Introduction
Network Topology A network consists of multiple computers connected using some type of interface, each having one or moreinterface devices such as a Network Interface Card (NIC) and/or a serial device for PPP networking. Eachcomputer is supported by network software that provides the server or client functionality. The hardware used totransmit data across the network is called the media. It may include copper cable, fiber optic, or wirelesstransmission. The standard cabling used for the purposes of this document is 10Base-T category 5 ethernet cable.This is twisted copper cabling which appears at the surface to look similar to TV coaxial cable. It is terminated oneach end by a connector that looks much like a phone connector. Its maximum segment length is 100 meters.
Network Categories
There are two main types of network categories which are:
In a server based network, there are computers set up to be primary providers of services such as file service ormail service. The computers providing the service are are called servers and the computers that request and usethe service are called client computers.In a peer-to-peer network, various computers on the network can act both as clients and servers. For instance,many Microsoft Windows based computers will allow file and print sharing. These computers can act both as aclient and a server and are also referred to as peers. Many networks are combination peer-to-peer and serverbased networks. The network operating system uses a network data protocol to communicate on the network toother computers. The network operating system supports the applications on that computer. A Network OperatingSystem (NOS) includes Windows NT, Novell Netware, Linux, Unix and others.
Three Network TopologiesThe network topology describes the method used to do the physical wiring of the network.
The main ones are bus, star, and ring.
Network Hardware ConnectionsEthernet uses star topology for the physical wiring layout. A diagram of a typical ethernet network layout isshown below.
On a network, a hub is basically a repeater which is used to re-time and amplify the network signals. In this diagram, please examine the hubs closely. On the left are 4 ports close to each other with an x above or below them. This means that these ports are crossover ports. This crossover is similar to the arrangement that was used for serial cables between two computers. Each serial port has a transmitter and receiver. Unless there was a null modem connection between two serial ports, or the cable was wired to cross transmit to receive and vice versa, the connection would not work. This is because the transmit port would be sending to the transmit port on the other side.
Therefore note that you cannot connect two computers together with a straight network jumper cable between their network cards. You must use a special crossover cable that you can buy at most computer stores and some office supply stores for around 10 dollars. Otherwise, you must use a hub as shown here.
The hub on the upper left is full, but it has an uplink port on the right which lets it connect to another hub. Theuplink does not have a crossover connection and is designed to fit into a crossover connection on the next hub.This way you can keep linking hubs to put computers on a network. Because each hub introduces some delayonto the network signals, there is a limit to the number of hubs you can sequentially link. Also the computers thatare connected to the two hubs are on the same network and can talk to each other. All network traffic including allbroadcasts is passed through the hubs.
In the diagram, machine G has two network cards, eth0 and eth1. The cards eth1 and eth0 are on two differentnetworks or subnetworks. Unless machine G is programmed as a router or bridge, traffic will not pass betweenthe two networks. This means that machines X and Z cannot talk to machines A through F and vice versa.Machine X can talk to Z and G, and machines A though F can talk to each other and they can talk to machine G.All machines can talk to machine G. Therefore the machines are dependent on machine G to talk between the twonetworks or subnets.
Each network card, called a network interface card (NIC) has a built in hardware address programmed by itsmanufacturer. This is a 48 bit address and should be unique for each card. This address is called a media accesscontrol (MAC) address. The media, in our specific case will be the ethernet. Therefore when you refer toethernet, you are referring to the type of network card, the cabling, the hubs, and the data packets being sent. Youare talking about the hardware that makes it work, along with the data that is physically sent on the wires.
There are three types of networks that are commonly heard about. They are ethernet, token-ring, and ARCnet.Each one is described briefly here, although this document is mainly about ethernet.
IEEE 802 Standard
The Data Link Layer and IEEE
When we talk about Local Area Network (LAN) technology the IEEE 802 standard may be heard. Thisstandard defines networking connections for the interface card and the physical connections, describinghow they are done. The 802 standards were published by the Institute of Electrical and ElectronicsEngineers (IEEE). The 802.3 standard is called ethernet, but the IEEE standards do not define theexact original true ethernet standard that is common today. There is a great deal of confusion causedby this. There are several types of common ethernet frames. Many network cards support more than onetype.
The ethernet standard data encapsulation method is defined by RFC 894. RFC 1042 defines the IP to linklayer data encapsulation for networks using the IEEE 802 standards. The 802 standards define the twolowest levels of the seven layer network model and primarily deal with the control of access to thenetwork media. The network media is the physical means of carrying the data such as network cable. Thecontrol of access to the media is called media access control (MAC). The 802 standards are listed below:
802.1 - Internetworkingl
802.2 - Logical Link Control *
802.3 - Ethernet or CSMA/CD, Carrier-Sense Multiple Access with Collision detection LAN *
802.4 - Token-Bus LAN *l
802.5 - Token Ring LAN *l
802.6 - Metropolitan Area Network (MAN)l
802.7 - Broadband Technical Advisory Groupl
802.8 - Fiber-Optic Technical Advisory Groupl
802.9 - Integrated Voice/Data Networksl
802.10 - Network Securityl
802.11 - Wireless Networksl
802.12 - Demand Priority Access LAN, 100 Base VG-AnyLAN
*The Ones with stars should be remembered in order for network certification testing.
Network Devices
Repeaters, Bridges, Routers, and Gateways
Network RepeaterA repeater connects two segments of your network cable. It retimes and regenerates the signals to properamplitudes and sends them to the other segments. When talking about, ethernet topology, you areprobably talking about using a hub as a repeater. Repeaters require a small amount of time to regeneratethe signal. This can cause a propagation delay which can affect network communication when there areseveral repeaters in a row. Many network architectures limit the number of repeaters that can be used in arow. Repeaters work only at the physical layer of the OSI network model.
Bridge
A bridge reads the outermost section of data on the data packet, to tell where the message is going. Itreduces the traffic on other network segments, since it does not send all packets. Bridges can beprogrammed to reject packets from particular networks. Bridging occurs at the data link layer of the OSImodel, which means the bridge cannot read IP addresses, but only the outermost hardware address of thepacket. In our case the bridge can read the ethernet data which gives the hardware address of thedestination address, not the IP address. Bridges forward all broadcast messages. Only a special bridgecalled a translation bridge will allow two networks of different architectures to be connected. Bridges donot normally allow connection of networks with different architectures. The hardware address is alsocalled the MAC (media access control) address. To determine the network segment a MAC addressbelongs to, bridges use one of:
Transparent Bridging - They build a table of addresses (bridging table) as they receive packets. Ifthe address is not in the bridging table, the packet is forwarded to all segments other than the oneit came from. This type of bridge is used on ethernet networks.l
Source route bridging - The source computer provides path information inside the packet. This isused on Token Ring networks.
Network RouterA router is used to route data packets between two networks. It reads the information in each packet totell where it is going. If it is destined for an immediate network it has access to, it will strip the outerpacket, readdress the packet to the proper ethernet address, and transmit it on that network. If it isdestined for another network and must be sent to another router, it will re-package the outer packet to bereceived by the next router and send it to the next router. The section on routing explains the theorybehind this and how routing tables are used to help determine packet destinations. Routing occurs at thenetwork layer of the OSI model. They can connect networks with different architectures such as TokenRing and Ethernet. Although they can transform information at the data link level, routers cannottransform information from one data format such as TCP/IP to another such as IPX/SPX. Routers do notsend broadcast packets or corrupted packets. If the routing table does not indicate the proper address of apacket, the packet is discarded.
Brouter
There is a device called a brouter which will function similar to a bridge for network transport protocolsthat are not routable, and will function as a router for routable protocols. It functions at the network anddata link layers of the OSI network model.
GatewayA gateway can translate information between different network data formats or network architectures. Itcan translate TCP/IP to AppleTalk so computers supporting TCP/IP can communicate with Apple brandcomputers. Most gateways operate at the application layer, but can operate at the network or sessionlayer of the OSI model. Gateways will start at the lower level and strip information until it gets to therequired level and repackage the information and work its way back toward the hardware layer of theOSI model. To confuse issues, when talking about a router that is used to interface to another network,the word gateway is often used. This does not mean the routing machine is a gateway as defined here,although it could be.