Chapter 14 - CIS 131 & 232

dargspurΔίκτυα και Επικοινωνίες

27 Οκτ 2013 (πριν από 5 χρόνια και 2 μήνες)

83 εμφανίσεις

© 2001 by Prentice Hall


Local Area Networks
3rd Edition

David A. Stamper

Part 5:
Connecting to Other Systems

and Networks

Chapter 14

Making Network

© 2001 by Prentice Hall


Chapter Preview

LAN connections

Repeaters, bridges, routers, and

Switches and virtual LANs

Remote access

Common carrier services

In this chapter you will study:

© 2001 by Prentice Hall


LAN Connections

Companies that have LANs in separate geographical
locations or LANs that cover distances greater than the
maximum medium distance allowed, or companies with
more nodes that can be accommodated by one LAN, must
segment their network into two or more LANs.

Having separate LANs allows a company to split functions
and gives an additional level of security.

LANs may also be connected in order to consolidate
independent LANs that may have been formed in an ad

Responsiveness of the system can be maintained while the
number of users increases by adding more resources to an
existing LAN

memory, disks, another server, etc.

or by
splitting the LAN into two or more smaller LANs.

© 2001 by Prentice Hall



Every LAN has a distance restriction. IEEE
standards specify a maximum segment length of
500 meters. If you want to span longer distances,
you can use a repeater to connect two segments.

As signals travel along the medium, they lose
strength through attenuation. Weak signals can
cause transmission errors. A repeater accepts a
signal, regenerates it, and passes it along at full

A repeater does not separate one segment of the
network from another.

© 2001 by Prentice Hall


A Repeater, Bridge, and Router
and the OSI Reference Model

Application Layer

Presentation Layer

Session Layer

Transport Layer

Network Layer

Data Link Layer

Physical Layer

Processor 1

Application Layer

Presentation Layer

Session Layer

Transport Layer

Network Layer

Data Link Layer

Physical Layer

Processor 2




© 2001 by Prentice Hall



Early bridges were used to connect two networks,
each of which used the same MAC protocol.
Today, bridges also connect LANs having
different MAC protocols. This device may be
called a ‘brouter’ or multiprotocol bridge.

Most bridges being sold today are called learning
bridges, or transparent bridges. A learning bridge
builds its routing table from messages it receives
and does not need to be loaded with a predefined
routing table.

© 2001 by Prentice Hall


Basic Bridge Functions

1. Accept packet from LAN A.

2. Examine address of packet.

3. If packet address is a LAN A address, allow the
packet to continue on LAN A.

4. If packet address is a LAN B address, transmit
the packet onto the LAN B medium.

5. Do the equivalent for LAN B packets.

Media conversion


Remote connection

Signal conversion

Speed conversion

Packet statistics

Token ring to ethernet conversion

Packet Routing Function

Additional Functions

© 2001 by Prentice Hall


Token Rings Connected by a



Ring Network


Ring Network

© 2001 by Prentice Hall


Spanning Tree Algorithms

Spanning tree algorithms, in which bridges
exchange routing information with each other,
can be used on any type of LAN.

The advantages of the spanning tree algorithm
are that it is MAC
independent, bridges can
learn the topology of the network without manual
intervention, and paths can change if an existing
path becomes inoperable or if a better path is
introduced. The algorithm overhead is the size of
the routing table for networks with many
communicating nodes, and the extra network
traffic resulting from status messages and

© 2001 by Prentice Hall


Source Routing

Source routing is an IEEE standard used as a
routing algorithm for token
passing networks.

The advantage of the source routing algorithm is
that bridges are not responsible for maintaining
large routing tables for extensive networks. Each
node is responsible for maintaining routing
information only for the nodes with which it
communicates. The disadvantages are the
overhead of sending numerous packets during
discovery and the extra routing data that must be
appended to each message.

© 2001 by Prentice Hall


Remote Bridge Connection

232 serial lines

Synchronous transmission at 56 Kbps or 64 Kbps

Fractional T
1 at multiples of 64 Kbps

Integrated services digital network (ISDN)

Digital subscriber lines (DSL)

422 serial lines at 19.2 Kbps to 2 Mbps

1 Line at 1.5 Mbps

X.25 packet
switching network

Frame relay

© 2001 by Prentice Hall



Routers operate at the network layer of the OSI Reference
Model. The network layer is responsible for packet routing
and for collecting accounting information.

Some networks use a static routing algorithm, meaning that
packet routing between two nodes never changes. In a
CSMA/CD bus LAN, a packet is broadcast to every node; in
a token ring, a packet is transmitted from one node to the
next node in the ring.

A Novell network uses a protocol called sequenced packet
exchange/internetwork packet exchange (SPX/IPX) to
transfer packets between nodes. SPX operates at the
transport layer and IPX at the network layer.

Another protocol used by many networks is the
transmission control protocol/internet protocol (TCP/IP).
TCP/IP is the protocol used on the Internet.

© 2001 by Prentice Hall



The interface between two dissimilar networks is
called a gateway. A gateway is basically a
protocol converter. It reconciles the differences
between the networks it connects.

The components of a gateway are the network
interfaces and the logic that carries out the
conversion necessary when moving messages
between networks. The conversion must change
the header and trailer of the packet to make it
consistent with the protocol of the network or
data link to which the message is being

© 2001 by Prentice Hall


Ways to Increase LAN Media

Faster hardware

Higher network speeds

Lower bandwidth demands

LAN segmentation

Full duplex

Switching hubs

© 2001 by Prentice Hall


LAN Switches

LAN switches work similarly to the way in which a
telephone switch works. In the idle state, you are not
connected to anything except the telephone switch and
cannot communicate with anyone until a circuit is set up.
When you dial someone’s number, the complete
transmission capacity of the telephone network is not
dedicated to your call; instead, a connection is made
between your telephone and the telephone of the person
you are calling and a single circuit is used, leaving other
circuits available to other subscribers.

LAN switches, also called
switching hubs
, look much like
standard wiring hubs. The switching hub examines the data
link header of the packet and obtains the destination
address. The switch then establishes a dedicated
connection between the sender’s port and the recipient’s
port, and the two communicate.

© 2001 by Prentice Hall


A LAN Switch

Common Server

Common Server

Switching Hub

10/100 Mbps

Conventional Hub
10/100 Mbps

Conventional Hub
10/100 Mbps

To Workstations or

Segment Servers

To Workstations or

Segment Servers


Other Hubs

© 2001 by Prentice Hall


Some Benefits of Switching Hubs

Efficient network segmentation to balance traffic.

Good price/performance.

Availability of shared and dedicated bandwidth.

Support of new technologies such as asynchronous transfer mode
and other network protocols.

Preservation of investment in cabling and LAN adapters.

Devices can communicate at NIC speeds as long as necessary.

Provide bridging and routing as well as integration with faster
technologies, such as FDDI, 100 Mbps ethernet.

Multiple connections can be established concurrently.

Ability to define virtual LANs (VLANs)

© 2001 by Prentice Hall


Virtual LANs

The benefit of VLANs is the ability to collect existing
computers into a VLAN and to move workstations while
maintaining their VLAN connection. Because VLANs are
identified by addresses or switch ports and not by physical
connections, LAN nodes can be moved from one location
to another and remain on the same VLAN without having to
change connections at the wiring hubs.

A variety of methods are used to determine how users are
grouped into a VLAN:


MAC Address

Packet Tagging

Network layer addresses

© 2001 by Prentice Hall


Host Connections

The Host as a LAN Node

Some hosts have the ability to connect to the LAN as a node. This is the
most effective way to establish the connection.

Asynchronous Connections

Virtually every computer has the ability to send and receive by using an
asynchronous data link protocol. Because most computers support the
asynchronous data link protocol, it is sometimes used to link a
microcomputer to a host. Usually, a microcomputer attached to a host
asynchronously operates in one of two modes: file transfer or terminal

Dedicated Connection Per Microcomputer

One way to connect a LAN node to a host is to provide a dedicated
connection between a port on the host and each microcomputer needing a
host connection. A dedicated connection provides direct host access, and
the microcomputer does not use LAN resources for communicating with the

© 2001 by Prentice Hall


Host Connections (cont.)

A dedicated connection has several disadvantages. First, as with all
asynchronous connections, the sped of the link is slow. These connection
speeds can be over 100,000 bps, but typically for microcomputer
connections they are 33.6 Kbps or less. If many LAN nodes must
communicate with the host, many host ports are required.


A multiplexer is a hardware device that allows several devices to share one
communication channel. Multiplexing is typically used to consolidate the
message traffic between a computer and several remotely located terminals.
This technique can also be used to allow several microcomputers to share a
communication link to a host processor.

Shared Asynchronous Connections

In some applications, each LAN node needs occasional access to the host,
but the number of concurrent connections is far fewer than the number of
LAN nodes. In such situations, a dedicated line per node is excessive. A
better solution is to share asynchronous connections.

© 2001 by Prentice Hall


Common Features of Asynchronous
Communications Software


Mouse support

File transfers (CompuServe, Xmodem, Ymodem, Kermit)

Terminal emulation (ANSI, DEC VT220, IBM 3101, TTY)

Electronic mail

Phone directory

Capture of data to a disk

Text editor

Password security

© 2001 by Prentice Hall


Interconnection Utilities

File Transfer Utilities

File transfer utilities allow you to move files between network nodes. File
transfer capabilities are an intrinsic part of many routers; part of the TCP/IP
protocol suite is a file transfer capability.

Remote Logon

A remote logon essentially establishes a remote user as a local user on the
remote node. Once a user has successfully logged onto the remote node,
commands issued by that user are processed and acted on by the remote
node rather than by the local node.

Remote Access

Through remote connections, LAN administrators can resolve problems
from home or other work locations; users can perform some of their work at
home and telecommute; and travelers can conduct work while away form
the office.

© 2001 by Prentice Hall


Interconnection Utilities (cont.)

Integrated Services Digital Networks (ISDNs)

One objective of ISDNs is to allow international data exchange. This requires
interfaces between a number of national and regional providers of such
services. The first mission of the ISDN program has been to define the
functions and characteristics of the network and to establish
implementation standards.

ISDN was the first high
speed alternative to switched, analog connections
for Internet access. ISDN when used for Internet access usually provides
speeds of 128 Kbps.

Digital Subscriber Lines (DSL)

Digital subscriber lines are an emerging service that provides much faster
transmission rates than analog modems and ISDN.