Professional Documents
Culture Documents
Page 51
Network Connectivity Devices
Figure 2 Modems convert digital signals to analog waves, and convert analog waves to digital signals
Modem Hardware
Modems are known as data communications equipment (DCE) and share the following characteristics:
A serial (RS-232) communications interface
An RJ-11 telephone-line interface (a four-wire telephone plug)
Modems are available in both internal and external models. An internal modem, as shown in Figure 3, is
installed in a computer's expansion slot like any other circuit board.
Figure 4 External modem connects through the RS-232 cable to the computer serial port
Expanding a Network Using Components
As companies grow, so do their networks. LANs tend to outgrow their original designs. You know your LAN
is too small when:
Page 52
Network Connectivity Devices
The time usually comes when administrators need to expand the size or improve the performance of their
networks. But networks cannot be made larger merely by adding new computers and more cable. Each
topology or architecture has limits. There are, however, components that can be installed to increase the size of
the network within its existing environment. These components can:
Segment existing LANs so that each segment becomes its own LAN.
Join two separate LANs.
Connect to other LANs and computing environments to join them into a larger comprehensive WAN.
Repeaters
As signals travel along a cable, they degrade and become distorted in a process called "attenuation. If a cable is
long enough, attenuation will finally make a signal unrecognizable. Installing a repeater enables signals to
travel farther. A repeater works at the physical layer of the OSI Reference Model to regenerate the network's
signals and resend them out on other segments. Figure 7 shows how repeaters regenerate weak signals.
Page 53
Network Connectivity Devices
Hubs
Hubs can also be used to expand the size of a LAN. Although using hubs won't convert a LAN into a WAN,
connecting or adding hubs to a LAN can effectively increase the number of workstations. This method of
growing a LAN is popular, but does come with many design limitations.
Bridges
Like a repeater, a bridge can join segments or workgroup LANs. Figure 7 shows a bridge connecting two
network segments. However, a bridge can also divide a network to isolate traffic or problems. For example, if
the volume of traffic from one or two computers or a single department is flooding the network with data and
slowing down the entire operation, a bridge could isolate those computers or that department.
Bridges can be used to:
Expand the length of a segment.
Provide for an increased number of computers on the network.
Reduce traffic bottlenecks resulting from an excessive number of attached computers.
Split an overloaded network into two separate networks, reducing the amount of traffic on each
segment and making each network more efficient.
Link unlike physical media such as twisted-pair and coaxial Ethernet.
Page 54
Network Connectivity Devices
Because bridges work at the data-link layer of the OSI reference model, all information contained in the higher
levels of the OSI reference model is unavailable to them. Rather than distinguish between one protocol and
another, bridges simply pass all protocols along the network. All protocols pass across bridges, so it is up to
the individual computers to determine which protocols they can recognize. Bridges work at the MAC sublayer
and are sometimes referred to as MAC-layer bridges.
A MAC-layer bridge:
Listens to all traffic.
Checks the source and destination addresses of each packet.
Builds a routing table, as information becomes available.
Forwards packets in the following manner:
o If the destination is not listed in the routing table, the bridge forwards the packets to all
segments.
o If the destination is listed in the routing table, the bridge forwards the packets to that segment
(unless it is the same segment as the source).
A bridge works on the principle that each network node has its own address. A bridge forwards packets based
on the address of the destination node. Bridges actually have some degree of intelligence in that they learn
where to forward data. As traffic passes through the bridge, information about the computer addresses is stored
in the bridge's RAM. The bridge uses this RAM to build a routing table based on source addresses.
Initially, the bridge's routing table is empty. As nodes transmit packets, the source address is copied to the
routing table. With this address information the bridge learns which computers are on which segment of the
network.
Page 55
Network Connectivity Devices
In summary, if a bridge knows the location of the destination node, it forwards the packet to it. If it does not
know the destination, it forwards the packet to all segments.
Segmenting Network Traffic: A bridge can segment traffic because of its routing table. As shown in Figure
11, a computer on segment 1 (the source), sends data to another computer (the destination) also located in
segment 1. If the destination address is in the routing table, the bridge can determine that the destination
computer is also on segment 1. Because the source and destination computers are both on segment 1, the
packet does not get forwarded across the bridge to segment 2.
Routers
In an environment that consists of several network segments with differing protocols and architectures, a
bridge might be inadequate for ensuring fast communication among all segments. A network this complex
needs a device that not only knows the address of each segment, but can also determine the best path for
sending data and filtering broadcast traffic to the local segment. Such a device is called a "router."
Routers work at the network layer of the OSI reference model. This means they can switch and route packets
across multiple networks. They do this by exchanging protocol-specific information between separate
networks. Routers read complex network addressing information in the packet and, because they function at a
higher layer in the OSI reference model than bridges, they have access to additional information.
Routers can provide the following functions of a bridge:
Filtering and isolating traffic
Connecting network segments
Routers have access to more of the information in packets than bridges have and use this information to
improve packet deliveries. Routers are used in complex networks because they provide better traffic
management. Routers can share status and routing information with one another and use this information to
bypass slow or malfunctioning connections.
Page 56
Network Connectivity Devices
Routers maintain their own routing tables, usually consisting of network addresses; host addresses can also be
kept if the network architecture calls for it. To determine the destination address for incoming data, the routing
table includes:
All known network addresses.
Instructions for connection to other networks.
The possible paths between routers.
The costs of sending data over those paths.
Routers require specific addresses. They understand only the network numbers that allow them to
communicate with other routers and local NIC addresses. Routers do not talk to remote computers.
Because routers must perform complex functions on each packet, routers are slower than most bridges. As
packets are passed from router to router, data-link layer source and destination addresses are stripped off and
then re-created. This enables a router to route a packet from a TCP/IP Ethernet network to a server on a
TCP/IP Token Ring network.
Because routers read only addressed network packets, they do not allow corrupted data to get passed onto the
network. Because they do not pass corrupted data or broadcast data storms, routers put little stress on
networks.
Routers do not look at the destination node address; they look only at the network address. Routers will pass
information only if the network address is known. This ability to control the data passing through the router
reduces the amount of traffic between networks and allows routers to use these links more efficiently than
bridges.
Using the router-addressing scheme, administrators can break one large network into many separate networks,
and because routers do not pass or even handle every packet, they act as a safety barrier between network
segments. This can greatly reduce the amount of traffic on the network and the wait time experienced by users.
Routable Protocols: Not all protocols are routable. Protocols that are routable include:
DECnet.
Page 57
Network Connectivity Devices
Routers are available that can accommodate multiple protocols such as IP and DECnet in the same network.
Choosing Paths: Unlike bridges, routers can accommodate multiple active paths between LAN segments and
choose among redundant paths. Because routers can link segments that use completely different data
packaging and media-access schemes, there are often several paths available for the router to use. This means
that if one router does not function, the data can still be passed over alternate routes.
A router can listen to a network and identify which parts are busiest. It uses this information to determine
which path to send data over. If one path is very busy, the router identifies an alternative path and sends data
over that one.
A router decides the path the data packet will follow by determining the number of hops between internetwork
segments. Like bridges, routers build routing tables and use these in routing algorithms such as the following:
OSPF ("open shortest path first") is a link-state routing algorithm. Link-state algorithms control the
routing process and allow routers to respond quickly to changes in the network.
RIP (Routing Information Protocol) uses distance-vector algorithms to determine routes. Transmission
Control Protocol/Internet Protocol (TCP/IP) and IPX support RIP.
NetWare Link Services Protocol (NLSP) is a link-state algorithm to be used with IPX.
Gateways
Gateways enable communication between different architectures and environments. They repackage and
convert data going from one environment to another so that each environment can understand the other
environment's data. A gateway repackages information to match the requirements of the destination system.
Gateways can change the format of a message so that it conforms to the application program at the receiving
end of the transfer. For example, electronic-mail gateways, such as the X.400 gateway, receive messages in
one format, translate it, and forward it in X.400 format used by the receiver, and vice versa.
A gateway links two systems that do not use the same:
Communication protocols.
Data-formatting structures.
Languages.
Architecture.
Gateways interconnect heterogeneous networks; for example, they can connect Microsoft Windows NT Server
to IBM's Systems Network Architecture (SNA). Gateways change the format of the data to make it conform to
the application program at the receiving end. Gateways are task-specific, which means that they are dedicated
to a particular type of transfer.
Page 58