Introduction To Networking Technology and Concepts: Downloadable Content
Introduction To Networking Technology and Concepts: Downloadable Content
NETWORKING
TECHNOLOGY AND
CONCEPTS
DOWNLOADABLE CONTENT
DOWNLOADABLE CONTENT
Introduction to Networking Technology and Concepts-SSP
Definition of Network
A network is a collection of devices that must communicate with each other. The
system of interconnected hardware, software, and protocols that achieves and
maintains the connections is the network.
Networks can carry many types of data in different types of environments. Most
often, networks are used to connect systems and devices in and across the
locations of small and large businesses. Most private homes are using networks to
interconnect computers and other devices.
Also, remote employees and contractors connect to small and large business
locations from their homes or satellite and branch offices.
Modern IT devices are designed to connect to other devices to share data and information.
Networks enable and maintain device interconnections through infrastructure and protocols. Click
the image to enlarge.
Networks connect different users and data across many types of environments.
These include large enterprises, small and medium business and even home
users. In larger businesses, there are many locations that require communication
with each other.
Click each tab for more information about typical networked device and user
locations.
Location Categories
Networks are grouped into three location categories. There are local area
Networks, metropolitan area networks, and wide area networks.
LANs, MANs, and WANs are defined by not only the distance between connected
devices, but by the network architecture that supports the connectivity. LANs,
MANs, and WANs each require its own type of cabling, network infrastructure, and
protocols.
Main Location
A main location or office is a single site such as a data center. It can also be part of
a campus of nearby sites. The main location is where the bulk of the organization's
data is located. Typically, most of the people who work at the organization are
located in the main location and use network resources to perform their tasks. A
main location uses one or more LANs to connect devices and users. It may also
connect a LAN to a MAN or WAN depending on communication requirements with
devices and users at other related locations.
Branch Locations
Smaller groups of people work at branch offices. They communicate with each
other and work together through a network. Also, they can communicate with other
people and business systems at the main location. Workers at each branch office
have common access to local network resources such as printers and other special
equipment.
Typically, at least some corporate data resources are locally cached at the branch
locations. However, most if not all of the data is centrally housed and maintained at
the main location. A branch location uses one or more LANs to connect devices
and users. A MAN or WAN then connects the location to the main and other local,
nearby, and remote locations.
Home Offices
Now more than ever because of the Internet, people are able to work from a home
office. These people require on-demand connectivity and access to main or branch
locations to access the data and network resources used in their work. A home
office location typically uses one LAN to connect devices and users. It also
connects to one or more main and branch locations through a WAN - typically the
Internet.
Home office workers are able to use main or branch location printers or local
printers and other resources on their home network.
Mobile Users
Mobile users typically connect to the main or branch location data and resources
from many different remote locations. Mobile users typically work at places such as
customer locations and from business partner offices. Also, they can work from the
main or any branch location. Mobile users' devices typically use wireless
connectivity to become part of the LAN of their location. Called WiFi, the wireless
network connects their devices to the LAN as if they were using physical cables.
A major factor that affects mobile workers is that their work location can be
unpredictable. Their location at any time can span different areas and time zones
around the earth.
Networks are all about enabling sharing. In planning a network, consider how data
and information sharing should occur.
In the mainframe computer environment, the choice was limited. It is the mainframe
that shares data and the other applications and devices are the consumers of
shared data.
The advent of small computers and open systems enabled decentralizing data
sharing. In the open systems environment, computers and other devices on a
network create and share data with each other. Some of them are intended mostly
to share their data while others are mostly clients, or consumers of data.
The number of servers in relation to the number of clients is one thing to consider
when designing a network. Also consider the amount of data that flows between
them and the speed at which data must be shared.
The division of servers and clients on a network can be sorted into two network
sharing models. They are the peer-to-peer and client/server models.
Data Server
Data Server
Data Client
Data Server
Data Server
Data server and data client functions can be separate or combined on a compute platform. Click
image to enlarge.
P2P
Client/server
Here are the fundamental risks and benefits of the P2P network model:
Benefits Risks
Adding peers adds resources to the Because of the any-to-any and random
network and increases the capacity for access relationship between peers, P2P
resource sharing. Adding peers networks can cause high network
generally increases network throughput bandwidth consumption rates.
because more services and users
become available throughout the
growing network infrastructure.
Here are the fundamental risks and benefits of the client/server network model:
Benefits Risks
Question 1
Question 2
There are many components that are used to construct networks. All of them can
be divided into three general categories:
• Connectivity
• Network service providers
• Network service users
Small or large, simple, or complex, networks must have components from each
category. Connectivity includes such components as cables and connectors and
network interface cards and ports. Also included are network switches and routers.
Network services include devices that offer data to share and devices that access
the shared data to provide output for business and other uses. These specialized
systems may provide firewall functionality, user authentication, access controls,
and security. Other systems provide primary disk storage and general data
protection, backup, and recovery functionality.
Presented here are the most common physical components that form and maintain
a network. Use the tabs to learn about them.
Devices
Servers, workstations, laptops, and mobile devices are at the end points on the
network. Endpoint devices are interconnected through the other network devices to
share and receive data.
Interconnection
Interconnection devices provide the means and paths for the data to travel between
end devices. Some of the most fundamental are:
Switches
Switches are the connectivity devices that form the logical center of a network
segment. Each end device connected to the switch can establish a connection to
other end devices connected to switch ports. A switch is an intelligent device that
can increase network communications efficiency by actively controlling and
directing the connections between devices connected to the switch.
Because of its intelligence, a switch plays an active role in setting up, managing,
and optimizing communications between end devices connected to the network
through it.
Switches limit communications between the source and the target end-device. Click to enlarge.
Hubs
Hubs are network connectivity devices that form the physical center of a network
segment. Each end device connected to the hub can establish a connection to
other end devices connected to hub ports. A hub simply connects devices and
allows signals to pass-through.
A hub is not considered an intelligent device and therefore cannot increase network
communications efficiency. It plays a totally passive role in the communications
between end devices. Hubs are deprecated technology and are rarely used in
modern networks. Because of the intelligence and greatly reduced cost of using
switches, hubs are rarely used in modern networks.
Hubs are very inefficient network communication devices. Instead of limiting communications
between a source and the intended target end-device, hubs transmit source communications to all
end-devices on that network segment. Click the image to enlarge.
Routers
Switching and routing functions are often combined into a single physical device.
These devices typically connect home and office business networks to the Internet.
Network B
Network A
The diagram shows normal end-device communications on each of two network segments. When
an end-device on Network B needs to communicate with an end-device on Network A, a router is
used to enable the internetwork communications while keeping both networks separate. Click the
image to enlarge.
Repeater
Also known as extenders, the repeater is a network device that is used to replicate
or regenerate or signals that are weakened or distorted by transmission over long
distances or through areas with high levels of electromagnetic interference. The
purpose of a repeater is to extend the LAN segment beyond its physical cable
limits. For instance, the typical twisted-pair network cable can be run to a maximum
length of 100 meters. The electrical signals carried by a cable longer than that, or
worse, a faulty cable even shorter than 100 meters, will degrade to the point of
uselessness when it reaches the device at the other end. The main purpose of a
repeater is to extend the length of the network transmission medium beyond the
maximum limit.
Typically, repeaters are used to connect two physically close buildings when they
are too far apart for standard cables to be used. Repeaters also can be used to
connect between floors of a building that would normally surpass the maximum
allowable cable length.
Also available are wireless repeaters. These serve the same purpose and function
in a similar way. Instead of physical cables, wireless repeaters amplify and repeat
wireless signal transmissions between devices.
Networks range from a simple LAN with a few end devices to large networks with
many devices in diverse geographic areas. Typically, networks consist of multiple
small to large local, metropolitan, and wide area networks. The networks are
interconnected using many switches, routers, and other devices.
All networks are diagrammed when designing them. A diagram uses symbols and
icons to capture network configuration and connection information. After a network
is built and operational, it is necessary to have detailed and accurate diagrams for
troubleshooting or reconfiguration.
Although the form and colors may vary, a standard set of symbols and icons have
been developed that represent each type of networking component. Lines and
icons represent the connections and interconnections that represent the topology of
the network. While there are many specialized components available, this training
covers components that form the foundation of networks.
A circle or cylinder with arrows arranged as shown and antenna represents a wireless router
These are the symbols used to indicate the foundational components in network diagrams. Click
image to enlarge.
Here is an example of a simple network diagram using the standard symbols and
icons. In the example, you see three separate LAN networks each with its own set
of devices. Routers are used to internetwork the three LANs and also connect them
to two WANs, the public Internet and a private Internet.
All network diagrams contain more key information such as LAN segment network
addresses and subnet masks. It can also show the names and other information
about application servers and network services devices on the network.
In the diagram, you see device that there is a router that is merged symbol is with a
switch. It hosts a desktop personal computer and laptop, and four wireless laptops.
This single device provides both router and switch functions. A nonstandard,
switch/router icon clarifies the mixing of the two different functions into a single
device. The switch function creates the 10.10.0/24 subnet and connects the wired
desktop and laptop and the wireless laptops into a LAN segment. The router
function interfaces that LAN segment to the WAN.
Combined
Switch/Router
Device
Private
Corporate
Internet
Public Internet
The diagram shows the configuration of three simple LANs and their interconnections to each other
and two internetworks. The combined switch and router with wireless LAN capability is used to show
that there are devices that combine different functions into a single unit. Click the image to enlarge.
The term Internet is most commonly used when discussing the open, worldwide
interconnection of systems and networks that form the World Wide Web, or WWW.
Called the Internet, the first letter of the word Internet is capitalized when used to
describe the World Wide Web and other resources around the globe. The
worldwide Web is a subset of the interconnected systems around the world. People
access thousands of systems across the Internet to locate information, place
orders for merchandise and services and to communicate with each other.
each other. A "network" connects devices to each other. An internet - lowercase "i"
- connects networks of devices together.
Network
Shown are two distinct networks, Network 1 and Network 2. Each network has a
single user that is connected only to that network. Because the networks are
separate, user A cannot access devices on Network 2 and user B cannot access
devices on Network 1. Also, they cannot communicate with each other.
Network 1
User A
Network 2
User B
Internetwork
Shown are two distinct networks, Network 1 and Network 2. Each network has a
single user that is connected only to that network. Enabling User A to connect to
devices on either network, and User B to connect devices on either network without
merging the networks requires a special device called a router.
The router creates an internet that allows each network to remain logically separate
and yet enables users and devices to connect to each other at any time.
Network 1
User A
Network 2
User B
The topology of a network is expressed in two ways. The first is physical topology.
The physical topology describes and maps the arrangement of all network devices,
and the media - both cables and wireless - that interconnects them. The second is
the logical topology. The logical topology describes all paths that data can take as it
traverses the network between devices.
There are many different topologies and some of them can be combined when
designing a network. However, each topology is based on different standards and
sometimes different interconnection devices and media. Caution must be used
when building networks of various topologies.
There are several standard topology models that are used for interconnecting
network devices: Bus, Star, Ring, and Mesh.
Bus Topology
In the bus topology, all devices directly connect to the transmission media. Coaxial
cable is typically used. Since both ends of the media are open, impedance
matching terminators are required at each end to prevent signal reflection noise.
In this shared media topology, there is no network switch. Since there is no access
mediator and all devices connect directly, each has equal opportunity to access the
media at any time. When a device transmits, all devices on the network get the
transmission. Each must process the message to determine if they are the
recipient. Higher levels of traffic can negatively impact the normal operations of all
devices on the bus. More time must be spent servicing network interrupts than
performing application processing.
Only one device at a time can use the media to transmit data to a destination
device. If two or more devices try to transmit simultaneously, a collision takes
place. Since the media can handle only one source and destination communication
at a time, all transmission attempts are invalidated.
Because of the lack of network devices to control network access, out-of-date cable
requirements, and other considerations, the bus topology is rarely used today.
Device 6 and device 2 want to communicate with other devices but transmit at the same instant.
They each wait a random amount of time to get control of the media until transmission is complete.
Cabling is simple, but troubleshooting can become complex because of the higher possibility of
noise on the media due to faulty terminators.
The star topology is the most common topology of LAN networks. The star topology
has a central connection point, and all devices have a private cable to the central
device. Devices communicate with one another through the central point. The
central device can be either a switch or a hub, although a switch is preferred to
avoid CSMA/CD collisions handling-induced latency. Where a hub is used, the
topology operates as a logical bus with the same transmit collision problem.
Cable or connector problems affect only one device while the rest of the devices
remain unaffected. However, because all data must flow through a central
connection device, it must have enough bandwidth and low enough latency to
accommodate all communications consistently. Also, the central device is a single
point of failure. If it crashes, the entire network goes down.
The extended star topology is a more efficient and fault tolerant variant. Optimal
design ensures that device communications are mostly between outer edge
devices. In this way, fewer signals must traverse the central device. The central
device remains a single point of failure but if designed properly only a minimum
portion of the user population is affected if it crashes.
The star topology has a switch or hub at the center. The extended star is more fault tolerant and
efficient. Frequently communicating devices are grouped close to each other at an outer edge.
Cabling and troubleshooting can be simple to complex, depending on the type of star topology and
number of devices. Click the image to enlarge.
The ring topology is similar to the bus topology, except that there is no beginning or
Endpoint that must be terminated. All devices in the ring share a common cable,
and data flows in one direction only. Data is passed from device to device around
the ring.
Unlike the bus topology, ring topologies can prevent data collisions by use of a
token passing protocol. A special signal that is called a token is passed through
each device in turn. The token is used to administer media access fairness as no
device can transmit until it has the token. When transmission is complete, the token
is released and passed to the next device on the ring. The token protocol enables
all devices to have an equal opportunity to control the media for transmission.
The disadvantage to the ring topology is that a single device NIC or cable failure
can bring down the entire network. Troubleshooting can be more difficult than with
other topologies because it may be necessary to trace each cable and network
interface to find the faulty component.
The dual ring topology variant provides a redundant ring with data traveling in the
opposite direction. This design is more resilient than the single-ring topology.
Metropolitan Area Networks typically take advantage of dual ring topology using
fiber optic cables as the media.
The ring topologies rely on device interfaces and cables to maintain connectivity. Simple cabling
and easy to difficult troubleshooting are characteristics depending on the topology variant used.
Click the image to enlarge.
The full-mesh topology connects each device to every other device in the network.
This topology provides maximum redundancy and fault tolerance.
Full-mesh topologies are more expensive because many more ports must be used
to establish all the connections between devices. Because of the exponential
increase in ports that are required as it grows, a mesh network does not scale well
and is limited to small implementations. Because of the many available paths
between devices, full-mesh topologies are the most robust and resistant to failures.
If one network device goes down, it does not affect the ability of other devices to
communicate. Because of the high port counts and number of paths, mesh
The mesh topologies rely on switches, device interfaces and cables to maintain connectivity.
Complex cabling and difficult troubleshooting are characteristics of the mesh topologies. Click the
image to enlarge.
Two more types of networking devices are used in hierarchical networks. These
specialized devices are used in the core and distribution layers in this model. Use
the tabs to learn about each of these devices.
Router/Switch device
The hierarchical network core is built using high-speed and high-capacity devices
that combine the function of a switch and an internal router. The internal router
intelligently switches source and destination paths across the backplane of the
system. Data moves efficiently between its many ports.
The Router/Switch device icon. There are two distinct components shown in this icon. The top part
provides the high capacity internal routing functions, and the lower part provides the high capacity
network switching function at the core layer.
Multilayer Switch
The hierarchical network distribution layer is built using devices that provide key
extensions to the standard network switch functions. Called multilayer switches,
these devices provide boundary functionality to assist the networking services
managed at the layer above, the core layer, and the layer below, the network
access layer. Below is the standard icon for this device type.
Larger networks in data centers are often designed to use a hierarchy of switches
and routers. The diagram shows a layered hierarchical network using an access
layer and distribution layer of switches. It also contains a network core with the
devices that form the network backbone. Use the tabs to learn about the purpose of
each layer.
Core Layer
Core or backbone layer devices form the main foundation of a large and high-
performance network. The devices here are high capacity and robust systems.
They are built with redundant power supplies, high-bandwidth backplanes, and
multiple switch and internal signal routing boards, supporting the data center
network workload. They are highly resilient systems and create a backbone to
support fast and efficient data transport for the entire data center. The core network
layer is designed using redundant directors who are interconnected using full mesh
topology for highest availability and number of concurrent paths.
Devices that are used at the core are designed for high capacity, performance, and
fault tolerance. Because the transport of data at the high speed is the main
requirement, backbone devices have minimal extra features that do not directly
enhance this purpose.
Distribution Layer
The Distribution Layer manages routing, filtering, and quality of service policies for
the data center network. Distribution layer devices also often manage individual
branch-office WAN connections. Distribution layer switches can be classified as
multilayer switches. The term multilayer is applied to switches that are designed to
provide boundary functionality to assist the access and core layers. To accomplish
this, multilayer switches operate in two modes. They function as a switch when
attached to the access layer devices, and as a router when attached to the core
devices.
Multilayer switches can keep a master index of all network addresses and routes to
relieve the core devices of some of the processing burden of keeping track of this
vital and active information.
Access Layer
Access Layer switches are where the discrete end devices, such as servers, iSCSI
storage arrays, desktops, laptops, thin clients, and peripheral devices such as
printers connect to the network. Access layer switches provide high capacity
uplinks, typically trunks, to the distribution layer.
Multilayer Switch
Distribution Layer Devices
Access Workgroup
Layer Switch
Devices Trunk Interface
Instead of a single interface between devices, link aggregation is typically used. Also known as a
trunk, two or more interfaces are logically bound together to operate as one interface. Trunks
provide greater bandwidth and high connection resiliency. Click the image to enlarge.
Networks are designed to carry many different types of data, and most networks
carry multiple datatypes simultaneously. Known as network convergence, most
networks connect IT systems and users, as well as providing telephone, video, and
data communication services.
The types of data and the individual transport demands and priorities among them
greatly influence the design and operation of the networks that transport them.
They also inspire the Service-Level Agreements that define and help ensure the
appropriate and consistent performance of the network and interconnections.
Use the tabs to learn about the typical types of data that networks carry.
Application/User Data
Application and user data describe information that is the product of people and
their applications. They include documents, email and other communications,
media and business data such as databases, and analytical data.
A key type of this data is business data. This type is a specific subset of application
and user data. It is the information in the form of databases, business rules,
analytical information, and events in relation to operating a business or institution.
Businesses and institutions use applications to conduct, transact, record, analyze,
and actualize the inputs and output of the organization. These applications create,
transmit, and consume various types and amounts of data across LAN, MAN, and
WAN networks.
Since businesses and institutions are data-driven, the network has become the
central hub of operations. The ability of the network to efficiently move, prioritize,
and, protect data in transit are key deign influences. Service-Level Agreements, or
SLAs, are used to ensure that the network design, can meet the needs of the
business.
Digital/Analog
Analog and digital signals are both used to transmit information, but each does this
in different ways. The information carried in both are typically audio or video but
also includes other information types such as that which is created by measuring
equipment. An example would be a digital thermometer that can send temperature
readings through a USB connection in a computer.
In both types, the data is transformed into electric signals. The difference between
analog and digital data is that with analog, information is translated into electric
pulses of varying amplitude. In digital technology, translation of information is done.
Intermediary circuitry or devices converts the analog electrical signals into a digital,
binary format (0s and 1s) where the bit stream represents the varying analog signal
as digitized data that can be transported over a network. If required, the digitized
signal can be converted back to the analog equivalent after the destination end-
device connected to the network receives the data. The table compares key analog
and data signal attributes.
Voice
Voice communications today are typically digitized and traverse networks as form
of data. Whether it is over the standard telephone or a computer-based
communication application such as Skype, the analog human voice and other
sounds are received by the microphone and through the use of specialized
hardware and software, converted into packets of digital data. The data packets are
placed onto a network and then travel like any other type of data, such as e-mail,
application or user data.
There are various technologies that can be used to convert and voice and sounds
to data and move them over a network. The most well known among these is Voice
Over Internet Protocol. Better know as VoIP, the the converted voice and sounds
are carried over one or more private networks. Since voice conversations most
times are between two or more people across long distances, VoIP typically is also
internetworked across other private networks and even the public Internet as the
communications route between all the call participants is established.
VoIP and other analog-to-digital telephony systems enable voice and sound
communications to be connected between standard telephones and cell phones
over the public wired and wireless telephone networks and digital devices and
communications software connected to digital networks.
Video
Video in much the same way as voice is digitized and then carried over the
network. Also as with digital voice transmission, there are various technologies that
can be used to convert still and motion video and sound sequences to data and
transport them over a network. There are two basic forms of video transport. These
are upload/download and streaming. With upload/download, video is typically
encoded and stored. The complete video is available on the network as complete,
static file or files. Once uploaded and stored they can be downloaded on demand
and received in their entirety, stored locally at the receiving device.
To transport video, the first step is to encode the video sequences into a digital
format such as the MP4 or VOB file type. The files are transported over the network
and stored locally at the receiving end-device. When used, software decodes the
video and data files as read from storage, decodes them and then renders them for
playback. The key factors that impact video transport are bandwidth and latency.
However, when static video in the form of files is transported for upload/download
use, these factors have little impact on user experience.
Streaming
Video and audio sequences can be transported over the network using the
streaming method. Streaming is a method of transmitting and receiving video and
audio over a network as a steady, continuous flow of data. This form of video and
audio transport is characterized by the transmission and playback to proceeding in
real-time, with the data being transmitted and received and reconstituted into its
original form as it arrives from the network.
However, because video data is encoded at the pixel level and very granular, the
Question 1
Question 2
NETWORK 1
USER A
NETWORK 2
USER B
User A wants to connect to the indicated server on Network 2. What device can
be added to internetwork Network 1 and Network 2?
a. Router
b. Hub
c. Switch
d. CAT6 cable
Question 4
3. Observe the diagram. How many discrete LAN networks are shown?
a. 2 distinct LANs
b. 4 distinct LANs
c. 6 distinct LANs
d. There are distinct LANs.
Question 5
Question 6
Question 8
6. Which topology configurations are prone to media access collisions? Select all
that apply.
a. Bus topology
b. Star topology with a hub at the center.
c. Star topology with a switch at the center.
d. Mesh topology using switches only
e. Ring topology
The OSI reference model divides key network functions into seven distinct
categories. These functions are arranged into a layered stack. The layers form a
hierarchy and functions are in a logical order. Lower layers provide services for
upper layers, and higher layers complete their functions by using input from the
lower layers.
Splitting networking into layers enables manufacturers to alter how they implement
the functions of a layer without them impacting the operations of other layers.
The most important reason for using a layered architecture is to provide standards
for how each layer interfaces with the layers immediately above and below. This
standardization enables all vendors to create devices and software that can
interoperate with devices and software from other vendors.
Use the tabs for more information about the responsibilities of each layer of the OSI
model.
Physical
Layer 1 Physical Layer - Defines the electrical and physical specifications for
devices and cables.
Data Link
Layer 2 Data Link Layer - Provides the functional and procedural means to transfer
data between network entities and to detect and possibly correct errors that may
occur in the Physical Layer.
Network
Transport
Layer 4 Transport Layer - Provides transparent transfer of data between end users.
A protocol can be included at this layer to provide reliable data transfer services to
the upper layers. This is known as quality of service. The protocol typically applied
is the Transmission Control Protocol, or TCP. Other protocols can be used at this
layer. The next most popular protocol is the User Datagram Protocol, or UDP.
Session
Presentation
Application
Layer 7 Application Layer - The layer closest to the end user, this layer is the
interface between the networked user data and the user application on the device.
Network complexity is simplified using a layered architecture. Each layer is responsible for handling
one or more of the facilities required for networking. Click image to enlarge.
Data Encapsulation
In a layered network model, both data and protocol information for a layer is
packaged in a Protocol Data Unit or PDU. The protocol information for the layer is
put in a header, and the header is attached to the front of the data. The entire PDU
is passed down to the next layer. Again, protocol information for the layer is put into
a header and attached at the beginning of the data to form a PDU for that layer.
This new PDU is passed to the next below layer.
The information size grows as it is encapsulated and passed from layer to layer.
After reaching the bottom layer, the final PDU is ready to exit onto the network
media. All data is encoded onto a serial bit stream and is placed onto the media as
electrical or optical on and off pulses.
APPLICATION
SESSION
Payload Packet
NETWORK
PHYSICAL
The diagram applies to the TCP/IP over Ethernet protocol network. The Layer 4 PDU is called a
TCP segment. The Layer 3 PDU is called an IP packet, and the Layer 2 PDU is called an Ethernet
frame. Layer 1 is always data bits. The header has layer-specific information like addressing,
formatting, and various switches and flags. Click the image to enlarge.
The reverse process happens at the receiving device. The data comes in through
Layer 1 and is passed up to Layer 2. Layer 2 removes the Layer 2 header and
parses the Layer 2 protocol information. The remaining information is sent up to
Layer 3, where the Layer 3 header is removed and the Layer 3 protocol information
is parsed.
This procedure continues up the stack. Each source layer in this network model
communicates logically with the same layer in the destination device.
Building the network protocol stack in layers enables for easier network upgrades
and maintenance. It is easier to replace a particular layer with an updated protocol
rather than having to reengineer the entire stack of protocols for small changes.
In this model, electrical signals form the bits (1's and 0's) that are transported at the
lowest physical layer.
Transmitters and receivers use the OSI in the same way. The sender nests PDUs on the way to the
network and the receiver de-encapsulates them and passes them through its own OSI stack. Click
the image to enlarge.
Also, they must be able to maintain acceptable service levels under any condition.
These conditions include when there are errors in the network itself or connected
devices inject errors into the network.
The number of devices that share the network, the distances between them, and
the communications service levels that must be maintained are key considerations.
All must be factored into planning and design.
The distance and connectivity between the networks and how devices are spread
across them can determine the efficiency and stability of the network infrastructure.
There are four main network configuration factors that determine the capabilities
and overall service level of a network:
• The number and types of interconnected devices and their relative locations
• The network equipment and cables that connect the devices and other networks
• The arrangement of the network equipment and cables that interconnect the
devices on the network
• The types of data and data transport protocols that the network must carry
These factors vary according to network size and the location relationship between
devices, including interconnected networks. There are three basic categories that
describe general network relationships. They are local area network, Metropolitan
Area Network, and wide area network.
The number of devices and the way they are connected to the network greatly
The building of a network starts in a single location. This type of network is termed
the local area network, or LAN. A LAN is configured to enable devices to
communicate within a small geographical area such as a home, office space, or
within a single building. A LAN can be as small as two computers that are
connected to a shared printer in a small home office. A LAN can also extend to
more than 100 devices within an office building.
Individual LANs can be logically connected for communication using a router. Each
LAN connected to the router remains an individual network and is called a subnet.
In the home LAN at the left side in the diagram, you see the same switch and
router combination device that was introduced previously. This device forms a
single LAN and places all wired and wireless devices that are connected to it onto
that one LAN segment. The router portion interfaces the LAN segment to a WAN
such as the public Internet.
Subne
t
Subnet
Public
Internet
LANs can be stand-alone or logically merged using a router. Separate LANs that are connected
through a router are called subnets. Click the image to enlarge.
Many organizations have multiple buildings with networked resources that are
connected. For instance, businesses can have a main office and a manufacturing
plant that are located in the same industrial park. A college or university can have
multiple buildings across one or more campuses that are connected. When LANs
are internetworked across an industrial park, a university campus, or within a city, it
is called a metropolitan area network, or MAN.
In the diagram, a manufacturing plant in same the industrial park has been added
and must be connected to the main office LAN. The router at the main office
connects the office LAN to the manufacturing plant LAN forming a Metropolitan
Area Network.
MANUFACTURING
REMOTE PLANT
OFFICE
Subnet
Subnet
MAN
Subnet
Public Internet
MAIN OFFICE
The main office LAN is connected through a router to the LAN at the manufacturing plant. The plant
LAN is considered another subnet. Because of the relatively short distance between the LANs, a
MAN is formed. Click the image to enlarge.
The wide area network, or WAN, is used to connect a LAN or MAN in one
geographical location to others in remote locations. While LANs and MANs typically
cover distances measured in meters and up to a few kilometers, WAN networks
cover distances in kilometers and greater.
Businesses with offices, data centers, and plants usually own the LANs, but leases
the WAN infrastructure from a third-party, such as an Internet Service Provider.
The ISP provides and operates leased lines and related equipment to provide WAN
interconnections and bandwidth to each of its customers.
Dark fiber is sometimes used in the WAN cloud to cover at least portions of the
WAN connection. Dark fiber is the term that is used to describe long run fiber optic
cable infrastructure that is unused. The owner sells or leases the unused capacity
to the ISP. The ISP connects the dark fiber to the LANs of its customers, providing
private, long-distance WAN connectivity.
The ISP has complete use flexibility and provides the LAN connection equipment.
The ISP also defines the protocols that are used to connect the LANs of the
customer over the WAN infrastructure.
ISP Infrastructure
LAN WAN LA
N
A WAN cloud can be composed of one or more of private or leased lines, private or leased dark
fiber and the public Internet. Click image to enlarge.
The prime directive for networks is to ensure that the entire infrastructure can
consistently support current, peak, and near future communication service levels.
The standard term for defining and documenting communication and other IT
service level requirements is Service Level Agreement, or SLA.
All locations use the same type of network devices, such as routers, switches, and
firewalls. It is the capacity and speed of the devices that are used to build the
network that makes the difference. The equipment that is used in a network should
be selected based on the SLA requirements for the location.
There are two major categories for general SLA determination - data center and
campus. Main locations that store, process, and make available the major portion
of IT resources are placed into the data center category. Locations that house
mostly users of IT resources are placed into the campus category. Use the tabs for
more information about these categories.
The data center is where IT systems connect to the network to provide services.
These systems are physical and virtual enterprise servers and storage along with
the devices that maintain and protect systems and data.
Data center devices are mostly cabled to the network, rather than using wireless
connectivity. Hosting and maintaining adequate access to applications and
databases along with virtual machine access and management require enterprise-
level networking capabilities. This environment engenders the most demanding
SLAs.
Data center applications have relatively simple but stringent network requirements
that include high bandwidth and low latency. They are key factors that influence
data center network design.
With few users and many IT systems, the Data Center network requires more bandwidth, low
latency, and robust resiliency in its network infrastructure. Click image to enlarge.
Campus devices connect over wired and wireless networking. Typically, lower
bandwidth is required within campus locations. Intelligent edge caching can
decrease network demands to the data center by downloading and holding
frequently used data at remote sites. Campus locations can have relatively
complex designs using wired, wireless, and specialized networking. However, high
bandwidth and low latency are usually not key factors in network design.
With many users and few IT systems, the campus network requires less bandwidth, is less latency
sensitive, and encourages more cost-effective resiliency in its network infrastructure. Click image to
enlarge.
The networking protocols that most people are familiar with are Ethernet and
TCP/IP. They are the most often used protocols that run on the network
infrastructure to connect end devices to perform work. LANs, MANs, and WANs are
built using at least one them. There are other protocols available, specific to
transporting disk storage data between devices. This specialized network is called
a Storage Area Network, or SAN.
This diagram summarizes the connectivity of the most popular protocols that make
the network work. Use the tabs to learn about the SAN protocols.
Fibre Channel
The Fibre Channel protocol is used to attach host servers to storage in small to
medium businesses and in large enterprises. Fibre Channel networks are used to
increase the number of servers that can access a single storage array. Fibre
Channel also increases the amount of storage each host can access and the
storage I/O operations per second performance of each server.
The Fibre Channel protocol is used to transport small computer systems interface,
or SCSI, commands, and associated data to access block-level storage. SANs, or
Storage Area Networks are built using specialized Fibre Channel switches. As
these networks grow into multiple switch networks, they form Fibre Channel fabrics.
These fabrics use mesh or partial mesh topology.
iSCSI
Just as Fibre Channel, the iSCSI protocol is also used to attach servers to storage
block-storage devices on the network. The “i” in iSCSI stands for “internet”.
When run over a standard network infrastructure, SCSI uses the Ethernet and IP
protocols to transport the SCSI disk storage device commands and the data
associated with those commands between end devices.
Since iSCSI uses standard Ethernet network switching and routing infrastructure
and the TCP and IP protocols, you see the switches and routers used for iSCSI are
the same as used for any other network applications that use Ethernet and TCP/IP
networking.
Ethernet TCP/IP
Ethernet Ethernet
Workstation IP Router Server
Switch Switch
Fibre Channel
Fibre Channel Switch
Server Storage Array
iSCSI
Ethernet Ethernet Storage Array
Server IP Router
Switch Switch
A SAN transports SCSI commands and disk data between servers and storage arrays on the
network. A SAN can be formed on either a Fibre Channel or standard Ethernet TCP/IP network
infrastructure. Click the image to enlarge.
The diagram shows three common protocols and network infrastructure types that
are used to augment and enhance end device connectivity. They are InfiniBand,
Fibre Channel over IP, or FCIP, and Fibre Channel over Ethernet, or FCoE. Use
the tabs to learn about them.
InfiniBand
FCIP
Fibre Channel over IP is a network protocol that is most often used in Fibre
Channel SAN distance extension applications. If there are two sites with Fibre
Channel storage that need to be connected, they can connect through an IP
network linking the sites. The Fibre Channel protocol is encapsulated into IP
packets and transported. At the receiving end the FC frames are decapsulated
from the IP packets and delivered in their native form to an FC switch or directly to
a FC end-device.
FCIP can also take advantage of other underlying network technologies if required
to traverse a WAN that does not use Ethernet networking. Using FCIP can
eliminate the higher cost associated with extending the Fibre Channel network over
a long distance. As with all extended networks, WAN bandwidth and latency impact
are key factors that must be considered. SANs are especially sensitive to high
latency in the network.
FCoE
InfiniBand
Clustered Server InfiniBand Switch Clustered Server
Member 1 Member 2
F IP IP F
FCIP C MAN/WAN C
Multiprotocol Switch Multiprotocol Switch
Storage Storage
Ethernet
Converged LAN
FCoE
FC
InfiniBand, FCIP and FCoE are examples of various protocols and network infrastructures available
to augment and enhance existing end-to-end connectivity. Click the image to enlarge.
Question 1
1. A business must connect its main office to a new building it is leasing in the
same industrial park. Because minimal data transfer is required between the
buildings, it was decided to use a VPN over the public Internet to connect them.
What network classification would define this network?
a. LAN
b. MAN
c. WAN
d. Hierarchical
Question 2
2. Which bandwidth and latency types meet the typical network SLA requirements
of a bank branch office location?
a. High bandwidth
b. Low latency
c. Medium latency
d. Medium bandwidth
Question 3