Wednesday, November 9, 2016

Chapter 8: Local Area Network: Part 2

INTRODUCTION

Network operating systems and network support software are two of the most important. Network operating systems are essential if the network is going to allow multiple users to share resources. The network operating system provides users with password protection on their accounts and network administrators with services that help them control access to network resources as well as use and administer network


WIRELESS ETHERNET

  • Wireless LAN or Wireless Ethernet: a LAN that is not based primarily on physical wiring but uses wireless transmissions between workstations
  • Workstation can be anywhere as long as it is within transmitting distance to an access point
  • The access point: is essentially the interface device between the wireless user device and the wired LAN
  • Access point acts as a bridge between the wired and wireless networks and can perform basic routing functions
  • Typically found in 3 basic configuration:
    • Single-cell wireless LAN: at the center cell is the access point
    • Multiple-cell layout: multiple cells are supported by multiple access points, as in cellular telephone work
    • Ad hoc or peer to peer: the is no access point, each user device communicates directly with the other users devices
1. Wireless LAN Standards
  • IEEE 802.11
    • Original wireless standard, transmission rated for infrared wireless range from 1-2 Mbps
  • IEEE 802.11b
    • Second wireless standard, can transmit data at a theoretical rate of 11 Mbps using 2.4 GHz signals
  • With directional antennae designed for point-to-point transmission (rare), 802.11b can transmit for more than 10 miles
  • IEEE 802.11a
    • Capable of supporting a theoretical transmitting rate at 54 Mbps  using the 5-GHz frequency range
  •  IEEE 802.11g
    • Capable of transmitting data at 54 Mbps (theoretical) but using the same frequencies as 802.11b (2.4-GHz)
  • IEEE 802.11n (100 Mbps theoretical) is the latest standard to be approved
  • 802.11n 
    • has a theoretical maximum data rate of 600 mbps with actual rates of roughly 100-145 Mbps
    • uses MIMO technology (multiple input multiple output)Sender and receiver have multiple antennas for optimum reception
  • 802.11ac uses advanced MIMO, wider channels in the 5 GHz band and advanced QAM techniques to achieve high data rates
  • To provide security, most systems use either:
    • Wired Equivalent Privacy (WEP): provides either 40- or 128-bit key protection (dated)
    • WPA or WPA 2 (Wi-Fi Protected Access)
    • WPA 2 uses the most advanced encryption techniques
  • Wireless LANs may also be configured without an access point 
  • These configurations are called “ad-hoc”
2. Wireless CSMA/CA
  • Carrier sense multiple access with collision avoidance (CSMA/CD): supporting wireless LANs limits when workstation can transmit, in an attempt to reduce the number of collisions
  • How does CSMA/CA do this?
    • All devices, before they transmit, must wait an amount of time called an interframe space (IFS)
    • Some applications have a short IFS, while others have a long IFS
    • If two applications want to transmit at same time, the application with shorter IFS will go first

3. CSMA/CA Frame Format
  • Frame format for wireless Ethernet CSMA/CA has four address fields

NETWORK OPERATING SYSTEM
  • Operating system is the program initially loaded into computer memory when the computer is turned on; it manages all the other programs (applications) and resources
  • Application programming interface (API): application makes use of the operating system by making service requests
  • Multitasking operation system: allow multiple programs to run at the same time. The OS runs only one program at a time, but it jumps from one program to the next so fast that it appears as if multiple programs are running at the same time
  • Network OS is large, complex program that manages the resources common on most local area network
NETWORK OPERATING SYSTEMS PAST AND PRESENT

1. Novell NetWare
  • NetWare directory services (NDS): an intelligent system that authenticates users and includes a distributed database of information about every application, user, server, and resource on a network
  • Version 3 
    • User logs onto a particular serverBindery maintains directory system that contains the usernames and passwords of network users and groups of users authorized to log in that server
  • Version 4
    • Bindery replaced by powerful NDS databaseNo longer supported by Novell (beginning of 2004)
  • Novell NDS (NetWare Directory Services)
    • A database that maintains information on, and access to, every resource on the network, including users, groups of users, printers, data sets and servers
    • Network administrator creates a hierarchical tree structure that represents the layout of the organization
    • Tree structure is composed of organizational units which are composed of further objects, and leaf objects which are usually entities such as users, peripherals, servers, printers, queues and other network sources
2. Microsoft Windows NT and Window Server

Windows NT Version 4
  • User interface for single user personal computers
  • NT had only Domain
    • Container object that contained users, servers, and other resources that share account and security information
    • Domains are not hierarchal and in many cases they increase the level of administration 
Window Server 2000
  • Incorporated Active Directory: that stores information about all the objects and resources in a network and makes this information available to users, network administrators, and application program
  • Active directory creates a hierarchical application structure of resources
  • To construct an active directory hierarchy, a tree design is created
  • Objects, such as users, groups of users, computers, applications, and network devices are the leaf items within the tree
  • Leaf items are grouped in organizational units 
Window Server 2003
  • Improvements to Active Directory, including new management tools
  • Capability to interconnect up to 8 windows servers
  • New and improved file and print support services
  • Support for IPv6
  • Better security features
Window Server 2008 and 2012
  • The latest window of Window Network OS
  • Expanded Active Directory, including new management tools
  • New server core
  • Self-healing server that can fix corrupted files and/or folders
  • Increased processing speed
  • Advancements in network security
3. Unix
  • Well established and very popular multitasking OS capable of supporting network operations
  • First OS written in the language C
  • Very stable system capable of supporting very large operations
4. Linux
  • OS based on the concept of Unix
  • Many versions available for free or very small price
  • Can receive the original source code along with the compiled code
  • Very stable multitasking OS
  • Is part of the growing family of open source software that is highly regarded within the business and educational industries
5. Mac OS X Server
  • Apple created the Mac OS X server based on Unix concept, and shared some characteristics with both Unix and Linux operating systems such as fast, efficient, and stable code
SERVERS

  • Server is the computer that stores software resources
  • In order to support a network OS, you need one or more network servers
    • Network servers are high-power workstations often with multiple processors, RAID, SCSI, and lots of memory and disk spaceVarious forms of servers include server appliances, and server blades
  • Server virtualization allows you to create multiple servers in software all running on a single physical server
  • To protect the server from catastrophic disk failure, disk drives on most network servers support one of the redundant array of independent disks (RAID) techniques
    • RAID is a collection of techniques for interfacing multiple hard disk drives to a computer 
  • Some of the more common RAID techniques include:
    • RAID-0: Data is broken into pieces, and each piece is stored on different disk drives 
    • This technique is known as stripingRAID-1
      • Data is stored on at least two disk drives, in duplicate, to provide a level of redundancy (or fault tolerance), should one disk become corrupted
      • This technique is known also as disk mirroring
    • RAID-3: Data is redundantly stored across multiple disk drives (striping), and error-checking   information concerning the stored data is kept on a separate disk
    • RAID-5
      • Data is broken into pieces (stripes) and stored across three or more disks
      • Parity information (error-checking code) is stored along with the striped data, not on a separate disk
2. Client/Server Networks versus Peer-to-Peer Networks
  • A clear majority of LANs are client/server networks
  • The client, or user workstation, requests something such as database from server. The server accepts the request, retrieves data and return a response
  • Peer-to-peer networks also exist: may have servers, but the network relies less on the servers and more on the communications between workstations
NETWORK SUPPORT SOFTWARE

1. Utilities
  • Utilities are software programs that operate int the background and support one or more functions to keep the network running at the optimal performance
  • Some of the more common groups of network utility software:
    • Antivirus software
    • Anti-spam software
    • Anti-spyware software
    • Backup software
    • Network-monitoring software
    • Crash protection software
    • Security software
    • Remote software
    • Uninstall software
2. Internet software
  • the toolset to support internet-related services
  • Web server software: the application or set of programs that stores web pages and allow users from anywhere in the world to access those web pages
SOFTWARE LICENSING AGREEMENTS

Licensing agreement: a legal contract and describes a number of conditions that must be upheld for proper use of the software package
Most licensing agreements specify conditions in the following areas:
  • Software installation and use
  • Network installation
  • Backup copies
  • Decompilation
  • Rental Statement
  • Upgrade availabilities
  • Copyright restrictions
  • Maintenance agreements
Most licensing agreements come in one of the following forms
  • Single-user-single-station license: one station, one user at one time
  • Single-user-multiple-station license: one user with multiple devices
  • Interactive user license: operating system user licence and controlled number of concurrent users license
  • Site license: allows software package to be installed on any and all workstations and servers at a given time
  • Corporate License: allows software package to be install anywhere within a corporation, including multiple sites
  • General public license: software that is free to share and change, however, the creator may still charge a fee
LAN SUPPORT DEVICES

Other devices necessary for the proper support of a LAN:
  • Uninterruptible power supplies (UPS): a backup device that can maintain power to one or more pieces of equipment for short period of time
  • Tape drives: backup device
  • Printer
  • Media converters: are necessary when connect one type of medium with another
  • Workstation
    • Thin client workstation: a computer with no disk drives of any kind, often with reduced memory and some kind of minimized operating system









Chapter 7: Local Area Network: Part 1

INTRODUCTION

A Local Area Network (LAN) is a communications network that interconnects a variety of data communications devices within a small geographic area and transmits data at high data transfer rates. The strongest advantage of a local area network is its capability of allowing users to connect their computers to the internet and share hardware and software resources. Since appeared in 1970, LAN 's use has become widespread in commercial and academic environments.

PRIMARY FUNCTION OF LOCAL AREA NETWORKS

The majority of users expect a local area network to provide access to hardware and software resources that will allow them to perform one or more of the following:

  • Access to the internet
  • File serving: a large storage disk drive acts as a central storage repository
  • Database and application serving
  • Print serving: providing the authorization to access a particular printer, accept and queue print jobs, and providing a suer access to the print queue to perform administrative duties
  • email serving
  • Process control and monitoring
  • Distributed processing
  • Manufacturing support
  • Academic support
ADVANTAGES AND DISADVANTAGES OF LOCAL AREA NETWORK

Advantages:

  • Ability to share hardware and software resources
  • Individual workstation might survive network failure
  • Component and system evolution are possible
  • Support for heterogenous forms of hardware and software
  • Access to other LANs and WANs 
  • Private ownership
  • Secure transfer at high speed with low error rates
Disadvantages:
  • Equipment and support can be costly
  • Level of maintenance continues to grow
  • Private ownership
  • Some types of hardware may not interoperate
  • Just because a LAN can support 2 different kinds of packages does not mean data can interchange easily
  • LAN is only as strong as its weakest link

THE FIRST LOCAL AREA NETWORK: THE BUS/TREE
  • Bus/tree local are network: simply called bus LAN was the first physical design when LANs became commercially available in the late 1970s that consisted of a simple coaxial cable, or bus, to which all devices attached.
  • Connecting to the cable requires a simple device called Tap, a passive device
  • Passive device: does not alter the signal and does not require electricity to operate
  • Network interface card (NIC) is an electronic device, sometimes in the form of a computer circuit board or part of a larger circuit board that performs the necessary signal conversions and protocol operations that allow the workstation to send and receive data on the network
  • Can be used with baseband signal and broadband signal
  • Baseband signals are bidirectional and more outward in both directions from the workstation transmitting
  • Broadband signals are usually uni-directional and transmit in only one direction, however, special wiring considerations are necessary
  • It is also to split and join broadband cables and signals to create configurations called Tree

A MORE MODERN LAN

  • Star-wired bus LAN: logically acts as a bus, but physically looks like a star
  • Logical design: determines how the data moves around the network from workstation to workstation
  • Physical design: refers to the pattern formed by the location of the elements of the network, as it would be drawn on s sheet of paper
  • All workstations connect to a central device such as a hub
  • Hub: is a relatively non-intelligent device that simply and immediate;y retransmits the data it receives from any workstation out to all other workstations connected to the hub
  • Twisted pair cable has become the preferred medium 
  • Modular connectors and twisted pair make installation and maintenance of star-wired bus better than standard bus
  • Hubs can be interconnected with other cables
  • Biggest disadvantage: when one station talk, everyone hears it, this is called Shared Network-all devices on the network are sharing the one bandwidth.
  • Medium access control protocol: is the software that allows a device to place data onto a sub-based LAN and allows workstations to "take turn" at transmitting data
    a) Contention-based protocols, such as carrier sense multiple access with collision detection
    b) Round-robin protocols such as token passing
1. Contention-based protocols
  • Essentially first-come, first-served: the first station to recognize that no other station is transmitting data and place its data onto the medium is the first station to transmit
  • The most popular is Carrier sense multiple access with collision detection (CSMA/CD)
  • If no workstation is transmitting, a workstation can transmit
  • If another workstation is transmitting, the workstation wanting to transmit will wait and try again to transmit
  • If two workstation transmit at the same time, collision occurs
    - when two workstation hear collision, they stop transmitting immediately
    - Each workstation backs off a random amount of time and tries again
  • CSMA/CD is a nondeterministic protocol, at which cannot calculate the time at which a workstation will transmit


SWITCHES
  • The hub is a simple device that transmits an incoming frame out to all connections
  • the Switch: uses addresses and processing power to direct a frame out of a particular port, thus reducing the amount on traffic on the network
  • A switch primary function is to direct the data frame only to the addressed receiver
  • Switches have eliminated many hubs
  • Most switches are transparent- which means they observe the addresses of the frames in transmission on the current network and creates an internal port table to be used for making future forwarding decisions.
  • The switches create internal port by using a form of backward learning- they observe each frame that arrives at a port, extracts the source address from the frame, and places that address in the port's routing table
  • Workstation that connect to a hub are on shared segment
  • Workstations that connect to a switch are on a switched segment
  • The backplane of a switch must be fast enough to support multiple data transfers at one time
  • In a cut-through architecture, the data frame begins to exit the switch almost as soon as it begins to enter the switch
  • In contrast, a store-and-forward device holds the entire frame for a small amount of time while various fields of the frame are examined, a procedure that diminishes the overall network throughput
  • Shared segment network: a switch may be connected to a hub, which then connects multiple workstation
  • Dedicated segment network: a switch may be directly connected to one or more workstations. Each workstation then has a private or dedicated connection that can increase the bandwidth , which is a very efficient way to isolate heavy users from the network


1. Isolating traffic patterns and providing multiple access
  • Whether shared or dedicated segments are involved, the primary goal of a switch is to isolate a particular pattern of traffic from other patterns of traffic or from the remainder of the network
  • Switches, because of their backplane, can also allow multiple paths of communications to simultaneously occur


2. Full-duplex switches
  • Allow for simultaneous transmission and reception of data to and from a workstation
  • This full-duplex connection helps to eliminate collisions
  • To support a full-duplex connection 
    •  NIC in the workstation must be capable of supporting, and then configured to support a full duplex connection
    • A switch must be configured for a full duplex connection as well
    •  The cable connecting must also be able to support full duplex connection
3. Virtual LANs
  • Virtual LAN (VLAN) – logical subgroup within a LAN that is created via switches and software rather than by manually moving wiring from one network device to another
  • Even though employees and their actual computer workstations may be scattered throughout the building, LAN switches and VLAN software can be used to create a “network within a network
  • A relatively new standard, IEEE 802.1Q, was designed to allow multiple devices to intercommunicate and work together to create a virtual LAN
  • Instead of sending technician to a wiring closet to move a workstation cable from one switch to another, an 802.1Q-compliant switch can be remotely configured by a network administrator 
4. Link Aggregation
  • Allow you to combine two or more links into one higher-speed link
  • An IEEE protocol (802.3ad-2000) which typically runs in most LAN devices can support link aggregation
  • Link aggregation can also be used in the event of a link failure
  • Can be used to to allow multiple parallel links to a server
5. Spanning Tree algorithm
  • The spanning tree algorithm (used in Spanning Tree Protocol and now Rapid Spanning Tree Protocol) runs in switches and can identify loops and remove them
  • The way spanning tree algorithm works:
    • Identify a switch as the root switch
    • Visit each switch and identify the one port that has the shortest path back to the root switch.  Mark these ports with RP (root port)
    • Visit each LAN and identify the port that provides the shortest path back to the root switch.  Mark these ports with a DP (designated port). 
    • Are there any ports remaining that don’t have either an RP or DP designation?  Mark those ports as Removed.  (They aren’t physically removed, only removed in the forwarding tables)
6. Quality of service
  • On a standard Ethernet LAN, all frames were created equal, or first come first served protocol
  • Wireless Ethernet provides a level of priority
  • The 802.1p standard adds a 3-bit field to the front of each Ethernet frameThis 3-bit field can be used to establish a priority
WIRED ETHERNET

  • Ethernet: was the first commercially available local area network system and remains, the most popular LAN system today
  • Primarily on the star-wired bus topology and uses essentially the CSMA/CD medium access protocol
  • Comes in many forms depending upon the medium used and transmission speed and technology
  • One additional improvement to Ethernet is Power over Ethernet (PoE), can place a NIC in a device, but dont have to connect the device to an electrical source
WIRED ETHERNET FRAME FORMAT

  • To better support local area networks, the data link layer of the OSI model was broken into two sublayers:
    • Logical link control sublayer
    •  Medium access control sublayer
  • Medium access control sublayer works more closely with the physical layer and contains a header, computer addresses, error detection codes, and control information
  • Logical Link Control (LLC) sublayer: is primarily responsible for logical addressing and providing error control and flow control info.
  • EEE 802 suite of protocols defines frame formats for CSMA/CD (IEEE 802.3) 
  • The two frames do not have the same layout
    - If a CSMA/CD network connects to a token ring network, the frames have to be converted from one to another














D

Chapter 6: Errors, Error Detection, and Error Control

INTRODUCTION

Noise can creep in and disrupts data transmission even with the highest quality fiber-optic cable. When this occurs, error detection techniques become valuable tool. There are different form of noise that commonly occur during data transmission. So having a better understanding of different types of noise and what causes them will enable better application of noise-reduction techniques to communicate with the system. There are three error-control options when an error is detected: (1) toss the frame/packet (ignore the error), (2)return an error message to the transmitter, or (3)correct the error without help from the transmitter

NOISES AND ERRORS

1. White Noise

  • White noise: also called thermal noise or Gaussian noise, is a relatively continuos noise and is much like the static we hear when a radio is being turned between stations.
  • It is always present to some degree in transmission and depend on the temperature of the medium.
  • It can be significantly reduce but never completely


2. Impulse noise:
  • Impulse noise: or noise spike is a noncontinuous noise and one of the most difficult errors to detect because it can occur randomly
  •  The noise is typically an analog burst of energy. If  impulse spike interferes with an analog signal, removing it without affecting the original signal  can be difficult
  • If impulse noise interferes with a digital signal, often the original data can be recognized and recovered, but not recoverable if the noise is completely obliterates the digital signal

3. Crosstalk
  • Crosstalk: is unwanted coupling between two different signal paths
  • Telephone signal crosstalk is example. When crosstalk happens, you can hear another person talks back
  • It can be reduced with proper precautions and hardware
4. Echo
  • Echo: is the reflective feedback of a transmitted signal as the signal moves through a medium. 
  • Occurs mot often at junctions where wires are connected or at the open end of a coaxial cable.
  • Echo suppressor can be attached to a line to reduce echo




5. Jitter

  • Jitter: is the result of small timing irregularities that become magnified during the transmission of digital signals as the signals are passed from one device to another
  • Jitter can cause video devices to flicker, audio transmissions to click and break up, and transmitted computer data to arrive with errors
  • If serious enough, jitter can cause the system to slow down transmission rates
  • Causes can include electromagnetic interference, crosstalk, passing the signal through many repeaters and the use of lower quality equipment
  • Possible solution involve installing proper shielding
6. Attenuation
  • Attenuation: is the continuos loss of a signal;s strength as it travels through a medium
  • Can be eliminated with the use of amplifiers for analog systems or repeaters for digital systems

ERROR PREVENTION

To prevent the occurrence of may types of transmission errors, several techniques can be applied:
  • Install wiring with proper shielding to reduce electromagnetic interference and crosstalk
  • Be aware that many different types of wireless applications share the same wireless frequencies
  • Replace older equipment with more modern, digital equipment
  • Use the proper number of digital repeaters and analog, amplifiers to increase signal strength
  • Observe the stated capacities of a medium and to reduce the error, avoid pushing transmission speeds beyond their recommended limits

ERROR DETECTION

  • Despite best attempts to prevent, errors still occur
  • Error detection can be performed in several places within a communications model. The most common place is data link layer
1. Parity Check
  • Simple parity: is the easiest error-detection method to incorporate into a transmission system.
  • Even Parity: the 0 and 1 are added to the string produces an even number of binary 1s
  • Odd Parity: the 0 and 1 added to the string produces an odd number of binary 1s
2. Longitudinal parity
  • Longitudinal parity: tries to solve the main weakness of simple parity, that all even numbers of errors are not detected.
  • Adds a parity bit to each character then adds a row of parity bits after a block of character. 
  • The row of parity bits is actually a parity bit for each “column” of character. 
  • The row of parity bits plus the column parity bits add a great amount of redundancy to a block of characters
  • Both simple and longitudinal parities do not catch all errors
  • Simple parity only catches odd numbers of bit errors
  • Longitudinal parity is better at catching errors but requires too many check bits added to a block of data
3. Arithmetic checksum
  • Used in TCP and IP on the Internet
  • Characters to be transmitted are converted to numeric form and summed
  • Sum is placed in some form at the end of the transmission
  • Receiver performs same conversion and summing and compares new sum with sent sum
4. Cyclic Redundancy Checksum
  • CRC or cyclic checksum: adds 8 to 32 check bits to potentially large data packets and yields an error-detection capability approaching 100%
  • Transmitter takes the message polynomial and using polynomial arithmetic, divides it by a given generating polynomial
  • Generating polynomial: is an industry-approved bit string used to create the cyclic checksum remainder
  • Quotient is discarded but the remainder is “attached” to the end of the message
  • The message (with the remainder) is transmitted to the receiver
  • The receiver divides the message and remainder by the same generating polynomial
  • If a remainder not equal to zero results, there was an error during transmission
  • If a remainder of zero results, there was no error during transmission

ERROR CONTROL

1. Toss the frame/packet
  • Doesn't seem like an option, but has became a mode of operation for some newer wide area network transmission techniques
  • If a data frame arrives at a frame relay switch and an error is detected, the frame is simply discarded
  • Frame relay assumes a higher protocol (such as TCP/IP) will detect the tossed frame and ask for retransmission
2. Return a message
  • Stop and Wait Error Control: the simplest of the error control protocols
    - A transmitter sends a frame then stops and waits for an acknowledgement
    a) If a positive acknowledgment (ACK) is received, the next frame is sent
    b) If a negative acknowledgement (ACK) is received, the same frame is transmitted again

  • Siding Window Error Control: a flow control scheme that allows a station to transmit a number of data packets at one time before receiving some form of acknowledgement.
    - These techniques assume that multiple frames are in transmission at one time
    - When a receiver does acknowledge receipt, the returned ACK contains the number of the frame expected next
    - Using TCP/IP, there are some basic rules concerning ACKs:
    a) Rule 1: If a receiver just received data and wants to send its own data, piggyback an ACK along with that data
    b) Rule 2: If a receiver has no data to return and has just ACKed the last packet, receiver waits 500 ms for another packet
    *If while waiting, another packet arrives, send the ACK immediately 
    c) Rule 3: If a receiver has no data to return and has just ACKed the last packet, receiver waits 500 ms
    * No packet, send ACK



3. Correct the error
  • For a receiver to correct the error with n further help from the transmitter requires a large amount of redundant information to accompany the original data
    - this redundant information allows the receiver to determine the error and make corrections
  • This type of error control is often called forward error and involves codes called Hamming Codes
  • Hamming Code is a specially designed code in which special check bits have been added to data bits such that, if an error occurs during transmission, the receiver might be able to correct the error using the included check and data bits

ERROR DETECTION IN ACTION
  • FEC is used in transmission of radio signals, such as those used in transmission of digital television (Reed-Solomon and Trellis encoding) and 4D-PAM5 (Viterbi and Trellis encoding)
  • Some FEC is based on Hamming Codes

4.