Section Titles:
Modems | Repeaters | Bridges
| Routers
Brouters | Hubs | Gateways
Some components can be installed which will increase the size of the network within the
confines of the limitations set by the topology. These components can:
- Segment existing LANs so that each segment becomes its own LAN.
- Join two separate LANs.
- Connect to other LANs and computing environments to join them into a larger
comprehensive network.
- Modems share these characteristics
- a serial (RS-232) interface
- an RJ-11C telephone line connector
- telephones use analog signal; computers use digital signal. A modem translates between
the two
- BAUD refers to the speed of the oscillation of the sound wave on which a bit of
data is carried over the telephone wire
- the BPS can be greater than the baud rate due to compression and encode data so that
each modulation of sound can carry more than one bit of data is carried over the telephone
line. For example, a modem that modulates at 28,000 baud can actually send at 115,200 bps
=> bps is the most important parameter when looking at throughput.
- There are 2 types of modems
Asynchronous Communications (Async)
- use common phone lines
- data is transmitted in a serial stream
- not synchronized, no clocking device => no timing
- both sending and receiving devices must agree on a start and stop bit sequence
- error control
- a parity bit is used in an error checking and correction scheme called parity checking
- It checks to see if the # of bits sent = # of bits received
- the receiving computer checks to make sure that the received data matches what was sent.
- 25 % of the data traffic in async communications consists of data control and
coordination
- MNP (Microcom Network Protocol) has become the standard for error control
- Later LAPM (Link Access Procedure for Modems) is used in V.42 modems (57,600 baud).
- It uses MNP Class 4.
- LAPM is used between two modems that are V.42 compliant
- If one or the other modems is MNP 4 - compliant, the correct protocol would be MNP Class
4
- Communication performance depends on
- signaling or channel speed - how fast the bits are encoded onto the
communications channel
- throughput - amount of useful information going across the channel
- you can double the throughput by using compression. One current data compression
standard is the MNP Class 5 compression protocol
- V.42 bis is even faster because of compression.
- bis => second modification
- terbo => third, the bis standard was modified
- This is a good combination:
- V.32 signaling
- V.42 error control
- V.42bis compression
Standard |
BPS |
V.22 bis |
2400 |
V.32 |
9600 |
V.32bis |
14,400 |
V.32terbo |
19,200 |
V.FastClass (V.FC) |
28,800 |
V.34 |
28,800 |
V.42 |
57,600 |
Synchronous Communication
- relies on a timing scheme coordinated between two devices to separate groups of bits and
transmit them in blocks known as frames
- NO start and stop bits =. a continuous stream of data because both know when the data
starts and stops.
- if there's error, the data is retransmitted
- some synchronous protocol perform the following that asynchronous protocols don't:
- format data into blocks
- add control info
- check the info to provide error control
- the primary protocols in synchronous communication are:
- Synchronous data link control (SDLC)
- High-level data link control (HDLC)
- binary synchronous communication protocol (bisync)
- Synchronous communications are used in almost all digital and network
communications
- 2 types of telephone lines:
- public dial network lines (dial-up lines) - manually dial up to make a connection
- leased (dedicated) lines - full time connection that do not go through a series
of switches, 56 Kbps to 45 Mbps
- Repeaters
- EXTEND the network segment by REGENERATING the signal from one segment to the next
- Repeaters regenerate BASEBAND, digital signals
- don't translate or filter anything
- is the least expensive alternative
- work at the Physical layer of OSI
- Both segments being connected must use the same access method e.g. an 802.3
CSMA/CD (Ethernet) LAN segment can't be joined to a 802.5 (Token Ring) LAN segment.
Another way of saying this is the Logical Link Protocols must be the same in order to send
a signal.
- BUT repeaters CAN move packets from one physical medium to another: for example
can take an Ethernet packet from a thinnet coax and pass it on to a fiber-optic segment.
Same access method is being used on both segments, just a different medium to deliver the
signal
- They send every bit of data on => NO FILTERING, so they can pass a broadcast
storm along from on segment to the next and back. So you want to use a repeater when
there isn't much traffic on either segment you are connecting.
- There are limits on the number of repeaters which can be used. The repeater counts as a
single node in the maximum node count associated with the Ethernet standard [30 for thin
coax].
- Repeaters also allow isolation of segments in the event of failures or fault conditions.
Disconnecting one side of a repeater effectively isolates the associated segments from the
network.
- Using repeaters simply allows you to extend your network distance limitations. It does
not give you any more bandwidth or allow you to transmit data faster.
- Why only so many repeaters are allowed on a single network: "propagation
delay". In cases where there are multiple repeaters on the same network, the brief
time each repeater takes to clean up and amplify the signal, multiplied by the
number of repeaters can cause a noticeable delay in network transmissions.
- It should be noted that in the above diagram, the network number assigned to the main
network segment and the network number assigned to the other side of the repeater are the
same.
- In addition, the traffic generated on one segment is propagated onto the other segment.
This causes a rise in the total amount of traffic, so if the network segments are already
heavily loaded, it's not a good idea to use a repeater.
- A repeater works at the Physical Layer by simply repeating all data from one segment to
another.
Summary of Repeater features
- increase traffic on segments
- limitations on the number that can be used
- propagate errors in the network
- cannot be administered or controlled via remote access
- no traffic isolation or filtering
Summary:
A repeater
- Connects two segments of similar or dissimilar media
- Regenerates the signal to increase the distance transmitted
- Functions in the Physical Layer of the OSI model
- Passes ALL TRAFFIC in both directions
- Use a repeater to improve performance by dividing the network segments, thus reducing
the number of computers per segment (This is what it says in the book, but
it doesn't make sense to me)
- Do NOT use a repeater when:
- There is heavy network traffic
- Segments are using different access methods
- You need any kind of data filtering.
Amplifiers are just like repeaters, but generate a BROADBAND, analog signal.
That analog signal can have different frequencies and carry both voice and data. |
- have all the abilities of a repeater
- Bridges can
- take an overloaded network and split it into two networks, therefore they can divide the
network to isolate traffic or problems and reduce the traffic on both segments
- expand the distance of a segment
- link UNLIKE PHYSICAL MEDIA such as twisted-pair (10Base T) and coaxial Ethernet
(10Base2)
- VERY IMPORTANT: they can link UNLIKE ACCESS CONTROL METHODS, on different
segments such as Ethernet and Token Ring and forward packets between them. Exam Cram says
this is a Translation Bridge that can do this - not all bridges - but my observation is
questions don't necessarily mention the distinction.
- Bridges work at the Data Link Layer of the OSI model => they don't distinguish one
protocol from the next and simply pass protocols along the network. (use a bridge to pass
NetBEUI, a non-routable protocol, along the network)
- Bridges actually work at the MEDIA ACCESS CONTROL (MAC) sublayer. In fact they are
sometimes called Media Access Control layer bridges. Here's how they deal with traffic:
- They listen to all traffic. Each time the bridge is presented with a frame, the source
address is stored. The bridge builds up a table which identifies the segment to which the
device is located on. This internal table is then used to determine which segment incoming
frames should be forwarded to. The size of this table is important, especially if the
network has a large number of workstations/servers.
- they check the source and destination address of each PACKET
- They build a routing table based on the SOURCE ADDRESSES. Soon they know which computers
are on which segment
- Bridges are intelligent enough to do some routing:
- if the destination address is on the routing table and is on the SAME SEGMENT, the
packet isn't forwarded. Therefore, the bridge can SEGMENT network traffic
- If the destination address is the routing table, and on a remote segment, the bridge
forwards the packet to the correct segment
- if the destination address ISN'T on the routing table, the bridge forwards the packet to
ALL segments.
- BRIDGES SIMPLY PASS ON BROADCAST MESSAGES, SO they too contribute to broadcast storms
and don't help to reduce broadcast traffic
- Remote Bridges
- two segments are joined by a bridge on each side, each connected to a synchronous modem
and a telephone line
- there is a possibility that data might get into a continuous loop between LANs
- The SPANNING TREE ALGORITHM (STA)
- senses the existence of more than one route
- determines which is the most efficient and
- configures the bridge to use that route
- this route can be altered if it becomes unusable.
- Transparent bridges (also known as spanning tree, IEEE 802.1 D) make all routing
decisions. The bridge is said to be transparent (invisible) to the workstations. The
bridge will automatically initialize itself and configure its own routing information
after it has been enabled.
- Comparison of Bridges and Repeaters
- Bridges
- regenerate data at the packet level
- accommodate more nodes than repeaters
- provide better network performance than repeaters because they segment the network
- Implementing a Bridge
- it can be an external, stand-alone piece of equipment
- or be installed on a server
- Summary from MOC:
- Bridges have all the features of a repeater
- They connect two segments and regenerate the signal at the packet level
- They function at the Data Link layer of the OSI model
- Bridges are not suited to WANs slower than 56k
- They cannot take advantage of multiple paths simultaneously
- They pass all broadcasts, possibly creating broadcast storms
- Bridges read the source and destination of each packet
- they PASS packets with unknown destinations
- Use Bridges to:
- Connect two segments to expand the length or number of nodes on the network
- reduce traffic by segmenting the network
- Connect
- unlike MEDIA ( e.g. 10BaseT and 10Base2)
- unlike ACCESS CONTROL METHODS (Ethernet and Token Ring)
The advantages of bridges are
- increase the number of attached workstations and network segments
- since bridges buffer frames, it is possible to interconnect different segments which use
different MAC protocols
- since bridges work at the MAC layer, they are transparent to higher level protocols
- by subdividing the LAN into smaller segments, overall reliability is increased and the
network becomes easier to maintain
- used for non routable protocols like NetBEUI which must be bridged
- help localize network traffic by only forwarding data onto other segments as required
(unlike repeaters)
The disadvantages of bridges are
- the buffering of frames introduces network delays
- bridges may overload during periods of high traffic
- bridges which combine different MAC protocols require the frames to be modified before
transmission onto the new segment. This causes delays
- in complex networks, data is not sent over redundant paths, and the shortest path is not
always taken
- bridges pass on broadcasts, giving rise to broadcast storms on the network
Sample Question:
You want to connect an Ethernet network in one part of an office building to a Token-ring
network down the hall. Both networks use NWLink IPX but must eliminate the IPX addressing
and use only NetBEUI on both segments when they are joined. Which connectivity device do
you choose which will allow the two networks to communicate, but at the same time reduce
network levels. device should you use?
- repeater
- bridge
- router
- gateway
B - they are testing here to see if you know what a translation bridge can do.
Some bridges can't connect different segments that use different media schemes, but a
translation bridge can. A translation bridge will also reduce network traffic because
it can analyze packets based on MAC address and if it finds them to be from the same
segment as the originating they are simply discarded instead of being passed on to a
non-local segment. The bridge can do this using address information stored in its bridging
table. |
- Determine the best path for sending data and filtering broadcast traffic to the
local segment. They DON'T pass on broadcast traffic
- work at the Network layer of OSI => they can switch and route packets across
network segments
- They provide these functions of a bridge
- filtering and isolating traffic
- connecting network segments
- routing table contains
- all known network addresses
- how to connect to other networks
- possible paths between those routers
- costs of sending data over those paths
- not only network addresses but also media access control sublayer addresses for each
node
- Routers
- REQUIRE specific addresses: they only understand network numbers which allow them to
talk to other routers and local adapter card addresses
- only pass Packets to the network segment they are destined for.
- routers don't talk to remote computers, only to other routers
- they can segment large networks into smaller ones
- they act as a safety barrier (firewall) between segments
- they prohibit broadcast storms, because broadcasts and bad data aren't forwarded
- are slower than most bridges
- can join dissimilar access methods: a router can route a packet from a TCP/IP Ethernet
network to a TCP/IP Token Ring network
- Routers don't look at the destination computer address. They only look at the NETWORK
address and they only pass on the data if the network address is known => less
traffic
- Routable protocols:
- DECnet, IP, IPX, OSI, XNS, DDP (Apple)
- Routable protocols have Network layer addressing embedded
- Non-routable protocols:
- LAT, NetBEUI, DLC
- Non-routable protocols don't have network layer addressing
Choosing Paths
- routers can choose the best path for the data to follow
- routers can accommodate multiple active paths between LAN segments. To determine the
best path, it takes these things into account:
- If one path is down, the data can be forwarded over on alternative route
- routers can listen and determine which parts of the network are busiest.
- it decides the path the data packet will follow by determining the number of hops
between internetwork segments
- OSPF (Open Shortest Path First)
- is a link-state routing algorithm
- routes are calculated based on
- # of hops
- line speed
- traffic
- cost
- TCP/IP supports OSPF
- RIP (Routing Information Protocol)
- RIP is the protocol used to determine the # of hops to a distant segment.
- uses distance-vector algorithm to determine routes
- TCP/IP & IPX support RIP
- NLSP (NetWare Link Services Protocol)
- is a link-state algorithm for use with IPX
- There are 2 types of routers
- Static - manually setup and config the routing table and to specify each route
- Dynamic
- automatic discovery of routers
- use information from other routers
Distinguishing between Bridges and Routers
Both bridges and routers
- forward packets between networks
- send data across WAN links
- A Bridge
- recognizes the address of EACH computer on it's segment and forwards packets on the
basis of the destination address
- either recognizes the address or it doesn't, and forwards the packet accordingly
- forwards all broadcast messages to all ports, except to the port from which the
broadcast message came. Every computer on every segment receives this broadcast
- A Router
- works at the NETWORK layer and thus takes more information into account when determining
what to forward and where to forward it to.
- Routers recognize the addresses of other routers and determine which packets to forward
to which routers
Multiple Paths-- important
- Bridges recognize ONE PATH between networks
- Routers can search between multiple paths and determine the best path at the moment
The 4 KEY pieces of information that distinguish bridges and routers:
Bridges |
Routers |
- recognize the MAC sublayer addresses (i.e. the addresses of the network cards on its own
segment)
|
- Routers recognize network addresses not individual computer addresses
|
- forwards everything it doesn't recognize and
- forwards all addresses it knows, but only out the appropriate port
|
- routers filter addresses.
- It forwards particular protocols to particular addresses (other routers)
- if the router doesn't recognize a destination address, the packet is usually discarded
|
|
- only works with routable protocols
- Non-Routable = NetBEUI, DLC, LAT
|
Because they make path choices and filter out packets the segment doesn't need to
receive they
- help lessen network congestion
- conserve resources
- boost data throughput
- make data delivery more reliable
Because is works at the network layer, a router can connect networks that use
- Different architectures
- Different media access control methods -- for example, they can connect an Ethernet
segment to a Token-Ring segment
Summary of Router features
- use dynamic routing
- operate at the protocol level
- remote administration and configuration via SNMP
- support complex networks
- the more filtering done, the lower the performance
- provides security
- segment networks logically
- broadcast storms can be isolated
- often provide bridge functions also
- more complex routing protocols used [such as RIP, IGRP, OSPF]
- Combine the best qualities of both bridges and routers
- First, a brouter checks to see if the protocol is routable or non-routable
- Route selected routable protocols.
- They can bridge non-routable protocols. Like a Bridge, they use the MAC address to
forward to destination. They act like a router for one protocol and a bridge for all the
others
- More cost effective than individual bridges and routers.
- SO, use a brouter when you have routable and non-routable protocols.
There are many types of hubs:
- Passive hubs are don't require power and are simple splitters or combiners that
group workstations into a single segment
- Active hubs require power and include a repeater function and are thus capable of
supporting many more connections.
- Intelligent hubs provide
- packet switching
- traffic routing
- The TRANSLATOR -- allows communications between dissimilar systems or environments
- A gateway is usually a computer running gateway software connecting two different
segments. For example an Intel-based PC on one segment can both communicate and share
resources with a Macintosh computer or an SNA mainframe. Use gateways when different
environments need to communicate. One common use for gateways is to translate between
personal computers and mainframes
- GSNW is a gateway to allow Microsoft clients using SMB to connect to a NetWare server
using NCP.
- Gateways work at the Application --> Transport layer
- They make communication possible between different architectures and environments
- They perform protocol AND data conversion / translation.
- they takes the data from one environment, strip it, and re-package it in the protocol
stack from the destination system
- they repackage and convert data going from one environment to another so that each
environment can understand the other environment's data
- gateway links two systems don't use the same
- protocols
- data formatting structure
- languages
- architecture
- they are task specific in that they are dedicated to a specific type of
conversion: e.g. "Windows NT Server -> SNA Server Gateway"
- usually one computer is designated as the gateway computer. This adds a lot of traffic
to that segment
- Disadvantages
- They slow things down because of the work they do
- they are expensive
- difficult to configure
- Remember, gateways can translate
- protocols e.g. IPX/SPX --> TCP/IP
- and data (PC --> Mac)
- e-mail standards --> an e-mail gateway that translates on e-mail format into another
(such as SMTP) to route across the Internet.
|