Tuesday, October 14, 2014

Fiber Distributed Data Interface (FDDI)

FDDI Facts

Fiber Distributed Data Interface (FDDI) is a fiber-optic, token-ring architecture originally standardized by the American National Standards Institute (ANSI). This standard is in many respects similar to the IEEE 802.5 standard, but is characterized by higher data transfer rates (100 to 200 Mbps).
FDDI is typically implemented in situations where high data transfer rates are needed, including:
  • LAN Backbones--The FDDI network forms a high-speed backbone for the rest of the network.
  • Computer-room Networks--These networks connect high-performance mainframes and other computers.
  • High-speed LANs--The speed of FDDI is ideal for networks with high data traffic, powerful workstations (engineering or computer-aided design workstations), or networks requiring high transfer rates (i.e. digital video).
The following table describes various details about FDDI.

Characteristic Description
Topology FDDI networks are wired using a physical ring, logical ring topology or a physical star, logical ring topology. FDDI uses dual counter-rotating rings for data (two rings are used, with each sending data in the opposite direction).
Media Access Method FDDI uses a token-passing media access method. FDDI provides a ring wrapping feature which uses both rings for sending data. If a break occurs in one ring, data can be sent on the other ring, thus isolating the break.
Transmission Media As the name suggests, FDDI networks use fiber optic cables. Newer specifications allow the use of Cat 5 UTP (sometimes called CDDI).
Networking Devices FDDI networks use fiber optic connectors. SC and ST are both fiber optic connectors and can be used on an FDDI network though the MIC connector is the most common. Two types of devices might be connected to an FDDI network:
  • Dual Attachment Stations (DAS), also called Class A devices, attach to both rings (primary and secondary).
  • Single Attachment Stations (SAS), also called Class B devices, attach to one ring (primary).
Speed FDDI operates at 100 Mbps on a single ring. When both rings are used, data can travel at an effective rate of 200 Mbps.
Additional Specifications FDDI can operate over distances up to 200 km (124 miles). When two rings are used, the distance is limited to 100 km (62 miles).
FDDI networks can support up to 1000 devices.

Token Ring Facts

Token Ring Facts

Token ring began as a proprietary networking standard developed by IBM. Now there is a public token ring networking standard created by the IEEE 802.5 committee and other vendors that manufacture token ring components. Token ring was a popular networking architecture that is quickly being replaced by Ethernet. However, you may still encounter token ring in some existing networks.
Token ring networks have the following advantages:
  • There are no collisions.
  • The transmitting host can use the entire bandwidth to send its data.
  • You can assign priorities to designated hosts to give them greater network access.
  • Troubleshooting broken network connections is made easy by built-in diagnostic devices.
Token ring networks have the following disadvantages:
  • Higher cost than Ethernet networks.
  • Slower operating speeds than Ethernet networks.
The following table describes various details about token ring.

Characteristic Description
Topology Token ring networks are wired using a physical star, logical ring topology (a physical ring topology is also possible but not common).
Media Access Method Token ring uses a token-passing media access method:
  1. A token passes from host to host.
  2. When a host needs to transmit, it grabs the token.
  3. The host encapsulates its data into a frame and transmits it around the ring.
  4. Each host examines the recipient address of the frame until it arrives at the recipient.
  5. The recipient transmits a success frame to the transmitting host to confirm that it received the data.
  6. Once it receives a success frame, the sending host creates and releases a new token.
A host can communicate directly only with machines immediately upstream or downstream from them in the data flow. A broken ring results when a host fails. Other hosts on the network can no longer communicate with any hosts downstream from the break.
Transmission Media Token ring networks support the following transmission media:
  • Special IBM-type cables
  • STP and UTP
  • Fiber optic
Token Ring uses several types of drop cables to connect workstations to the MSAU (multistation access unit):
  • Type 1 or Type 2 shielded twisted pair (STP) wiring with a DB-9 connector.
  • Category 3 (4 Mbps) or Category 5 (16 Mbps) unshielded twisted pair (UTP) cabling with RJ-45 connectors.
Networking Devices The central connecting point for a token ring network is an MAU (multi-station access unit). You can uplink MAUs by connecting patch cables between the RI (ring in) and RO (ring out) ports on each MAU. Be aware that you must connect both sets of RI and RO ports on both MAUs to make sure the ring is complete.
Speed Common token ring networks operate at either 4 or 16 Mbps. Newer standards include 100 Mbps and Gigabit (1000 Mbps) token ring, although these have never been widely adopted.

Computer Networking Media (Cables)

They are TWO Types of Media's Used in Computer Networking Such as
    1. Bounded Media: Bounded media are the physical links through which signals are confined to narrow path. Bounded media are made up of a external conductor(usually copper) bounded by jacket material. These are also called guided media.

    2.Unbounded media:unbounded media does not require cabling and includes satellite, microwave and radio transmission. Wireless connections, including 802.11b and 802.11g, are examples of unbounded media. Today, bounded media continue to be more common than unbounded.

In computer networkmedia refers to the cables linking workstations together. There are many different types of transmission media, the most popular being twisted pair cable (normal electrical wire), coaxial cable (the type of cable used for cable television), and fiber optical cable cable (cables made out of glass).

Twisted Pair Facts
Twisted pair cables support a wide variety of fast, modern network standards. Twisted pair cabling is composed of the following components:
  • Two wires that carry the data signals (one conductor carries a positive signal; one carries a negative signal). They are made of 22 or 24 gauge copper wiring.
  • PVC plastic insulation surrounds each wire.
  • Two wires are twisted to reduce the effects of electromagnetic interference (EMI) and crosstalk. Because the wires are twisted, EMI should affect both wires equally and can be cancelled out.
  • Multiple wire pairs are bundled together in an outer sheath. Twisted pair cable can be classified according to the makeup of the outer sheath:
    • Shielded Twisted Pair (STP) has a grounded outer copper shield around the bundle of twisted pairs or around each pair. This provides added protection against EMI.
    • Unshielded Twisted Pair (UTP) does not have a grounded outer copper shield. UTP cables are easier to work with and are less expensive than shielded cables.
The table below describes the different unshielded twisted pair (UTP) cable types (categories).
Type Connector Description
Phone cable RJ-11 Used to connect a PC to a phone jack in a wall outlet to establish a dial-up Internet connection.
Has two pairs of twisted cable (a total of 4 wires).
Cat 3 RJ-45 Designed for use with 10 megabit Ethernet or 16 megabit token ring.
Cat 5 RJ-45 Supports 100 megabit and 1 gigabit Ethernet and ATM networking.
Cat 5e RJ-45 Similar to Cat 5 but provides better EMI protection. Supports 1 and 10 gigabit Ethernet (gigabit connections require the use of all four twisted pairs).
Cat 6 RJ-45 Supports high-bandwidth, broadband communications.
The table below describes the two types of connectors used with twisted pair cables.
Connector Description
RJ-11
  • Has 4 connectors
  • Supports up to 2 pairs of wires
  • Uses a locking tab to keep connector secure in outlet
  • Used primarily for telephone wiring
RJ-45
  • Has 8 connectors
  • Supports up to 4 pairs of wires
  • Uses a locking tab to keep connector secure in outlet
  • Used for Ethernet and some token ring connections

Each type of UTP cable can be substituted for any category below it, but never for a category above. For example, Cat 6 can be substituted for a task requiring Cat 5e; however, neither Cat 5 nor Cat 3 should be used for this particular task.


Coaxial Cable Facts

Coaxial cable is an older technology that is usually implemented with a bus topology. It is not suitable for ring or star topologies because the ends of the cable must be terminated. It is composed of two conductors, which share a common axis, within a single cable.
Coaxial cable is built with the following components:
  • Two concentric metallic conductors:
    • The inner conductor, which carries data signals. It is made of copper or copper coated with tin.
    • The mesh conductor is a second physical channel that also grounds the cable. It is made of aluminum or copper coated tin.
  • The insulator, which surrounds the inner conductor. It keeps the signal separated from the mesh conductor. It is made of PVC plastic.
  • The mesh conductor, which surrounds the insulator and grounds the cable. It is made of aluminum or copper coated tin.
  • The PVC sheath, which is the cable encasement. It surrounds and protects the wire. It is made of PVC plastic.
Coaxial cable has the following advantages and disadvantages:
Advantages
  • Highly resistant to EMI (electromagnetic interference)
  • Highly resistant to physical damage
Disadvantages
  • Expensive
  • Inflexible construction (difficult to install)
  • Unsupported by newer networking standards
The table below describes the different coaxial cable grades.
Grade Uses Conductor Resistance Rating
RG-58 Ethernet networking Tin-coated copper 50 ohms
RG-59 Cable TV and cable networking Copper-plated steel 75 ohms
RG-6 Satellite TV Solid copper 75 ohms
The table below describes the two types of connectors used with coaxial cable.

Connector Description
F-Type
  • Twisted onto the cable
  • Used to create cable and satellite TV connections
  • Used to hook a cable modem to a broadband cable connection
BNC
  • Molded onto the cable
  • Used to create Ethernet network connections 


Fiber Optic Facts

To connect computers using fiber optic cables, you need two fiber strands. One strand transmits signals, and the other strand receives signals. Fiber optic cabling is composed of the following components:
  • The core carries the signal. It is made of plastic or glass.
  • The cladding maintains the signal in the center of the core as the cable bends.
  • The sheathing protects the cladding and the core.
Fiber optic cabling offers the following advantages and disadvantages:
Advantages
  • Totally immune to EMI (electromagnetic interference)
  • Highly resistant to eavesdropping
  • Supports extremely high data transmission rates
  • Allows greater cable distances without a repeater 
Disadvantages
  • Very expensive
  • Difficult to work with
  • Special training required to attach connectors to cables
Multi-mode and single mode fiber cables are distinct from each other and not interchangeable. The table below describes multi-mode and single mode fiber cables.
Type Description
Single Mode
  • Transfers data through the core using a single light ray (the ray is also called a mode)
  • The core diameter is around 10 microns
  • Supports a large amount of data
  • Cable lengths can extend a great distance
Multi-mode
  • Transfers data through the core using multiple light rays
  • The core diameter is around 50 to 100 microns
  • Cable lengths are limited in distance
Fiber optic cabling uses the following connector types:
Type Description
ST Connector
  • Used with single and multi-mode cabling
  • Keyed, bayonet-type connector
  • Also called a push in and twist connector
  • Each wire has a separate connector
  • Nickel plated with a ceramic ferrule to insure proper core alignment and prevent light ray deflection
  • As part of the assembly process, it is necessary to polish the exposed fiber tip to ensure that light is passed on from one cable to the next with no dispersion
SC Connector
  • Used with single- and multi-mode cabling
  • Push on, pull off connector type that uses a locking tab to maintain connection
  • Each wire has a separate connector
  • Uses a ceramic ferrule to insure proper core alignment and prevent light ray deflection
  • As part of the assembly process, it is necessary to polish the exposed fiber tip
LC Connector
  • Used with single- and multi-mode cabling
  • Composed of a plastic connector with a locking tab, similar to a RJ-45 connector
  • A single connector with two ends keeps the two cables in place
  • Uses a ceramic ferrule to insure proper core alignment and prevent light ray deflection
  • Half the size of other fiber-optic connectors
MT-RJ Connector
  • Used with single and multi-mode cabling
  • Composed of a plastic connector with a locking tab
  • Uses metal guide pins to ensure it is properly aligned
  • A single connector with one end holds both cables
  • Uses a ceramic ferrule to insure proper core alignment and prevent light ray deflection


Ethernet Specifications

Ethernet standards are defined by the work of the IEEE 802.3 committee. The following table compares the characteristics of various Ethernet implementations.
Category Standard Bandwidth Cable Type Maximum Segment Length
Ethernet 10BaseT 10 Mbps (half duplex)
20 Mbps (full duplex)
Twisted pair (Cat3, 4, or 5) 100 meters
10BaseFL 10 Mbps (multimode cable) Fiber optic 1,000 to 2,000 meters
Fast Ethernet 100BaseT4 100 Mbps (half duplex)
200 Mbps (full duplex)
Twisted pair (Cat5 or higher) Uses 4 pairs of wires 100 meters
100BaseFX 100 Mbps (multimode cable) Fiber optic 412 meters
Gigabit Ethernet 1000BaseT 1,000 Mbps (half duplex)
2,000 Mbps (full duplex)
Twisted pair (Cat5e) 100 meters
1000BaseCX (short copper) Special copper (150 ohm) 25 meters, used within wiring closets
1000BaseSX (short) Fiber optic 220 to 550 meters depending on cable quality
1000BaseLX (long) 550 (multimode)
10 Km (single-mode)
10 G Ethernet 10 GBaseSR 10 Gbps (full duplex only) Fiber optic 2 to 300 meters
10 GBaseLR 2 to 10 kilometers
10 GBaseER 2 to 40 kilometers
You should also know the following facts about Ethernet:
  • The maximum cable length for UTP Ethernet "T" implementations is 100 meters for all standards.
  • You may also see 10Base2 and 10Base5 Ethernet implementations, both of which are older implementations using coaxial cable. You will not be required to know these for the Network+ exam.
  • Ethernet standards support a maximum of 1024 hosts. 

Sunday, October 12, 2014

Networking Devices

Network Adapter Facts

A network adapter connects a host to the network medium. Some computers, like laptops, come with built-in network adapters. Other computers use NICs (network interface cards) that plug in to the system's expansion slots or which are external to the computer and connect through an existing computer port.
A common network interface card is one used on an Ethernet network. The table below describes the components of an Ethernet NIC.
Component Description
Media connectors These connect the network interface and host to the network media.
Link indicator This visually indicates the network connection status. Green generally indicates a good connection, and red or an unlit diode indicates a bad connection.
Transceiver A NIC's transceiver is responsible for transmitting and receiving network communications. To send signals to the network, it converts digital data from a PC to digital signals. The type of signal the transceiver sends depends on the type of network. A fiber optic NIC sends light signals; an Ethernet NIC sends electronic signals. To receive signals, the transceiver converts digital signals from the network to digital data for the PC.
MAC Address The MAC address is a unique hexadecimal identifier burned into the ROM (physically assigned address) of every network interface.
  • The MAC address is a 12-digit hexadecimal number (each number ranges from 0-9 or A-F).
  • The address is often written as 00-B0-D0-06-BC-AC or 00B0.D006.BCAC, although dashes, periods, and colons can be used to divide the MAC address parts.
  • The MAC address is guaranteed unique through design. The first half (first 6 digits) of the MAC address is assigned to each manufacturer. The manufacturer determines the rest of the address, assigning a unique value which identifies the host address. A manufacturer that uses all the addresses in the original assignment can apply for a new MAC address assignment.
Note: Some network cards allow you to change (logically assigned address) the MAC address through jumpers, switches, or software. However, there is little practical reason for doing so.
A NIC communicates across the network using the following method:
  1. The NIC receives data from the PC.
  2. The NIC breaks the data into frames, which include the following information:
    • The receiving NIC's MAC address
    • The sending NIC's MAC address
    • The data it is transmitting
    • The CRC (cyclic redundancy checking) which is used to verify correct transmission and reception of the data
  3. The NIC encodes the frames as electrical or light impulses and transmits them across the network.
  4. The receiving NIC verifies the NIC addresses and CRC.
  5. The receiving NIC tracks the frames and reassembles the data.
  6. The receiving NIC sends the data to the PC.
The type of network interface card you choose depends on the type of network to which you are connecting.
  • Use an Ethernet NIC (as described above) to connect to an Ethernet network.
  • Use a token ring NIC to connect to a token ring network.
  • Use a modem to use the phone line to communicate with remote computers (such as to connect to an ISP). Modems communicate through the telephone system by converting binary data to analog waves (modulation) on the sending end, and then converting the analog waves back to binary data (demodulation) on the receiving end.
  • Use an ISDN NIC to connect through an ISDN network. ISDN is a dialup technology for host-to-host connections. However, unlike a modem, ISDN NICs send digital signals over a digital network. 

HUB

Networks using a Star topology require a central point for the devices to connect. Originally this device was called a concentrator since it consolidated the cable runs from all network devices. The basic form of concentrator is the hub.
hub stackable hub
As shown in Figure; the hub is a hardware device that contains multiple, independent ports that match the cable type of the network. Most common hubs interconnect Category 3 or 5 twisted-pair cable with RJ-45 ends, although Coax BNC and Fiber Optic BNC hubs also exist. The hub is considered the least common denominator in device concentrators. Hubs offer an inexpensive option for transporting data between devices, but hubs don't offer any form of intelligence. Hubs can be active or passive.
An active hub strengthens and regenerates the incoming signals before sending the data on to its destination.
Passive hubs do nothing with the signal.

Ethernet Hubs

An Ethernet hub is also called a multiport repeater. A repeater is a device that amplifies a signal as it passes through it, to counteract the effects of attenuation. If, for example, you have a thin Ethernet network with a cable segment longer than the prescribed maximum of 185 meters, you can install a repeater at some point in the segment to strengthen the signals and increase the maximum segment length. This type of repeater only has two BNC connectors, and is rarely seen these days.
ethernet hub switch
8 Port mini Ethernet Hub
The hubs used on UTP Ethernet networks are repeaters as well, but they can have many RJ45 ports instead of just two BNC connectors. When data enters the hub through any of its ports, the hub amplifies the signal and transmits it out through all of the other ports. This enables a star network to have a shared medium, even though each computer has its own separate cable. The hub relays every packet transmitted by any computer on the network to all of the other computers, and also amplifies the signals.
The maximum segment length for a UTP cable on an Ethernet network is 100 meters. A segment is defined as the distance between two communicating computers. However, because the hub also functions as a repeater, each of the cables connecting a computer to a hub port can be up to 100 meters long, allowing a segment length of up to 200 meters when one hub is inserted in the network.

Multistation Access Unit

mau
Multistation Access Unit (MAU) is a special type of hub used for token ring networks. The word "hub" is used most often in relation to Ethernet networks, and MAU only refers to token ring networks. On the outside, the MAU looks like a hub. It connects to multiple network devices, each with a separate cable.
Unlike a hub that uses a logical bus topology over a physical star, the MAU uses a logical ring topology over a physical star.
When the MAU detects a problem with a connection, the ring will beacon. Because it uses a physical star topology, the MAU can easily detect which port the problem exists on and close the port, or "wrap" it. The MAU does actively regenerate signals as it transmits data around the ring.

Switches


Switches are a special type of hub that offers an additional layer of intelligence to basic, physical-layer repeater hubs. A switch must be able to read the MAC address of each frame it receives. This information allows switches to repeat incoming data frames only to the computer or computers to which a frame is addressed. This speeds up the network and reduces congestion.
ethernet hub swtich
Switches operate at both the physical layer and the data link layer of the OSI Model.

Bridges

bridge is used to join two network segments together, it allows computers on either segment to access resources on the other. They can also be used to divide large networks into smaller segments. Bridges have all the features of repeaters, but can have more nodes, and since the network is divided, there is fewer computers competing for resources on each segment thus improving network performance.
Bridges can also connect networks that run at different speeds, different topologies, or different protocols. But they cannot, join an Ethernet segment with a Token Ring segment, because these use different networking standards. Bridges operate at both the Physical Layer and the MAC sublayer of the Data Link layer. Bridges read the MAC header of each frame to determine on which side of the bridge the destination device is located, the bridge then repeats the transmission to the segment where the device is located.

Routers

Routers Are networking devices used to extend or segment networks by forwarding packets from one logical network to another. Routers are most often used in large internetworks that use the TCP/IP protocol suite and for connecting TCP/IP hosts and local area networks (LANs) to the Internet using dedicated leased lines.

Routers work at the network layer (layer 3) of the Open Systems Interconnection (OSI) reference model for networking to move packets between networks using their logical addresses (which, in the case of TCP/IP, are the IP addresses of destination hosts on the network). Because routers operate at a higher OSI level than bridges do, they have better packet-routing and filtering capabilities and greater processing power, which results in routers costing more than bridges.
cisco router

Routing tables

Routers contain internal tables of information called routing tables that keep track of all known network addresses and possible paths throughout the internetwork, along with cost of reaching each network. Routers route packets based on the available paths and their costs, thus taking advantage of redundant paths that can exist in a mesh topology network.
Because routers use destination network addresses of packets, they work only if the configured network protocol is a routable protocol such as TCP/IP or IPX/SPX. This is different from bridges, which are protocol independent. The routing tables are the heart of a router; without them, there's no way for the router to know where to send the packets it receives.
Unlike bridges and switches, routers cannot compile routing tables from the information in the data packets they process. This is because the routing table contains more detailed information than is found in a data packet, and also because the router needs the information in the table to process the first packets it receives after being activated. A router can't forward a packet to all possible destinations in the way that a bridge can.
  • Static routers: These must have their routing tables configured manually with all network addresses and paths in the internetwork.
  • Dynamic routers: These automatically create their routing tables by listening to network traffic.
  • Routing tables are the means by which a router selects the fastest or nearest path to the next "hop" on the way to a data packet's final destination. This process is done through the use of routing metrics.
  • Routing metrics which are the means of determining how much distance or time a packet will require to reach the final destination. Routing metrics are provided in different forms.
  • hop is simply a router that the packet must travel through.
  • Ticks measure the time it takes to traverse a link. Each tick is 1/18 of a second. When the router selects a route based on tick and hop metrics, it chooses the one with the lowest number of ticks first.
You can use routers, to segment a large network, and to connect local area segments to a single network backbone that uses a different physical layer and data link layer standard. They can also be used to connect LAN's to a WAN's.

Brouters

Brouters are a combination of router and bridge. This is a special type of equipment used for networks that can be either bridged or routed, based on the protocols being forwarded. Brouters are complex, fairly expensive pieces of equipment and as such are rarely used.
brouter
A Brouter transmits two types of traffic at the exact same time: bridged traffic and routed traffic. For bridged traffic, the Brouter handles the traffic the same way a bridge or switch would, forwarding data based on the physical address of the packet. This makes the bridged traffic fairly fast, but slower than if it were sent directly through a bridge because the Brouter has to determine whether the data packet should be bridged or routed.

Gateways

A gateway is a device used to connect networks using different protocols. Gateways operate at the network layer of the OSI model. In order to communicate with a host on another network, an IP host must be configured with a route to the destination network. If a configuration route is not found, the host uses the gateway (default IP router) to transmit the traffic to the destination host. The default t gateway is where the IP sends packets that are destined for remote networks. If no default gateway is specified, communication is limited to the local network. Gateways receive data from a network using one type of protocol stack, removes that protocol stack and repackages it with the protocol stack that the other network can use.
Examples
  • E-mail gateways-for example, a gateway that receives Simple Mail Transfer Protocol (SMTP) e-mail, translates it into a standard X.400 format, and forwards it to its destination
  • Gateway Service for NetWare (GSNW), which enables a machine running Microsoft Windows NT Server or Windows Server to be a gateway for Windows clients so that they can access file and print resources on a NetWare server
  • Gateways between a Systems Network Architecture (SNA) host and computers on a TCP/IP network, such as the one provided by Microsoft SNA Server
  • A packet assembler/disassembler (PAD) that provides connectivity between a local area network (LAN) and an X.25 packet-switching network

CSU / DSU (Channel Service Unit / Data Service Unit)

CSU/DSU is a device that combines the functionality of a channel service unit (CSU) and a data service unit (DSU). These devices are used to connect a LAN to a WAN, and they take care of all the translation required to convert a data stream between these two methods of communication.
csu dsu
DSU provides all the handshaking and error correction required to maintain a connection across a wide area link, similar to a modem. The DSU will accept a serial data stream from a device on the LAN and translate this into a useable data stream for the digital WAN network. It will also take care of converting any inbound data streams from the WAN back to a serial communication.
CSU is similar to a DSU except it does not have the ability to provide handshaking or error correction. It is strictly an interface between the LAN and the WAN and relies on some other device to provide handshaking and error correction.

NICs (Network Interface Card)

Network Interface Card, or NIC is a hardware card installed in a computer so it can communicate on a network. The network adapter provides one or more ports for the network cable to connect to, and it transmits and receives data onto the network cable.
Wireless Lan card
wireless lan card
Every networked computer must also have a network adapter driver, which controls the network adapter. Each network adapter driver is configured to run with a certain type of network adapter.
Network card
networkcard
Network Interface Adapter Functions 
Network interface adapters perform a variety of functions that are crucial to getting data to and from the computer over the network.
These functions are as follows:
Data encapsulation
The network interface adapter and its driver are responsible for building the frame around the data generated by the network layer protocol, in preparation for transmission. The network interface adapter also reads the contents of incoming frames and passes the data to the appropriate network layer protocol.
Signal encoding and decoding
The network interface adapter implements the physical layer encoding scheme that converts the binary data generated by the network layer-now encapsulated in the frame-into electrical voltages, light pulses, or whatever other signal type the network medium uses, and converts received signals to binary data for use by the network layer.
transmission and reception
The primary function of the network interface adapter is to generate and transmit signals of the appropriate type over the network and to receive incoming signals. The nature of the signals depends on the network medium and the data-link layer protocol. On a typical LAN, every computer receives all of the packets transmitted over the network, and the network interface adapter examines the destination address in each packet, to see if it is intended for that computer. If so, the network interface adapter passes the packet to the computer for processing by the next layer in the protocol stack; if not, the network interface adapter discards the packet.
Data buffering 
Network interface adapters transmit and receive data one frame at a time, so they have built-in buffers that enable them to store data arriving either from the computer or from the network until a frame is complete and ready for processing.
Serial/parallel conversion
The communication between the computer and the network interface adapter runs in parallel, that is, either 16 or 32 bits at a time, depending on the bus the adapter uses. Network communications, however, are serial (running one bit at a time), so the network interface adapter is responsible for performing the conversion between the two types of transmissions.
Media access control
The network interface adapter also implements the MAC mechanism that the data-link layer protocol uses to regulate access to the network medium. The nature of the MAC mechanism depends on the protocol used.

Network protocols

A networked computer must also have one or more protocol drivers (sometimes called a transport protocol or just a protocol). The protocol driver works between the upper-level network software and the network adapter to package data to be sent on the network.
In most cases, for two computers to communicate on a network, they must use identical protocols. Sometimes, a computer is configured to use multiple protocols. In this case, two computers need only one protocol in common to communicate. For example, a computer running File and Printer Sharing for Microsoft Networks that uses both NetBEUI and TCP/IP can communicate with computers using only NetBEUI or TCP/IP.

ISDN (Integrated Services Digital Network) adapters

Integrated Services Digital Network adapters can be used to send voice, data, audio, or video over standard telephone cabling. ISDN adapters must be connected directly to a digital telephone network. ISDN adapters are not actually modems, since they neither modulate nor demodulate the digital ISDN signal.
Like standard modems, ISDN adapters are available both as internal devices that connect directly to a computer's expansion bus and as external devices that connect to one of a computer's serial or parallel ports. ISDN can provide data throughput rates from 56 Kbps to 1.544 Mbps (using a T1 carrier service).
isdn adpator
ISDN hardware requires a NT (network termination) device, which converts network data signals into the signaling protocols used by ISDN. Some times, the NT interface is included, or integrated, with ISDN adapters and ISDN-compatible routers. In other cases, an NT device separate from the adapter or router must be implemented. ISDN works at the physical, data link, network, and transport layers of the OSI Model.

WAPs (Wireless Access Point)

A wireless network adapter card with a transceiver sometimes called an access point, broadcasts and receives signals to and from the surrounding computers and passes back and forth between the wireless computers and the cabled network.
wireless access point
Access points act as wireless hubs to link multiple wireless NICs into a single subnet. Access points also have at least one fixed Ethernet port to allow the wireless network to be bridged to a traditional wired Ethernet network.

Modems

A modem is a device that makes it possible for computers to communicate over telephone lines. The word modem comes from Modulate and Demodulate. Because standard telephone lines use analog signals, and computers digital signals, a sending modem must modulate its digital signals into analog signals. The computers modem on the receiving end must then demodulate the analog signals into digital signals.
modem
Modems can be external, connected to the computers serial port by an RS-232 cable or internal in one of the computers expansion slots. Modems connect to the phone line using standard telephone RJ-11 connectors.

Transceivers (media converters)

Transceiver short for transmitter-receiver, a device that both transmits and receives analog or digital signals. The term is used most frequently to describe the component in local-area networks (LANs) that actually applies signals onto the network wire and detects signals passing through the wire. For many LANs, the transceiver is built into the network interface card (NIC). Some types of networks, however, require an external transceiver.
transeiver
In Ethernet networks, a transceiver is also called a Medium Access Unit (MAU). Media converters interconnect different cable types twisted pair, fiber, and Thin or thick coax, within an existing network. They are often used to connect newer 100-Mbps, Gigabit Ethernet, or ATM equipment to existing networks, which are generally 10BASE-T, 100BASE-T, or a mixture of both. They can also be used in pairs to insert a fiber segment into copper networks to increase cabling distances and enhance immunity to electromagnetic interference (EMI).

Firewalls

In computing, a firewall is a piece of hardware and/or software which functions in a networked environment to prevent some communications forbidden by the security policy, analogous to the function of firewalls in building construction.
firewall
A firewall has the basic task of controlling traffic between different zones of trust. Typical zones of trust include the Internet (a zone with no trust) and an internal network (a zone with high trust). The ultimate goal is to provide controlled connectivity between zones of differing trust levels through the enforcement of a security policy and connectivity model based on the least privilege principle.
There are three basic types of firewalls depending on:
  • whether the communication is being done between a single node and the network, or between two or more networks
  • whether the communication is intercepted at the network layer, or at the application layer
  • whether the communication state is being tracked at the firewall or not
With regard to the scope of filtered communication these firewalls are exist:
  • Personal firewalls, a software application which normally filters traffic entering or leaving a single computer through the Internet.
  • Network firewalls, normally running on a dedicated network device or computer positioned on the boundary of two or more networks or DMZs (demilitarized zones). Such a firewall filters all traffic entering or leaving the connected networks.
In reference to the layers where the traffic can be intercepted, three main categories of firewalls exist:
  • network layer firewalls An example would be iptables.
  • application layer firewalls An example would be TCP Wrapper.
  • application firewalls An example would be restricting ftp services through /etc/ftpaccess file
These network-layer and application-layer types of firewall may overlap, even though the personal firewall does not serve a network; indeed, single systems have implemented both together.
There's also the notion of application firewalls which are sometimes used during wide area network (WAN) networking on the world-wide web and govern the system software. An extended description would place them lower than application layer firewalls, indeed at the Operating System layer, and could alternately be called operating system firewalls.
Lastly, depending on whether the firewalls track packet states, two additional categories of firewalls exist:
  • stateful firewalls
  • stateless firewalls

Network layer firewalls

Network layer firewalls operate at a (relatively low) level of the TCP/IP protocol stack as IP-packet filters, not allowing packets to pass through the firewall unless they match the rules. The firewall administrator may define the rules; or default built-in rules may apply (as in some inflexible firewall systems).
A more permissive setup could allow any packet to pass the filter as long as it does not match one or more "negative-rules", or "deny rules". Today network firewalls are built into most computer operating system and network appliances.
Modern firewalls can filter traffic based on many packet attributes like source IP address, source port, destination IP address or port, destination service like WWW or FTP. They can filter based on protocols, TTL values, netblock of originator, domain name of the source, and many other attributes.

Application-layer firewalls

Application-layer firewalls work on the application level of the TCP/IP stack (i.e., all browser traffic, or all telnet or ftp traffic), and may intercept all packets traveling to or from an application. They block other packets (usually dropping them without acknowledgement to the sender). In principle, application firewalls can prevent all unwanted outside traffic from reaching protected machines.
By inspecting all packets for improper content, firewalls can even prevent the spread of the likes of viruses. In practice, however, this becomes so complex and so difficult to attempt (given the variety of applications and the diversity of content each may allow in its packet traffic) that comprehensive firewall design does not generally attempt this approach.

Proxies

A proxy device (running either on dedicated hardware or as software on a general-purpose machine) may act as a firewall by responding to input packets (connection requests, for example) in the manner of an application, whilst blocking other packets.
proxy server
Proxies make tampering with an internal system from the external network more difficult, and misuse of one internal system would not necessarily cause a security breach exploitable from outside the firewall (as long as the application proxy remains intact and properly configured). Conversely, intruders may hijack a publicly-reachable system and use it as a proxy for their own purposes; the proxy then masquerades as that system to other internal machines. While use of internal address spaces enhances security, crackers may still employ methods such as IP spoofing to attempt to pass packets to a target network.

Computer Networking Glossary

10Base2 - Ethernet specification for thin coaxial cable, transmits signals at 10 Mbps (megabits per second) with a distance limit of 185 meters per segment.
10Base5 - Ethernet specification for thick coaxial cable, transmits signals at 10 Mbps (megabits per second) with a distance limit of 500 meters per segment.
10BaseF - Ethernet specification for fiber optic cable, transmits signals at 10 Mbps (megabits per second) with a distance limit of 2000 meters per segment.
10BaseT - Ethernet specification for unshielded twisted pair cable (category 3, 4, or 5), transmits signals at 10 Mbps (megabits per second) with a distance limit of 100 meters per segment.
100BaseT - Ethernet specification for unshielded twisted pair cabling that is used to transmit data at 100 Mbps (megabits per second) with a distance limit of 100 meters per segment.
1000BaseTX -Ethernet specification for unshielded twisted pair cabling that is used to transmit data at 1 Gbps (gigabits per second) with a distance limitation of 220 meters per segment.
Asynchronous Transfer Mode (ATM) - A network protocol that transmits data at a speed of 155 Mbps and higher. It is most often used to interconnect two or more local area networks.
AppleTalk - Apple Computer's network protocol originally designed to run over LocalTalk networks, but can also run on Ethernet and Token Ring.
AUI Connector (Attachment Unit Interface) - A 15 pin connector found on Ethernet cards that can be used for attaching coaxial, fiber optic, or twisted pair cable.
Backbone - A cable to which multiple nodes or workstations are attached.
Bit - Binary digit in the binary numbering system. Its value can be 0 or 1. In an 8-bit character scheme, it takes 8 bits to make a byte (character) of data.
BNC Connector (Bayone-Neill-Concelman) - Standard connector used to connect 10Base2 coaxial cable.
Bridge - Devices that connect and pass packets between two network segments that use the same communications protocol.
Byte - an 8-bit long binary value, which originally mapped to text character values (between 0 and 255 decimal). For example, a decimal value of 65, represented in a binary byte is "01000001" and represents the capital letter "A". A byte also is the atomic value of data storage, so a megabyte is the amount of memory required to store a million bytes.
Cable - Transmission medium of copper wire or optical fiber wrapped in a protective cover.
Client/Server - A networking system in which one or more file servers (Server) provide services; such as network management, application and centralized data storage for workstations (Clients).
CSMA/CA - Carrier Sense Multiple Access Collision Avoidance is a network access method in which each device signals its intent to transmit before it actually does so. This prevents other devices from sending information, thus preventing collisions from occurring between signals from two or more devices. This is the access method used by LocalTalk.
CSMA/CD - Carrier Sense Multiple Access Collision Detection is a network access method in which devices that are ready to transmit data first check the channel for a carrier. If no carrier is sensed, a device can transmit. If two devices transmit at once, a collision occurs and each computer backs off and waits a random amount of time before attempting to retransmit. This is the access method used by Ethernet.
Coaxial Cable - Cable consisting of a single copper conductor in the center surrounded by a plastic layer for insulation and a braided metal outer shield.
Concentrator - A device that provides a central connection point for cables from workstations, servers, and peripherals. Most concentrators contain the ability to amplify the electrical signal they receive.
DIN - A plug and socket connector consisting of a circular pattern of pins in a metal sleeve. This type of connector is commonly seen on keyboards.
Dumb Terminal - Refers to devices that are designed to communicate exclusively with a host (main frame) computer. It receives all screen layouts from the host computer and sends all keyboard entry to the host. It cannot function without the host computer.
E-mail - An electronic mail message sent from a host computer to a remote computer.
End User - Refers to the human executing applications on the workstation.
Ethernet - A network protocol invented by Xerox Corporation and developed jointly by Xerox, Intel and Digital Equipment Corporation. Ethernet networks use CSMA/CD and run over a variety of cable types at 10 Mbps (megabits per second).
Expansion Slot - Area in a computer that accepts additional input/output boards to increase the capability of the computer.
Fast Ethernet - An Ethernet standard that supports 100 Mbps using category 5 twisted pair or fiber optic cable.
Fiber Distributed Data Interface (FDDI) - A network protocol that is used primarily to interconnect two or more local area networks, often over large distances.
Fiber Optic Cable - A cable, consisting of a center glass core surrounded by layers of plastic, that transmits data using light rather than electricity. It has the ability to carry more information over much longer distances.
File Server - A computer connected to the network that contains primary files/applications and shares them as requested with the other computers on the network. If the file server is dedicated for that purpose only, it is connected to a client/server network. An example of a legacy client/server network is Novell Netware. All the computers connected to a peer-to-peer network are capable of being the file server. Most modern operating systems can operate as servers or as clients, greying the distinction in the server architecture.
Firewall - A security device which inspects traffic entering and leaving a network, and allows or disallows the traffic, depending on rules describing acceptable use of the network, by filtering out unwanted packets. The firewall is usually positioned as the gateway device to another network, such as the internet. Many routers now contain firewalls. A personal firewall is usually software that runs on a workstation or server to filter unwanted traffic at the individual machine.
Gigabit Ethernet - An Ethernet protocol that raises the transmission rates to 1 Gbps (gigabits per second). Most school, corporate, and household networks provide gigabit ethernet to the workstations via cabled connections.
Gigabyte (GB) - One billion bytes of information. One thousand megabytes.
Hub - A hardware device that contains multiple independent but connected modules of network and internetwork equipment. Hubs can be active (where they repeat signals sent through them) or passive (where they do not repeat but merely split signals sent through them).
Infrared - Electromagnetic waves whose frequency range is above that of microwaves, but below that of the visible spectrum.
Intranet - Network internal to an organization that uses Internet protocols.
Internet - A global network of networks used to exchange information using the TCP/IP protocol. It allows for electronic mail and the accessing ad retrieval of information from remote sources.
LAN (Local Area Network) - A network connecting computers in a relatively small area such as a building.
Linear Bus - A network topology in which each node attaches directly to a common cable.
LocalTalk - Apple Corporation proprietary protocol that uses CSMA/CA media access scheme and supports transmissions at speeds of 230 Kbps (Kilobits per second).
MAN (Metropolitan Area Network) - A network connecting computers over a large geographical area, such as a city or school district.
MAU (Multistation Access Unit) - A Token Ring wiring hub.
Modem (Modulator/Demodulator) - Devices that convert digital and analog signals. Modems allow computer data (digital) to be transmitted over voice-grade telephone lines (analog).
Multiplexer - A device that allows multiple logical signals to be transmitted simultaneously across a single physical channel.
Network Modem - A modem connected to a Local Area Network (LAN) that is accessible from any workstation on the network.
Network Interface Card (NIC) - A board that provides network communication capabilities to and from a computer.
Network Operating System (NOS) - Operating system designed to pass information and communicate between more than one computer. Examples include Linux/Unix and Windows Server.
Node - End point of a network connection. Nodes include any device attached to a network such as file servers, printers, or workstations.
Node Devices - Any computer or peripheral that is connected to the network.
PCMCIA - (later versions were PCMCIA2 and PC Card) An expansion slot found in many laptop computers. Largely replaced by USB in the 2000-2010 period.
Peer-to-Peer Network - A network in which resources and files are shared without a centralized management source.
Physical Topology - The physical layout of the network; how the cables are arranged; and how the computers are connected.
Point-to-Point - A direct link between two objects in a network.
Ports - A connection point for a cable.
Protocol -A formal description of a set of rules and conventions that govern how devices on a network exchange information.
RAID (Redundant Array of Inexpensive Disks) - A configuration of multiple disks designed to preserve data after a disk casualty.
RAM (Random Access Memory) - The working memory of a computer where data and programs are temporarily stored. RAM only holds information when the computer is on.
Repeater - A device used in a network to strengthen a signal as it is passed along the network cable.
RJ-45 - Standard connectors used for unshielded twisted-pair cable.
Router -A device that routes information between interconnected networks. It can select the best path to route a message, as well as translate information from one network to another. Many routers now contain firewalls. Home routers can contain firewall, router, switching (for cabled connections), and a wireless access point.
SCSI (Small Computer Serial Interface) - An interface controller that allows several peripherals to be connected to the same port on a computer.
Segment - Refers to a section of cable on a network. In Ethernet networks, two types of segments are defined. A populated or trunk segment is a network cable that has one or more nodes attached to it. A link segment is a cable that connects a computer to an interconnecting device, such as a repeater or concentrator, or connects a interconnecting device to another interconnecting device.
Sneaker-Net - Refers to a manual method of sharing files in which a file is copied from a computer to a floppy disk, transported to a second computer by a person physically walking (apparently wearing sneakers) to the second computer, and manually transferring the file from floppy disk to the second computer.
Speed of Data Transfer - The rate at which information travels through a network, usually measured in megabits per second.
Star Topology - LAN topology in which each node on a network is connected directly to a central network hub or concentrator.
Star-Wired Ring - Network topology that connects network devices (such as computers and printers) in a complete circle.
Switch - A "intelligent" type of hub, in that it sends packets only to the intended ports, rather than all computers on the network.
Tape Back-Up - A common server or network peripheral which allows copying data and programs from a computer system to magnetic tape. On tape, data is stored sequentially. When retrieving data, the tape is searched from the beginning of tape until the data is found.
Terminator - A device that provides electrical resistance at the end of a transmission line. Its function is to absorb signals on the line, thereby keeping them from bouncing back and being received again by the network.
Thicknet - A thick coaxial cable that is used with a 10Base5 Ethernet LAN.
Thinnet - A thin coaxial cable that is used with a 10Base2 Ethernet LAN.
Token - A special packet that contains data and acts as a messenger or carrier between each computer and device on a ring topology. Each computer must wait for the messenger to stop at its node before it can send data over the network.
Token Ring - A network protocol developed by IBM in which computers access the network through token-passing. Usually uses a star-wired ring topology.
Topology - There are two types of topology: physical and logical. The physical topology of a network refers to the configuration of cables, computers, and other peripherals. Logical topology is the method used to pass the information between workstations. Issues involving logical topologies are discussed on the Protocol chapter
Transceiver (Transmitter/Receiver) - A Device that receives and sends signals over a medium. In networks, it is generally used to allow for the connection between two different types of cable connectors, such as AUI and RJ-45.
Tree Topology - LAN topology similar to linear bus topology, except that tree networks can contain branches with multiple nodes.
Twisted Pair - Network cabling that consists of four pairs of wires that are manufactured with the wires twisted to certain specifications. Available in shielded and unshielded versions.
USB/ USB2 Port - A hardware interface for peripherals from keyboards to hard drives, widely used on all computers.
WAN (Wide Area Network) - A network connecting computers within very large areas, such as states, countries, and the world.
Workgroup - A collection of workstations and servers on a LAN that are designated to communicate and exchange data with one another.
Workstation - A computer connected to a network at which users interact with software stored on the network.