Local Area Network (LAN) Compatibility Issues.: Espiritu, Rita V
Local Area Network (LAN) Compatibility Issues.: Espiritu, Rita V
Local Area Network (LAN) Compatibility Issues.: Espiritu, Rita V
1991-09
Espiritu, Rita V.
Monterey, California. Naval Postgraduate School
http://hdl.handle.net/10945/28335
NAVAL POSTGRADUATE SCHOOL
Monterey, California
THESIS
LOCAL AREA NETWORK (LAN)
COMPATIBILITY ISSUES
by
RITA V. ESPIRITU
September, 1991
T259717
REPORT DOCUMENTATION PAGE
1a REPORT SECURITY CLASSIFICATION lb RESTRICTIVE MARKINGS
unclassified
6c ADDRESS (City, State, and ZIP Code) 7b ADDRESS [City, State, and ZIP Code)
Monterey, CA 93943 5000 Monterey, CA 93943 5000
Number
13a TYPE OF REPORT 13b TIME COVERED 14 DATE OF REPORT (year, month, day) 15 PAGE COUNT
Master's Thesis From To September 1991 95
16 SUPPLEMENTARY NOTATION
The views expressed in this thesis are those of the author and do not reflect the official policy or position of the Department of Defense or the U.S.
Government.
17.COSATICODES 1 8 SUBJECT TERMS (continue on reverse if necessary and identify by block number)
FIELD GROUP SUBGROUP Local Area Networks(LAN), LAN hardware and software compatibility issues, LAN
Manager's Guide.
This thesis presents a research study of local area network compatibility issues. Todays high performance and successful LANs must use
hardware and software that is compatible with the network technology used. Compatibility, for the purposes of this thesis, means the ability to
programs within the network and
interface without special adapters or other devices and directly relates to the ease of the rnsfer of data or
between systems. An understanding of compatibility issues can help network users and managers diagnose and resolve connectivity problems
thus saving valuble time and money that can be used toward other productive endeavors within an organization. This thesis will discuss
hardware and software concepts, LAN architecture, and design issues as they relate to network compatibility. A LAN Manager's Guide covering
the above issues is included as an appendix. It is written specifically for the Administrative Sciences/Information Systems (AS/IS) computer
network laboratories as supplemental information for students on LANs.
by
Rita V. Espiritu
Lieutenant Commander, United States Navy
M.S. Naval Postgraduate School, 1991
from the
n
ABSTRACT
saving valuable time and money that can be used toward other
LANs.
111
TABLE OF CONTENTS
I. INTRODUCTION 1
A. BACKGROUND 1
B. PURPOSE 3
D. ORGANIZATION OF STUDY 4
A. DETERMINING COMPATIBILITY 5
B. NETWORK ARCHITECTURE 7
C. COMMUNICATIONS STANDARDS 8
Model 9
D. MEDIA STANDARDS 12
F. LAN TECHNOLOGIES 14
1. EtherNet 15
2 IBM' s Token-Ring 15
3. ARCnet 16
4. Appletalk 17
G. LAN TOPOLOGY 18
H. COMMUNICATION PROTOCOLS 22
IV
III. NETWORK HARDWARE 25
B. FILE SERVERS 31
D. BUS CARDS 34
E. ROM BIOS 35
G. WORKSTATIONS 36
H. EMULATION BOARDS 37
I. INTERCONNECTION HARDWARE 39
1. Bridges 40
2. Routers 4
3. Gateways 40
C. LAN DRIVERS 48
E. APPLICATIONS 51
F. INTERRUPTS 54
V. CONCLUSION 57
v
APPENDIX: AS/IS LAB MANAGER'S GUIDE 58
LIST OF REFERENCES 84
VI
I . INTRODUCTION
A . BACKGROUND
scope are complex tasks that are here to stay. Software and
compatible, that implies that the PC can run the same software
and support the same add-on hardware as an IBM PC; but it may
also mean that the PC can run most IBM PC-compatible software.
issues
D. ORGANIZATION OF STUDY
the ISO and the IEEE; a number of network technologies and the
A. DETERMINING COMPATIBILITY
Compatibility is defined as the capability of a
modification
Standards have been set at some of the lower levels of
(Doll, 1990)
B. NETWORK ARCHITECTURE
The architecture of a computer network is the design plan
example, two networks can use the same kinds of cables and
C. COMMUNICATIONS STANDARDS
The heart of networking is communication and effective
10
does not specify how functions must be performed. This level
products
only to the lowest two layers: Data Link and Physical. This
ll
application communication. Lack of management specifications
describe the protocols used in the lower two layers of the OSI
D. MEDIA STANDARDS
The cables and other carriers of a network's transmission
12
cables, which can be much less expensive than coax, but it
13
F. LAN TECHNOLOGIES
14
availability of supporting hardware (repeaters, hubs, media
1 . EtherNet
thick EtherNet trunk cable runs from one end of the network to
(Liebing, 1990)
2 . IBM' s Token-Ring
15
repeater--receiving the serial bit from the nearest active
down the cable to the next node in line. Only a few bit times
1989)
3 . ARCnet
16
interconnected. The only major constraint on the transmission
4 . Appletalk
per second. When data is sent any faster than that over the
(Needleham, 1990)
17
G. LAN TOPOLOGY
widespread use:
• Carrier Sense Multiple Access with Collision Detection
(CSMA/CD) - is most commonly used on an Ethernet linear
bus topology. A network board must wait until no one else
is talking on the network before it can talk. Then, as
the board sends the packet, it listens to what is being
said. If the board does not hear itself, another board is
talking at the same time. Both boards jam each other,
back off for a random amount of time, then try again.
The three basic types of topology are the star, bus, and
ring topologies. On the OSI model, the cabling lies below the
18
relatively independent. Both topologies can affect the
technique.
the network wires run between the network nodes and a central
The hub is the focal point of the star and all network traffic
19
A disadvantage of
20
Because of the electrical characteristics of this
breaks at any point, the entire network fails. The cable does
because two cables run from the CPU to the back panel of each
directions. Large networks can also saturate the bus when too
connected both to a
21
IBM' s Token-Ring is the most popular form of the ring
H. COMMUNICATION PROTOCOLS
A protocol is nothing more than a formal agreement about
how computers should format and acknowledge information during
22
translating between protocols and therefore impact performance
23
• Connection Services - are the lowest-level network
functions. These govern the actual, physical transmission
from one computer's memory onto the network, and then into
the destination computer.
24
III. NETWORK HARDWARE
feat since most software and hardware products have bugs and
deliberately
hard disks, and bus cards are other components. The selection
not all types of cable can support long cable runs (i.e., if
25
availability of diverse LAN hardware, interchangeable
not that simple. To get one byte of data from here to there,
26
Requests must be acknowledged. Sessions must be established.
Luckily, the work of the NIC can be broken down into eight
it does not work, causes errors, loses packets, drops the line
frustrating.
most often used in the file server, whereas the slower eight-
connectors (one long and one short) so they will only fit in
27
ensure that the file server has an adequate number of 16-bit
same machine with other expansion cards that use the lower
when the NIC tries to use the same hardware interrupt (IRQ) as
NIC will indicate which IRQs they use. Usually, if the system
separate section.
28
Also, if the CPU is running 50 percent, there might be a need
29
The MCA or EISA buses are two or four times wider than that of
allows NICs to bypass the CPU and take over the bus. This
from the NIC to the bus and back. They both offer a burst
mode that lets data transfer from bus cards to memory (and
vice versa) and take place at the speed of the processor. Bus
board and the computer. Since the board and the computer are
30
Occasionally, computers and network interface boards
1991)
for use in file servers; they do not even come with the chip.
B. FILE SERVERS
31
supported, and more and larger hard disk drives than any
(Liebing, 1990)
32
simplest form, the hard disks would be on one channel; a disk
good if the data from the server trickles out to the LAN.
Today's common, dumb, eight-bit network adapters are
33
C. MICROPROCESSORS/CENTRAL PROCESSING UNITS (CPUs)
(Bullette, 1991)
D. BUS CARDS
34
compatible computers. This bus accepts standard 8- or 16-
bit network and disk interface cards. The standard speed
is 8Mhz
E. ROM BIOS
On a PC, the ROM BIOS (Read Only Memory Basic Input/Output
Also, the hard disk must be included in the ROM BIOS setup
35
tables or there will be trouble getting the file server to
board must be the same type, or at least have the same speed
G. WORKSTATIONS
(I/O) base address setting. Since many devices use the same
36
Users who install applications in their private
H. EMULATION BOARDS
An emulation board is a circuit board that when combined
The emulator board should fit any slot and be used like any
37
as cluster controllers, may be "IBM-compatible" but not
actually does, what the documentation says the key does, and
what the comparable key on a 3270 does. An advantage is
supports not only the two-way transfer but also the mainframe
coax and connector from the 3270 terminal and plug the cable
directly into the emulator board on the PC. Then, the system
the mainframe
software.
38
The PC to Mainframe link is fundamental to the integration
I. INTERCONNECTION HARDWARE
LAN uses EtherNet, while another uses Token Ring, there will
dissimilar LANs. EtherNet and Token Ring both use the same
and routers between the two must understand the LLC protocols.
39
When two networks are being connected, the connections are
1 . Bridges
A bridge connects two networks that use the same
2 . Routers
A router is a device that interconnects the bottom
3 Gateways
40
and retransmitting packets between two entirely different
41
IV. NETWORK SOFTWARE
compatibility
42
to ensure that users are authorized to view certain files and
utility programs that help the user perform key tasks such as
1991)
43
deleting, copying, naming, and renaming files. The command
basic input /output (I/O) functions that take place inside the
computer. Input from the keyboard and other sources is
44
Workarounds such as expanded and extended memory serve some
developed 0S2
0S2 does not work on old PCs (with 8088 or 8086 CPU's),
but instead is intended for the newer 80286, 80386, and 80486
processors
45
companies fueled the growth of networks by announcing and
accepted standards
Network operating systems available today are NOVELLE
NetWare, IBM PC LAN Program, IBM LAN Server, 3COM 3+0pen,
46
ensure that the end-user has error-free access to network
47
look like local DOS to the program and people using them.
they normally do. The print jobs are redirected to the shared
C. LAN DRIVERS
48
necessary to create an Ethernet packet. The LAN driver code
(Liebing, 1990)
49
It defines a series of commands, but not how these
reliably; in fact, the odds are that they will not. Vendors
will implement NetBIOS on various protocol "stacks" (such as
50
network protocols for routing information. Because it is a
cards are compatible. You can also use products that bridge
(Durr, 1989)
E . APPLICATIONS
Applications are the real purpose for which networks
51
application programs, LANs are just an expensive way for
is set up.
file server; others are not so easy. Then, there are always
52
locally available to the client) or something the
workstations could do for themselves but not as
efficiently as the server.
• Multiple Defaults and Setup Files - A common difficulty
with applications that are not very "network-aware" lies
in the way they handle user preferences for defaults,
configurations, and setup options. Most true multiuser
applications provide a way for users to save their
preferences in their personal network directories so that
they do not overwrite other user's preferences.
• Network Operating System Features - The easiest
applications to install are those that have a version
designed specifically for a particular Network Operating
System.
53
setup files. Other programs may even require four or five
search drive mappings. Also, every drive mapping users
establish takes up 16 bytes of file server memory.
F . INTERRUPTS
54
problems with the PC and XT is the shortage of interrupt
board do not use the same interrupt level as the one used on
the network board (e.g., IRQ2) . If this is the case, the
using DOS because DOS does not operate in protected mode. DOS
55
memory space of another, and such invasions cripple the
that once a TSR terminates, it does not release its space for
fact that both DOS and NOS must be resident in each PC) . One
TSR.
56
CONCLUSION
57
APPENDIX: AS/IS LAB MANAGER'S GUIDE
58
A Basic Reference Guide
September 1991
59
TABLE OF CONTENTS
A. INTRODUCTION 4
B. NETWORK TECHNOLOGY 4
1. EtherNet 4
2 IBM Token-Ring 6
3. Appletalk 7
C. LABORATORY SETUP 8
1. 1-158 8
2. 1-224 8
3. 1-250 9
D. FILE ORGANIZATION 17
E. SETTING UP DIRECTORIES 17
F. SOFTWARE INSTALLATION 19
G. BATCH PROCESSING 19
4. DOS Environment 23
60
A. INTRODUCTION
School
B. NETWORK TECHNOLOGY
There are three different technologies used in the AS/IS
61
1 . EtherNet
IEEE standard.
62
use, the transmission is delayed until the cable is free. It
rates up to 20 Mbps)
2 . IBM Token-Ring
bit 3tream on down the cable to the next node in line. Only
63
These networks use a token-passing scheme for network
mode.
16Mbps.
3 . Appletalk
Appletalk is a baseband network with a bus topology.
It operates over shielded twisted-pair wire, unshielded
64
scheme, each MAC on the network listens for the signal that
C. LABORATORY SETUP
1. 1-158
65
2. 1-224
386 servers. There are also an AST optical scanner, two IBM
Proprinters, and one IBM Color Inkjet printer. See Figure (2)
66
communication) , the Apple network uses its own Apple protocol.
cables and connectors are unique in that the network uses only
detailed layout.
3. 1-250
67
Medio Type Coax cable Shielded ooax cable Sheilded t
Twisted
pair
Mat hod
Diatance Limitation 1000 ft - 770 m. for STP - 1000 ft for 300 meters
optical coupler
filaa icons
- Network
Function Manua
- Network
Commands
performance at
medium and high
loads
68
Topology - logical bus - logical ring - logical bua -logical
- physical atar - phyaical atar - phyaical bua bua
- phyaical
bua
PC) TOPS
- full fila
tranafar via
dial— up
communucat ion
3270 annul.
D. FILE ORGANIZATION
Users have different uses for the files. One user may need to
69
IN 158
IBM Token Rinp LAN
In back of 1-158
TN4
I J I
IBM
3812
Pageprinter
TN33
(MODEM)
TN6 TN7
(MODEM) (MODEM)
TN7M
(MODEM)
TN11
(MODEM)
Legend:
D
IBM 8228
MULTISTATION
U ACCESS
u UNIT
D (MAU)
70
IN 224
IBM Token Ring LAN
(Future campus
3174-1L Bernoulli
backbone connection)
Box
(Mainframe
Controller) L^ ZZ3
J
IBM 8228
MULTISTATION
ACCESS
UNIT
(MAU)
I
AT AT AT AT AT AT
CLONE CLONE CLONE CLONE CLONE CLONE
DOCUMENT
TN20 TN21 TN22 TN23 TN24 TN25 (GRAPHIC)
(MODEM) (MODEM) (MODEM) (3270) (MODEM) (MODEM) SCANNER
IBM 8228
MULTISTATION
ACCESS
UNIT
(MAU)
IBM 8228
MULTISTATION
ACCESS
UNIT
(MAU)
TNT 5
(3270)
Note: This drawing, not to scale, shows the layout of the TR-LAN.
*The 3270 Emulation connection to the mainframe goes thru the Gateway server.
* Uses Printer #1 ... ), ^ r Jel nnter
.
T ,
.
, ,
NPS
TCP/IP ETHERNET
BACKBONE SINGLEPORT
INTERNET REPEATER
CONNECTION
2
3COM IBM
( Printer \ Server COLOR PLOTTER
(3Server3)
TN13
(ENET5)
NORMS
Legend:
=s33]
fl
Terminator 'T" Connector
72
IN 224
Apple AppleTalk Layout
Secure
|"se. Cabinet
Macintosh
Plus Macintosh Macintosh Macintosh Macintosh Macintosh Laser
(Server) Plus Plus Plus Plus Plus Writer
45 Plus
Hard Disk
rTl
/£±
TOPS TOPS
IBM
XT
TN16 TN8.M
LEGEND:
-D=
LocalTalk Connector Kit
73
IN 250
Ethernet LAN
(Broadband)
m
Short Distance Kits Base Expander
*<&*
Connection Hardware
and execute the programs, but not modify them. In these labs,
E. SETTING UP DIRECTORIES
are stored on the server hard disks where they are most easily
controlled and supported and where they can be shared with all
users. To store their created files, users save them on their
75
When users log onto the network, the first thing they see
F. SOFTWARE INSTALLATION
G. BATCH PROCESSING
No single tool is more important to the network user and
76
and simplifying the network environment.
commands. These files store the commands in text files and are
batch file is installed that starts the network and takes you
are application batch files. The user can work with the
The AS/IS labs batch files are written so that when the user
77
example, if you frequently issue the same five commands when
you start a system, you can put those commands in a batch file
and give the batch file a name: for example STARTUP.BAT. When
you enter the command STARTUP, the file runs and the commands
are executed.
lines
is IBM version 3.3 except for the 3COM network in 1-224 which
uses IBM DOS 3.2. The Networking Operating System (NOS) used
different methods:
78
the file name you specify does not already exist. Otherwise,
ideal for creating and documenting long batch files. Load your
the file as an ASCII (or DOS text) file. Use any filename
you want, but be sure to use the BAT extension required for
files DOS can have open at one time) . The CONFIG.SYS file is
usually created the first time you install DOS. Later on, you
79
Each such device requires its own device driver, which is a
between the device and the entire system. DOS must be able to
find the driver in order to load it, and the DEVICE line
files except that its filename is known to DOS and thus cannot
80
users some information on starting the network, availability
system is turned on. They also help avoid errors that might
4 . DOS Environment
the current environment, type SET at the DOS prompt. The SET
file.
software and cabling but also the users of the LAN. Users may
81
understanding of basic LAN concepts. A well organized network
administration avoids most of these problems by using
to the users.
troubleshooting/maintenance action
Software problems can result from improper installation or
82
significantly from programs which are network aware or are
83
REFERENCES
Aaron, Bud and Aaron, Alex, Upgrading PC's Made Easy , Osborne
McGraw-Hill, 1991.
84
Doll, Dixon, "The Year Ahead: Changes and Challenges in
Networking," Network World, 24 December, 1990.
Foster, Jennifer, The Hardware Guide for Novell NetWare, John Wiley
and Sons, Inc., 1991.
Gookin, Dan, The ABC s of Upgrading Your PC, Sybex Inc., 1990.
Inc., 1990.
85
Marney-Petix, Victoria C. Networking
, and Data Communications,
Reston Publishing Co., 1986.
Norton, Peter, Inside the IBM PC and PS/2, Simon and Schuster,
Inc., 1990.
86
Stallings, William, Handbook of Computer Communications Standards,
Local Network Standards, Volume 2, Macmillan Publishing Co.y 1987.
87
INITIAL DISTRIBUTION LIST
2 Superintendent
Attn: Library, Code 0052
Naval Postgraduate School
Monterey, California 93943-5000
3 Commanding Officer
Attn: LCDR Rita V. Espiritu
NAVCOMTELSTA
PSC 458, Box 7
FPO AP 96451
88
Thesis
E6885 Espiritu
c.l Local area' network (LAN)
compatibility issues.