the following is a characteristic of fiber-optic cabling? (Choose all that apply.)
a. Can be used in electrically noisy environments
b. Requires only a single strand of fiber for network connections
c. Carries data over longer distances than UTP does
d. Lower bandwidth capability
11. Which topology most likely uses coaxial cabling?
a. Physical star
b. Logical ring
c. Physical bus
d. Logical switching
12. Which of the following is true of a MAC address?
a. All binary 1s in the source address indicates a broadcast frame.
b. It’s sometimes called a logical address.
c. A destination address of 12 hexadecimal Fs is a broadcast.
d. It’s composed of 12 bits.
13. Which of the following is the most commonly used Ethernet frame type?
a. Ethernet II
b. Ethernet SNAP
c. Ethernet 802.3
d. Ethernet 802.2
14. Which of the following is a field of the most common Ethernet frame type? (Choose all that apply.)
a. ARP trailer
b. FCS
c. Destination MAC Address
d. Data
e. MAC type
15. Which access method uses a “listen before sending” strategy?
a. Token passing
b. CSMA/CD
c. Token bus
d. Polling
16. Which of the following is true about full-duplex Ethernet? (Choose all that apply.)
3
Review Questions 155
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
a. Stations can transmit and receive but not at the same time.
b. Collision detection is turned off.
c. It’s possible only with switches.
d. It allows a physical bus to operate much faster.
17. Which of the following is defined by the extent to which signals in an Ethernet bus topology network are propagated?
a. Physical domain
b. Collision domain
c. Broadcast domain
d. Logical domain
18. Which of the following is considered a property of Ethernet? (Choose all that apply.)
a. Scalable
b. Best-effort delivery system
c. Guaranteed delivery system
d. Obsolete technology
19. Which of the following is true of IEEE 802.3an?
a. Requires two pairs of wires
b. Uses Category 5 or higher cabling
c. Currently best for desktop computers
d. Operates only in full-duplex mode
20. Which of the following is a feature of 100BaseFX? (Choose all that apply.)
a. Often used as backbone cabling
b. Best when only short cable runs are needed
c. The fastest of the Ethernet standards
d. Uses two strands of fiber
21. Which Wi-Fi standard can provide the highest bandwidth?
a. 802.11a
b. 802.11b
c. 802.11n
d. 802.11g
22. Which of the following is true about infrastructure mode in wireless networks? (Choose all that apply.)
a. Best used for temporary networks
b. Uses a central device
c. Resembles a physical bus and logical ring
d. Most like a logical bus and physical star
156 Chapter 3
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
23. How many channels can be used on an 802.11b network in North America?
a. 7
b. 9
c. 11
d. 13
24. Which media access method does Wi-Fi use?
a. CSMA/CD
b. Token bus
c. Demand priority
d. CSMA/CA
25. Which of the following is true about the token ring technology? (Choose all that apply.)
a. It uses a physical ring topology.
b. All computers have equal access to the media.
c. It uses RTS/CTS signaling before transmission can occur.
d. Only the computer with the token can transmit data.
Challenge Labs
Challenge Lab 3-1: Building an Extended Star Topology Network
Time Required: 30 minutes
Objective: Use hubs and switches to build an extended star topology network.
Required Tools/Equipment: Determine which type of devices and how many you need to build the network.
Description: In this lab, you build an extended star network, in which the com- puters are connected in a physical star and a logical bus topology, and the com- puters form the outer arms of the extended star. The center of the extended star should be a device that creates one collision domain per port. Build the network with as much equipment as you have available, distributing computers evenly around the outer edges of the extended star. Draw the final topology and label the devices. If you lack equipment, you can simply draw the topology without building the physical network. Then answer the following questions:
● What type of device are the computers attached to?
3
Challenge Labs 157
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
● What type of device is at the center of the extended star?
● How many collision domains are in this network?
Challenge Lab 3-2: Adding Wireless Access to the Extended Star Network
Time Required: 30 minutes
Objective: Add wireless networking to the extended star network you built in Challenge Lab 3-1.
Required Tools/Equipment: An access point or wireless router and some wire- less NICs
Description: Add wireless networking to the extended star network you built in Challenge Lab 3-1. Expand the drawing you created to include the AP or wireless router. If you don’t have the necessary equipment, just expand the drawing. Answer the following questions:
● Which device in your extended star did you connect the AP to and why?
● Which wireless mode are you using: ad hoc or infrastructure?
● What logical and physical topology does addingwireless bring to this network?
Challenge Lab 3-3: Installing inSSIDer
Time Required: 20 minutes
Objective: Install a wireless scanning tool and scan your network.
Required Tools/Equipment: A computer with a wireless NIC and access to the Internet or an already downloaded copy of inSSIDer
Description: In this lab, you download inSSIDer from http://metageek.net and install it on a computer with a wireless NIC. Your instructor might need to install it for you if you don’t have the necessary permissions. After it’s installed, start a scan of your network to look for access points. Answer the following questions:
● Approximately how many wireless networks did inSSIDer find?
158 Chapter 3
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
● Which wireless channels are the most heavily used?
● If you were to set up a new wireless LAN based on what inSSIDer found, what channel would you use for the network?
Case Projects
Case Project 3-1 Old-Tech Corporation has 10 computers in its main office area, which is net- worked in a star topology using 10 Mbps Ethernet hubs, and wants to add five computers in the manufacturing area. One problem with the existing network is data throughput. Large files are transferred across the network regu- larly, and the transfers take quite a while. In addition, when two or more com- puters are transferring large files, the network becomes unbearably slow for users. Adding the manufacturing computers will only make this problem worse and result in another problem. Because the ceiling is more than 30 feet high, there’s no easy way to run cables to computers, and providing a secure pathway for cables is next to impossible. Devise a solution to this company’s networking problems. As part of your solution, answer the following questions:
● What changes in equipment are required to bring this company’s net- work up to date to solve the shared-bandwidth problem?
● What topology and which type of device can be used in the manufacturing area to solve the cabling difficulties?
Case Project 3-2 EBiz.com has 250 networked computers and five servers and uses a star topol- ogy wired network to reach employees’ offices, with a bus interconnecting three floors in its office building. Because of a staggering influx of Internet business, the network administrator’s task is to boost network performance and availability as much as possible. The company also wants a network design that’s easy to reconfigure and change because workgroups form and disband frequently, and their membership changes regularly. All computers must share sensitive data and control access to customer files and databases. Aside from the customer information and billing databases, which run on all servers, employees’ desktop computers must run standard word-processing and spreadsheet programs.
3
Case Projects 159
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Use the following write-on lines to evaluate the requirements for this net- work. After you finish, determine the best network topology or topology combination for the company. On a blank piece of paper, sketch the net- work design you think best suits EBiz.com’s needs. Remember: High per- formance and easy reconfiguration are your primary design goals!
● What type of topology should be used in this network?
● Will the network be peer to peer or server based?
● How many computers will be attached to the network?
● What kind of networking device is easiest to reconfigure? What kind offers the best access to the network medium’s bandwidth between pairs of devices?
Case Project 3-3 ENorm, Inc. has two sites in Pittsburgh that are four miles apart. Each site consists of a large factory with office space for 25 users at the front of the factory and up to 20 workstations in two work cells on each factory floor. All office users need access to an inventory database that runs on a server at the Allegheny Street location; they also need access to a billing application with data residing on a server at the Monongahela site. All factory floor users also need access to the inventory database at the Allegheny Street location.
Office space is permanently configured, but the manufacturing space must be reconfigured before each new manufacturing run begins. Wiring closets are available in the office space. Nothing but a concrete floor and overhead girders stay the same in the work cell areas. The computers must share sen- sitive data and control access to files. Aside from the two databases, which run on the two servers, office computers must run standard word-processing and spreadsheet programs. Work cell machines are used strictly for updat- ing inventory and quality control information for the Allegheny Street inventory database. Workstations in the manufacturing cells are switched on only when they’re in use, which might occur during different phases of a manufacturing run. Seldom is a machine in use constantly on the factory floor.
160 Chapter 3
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Use the following write-on lines to evaluate the requirements for this network. After you finish, determine the best network topology or topology combina- tion for the company. On a blank piece of paper, sketch the network design you think best suits ENorm, Inc.’s needs.
● Will the network be peer to peer or server based?
● How many computers will be attached to the network?
● What topology works best for the offices, given the availability of wir- ing closets? What topology works best for the factory floor, given its need for constant reconfiguration?
3
Case Projects 161
Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.


