You are on page 1of 6
Chapter 2 Network Configuration Designing 2.1.4 Other Access Methods (1) EDDIE FDDI is an adaptation of a standard stipulated by ANSI (American National Standards Institute) for backbone LANs and provides a transmission speed of 100 Mbps. FDDI uses the token passing method as its access method. Its transmission medium is the optical fiber cable, (2) ATM-LAN . ATM (Asynchronous Transfer Mode) is a switching/multiplexing technology that is standardized by ITU-T and.ATM forum. ATM has the following features: * Cell (53 bytes, fixed length) based transmission + High-specd transmission {up to 2.4 Ghps, 45M, 156M, and 622M bps interfaces are generally used.) * Connectionless communication * Suited for multimedia communication since-ATM allows the coexistence of audio, video, LAN, aad other types of data that possesses unique communication requirements and provides an optimal communications channel for each of these types of data. + Devices such-as ATM switchboard and ATM adapters for workstations are highly expensive. 2-10 All Rights Ressrved, Copyright (6) 2005, Hitachi Information Academy Co, Ltd Chapter 2 Network Configuration Designing ‘Network device configuration OS! basic 3 reference model 2 2.2 Network Device Configuration This section describes the types and features of the devices that make up a network. (2) Repeater and HUB (repeater HUB) The Repeater and HUB relay data in the physical layer. The basic functions of a repeater or HUB are to relay, shape, and amplifier electrical signals and to remove any errors. (2) Bridge The bridge relays data in the data Jink layer. The basic function of a bridge is to serve as a filter which examines the destination MAC address of each data frame and determine whether the fragment is to be passed over. (3) Router The router relays data in the network layer. The basic function of 2 router is to match the destination network address against the routing table maintained within the router and find the optimal route for relaying data. (4) LAN switch The LAN switch is an implementation of a switch for relaying data using the MAC address and network layer address (e.g., IP address), LAN switches are divided into layer 2 switches (switching HUBs) and layer 3 switches according to the layer of the address to be relayed. 211 AIL Rights Reserved, Copyright (e) 2008, Hitnch Information ‘Asedeay Co, Tad Chapter 2 Network Configuration Designing ‘Bridge Bridge function sin on ' Bride r al | ©] | {F (Address tabie) S| |_tanians (Sal oa tt ale it i ay. Bl x | isa[Oq j bial» ‘the LAN2 side. LANT LAN2 SA: Source address. “Does not pass a DA: Destination addresa Aen he taNe a, bo, d: MAC address, oe. 2.2.1 Bridge Bridges provide controls for the data link layer and are used to connect between LANS with the same or different protocols. (@) Bridging Connects between LANS having different protocols such as Ethernet, token ring, FDDI, and wireless LANs and performs protocol conversion. (2) Filtering A bridge abs a table, called the address table, for managing MAC addresses. The bridge checks and identifies the end-systems on its sides and examines the destination address of the data frame to determine whether the frame is to be relayed, Normally, the address table is automatically generated by the bridge by making use of its learning function. (3) When to use a bridge @ Protocol type ‘When the protocol to be used is supported by the router or layer 3 switch, the bridge is transparent in the nctwork and higher-level layers (there. are routers that can bridge data with a specific protocol) @ Installation-time cost and settings ‘When connecting LANS of different protocols without using expensive routers When there is no need to pursue high performance or functionality ‘When introducing a network urgeatly 212 AI Rights Reserved, Copyright () 2008, se Information ‘Acedemy Co, Led Chapter 2 Network Configuration Designing @Router LANi Router 1 LAN2 Router 2 LANG ' Routing table. | Routing table ' | ete] RE [Metre ctin | | (oats AZS™]) [PASASADA | ANT eet | LANE 22) (eciiol dl | [ANS 27 — ac | trata) ipsa wea) nocd i ves22| | Iecea| oO ARP cash I PASASADA = rom fsa Ane cas ~fslelt} az la Trasaen ance Mace cea Pett Ii att T tai WMacit iat 4. @ 1: MAC addresses: 11, 1.2, 2.1, 2.2, 4.1, 4.2; (P addresses DA: Destination address ‘SA: Source address 2.2.2 Router (B) Basic functions ‘The router transfers data at the network level. It exercises data transmission control by referring to the network addresses (IP address, IPX address, etc.). The router provides the following functions to accomplish communication between different LANs: + To create and manage the routing tables that contains the information about the connected networks. + To check the destination network address in the received LAN frame and determine, from the routing table, the next LAN to which the frame is to be transferred, and transmit the frame from an appropriate port (interface). * Routing table Acrouting table is made up of the following four entries: (a) Destination network address: The address of the network to communicate with (b) Metric: The value that serves as the criterion when selecting the optimum path to the destination network from two or more candidate paths. (©) Next hop address: The IP address of the next router to which the frame is to be transferred when there are two or more paths to the destination network. (@) Interface to which the next hop address is connected: The interface to which the target next hop address is connected when the router has two or more interfaces. All Rights Resavved, Copyright (©) 2003, Mia ‘Academy Co, Etd Teformation Chapter 2 Network Configuration Designing NA : Destination network address NHA: Next hop address (2) Creating and maintaining a routing table There are two modes of creating and maintaining a routing table. (@) Static routing Routing is done using one fixed routing table. The routing table is created and maintained by the administrator or user. () Dynamic routing The routing table is created and maintained dynamically by routers through interactions between them according to a routing protocol. 214 AN Ris Rear Cop (02015 Hae ifratin Chapter 2 Network Configuration Designing ‘Multiprotoco! router and filtering — Multiprotocol router — na! UNIX TCPAP. @) Multiprotocol router A variety of coramunications protocols are used in a multi-vendor environment. A router that supports more than one protocol is called a multiprotocol router. The following communications protocol ate generally used for LANs: + TCP/IP + 1PX + OSI * DECnet + AppleTalk + Others (4) Filtering Routers are designed to relay data from different types of networks (LAN/WAN). It can destruct any data that is not to be telayed. This function is called filtering (you can specify filtering for each of the interfaces in the router). Typical bases of filtering include the following (for TCP/IP): + IP address: You can specify the router whether to pass the received frame based on the destination IP address or source address in the frame. + Higher-level protocol number: You can specify the router whether to pass ‘TCP or UDP data. + Port number: You can specify the router whether to pass the received frame based on the destination or source port number. 21S SU ighls Reserved, Copysghl (€)2003, Misc Infomation ‘Academy Co, Tid

You might also like