0% found this document useful (0 votes)
103 views68 pages

Introduction To Networking Technology and Concepts: Downloadable Content

Uploaded by

Sumit Midha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
103 views68 pages

Introduction To Networking Technology and Concepts: Downloadable Content

Uploaded by

Sumit Midha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 68

INTRODUCTION TO

NETWORKING
TECHNOLOGY AND
CONCEPTS

DOWNLOADABLE CONTENT

DOWNLOADABLE CONTENT
Introduction to Networking Technology and Concepts-SSP

© Copyright 2019 Dell Inc. Page i


Table of Contents

Introduction to Networking Technology and Concepts ......................................................... 1

Introduction to Networking Concepts and Technology.......................................... 2


Network Fundamentals and Terminology ............................................................................. 2

Definition of Network ................................................................................................. 3


Definition of the Network ...................................................................................................... 3
Need for Networks ............................................................................................................... 3
Networks Connect Data and Users Across Different Locations ............................................ 4
Sharing Network Resources ................................................................................................ 9
Peer-to-peer and Client/server Network Sharing Models .................................................... 10

Knowledge Check: What Is a Network? ................................................................. 13


Question 1 ......................................................................................................................... 13
Question 2 ......................................................................................................................... 13

Describing the Network ........................................................................................... 14


Describing the Network ...................................................................................................... 14
Common Network Components ......................................................................................... 14
Physical Network Components .......................................................................................... 15
Network Components and Topology Diagrams .................................................................. 19
Basic Network Diagram...................................................................................................... 20
Networks and Internetworking ............................................................................................ 21
Device Interconnection Topologies .................................................................................... 26
Bus Topology ..................................................................................................................... 27
Star and Extended Star Topology ...................................................................................... 28
Ring and Dual Ring Topology ............................................................................................ 29
Full-Mesh and Partial-Mesh Topology ................................................................................ 30
Hierarchical Data Center Network ...................................................................................... 31
Hierarchical Network Topology .......................................................................................... 32
What Types of Data Do Networks Transport? .................................................................... 34

Introduction to Networking Technology and Concepts-SSP

Page ii © Copyright 2019 Dell Inc.


Knowledge Check: Network Devices and Description ......................................... 40
Question 1 ......................................................................................................................... 40
Question 2 ......................................................................................................................... 41
Question 3 available in the web-based course ................................................................... 42
Question 4 ......................................................................................................................... 42
Question 5 ......................................................................................................................... 43
Question 6 ......................................................................................................................... 43
Question 7 available in the web-based course ................................................................... 44
Question 8 ......................................................................................................................... 44

Network Types and Protocols ................................................................................. 45


Network Types and Protocols ............................................................................................ 45
OSI Reference Model ........................................................................................................ 45
Data Encapsulation ............................................................................................................ 47
Networked Data Transmitted and Received ....................................................................... 48
Network Design Considerations ......................................................................................... 49
Network Capability and Service Level Design Factors ....................................................... 50
Local Area Network............................................................................................................ 51
Metropolitan Area Network ................................................................................................. 52
Wide Area Network ............................................................................................................ 53
Campus and Data Center Networks ................................................................................... 54
Protocols Make the Network Work ..................................................................................... 57
Protocols and Networks that Enhance Connectivity ........................................................... 58

Knowledge Check: Topologies and Protocols ...................................................... 61


Question 1 ......................................................................................................................... 61
Question 2 ......................................................................................................................... 61
Question 3 ......................................................................................................................... 61

Introduction to Networking Technology and Concepts-SSP

© Copyright 2019 Dell Inc. Page iii


Introduction to Networking Concepts and Technology

Introduction to Networking Technology and Concepts

Introduction to Networking Technology and Concepts-SSP

© Copyright 2019 Dell Inc. Page 1


Introduction to Networking Concepts and Technology

Introduction to Networking Concepts and Technology

Network Fundamentals and Terminology

After completing this module, you will be able to:


• Describe the benefits and the functions of networking.
• Identify network devices, operational attributes, and the ways they work
together to form a network.
• Describe the OSI network communications model and how it is applied to
standardize network connectivity and communications.

Introduction to Networking Technology and Concepts-SSP

Page 2 © Copyright 2019 Dell Inc.


Definition of Network

Definition of Network

Definition of the Network

Need for Networks

A network is a collection of devices that must communicate with each other. The
system of interconnected hardware, software, and protocols that achieves and
maintains the connections is the network.

Computers and other devices are designed to work individually or together to


provide data processing and other services to businesses and many other types of
users. When it is necessary for systems to work together, it is usually some type of
network that provides and maintains interconnectivity.

Networks can carry many types of data in different types of environments. Most
often, networks are used to connect systems and devices in and across the
locations of small and large businesses. Most private homes are using networks to
interconnect computers and other devices.

Also, remote employees and contractors connect to small and large business
locations from their homes or satellite and branch offices.

Introduction to Networking Technology and Concepts-SSP

© Copyright 2019 Dell Inc. Page 3


Definition of Network

Modern IT devices are designed to connect to other devices to share data and information.
Networks enable and maintain device interconnections through infrastructure and protocols. Click
the image to enlarge.

Networks Connect Data and Users Across Different Locations

Networks connect different users and data across many types of environments.
These include large enterprises, small and medium business and even home
users. In larger businesses, there are many locations that require communication
with each other.

These locations are described in terms of where IT resources are located in


relationship to each other and users.

Click each tab for more information about typical networked device and user
locations.

Introduction to Networking Technology and Concepts-SSP

Page 4 © Copyright 2019 Dell Inc.


Definition of Network

Location Categories

Networks are grouped into three location categories. There are local area
Networks, metropolitan area networks, and wide area networks.

LANs, MANs, and WANs are defined by not only the distance between connected
devices, but by the network architecture that supports the connectivity. LANs,
MANs, and WANs each require its own type of cabling, network infrastructure, and
protocols.

Main Location

A main location or office is a single site such as a data center. It can also be part of
a campus of nearby sites. The main location is where the bulk of the organization's

Introduction to Networking Technology and Concepts-SSP

© Copyright 2019 Dell Inc. Page 5


Definition of Network

data is located. Typically, most of the people who work at the organization are
located in the main location and use network resources to perform their tasks. A
main location uses one or more LANs to connect devices and users. It may also
connect a LAN to a MAN or WAN depending on communication requirements with
devices and users at other related locations.

Branch Locations

Smaller groups of people work at branch offices. They communicate with each
other and work together through a network. Also, they can communicate with other
people and business systems at the main location. Workers at each branch office
have common access to local network resources such as printers and other special
equipment.

Introduction to Networking Technology and Concepts-SSP

Page 6 © Copyright 2019 Dell Inc.


Definition of Network

Typically, at least some corporate data resources are locally cached at the branch
locations. However, most if not all of the data is centrally housed and maintained at
the main location. A branch location uses one or more LANs to connect devices
and users. A MAN or WAN then connects the location to the main and other local,
nearby, and remote locations.

Home Offices

Now more than ever because of the Internet, people are able to work from a home
office. These people require on-demand connectivity and access to main or branch
locations to access the data and network resources used in their work. A home
office location typically uses one LAN to connect devices and users. It also
connects to one or more main and branch locations through a WAN - typically the
Internet.

Introduction to Networking Technology and Concepts-SSP

© Copyright 2019 Dell Inc. Page 7


Definition of Network

Home office workers are able to use main or branch location printers or local
printers and other resources on their home network.

Mobile Users

Mobile users typically connect to the main or branch location data and resources
from many different remote locations. Mobile users typically work at places such as
customer locations and from business partner offices. Also, they can work from the
main or any branch location. Mobile users' devices typically use wireless
connectivity to become part of the LAN of their location. Called WiFi, the wireless
network connects their devices to the LAN as if they were using physical cables.

A major factor that affects mobile workers is that their work location can be
unpredictable. Their location at any time can span different areas and time zones
around the earth.

Introduction to Networking Technology and Concepts-SSP

Page 8 © Copyright 2019 Dell Inc.


Definition of Network

Sharing Network Resources

Networks are all about enabling sharing. In planning a network, consider how data
and information sharing should occur.

In the mainframe computer environment, the choice was limited. It is the mainframe
that shares data and the other applications and devices are the consumers of
shared data.

The advent of small computers and open systems enabled decentralizing data
sharing. In the open systems environment, computers and other devices on a
network create and share data with each other. Some of them are intended mostly
to share their data while others are mostly clients, or consumers of data.

The number of servers in relation to the number of clients is one thing to consider
when designing a network. Also consider the amount of data that flows between
them and the speed at which data must be shared.

The division of servers and clients on a network can be sorted into two network
sharing models. They are the peer-to-peer and client/server models.

Data Server

Data Server
Data Client

Data Server
Data Server

Data Client Data Client


Data Client

Data server and data client functions can be separate or combined on a compute platform. Click
image to enlarge.

Introduction to Networking Technology and Concepts-SSP

© Copyright 2019 Dell Inc. Page 9


Definition of Network

Peer-to-peer and Client/server Network Sharing Models

Computers on a network are arranged to perform data sharing and consumer


functions most efficiently by adhering to either of two data sharing models. These
models are peer-to-peer - also known as P2P - and client/server.

Use the tabs to learn about each model.

P2P

Here are the fundamental attributes of the peer-to-peer network model:

• Decentralized network computing architecture


• Data server and consumer workload is divided and shared among computers
on the network
• Data servers and consumers are equal peers. No hierarchical relationship
exists as all systems can share and grant access to resources
• Network devices have the same privileges and rights to the various data and
device resources
• Peers communicate with each other directly without the use of a mediator to
control access and security

Client/server

Here are the fundamental attributes of the client/server network model:

• Centralized network computing architecture


• Based on resource servers and the clients that require those resources
• Clients make requests to the server to access the resources
• Server devices contain or control resources in the form of data and services
such as printers and data and protection and recovery systems
• Clients are the devices that do not share their resources but work
independently, making requests to the servers for data and other resources

P2P - Benefits vs. Risks

Here are the fundamental risks and benefits of the P2P network model:

Introduction to Networking Technology and Concepts-SSP

Page 10 © Copyright 2019 Dell Inc.


Definition of Network

Benefits Risks

Adding peers adds resources to the Because of the any-to-any and random
network and increases the capacity for access relationship between peers, P2P
resource sharing. Adding peers networks can cause high network
generally increases network throughput bandwidth consumption rates.
because more services and users
become available throughout the
growing network infrastructure.

There is no single point of failure. If a Lack of solid security because of cross-


peer device fails, just that connection is peer resource sharing with minimal or no
lost. The network itself and the other user authentication. Any peer device can
peers across it remain unaffected. send and receive data from any other
peer device.

Client/server - Benefits vs. Risks

Here are the fundamental risks and benefits of the client/server network model:

Benefits Risks

An organizational structure administers Specialized servers, software, and


the devices relationships. Centralized possibly other equipment. This
data and resource servers allow for increases capital and operational costs
efficient client use and systems
management.

Security is a key advantage because An increasing number of clients using


client requests to servers can be the services places higher loads on the
controlled, monitored, and logged. servers. Network infrastructure
Credentials are used to control access to demands increase resulting in higher
servers, preventing unauthorized I/O latency and slower response times.
connections to data and resources.

Introduction to Networking Technology and Concepts-SSP

© Copyright 2019 Dell Inc. Page 11


Definition of Network

The client/server model best applies to Because of the centralized services


modern IT architectures based on server architecture, the client/server model is
and desktop virtualization, converged prone to multiple single points of failure.
and hyper-converged infrastructure, and A server failure could result in major
cloud architecture. disruptions across the systems and the
user community.
A remedy is to make the servers and
storage systems more robust by using
techniques such as clustering,
competent redundancy such as N+1,
and RAID disk storage architectures.

Introduction to Networking Technology and Concepts-SSP

Page 12 © Copyright 2019 Dell Inc.


Knowledge Check: What Is a Network?

Knowledge Check: What Is a Network?

Question 1

1. What is the definition of a network?


a. A collection of devices that share resources
b. A collection of devices that control user access to resources
c. A collection of local and remote employees that communication with each
other
d. A collection of local and remote businesses that communicate with each
other

Question 2

2. What is a risk associated with Deploying a peer-to-peer network?


a. Specialized software and possibly other equipment is needed, increases
capital and operational costs.
b. Any-to-any and random access relationship can cause high network
bandwidth consumption rates.
c. Adding peers adds resources to the network generally increases network
I/O latency.
d. The P2P computing model is most prone to single points of failure.

Introduction to Networking Technology and Concepts-SSP

© Copyright 2019 Dell Inc. Page 13


Describing the Network

Describing the Network

Describing the Network

Common Network Components

There are many components that are used to construct networks. All of them can
be divided into three general categories:
• Connectivity
• Network service providers
• Network service users

Small or large, simple, or complex, networks must have components from each
category. Connectivity includes such components as cables and connectors and
network interface cards and ports. Also included are network switches and routers.

Network services include devices that offer data to share and devices that access
the shared data to provide output for business and other uses. These specialized
systems may provide firewall functionality, user authentication, access controls,
and security. Other systems provide primary disk storage and general data
protection, backup, and recovery functionality.

Introduction to Networking Technology and Concepts-SSP

Page 14 © Copyright 2019 Dell Inc.


Describing the Network

This lesson discusses the fundamental components that makeup a network.

Physical Network Components

Presented here are the most common physical components that form and maintain
a network. Use the tabs to learn about them.

Devices

Servers, workstations, laptops, and mobile devices are at the end points on the
network. Endpoint devices are interconnected through the other network devices to
share and receive data.

Interconnection

Interconnection devices provide the means and paths for the data to travel between
end devices. Some of the most fundamental are:

Network Interface Card (NIC) Installed into or directly connected to an


end device to connect it to the network.
Translates data, signaling, and protocols
to facilitate data flow between the end
device and the network.

Network Media The collection of copper and optical


cables, and wireless media that carry
the signals and data and transports
them throughout the network.

Connectors Connectors provide the physical


interface between a medium and the
devices on the network.
There are two broad categories of
connectors for copper and fiber optic
media. A connector terminates each end
of a cable.

Introduction to Networking Technology and Concepts-SSP

© Copyright 2019 Dell Inc. Page 15


Describing the Network

Switches

Switches are the connectivity devices that form the logical center of a network
segment. Each end device connected to the switch can establish a connection to
other end devices connected to switch ports. A switch is an intelligent device that
can increase network communications efficiency by actively controlling and
directing the connections between devices connected to the switch.

Because of its intelligence, a switch plays an active role in setting up, managing,
and optimizing communications between end devices connected to the network
through it.

Switches limit communications between the source and the target end-device. Click to enlarge.

Hubs

Hubs are network connectivity devices that form the physical center of a network
segment. Each end device connected to the hub can establish a connection to
other end devices connected to hub ports. A hub simply connects devices and
allows signals to pass-through.

A hub is not considered an intelligent device and therefore cannot increase network
communications efficiency. It plays a totally passive role in the communications
between end devices. Hubs are deprecated technology and are rarely used in

Introduction to Networking Technology and Concepts-SSP

Page 16 © Copyright 2019 Dell Inc.


Describing the Network

modern networks. Because of the intelligence and greatly reduced cost of using
switches, hubs are rarely used in modern networks.

Hubs are very inefficient network communication devices. Instead of limiting communications
between a source and the intended target end-device, hubs transmit source communications to all
end-devices on that network segment. Click the image to enlarge.

Routers

Switches interconnect end-devices into a network segment and routers


interconnect network segments. A router can also translate interconnection
technologies such as protocols and media types when these differ among the
network segments connected through it.

Switching and routing functions are often combined into a single physical device.
These devices typically connect home and office business networks to the Internet.

Introduction to Networking Technology and Concepts-SSP

© Copyright 2019 Dell Inc. Page 17


Describing the Network

Network B

Network A

The diagram shows normal end-device communications on each of two network segments. When
an end-device on Network B needs to communicate with an end-device on Network A, a router is
used to enable the internetwork communications while keeping both networks separate. Click the
image to enlarge.

Repeater

Also known as extenders, the repeater is a network device that is used to replicate
or regenerate or signals that are weakened or distorted by transmission over long
distances or through areas with high levels of electromagnetic interference. The
purpose of a repeater is to extend the LAN segment beyond its physical cable
limits. For instance, the typical twisted-pair network cable can be run to a maximum
length of 100 meters. The electrical signals carried by a cable longer than that, or
worse, a faulty cable even shorter than 100 meters, will degrade to the point of
uselessness when it reaches the device at the other end. The main purpose of a
repeater is to extend the length of the network transmission medium beyond the
maximum limit.

The repeater operates by connecting to a device, hub, switch or router using a


standard cable of less than maximum length. Another cable of maximum length or
less connects the output port of the repeater to the destination device. The repeater
amplifies and re-transmits the incoming signals to the destination. The length of the
cables at the input and output of the repeater are added together, at least doubling

Introduction to Networking Technology and Concepts-SSP

Page 18 © Copyright 2019 Dell Inc.


Describing the Network

the standard operational distance between devices, depending on the


specifications and power of the repeater.

Typically, repeaters are used to connect two physically close buildings when they
are too far apart for standard cables to be used. Repeaters also can be used to
connect between floors of a building that would normally surpass the maximum
allowable cable length.

Also available are wireless repeaters. These serve the same purpose and function
in a similar way. Instead of physical cables, wireless repeaters amplify and repeat
wireless signal transmissions between devices.

Network Components and Topology Diagrams

Networks range from a simple LAN with a few end devices to large networks with
many devices in diverse geographic areas. Typically, networks consist of multiple
small to large local, metropolitan, and wide area networks. The networks are
interconnected using many switches, routers, and other devices.

All networks are diagrammed when designing them. A diagram uses symbols and
icons to capture network configuration and connection information. After a network
is built and operational, it is necessary to have detailed and accurate diagrams for
troubleshooting or reconfiguration.

Although the form and colors may vary, a standard set of symbols and icons have
been developed that represent each type of networking component. Lines and
icons represent the connections and interconnections that represent the topology of
the network. While there are many specialized components available, this training
covers components that form the foundation of networks.

Introduction to Networking Technology and Concepts-SSP

© Copyright 2019 Dell Inc. Page 19


Describing the Network

A cloud symbol represents the Internet

A circle or cylinder with arrows arranged as shown represents a router

A circle or cylinder with arrows arranged as shown and antenna represents a wireless router

A square or box with arrows arranged as shown represents a switch

This icon represents a server

This icon represents a workstation or desktop personal computer

These are the symbols used to indicate the foundational components in network diagrams. Click
image to enlarge.

Basic Network Diagram

Here is an example of a simple network diagram using the standard symbols and
icons. In the example, you see three separate LAN networks each with its own set
of devices. Routers are used to internetwork the three LANs and also connect them
to two WANs, the public Internet and a private Internet.

All network diagrams contain more key information such as LAN segment network
addresses and subnet masks. It can also show the names and other information
about application servers and network services devices on the network.

In the diagram, you see device that there is a router that is merged symbol is with a
switch. It hosts a desktop personal computer and laptop, and four wireless laptops.
This single device provides both router and switch functions. A nonstandard,
switch/router icon clarifies the mixing of the two different functions into a single

Introduction to Networking Technology and Concepts-SSP

Page 20 © Copyright 2019 Dell Inc.


Describing the Network

device. The switch function creates the 10.10.0/24 subnet and connects the wired
desktop and laptop and the wireless laptops into a LAN segment. The router
function interfaces that LAN segment to the WAN.

Combined
Switch/Router
Device

Private
Corporate
Internet

Public Internet

The diagram shows the configuration of three simple LANs and their interconnections to each other
and two internetworks. The combined switch and router with wireless LAN capability is used to show
that there are devices that combine different functions into a single unit. Click the image to enlarge.

Networks and Internetworking

The term Internet is most commonly used when discussing the open, worldwide
interconnection of systems and networks that form the World Wide Web, or WWW.

Called the Internet, the first letter of the word Internet is capitalized when used to
describe the World Wide Web and other resources around the globe. The
worldwide Web is a subset of the interconnected systems around the world. People
access thousands of systems across the Internet to locate information, place
orders for merchandise and services and to communicate with each other.

Technically, an internet is a combination of multiple networks that are connected to

Introduction to Networking Technology and Concepts-SSP

© Copyright 2019 Dell Inc. Page 21


Describing the Network

each other. A "network" connects devices to each other. An internet - lowercase "i"
- connects networks of devices together.

Use the tabs to see examples a networking and internetworking.

Network

Shown are two distinct networks, Network 1 and Network 2. Each network has a
single user that is connected only to that network. Because the networks are
separate, user A cannot access devices on Network 2 and user B cannot access
devices on Network 1. Also, they cannot communicate with each other.

Introduction to Networking Technology and Concepts-SSP

Page 22 © Copyright 2019 Dell Inc.


Describing the Network

Network 1

User A

Network 2

User B

Introduction to Networking Technology and Concepts-SSP

© Copyright 2019 Dell Inc. Page 23


Describing the Network

Click the image to enlarge.

Internetwork

Shown are two distinct networks, Network 1 and Network 2. Each network has a
single user that is connected only to that network. Enabling User A to connect to
devices on either network, and User B to connect devices on either network without
merging the networks requires a special device called a router.

The router creates an internet that allows each network to remain logically separate
and yet enables users and devices to connect to each other at any time.

Introduction to Networking Technology and Concepts-SSP

Page 24 © Copyright 2019 Dell Inc.


Describing the Network

Network 1

User A

Network 2

User B

Introduction to Networking Technology and Concepts-SSP

© Copyright 2019 Dell Inc. Page 25


Describing the Network

Click the image to enlarge.

Device Interconnection Topologies

A topology is the device interconnection scheme of a network. The network


topology defines the pattern of all the interconnected elements across the network.

The topology of a network is expressed in two ways. The first is physical topology.
The physical topology describes and maps the arrangement of all network devices,
and the media - both cables and wireless - that interconnects them. The second is
the logical topology. The logical topology describes all paths that data can take as it
traverses the network between devices.

There are many different topologies and some of them can be combined when
designing a network. However, each topology is based on different standards and
sometimes different interconnection devices and media. Caution must be used
when building networks of various topologies.

There are several standard topology models that are used for interconnecting
network devices: Bus, Star, Ring, and Mesh.

Introduction to Networking Technology and Concepts-SSP

Page 26 © Copyright 2019 Dell Inc.


Describing the Network

Bus Topology

In the bus topology, all devices directly connect to the transmission media. Coaxial
cable is typically used. Since both ends of the media are open, impedance
matching terminators are required at each end to prevent signal reflection noise.

In this shared media topology, there is no network switch. Since there is no access
mediator and all devices connect directly, each has equal opportunity to access the
media at any time. When a device transmits, all devices on the network get the
transmission. Each must process the message to determine if they are the
recipient. Higher levels of traffic can negatively impact the normal operations of all
devices on the bus. More time must be spent servicing network interrupts than
performing application processing.

Only one device at a time can use the media to transmit data to a destination
device. If two or more devices try to transmit simultaneously, a collision takes
place. Since the media can handle only one source and destination communication
at a time, all transmission attempts are invalidated.

To prevent multiple devices from transmitting simultaneously, each device must


first listen to determine that no other system is transmitting.

If two or more devices happen to start transmitting simultaneously, each


transmitting device detects the collision. They stop and wait a random amount of
time before trying to retransmit. This mode of operation is called Carrier Sense
Multiple-Access with Collision Detection, orCSMA/CD.

Because of the lack of network devices to control network access, out-of-date cable
requirements, and other considerations, the bus topology is rarely used today.

Introduction to Networking Technology and Concepts-SSP

© Copyright 2019 Dell Inc. Page 27


Describing the Network

Device 6 and device 2 want to communicate with other devices but transmit at the same instant.
They each wait a random amount of time to get control of the media until transmission is complete.
Cabling is simple, but troubleshooting can become complex because of the higher possibility of
noise on the media due to faulty terminators.

Star and Extended Star Topology

The star topology is the most common topology of LAN networks. The star topology
has a central connection point, and all devices have a private cable to the central
device. Devices communicate with one another through the central point. The
central device can be either a switch or a hub, although a switch is preferred to
avoid CSMA/CD collisions handling-induced latency. Where a hub is used, the
topology operates as a logical bus with the same transmit collision problem.

Cable or connector problems affect only one device while the rest of the devices
remain unaffected. However, because all data must flow through a central
connection device, it must have enough bandwidth and low enough latency to
accommodate all communications consistently. Also, the central device is a single
point of failure. If it crashes, the entire network goes down.

The extended star topology is a more efficient and fault tolerant variant. Optimal
design ensures that device communications are mostly between outer edge
devices. In this way, fewer signals must traverse the central device. The central

Introduction to Networking Technology and Concepts-SSP

Page 28 © Copyright 2019 Dell Inc.


Describing the Network

device remains a single point of failure but if designed properly only a minimum
portion of the user population is affected if it crashes.

The star topology has a switch or hub at the center. The extended star is more fault tolerant and
efficient. Frequently communicating devices are grouped close to each other at an outer edge.
Cabling and troubleshooting can be simple to complex, depending on the type of star topology and
number of devices. Click the image to enlarge.

Ring and Dual Ring Topology

The ring topology is similar to the bus topology, except that there is no beginning or
Endpoint that must be terminated. All devices in the ring share a common cable,
and data flows in one direction only. Data is passed from device to device around
the ring.

Unlike the bus topology, ring topologies can prevent data collisions by use of a
token passing protocol. A special signal that is called a token is passed through
each device in turn. The token is used to administer media access fairness as no
device can transmit until it has the token. When transmission is complete, the token
is released and passed to the next device on the ring. The token protocol enables
all devices to have an equal opportunity to control the media for transmission.

The disadvantage to the ring topology is that a single device NIC or cable failure

Introduction to Networking Technology and Concepts-SSP

© Copyright 2019 Dell Inc. Page 29


Describing the Network

can bring down the entire network. Troubleshooting can be more difficult than with
other topologies because it may be necessary to trace each cable and network
interface to find the faulty component.

The dual ring topology variant provides a redundant ring with data traveling in the
opposite direction. This design is more resilient than the single-ring topology.
Metropolitan Area Networks typically take advantage of dual ring topology using
fiber optic cables as the media.

The ring topologies rely on device interfaces and cables to maintain connectivity. Simple cabling
and easy to difficult troubleshooting are characteristics depending on the topology variant used.
Click the image to enlarge.

Full-Mesh and Partial-Mesh Topology

The full-mesh topology connects each device to every other device in the network.
This topology provides maximum redundancy and fault tolerance.

Full-mesh topologies are more expensive because many more ports must be used
to establish all the connections between devices. Because of the exponential
increase in ports that are required as it grows, a mesh network does not scale well
and is limited to small implementations. Because of the many available paths
between devices, full-mesh topologies are the most robust and resistant to failures.
If one network device goes down, it does not affect the ability of other devices to
communicate. Because of the high port counts and number of paths, mesh

Introduction to Networking Technology and Concepts-SSP

Page 30 © Copyright 2019 Dell Inc.


Describing the Network

topologies are the most difficult to troubleshoot.

A partial-mesh topology is a lower-cost way to provide some redundancy, but has


less fault tolerance. In the Full-Mesh topology, each switch device maintains
connectivity with all other devices. In the Partial-Mesh topology, a network designer
must decide which area of the network is the most critical and place a switch there.

The mesh topologies rely on switches, device interfaces and cables to maintain connectivity.
Complex cabling and difficult troubleshooting are characteristics of the mesh topologies. Click the
image to enlarge.

Hierarchical Data Center Network

The hierarchical internetwork model is an industry-wide model for designing


reliable, highly scalable, and flexible networks. The hierarchical model divides the
network architecture into three distinct layers. They include a high-capacity
backbone layer at the center of the network and a distribution layer that interfaces
with a lower layer of standard access switches.

Two more types of networking devices are used in hierarchical networks. These
specialized devices are used in the core and distribution layers in this model. Use
the tabs to learn about each of these devices.

Router/Switch device

The hierarchical network core is built using high-speed and high-capacity devices
that combine the function of a switch and an internal router. The internal router

Introduction to Networking Technology and Concepts-SSP

© Copyright 2019 Dell Inc. Page 31


Describing the Network

intelligently switches source and destination paths across the backplane of the
system. Data moves efficiently between its many ports.

The Router/Switch device icon. There are two distinct components shown in this icon. The top part
provides the high capacity internal routing functions, and the lower part provides the high capacity
network switching function at the core layer.

Multilayer Switch

The hierarchical network distribution layer is built using devices that provide key
extensions to the standard network switch functions. Called multilayer switches,
these devices provide boundary functionality to assist the networking services
managed at the layer above, the core layer, and the layer below, the network
access layer. Below is the standard icon for this device type.

This icon depicts a mulitlayer switch device.

Hierarchical Network Topology

Larger networks in data centers are often designed to use a hierarchy of switches
and routers. The diagram shows a layered hierarchical network using an access
layer and distribution layer of switches. It also contains a network core with the
devices that form the network backbone. Use the tabs to learn about the purpose of
each layer.

To optimize general network performance, it is best to place servers and other


devices that communicate with each other grouped at the edge. Even better, is to
connect them to the same physical edge switch if possible. Large capacity data
storage arrays that many hosts throughout the data center use simultaneously
should be connected close to the core.

Introduction to Networking Technology and Concepts-SSP

Page 32 © Copyright 2019 Dell Inc.


Describing the Network

Core Layer

Core or backbone layer devices form the main foundation of a large and high-
performance network. The devices here are high capacity and robust systems.
They are built with redundant power supplies, high-bandwidth backplanes, and
multiple switch and internal signal routing boards, supporting the data center
network workload. They are highly resilient systems and create a backbone to
support fast and efficient data transport for the entire data center. The core network
layer is designed using redundant directors who are interconnected using full mesh
topology for highest availability and number of concurrent paths.

Devices that are used at the core are designed for high capacity, performance, and
fault tolerance. Because the transport of data at the high speed is the main
requirement, backbone devices have minimal extra features that do not directly
enhance this purpose.

Distribution Layer

The Distribution Layer manages routing, filtering, and quality of service policies for
the data center network. Distribution layer devices also often manage individual
branch-office WAN connections. Distribution layer switches can be classified as
multilayer switches. The term multilayer is applied to switches that are designed to
provide boundary functionality to assist the access and core layers. To accomplish
this, multilayer switches operate in two modes. They function as a switch when
attached to the access layer devices, and as a router when attached to the core
devices.

Multilayer switches can keep a master index of all network addresses and routes to
relieve the core devices of some of the processing burden of keeping track of this
vital and active information.

Access Layer

Access Layer switches are where the discrete end devices, such as servers, iSCSI
storage arrays, desktops, laptops, thin clients, and peripheral devices such as
printers connect to the network. Access layer switches provide high capacity
uplinks, typically trunks, to the distribution layer.

Introduction to Networking Technology and Concepts-SSP

© Copyright 2019 Dell Inc. Page 33


Describing the Network

Core (Backbone) Layer Router/Switch Devices

Multilayer Switch
Distribution Layer Devices

Access Workgroup
Layer Switch
Devices Trunk Interface

Instead of a single interface between devices, link aggregation is typically used. Also known as a
trunk, two or more interfaces are logically bound together to operate as one interface. Trunks
provide greater bandwidth and high connection resiliency. Click the image to enlarge.

What Types of Data Do Networks Transport?

Networks are designed to carry many different types of data, and most networks
carry multiple datatypes simultaneously. Known as network convergence, most
networks connect IT systems and users, as well as providing telephone, video, and
data communication services.

The types of data and the individual transport demands and priorities among them
greatly influence the design and operation of the networks that transport them.
They also inspire the Service-Level Agreements that define and help ensure the
appropriate and consistent performance of the network and interconnections.

Use the tabs to learn about the typical types of data that networks carry.

Application/User Data

Application and user data describe information that is the product of people and
their applications. They include documents, email and other communications,
media and business data such as databases, and analytical data.

A key type of this data is business data. This type is a specific subset of application

Introduction to Networking Technology and Concepts-SSP

Page 34 © Copyright 2019 Dell Inc.


Describing the Network

and user data. It is the information in the form of databases, business rules,
analytical information, and events in relation to operating a business or institution.
Businesses and institutions use applications to conduct, transact, record, analyze,
and actualize the inputs and output of the organization. These applications create,
transmit, and consume various types and amounts of data across LAN, MAN, and
WAN networks.

Since businesses and institutions are data-driven, the network has become the
central hub of operations. The ability of the network to efficiently move, prioritize,
and, protect data in transit are key deign influences. Service-Level Agreements, or
SLAs, are used to ensure that the network design, can meet the needs of the
business.

Digital/Analog

Analog and digital signals are both used to transmit information, but each does this
in different ways. The information carried in both are typically audio or video but
also includes other information types such as that which is created by measuring
equipment. An example would be a digital thermometer that can send temperature
readings through a USB connection in a computer.

In both types, the data is transformed into electric signals. The difference between
analog and digital data is that with analog, information is translated into electric
pulses of varying amplitude. In digital technology, translation of information is done.
Intermediary circuitry or devices converts the analog electrical signals into a digital,
binary format (0s and 1s) where the bit stream represents the varying analog signal
as digitized data that can be transported over a network. If required, the digitized
signal can be converted back to the analog equivalent after the destination end-
device connected to the network receives the data. The table compares key analog
and data signal attributes.

Attribute Analog Digital

Introduction to Networking Technology and Concepts-SSP

© Copyright 2019 Dell Inc. Page 35


Describing the Network

Signal A continuous output signal Distinct, individual


that contains information of signals generated
a physical measurement. each in their own time
period or time slice.
The signals are
assembled into binary
data units. Individual
data units are defined
by clock signals at the
beginning and end of a
sequence of individual
signals that comprise
the data unit.

Data Representation Data is encoded in Data is represented in


continuous range of values the flow of discrete or
transmitted over a carrier individual values such
signal to represent as zero's and one's.
information. Data is encoded into
patterns of fixed
groups of these
values. An example is
the data byte. A byte
consists of eight
individual one's and
zero's. Data is
encoded onto bytes
and decoded when
received by a device
that recovers the data
and reproduces it.

Introduction to Networking Technology and Concepts-SSP

Page 36 © Copyright 2019 Dell Inc.


Describing the Network

Example Radio carriers carrying MP3 or WAV data files


audio and video signals. or CDs and DVDs
The air carrying the sound encoded with voice
of a musical instrument or and music. The sound
the human voice to the of a musical
ear. instrument or the
human voice as read
from an MP3 or WAV
file or CD or DVD and
played through a
device that reads the
digital data and
converts it back to
analog signals for the
ear.

Voice

Voice communications today are typically digitized and traverse networks as form
of data. Whether it is over the standard telephone or a computer-based
communication application such as Skype, the analog human voice and other
sounds are received by the microphone and through the use of specialized
hardware and software, converted into packets of digital data. The data packets are
placed onto a network and then travel like any other type of data, such as e-mail,
application or user data.

There are various technologies that can be used to convert and voice and sounds
to data and move them over a network. The most well known among these is Voice
Over Internet Protocol. Better know as VoIP, the the converted voice and sounds
are carried over one or more private networks. Since voice conversations most
times are between two or more people across long distances, VoIP typically is also
internetworked across other private networks and even the public Internet as the
communications route between all the call participants is established.

VoIP and other analog-to-digital telephony systems enable voice and sound
communications to be connected between standard telephones and cell phones

Introduction to Networking Technology and Concepts-SSP

© Copyright 2019 Dell Inc. Page 37


Describing the Network

over the public wired and wireless telephone networks and digital devices and
communications software connected to digital networks.

Video

Video in much the same way as voice is digitized and then carried over the
network. Also as with digital voice transmission, there are various technologies that
can be used to convert still and motion video and sound sequences to data and
transport them over a network. There are two basic forms of video transport. These
are upload/download and streaming. With upload/download, video is typically
encoded and stored. The complete video is available on the network as complete,
static file or files. Once uploaded and stored they can be downloaded on demand
and received in their entirety, stored locally at the receiving device.

To transport video, the first step is to encode the video sequences into a digital
format such as the MP4 or VOB file type. The files are transported over the network
and stored locally at the receiving end-device. When used, software decodes the
video and data files as read from storage, decodes them and then renders them for
playback. The key factors that impact video transport are bandwidth and latency.
However, when static video in the form of files is transported for upload/download
use, these factors have little impact on user experience.

Streaming

Video and audio sequences can be transported over the network using the
streaming method. Streaming is a method of transmitting and receiving video and
audio over a network as a steady, continuous flow of data. This form of video and
audio transport is characterized by the transmission and playback to proceeding in
real-time, with the data being transmitted and received and reconstituted into its
original form as it arrives from the network.

Streaming transport over the network is sensitive to bandwidth and latency


suppression. Depending on the resolution of the video sequence, transporting
video over the network in real-time can consume a substantial amount of available
network bandwidth. Also, latency can build as the the distance between the source
and destination end-devices increases and routing through other networks along
the way is encountered.

However, because video data is encoded at the pixel level and very granular, the

Introduction to Networking Technology and Concepts-SSP

Page 38 © Copyright 2019 Dell Inc.


Describing the Network

quality of playback at the receiving end-device is not perceptibly affected if small


portions of the data is intermittently dropped or arrives out of sequence due to
network service-level or bandwidth problems.

Introduction to Networking Technology and Concepts-SSP

© Copyright 2019 Dell Inc. Page 39


Knowledge Check: Network Devices and Description

Knowledge Check: Network Devices and Description

Question 1

1. Match each device to its network component category.

A. Wireless router A Connectivity

B. Firewall B Network services device

C. Backup client C Network services user

D. Backup server D Network services provider

Introduction to Networking Technology and Concepts-SSP

Page 40 © Copyright 2019 Dell Inc.


Knowledge Check: Network Devices and Description

Question 2

NETWORK 1

USER A

NETWORK 2

USER B

Introduction to Networking Technology and Concepts-SSP

© Copyright 2019 Dell Inc. Page 41


Knowledge Check: Network Devices and Description

Click image to enlarge.

2. Observe the diagram.

User A wants to connect to the indicated server on Network 2. What device can
be added to internetwork Network 1 and Network 2?
a. Router
b. Hub
c. Switch
d. CAT6 cable

Question 3 available in the web-based course

Question 4

3. Observe the diagram. How many discrete LAN networks are shown?
a. 2 distinct LANs
b. 4 distinct LANs
c. 6 distinct LANs
d. There are distinct LANs.

Introduction to Networking Technology and Concepts-SSP

Page 42 © Copyright 2019 Dell Inc.


Knowledge Check: Network Devices and Description

Click image to enlarge.

Question 5

4. What is a characteristic of analog data representation?


a. Data is encoded in a continuous range of values that are transmitted that
are over a carrier signal to represent information.
b. Data is encoded into patterns of fixed groups of individual values.
c. A continuous output signal that contains information of a physical
measurement.
d. Individual signals generated each in their own time slice.

Question 6

5. In which of these types of data is high network latency most perceptible?


a. Streaming video data
b. MP4 video file download
c. VoIP data
d. MP3 audio file download

Introduction to Networking Technology and Concepts-SSP

© Copyright 2019 Dell Inc. Page 43


Knowledge Check: Network Devices and Description

Question 7 available in the web-based course

Question 8

6. Which topology configurations are prone to media access collisions? Select all
that apply.
a. Bus topology
b. Star topology with a hub at the center.
c. Star topology with a switch at the center.
d. Mesh topology using switches only
e. Ring topology

Introduction to Networking Technology and Concepts-SSP

Page 44 © Copyright 2019 Dell Inc.


Network Types and Protocols

Network Types and Protocols

Network Types and Protocols

OSI Reference Model

A reference model is an agreed upon standard to ensure compatibility among


devices and systems that must work together to communicate and exchange data.
Manufactures of networking devices ensure interoperability by adhering to a
standard named the open systems interconnect, or OSI model.

The OSI reference model divides key network functions into seven distinct
categories. These functions are arranged into a layered stack. The layers form a
hierarchy and functions are in a logical order. Lower layers provide services for
upper layers, and higher layers complete their functions by using input from the
lower layers.

Splitting networking into layers enables manufacturers to alter how they implement
the functions of a layer without them impacting the operations of other layers.

The most important reason for using a layered architecture is to provide standards
for how each layer interfaces with the layers immediately above and below. This
standardization enables all vendors to create devices and software that can
interoperate with devices and software from other vendors.

Use the tabs for more information about the responsibilities of each layer of the OSI
model.

Physical

Layer 1 Physical Layer - Defines the electrical and physical specifications for
devices and cables.

Introduction to Networking Technology and Concepts-SSP

© Copyright 2019 Dell Inc. Page 45


Network Types and Protocols

Data Link

Layer 2 Data Link Layer - Provides the functional and procedural means to transfer
data between network entities and to detect and possibly correct errors that may
occur in the Physical Layer.

Network

Layer 3 Network Layer - Provides the function and procedural means of


transferring variable length data sequences from a source to destination via one or
more networks via routing. Here also lies the responsibility for maintaining the
quality of service requested by the Transport Layer. The Internet Protocol, are IP
operates at this layer.

Transport

Layer 4 Transport Layer - Provides transparent transfer of data between end users.
A protocol can be included at this layer to provide reliable data transfer services to
the upper layers. This is known as quality of service. The protocol typically applied
is the Transmission Control Protocol, or TCP. Other protocols can be used at this
layer. The next most popular protocol is the User Datagram Protocol, or UDP.

Session

Layer 5 Session Layer - Controls the connections between computers. It


establishes, manages, and terminates the connections between the local and
remote application.

Presentation

Layer 6 Presentation Layer - Establishes a context between the Application layer


entities in which the high-layer entities can use different syntax and semantics.

Application

Layer 7 Application Layer - The layer closest to the end user, this layer is the
interface between the networked user data and the user application on the device.

Introduction to Networking Technology and Concepts-SSP

Page 46 © Copyright 2019 Dell Inc.


Network Types and Protocols

Application interface to lower level functions and services


APPLICATION LAYER

Syntactic Data Representation (Examples: JPG, DOC, PPT, etc.)


PRESENTATION LAYER

Application level connection and coordination


SESSION LAYER

Logical end-to-end connections, data sequencing and integrity


TRANSPORT LAYER

Logical addressing and Routing


NETWORK LAYER

Physical addressing, framing, flow control


DATA LINK LAYER

Physical media, signaling/codes, data transmission


PHYSICAL LAYER

Network complexity is simplified using a layered architecture. Each layer is responsible for handling
one or more of the facilities required for networking. Click image to enlarge.

Data Encapsulation

In a layered network model, both data and protocol information for a layer is
packaged in a Protocol Data Unit or PDU. The protocol information for the layer is
put in a header, and the header is attached to the front of the data. The entire PDU
is passed down to the next layer. Again, protocol information for the layer is put into
a header and attached at the beginning of the data to form a PDU for that layer.
This new PDU is passed to the next below layer.

The information size grows as it is encapsulated and passed from layer to layer.
After reaching the bottom layer, the final PDU is ready to exit onto the network
media. All data is encoded onto a serial bit stream and is placed onto the media as
electrical or optical on and off pulses.

Introduction to Networking Technology and Concepts-SSP

© Copyright 2019 Dell Inc. Page 47


Network Types and Protocols

APPLICATION

PRESENTATION User Data


Sender

SESSION

User Data Segment


TRANSPORT

Payload Packet
NETWORK

DATA LINK Frame


Payload

PHYSICAL

The diagram applies to the TCP/IP over Ethernet protocol network. The Layer 4 PDU is called a
TCP segment. The Layer 3 PDU is called an IP packet, and the Layer 2 PDU is called an Ethernet
frame. Layer 1 is always data bits. The header has layer-specific information like addressing,
formatting, and various switches and flags. Click the image to enlarge.

Networked Data Transmitted and Received

The reverse process happens at the receiving device. The data comes in through
Layer 1 and is passed up to Layer 2. Layer 2 removes the Layer 2 header and
parses the Layer 2 protocol information. The remaining information is sent up to
Layer 3, where the Layer 3 header is removed and the Layer 3 protocol information
is parsed.

This procedure continues up the stack. Each source layer in this network model
communicates logically with the same layer in the destination device.

Building the network protocol stack in layers enables for easier network upgrades
and maintenance. It is easier to replace a particular layer with an updated protocol
rather than having to reengineer the entire stack of protocols for small changes.

In this model, electrical signals form the bits (1's and 0's) that are transported at the
lowest physical layer.

Introduction to Networking Technology and Concepts-SSP

Page 48 © Copyright 2019 Dell Inc.


Network Types and Protocols

TRANSPORT LAYER TRANSPORT LAYER

PRESENTATION LAYER PRESENTATION LAYER

SESSION LAYER SESSION LAYER

TRANSPORT LAYER TRANSPORT LAYER

NETWORK LAYER NETWORK LAYER

DATA LINK LAYER DATA LINK LAYER

PHYSICAL LAYER PHYSICAL LAYER

Transmitters and receivers use the OSI in the same way. The sender nests PDUs on the way to the
network and the receiver de-encapsulates them and passes them through its own OSI stack. Click
the image to enlarge.

Network Design Considerations

Introduction to Networking Technology and Concepts-SSP

© Copyright 2019 Dell Inc. Page 49


Network Types and Protocols

Networks are constructed to interconnect computers and various other devices.


However, other than for the smallest of home networks, there are many factors that
must be considered in the planning and design of a network.

More than establishing interconnections, the network must efficiently handle


multiple connections and communications simultaneously.

Networks must be flexible and robust enough to sustain communication workload


bursts and peaks.

Also, they must be able to maintain acceptable service levels under any condition.
These conditions include when there are errors in the network itself or connected
devices inject errors into the network.

The number of devices that share the network, the distances between them, and
the communications service levels that must be maintained are key considerations.
All must be factored into planning and design.

The distance and connectivity between the networks and how devices are spread
across them can determine the efficiency and stability of the network infrastructure.

Network Capability and Service Level Design Factors

There are four main network configuration factors that determine the capabilities
and overall service level of a network:

• The number and types of interconnected devices and their relative locations
• The network equipment and cables that connect the devices and other networks
• The arrangement of the network equipment and cables that interconnect the
devices on the network
• The types of data and data transport protocols that the network must carry

These factors vary according to network size and the location relationship between
devices, including interconnected networks. There are three basic categories that
describe general network relationships. They are local area network, Metropolitan
Area Network, and wide area network.

The number of devices and the way they are connected to the network greatly

Introduction to Networking Technology and Concepts-SSP

Page 50 © Copyright 2019 Dell Inc.


Network Types and Protocols

affects the communications services levels. The interconnection configuration of a


network is called its topology and is key in determining the performance of the
network.

Local Area Network

The building of a network starts in a single location. This type of network is termed
the local area network, or LAN. A LAN is configured to enable devices to
communicate within a small geographical area such as a home, office space, or
within a single building. A LAN can be as small as two computers that are
connected to a shared printer in a small home office. A LAN can also extend to
more than 100 devices within an office building.

Individual LANs can be logically connected for communication using a router. Each
LAN connected to the router remains an individual network and is called a subnet.

In the home LAN at the left side in the diagram, you see the same switch and
router combination device that was introduced previously. This device forms a
single LAN and places all wired and wireless devices that are connected to it onto
that one LAN segment. The router portion interfaces the LAN segment to a WAN
such as the public Internet.

Introduction to Networking Technology and Concepts-SSP

© Copyright 2019 Dell Inc. Page 51


Network Types and Protocols

Subne
t
Subnet

Public
Internet

LANs can be stand-alone or logically merged using a router. Separate LANs that are connected
through a router are called subnets. Click the image to enlarge.

Metropolitan Area Network

Many organizations have multiple buildings with networked resources that are
connected. For instance, businesses can have a main office and a manufacturing
plant that are located in the same industrial park. A college or university can have
multiple buildings across one or more campuses that are connected. When LANs
are internetworked across an industrial park, a university campus, or within a city, it
is called a metropolitan area network, or MAN.

In the diagram, a manufacturing plant in same the industrial park has been added
and must be connected to the main office LAN. The router at the main office
connects the office LAN to the manufacturing plant LAN forming a Metropolitan
Area Network.

Introduction to Networking Technology and Concepts-SSP

Page 52 © Copyright 2019 Dell Inc.


Network Types and Protocols

MANUFACTURING
REMOTE PLANT
OFFICE

Subnet

Subnet
MAN
Subnet

Public Internet

MAIN OFFICE

The main office LAN is connected through a router to the LAN at the manufacturing plant. The plant
LAN is considered another subnet. Because of the relatively short distance between the LANs, a
MAN is formed. Click the image to enlarge.

Wide Area Network

The wide area network, or WAN, is used to connect a LAN or MAN in one
geographical location to others in remote locations. While LANs and MANs typically
cover distances measured in meters and up to a few kilometers, WAN networks
cover distances in kilometers and greater.

Businesses with offices, data centers, and plants usually own the LANs, but leases
the WAN infrastructure from a third-party, such as an Internet Service Provider.
The ISP provides and operates leased lines and related equipment to provide WAN
interconnections and bandwidth to each of its customers.

Dark fiber is sometimes used in the WAN cloud to cover at least portions of the
WAN connection. Dark fiber is the term that is used to describe long run fiber optic
cable infrastructure that is unused. The owner sells or leases the unused capacity
to the ISP. The ISP connects the dark fiber to the LANs of its customers, providing
private, long-distance WAN connectivity.

Introduction to Networking Technology and Concepts-SSP

© Copyright 2019 Dell Inc. Page 53


Network Types and Protocols

The ISP has complete use flexibility and provides the LAN connection equipment.
The ISP also defines the protocols that are used to connect the LANs of the
customer over the WAN infrastructure.

ISP Infrastructure

Geographic distance in miles

LAN WAN LA
N

A WAN cloud can be composed of one or more of private or leased lines, private or leased dark
fiber and the public Internet. Click image to enlarge.

Campus and Data Center Networks

The prime directive for networks is to ensure that the entire infrastructure can
consistently support current, peak, and near future communication service levels.
The standard term for defining and documenting communication and other IT
service level requirements is Service Level Agreement, or SLA.

Most businesses and government organizations have a main location such as a


data center and one or more smaller satellite locations. The satellite locations
contain mostly users of main location resources. Each location has its own SLA
requirement, but the SLA is expanded to consider all sites when they are inter-
networked across MAN or WAN distances.

All locations use the same type of network devices, such as routers, switches, and
firewalls. It is the capacity and speed of the devices that are used to build the
network that makes the difference. The equipment that is used in a network should
be selected based on the SLA requirements for the location.

There are two major categories for general SLA determination - data center and
campus. Main locations that store, process, and make available the major portion

Introduction to Networking Technology and Concepts-SSP

Page 54 © Copyright 2019 Dell Inc.


Network Types and Protocols

of IT resources are placed into the data center category. Locations that house
mostly users of IT resources are placed into the campus category. Use the tabs for
more information about these categories.

Data center network SLA requirements

The data center is where IT systems connect to the network to provide services.
These systems are physical and virtual enterprise servers and storage along with
the devices that maintain and protect systems and data.

Data center devices are mostly cabled to the network, rather than using wireless
connectivity. Hosting and maintaining adequate access to applications and
databases along with virtual machine access and management require enterprise-
level networking capabilities. This environment engenders the most demanding
SLAs.

Data center applications have relatively simple but stringent network requirements
that include high bandwidth and low latency. They are key factors that influence
data center network design.

With few users and many IT systems, the Data Center network requires more bandwidth, low
latency, and robust resiliency in its network infrastructure. Click image to enlarge.

Introduction to Networking Technology and Concepts-SSP

© Copyright 2019 Dell Inc. Page 55


Network Types and Protocols

Campus network SLA requirements

The campus is where users such as employees, contractors and customers


connect to the network. Using client devices, they connect to the data center for
most of their resource and data processing needs. Also, many users are issued
virtualized client systems. Known as virtual desktops, these client systems are fully
hosted in the data center. Users remotely access the client OS, applications, and
data.

Campus devices connect over wired and wireless networking. Typically, lower
bandwidth is required within campus locations. Intelligent edge caching can
decrease network demands to the data center by downloading and holding
frequently used data at remote sites. Campus locations can have relatively
complex designs using wired, wireless, and specialized networking. However, high
bandwidth and low latency are usually not key factors in network design.

With many users and few IT systems, the campus network requires less bandwidth, is less latency
sensitive, and encourages more cost-effective resiliency in its network infrastructure. Click image to
enlarge.

Introduction to Networking Technology and Concepts-SSP

Page 56 © Copyright 2019 Dell Inc.


Network Types and Protocols

Protocols Make the Network Work

The networking protocols that most people are familiar with are Ethernet and
TCP/IP. They are the most often used protocols that run on the network
infrastructure to connect end devices to perform work. LANs, MANs, and WANs are
built using at least one them. There are other protocols available, specific to
transporting disk storage data between devices. This specialized network is called
a Storage Area Network, or SAN.

This diagram summarizes the connectivity of the most popular protocols that make
the network work. Use the tabs to learn about the SAN protocols.

Fibre Channel

The Fibre Channel protocol is used to attach host servers to storage in small to
medium businesses and in large enterprises. Fibre Channel networks are used to
increase the number of servers that can access a single storage array. Fibre
Channel also increases the amount of storage each host can access and the
storage I/O operations per second performance of each server.

The Fibre Channel protocol is used to transport small computer systems interface,
or SCSI, commands, and associated data to access block-level storage. SANs, or
Storage Area Networks are built using specialized Fibre Channel switches. As
these networks grow into multiple switch networks, they form Fibre Channel fabrics.
These fabrics use mesh or partial mesh topology.

iSCSI

Just as Fibre Channel, the iSCSI protocol is also used to attach servers to storage
block-storage devices on the network. The “i” in iSCSI stands for “internet”.

When run over a standard network infrastructure, SCSI uses the Ethernet and IP
protocols to transport the SCSI disk storage device commands and the data
associated with those commands between end devices.

Since iSCSI uses standard Ethernet network switching and routing infrastructure
and the TCP and IP protocols, you see the switches and routers used for iSCSI are
the same as used for any other network applications that use Ethernet and TCP/IP
networking.

Introduction to Networking Technology and Concepts-SSP

© Copyright 2019 Dell Inc. Page 57


Network Types and Protocols

Ethernet TCP/IP
Ethernet Ethernet
Workstation IP Router Server
Switch Switch

Fibre Channel
Fibre Channel Switch
Server Storage Array

iSCSI
Ethernet Ethernet Storage Array
Server IP Router
Switch Switch

A SAN transports SCSI commands and disk data between servers and storage arrays on the
network. A SAN can be formed on either a Fibre Channel or standard Ethernet TCP/IP network
infrastructure. Click the image to enlarge.

Protocols and Networks that Enhance Connectivity

Various protocols and network infrastructures can be used to augment or even


replace existing less efficient end device connectivity schemes. These specialized
protocol and network configurations can extend the standard range of end-device
connectivity or replace less efficient interconnectivity technologies.

The diagram shows three common protocols and network infrastructure types that
are used to augment and enhance end device connectivity. They are InfiniBand,
Fibre Channel over IP, or FCIP, and Fibre Channel over Ethernet, or FCoE. Use
the tabs to learn about them.

InfiniBand

InfiniBand is a protocol and switched network infrastructure that is a high-speed


replacement for the internal PCI bus that is used in servers. It is configured as a
direct memory access interconnection between two or more servers. The
InfiniBand network becomes the high-performance server clustering interconnect
for clustered systems running high-speed computer applications.

Introduction to Networking Technology and Concepts-SSP

Page 58 © Copyright 2019 Dell Inc.


Network Types and Protocols

FCIP

Fibre Channel over IP is a network protocol that is most often used in Fibre
Channel SAN distance extension applications. If there are two sites with Fibre
Channel storage that need to be connected, they can connect through an IP
network linking the sites. The Fibre Channel protocol is encapsulated into IP
packets and transported. At the receiving end the FC frames are decapsulated
from the IP packets and delivered in their native form to an FC switch or directly to
a FC end-device.

FCIP can also take advantage of other underlying network technologies if required
to traverse a WAN that does not use Ethernet networking. Using FCIP can
eliminate the higher cost associated with extending the Fibre Channel network over
a long distance. As with all extended networks, WAN bandwidth and latency impact
are key factors that must be considered. SANs are especially sensitive to high
latency in the network.

FCoE

Fibre Channel over Ethernet, or FCoE, is a protocol designed to converge multiple


protocols onto a single cable. With FCoE, both Fibre Channel and Ethernet
protocols are transported on the same cable using enhanced, or lossless, Ethernet.
The two protocols are converged because Fibre Channel frames are encapsulated
within Ethernet frames for transport. FCoE has an advantage over FCIP in that
there is no TCP or IP protocol overhead.

Converged networking provides a cost-effective network connectivity alternative


across data centers that already have a significant Fibre Channel infrastructure
investment.

Introduction to Networking Technology and Concepts-SSP

© Copyright 2019 Dell Inc. Page 59


Network Types and Protocols

InfiniBand
Clustered Server InfiniBand Switch Clustered Server
Member 1 Member 2

F IP IP F
FCIP C MAN/WAN C
Multiprotocol Switch Multiprotocol Switch
Storage Storage

Ethernet
Converged LAN
FCoE
FC

Server FCoE/Ethernet FCo Storage

InfiniBand, FCIP and FCoE are examples of various protocols and network infrastructures available
to augment and enhance existing end-to-end connectivity. Click the image to enlarge.

Introduction to Networking Technology and Concepts-SSP

Page 60 © Copyright 2019 Dell Inc.


Knowledge Check: Topologies and Protocols

Question 1

1. A business must connect its main office to a new building it is leasing in the
same industrial park. Because minimal data transfer is required between the
buildings, it was decided to use a VPN over the public Internet to connect them.
What network classification would define this network?
a. LAN
b. MAN
c. WAN
d. Hierarchical

Question 2

2. Which bandwidth and latency types meet the typical network SLA requirements
of a bank branch office location?
a. High bandwidth
b. Low latency
c. Medium latency
d. Medium bandwidth

Question 3

3. Match each OSI layer to its function.

Introduction to Networking Technology and Concepts-SSP

© Copyright 2019 Dell Inc. Page 61


A. Application A Application data network interface

B. Physical F Syntactic data representation, such as


JPEG, DOC, and XLS file types

C. Session C Application level connection and


coordination

D. Data Link E Logical connections, data sequencing,


and integrity

E. Transport G IP addressing and routing

F. Presentation D MAC address, framing, flow control

G.Network B Media, signaling/codes, data


transmission

Introduction to Networking Technology and Concepts-SSP

Page 62 © Copyright 2019 Dell Inc.

You might also like