Cabletron Systems reserves the right to make changes in specifications and other information
contained in this document without prior notice. The reader should in all cases consult Cabletron
Systems to determine whether any such changes have been made.
The hardware, firmware, or software described in this manual is subject to change without notice.
IN NO EVENT SHALL CABLETRON SYSTEMS BE LIABLE FOR ANY INCIDENTAL, INDIRECT,
SPECIAL, OR CONSEQUENTIAL DAMAGES WHATSOEVER (INCLUDING BUT NOT LIMITED
TO LOST PROFITS) ARISING OUT OF OR RELATED TO THIS MANUAL OR THE INFORMATION
CONTAINED IN IT, EVEN IF CABLETRON SYSTEMS HAS BEEN ADVISED OF, KNOWN, OR
SHOULD HAVE KNOWN, THE POSSIBILITY OF SUCH DAMAGES.
Copyright
Printed in the United States of America.
Order Number: 9031706-01 March 1996
Cabletron Systems, Inc.
P.O. Box 5005
Rochester, NH 03866-5005
The purpose of this Networking Guide is to provide the customers and strategic
partners of Cabletron Systems with information which allows them to configure
and expand their own networks. As it is impossible to foresee every possible
situation that may arise when a new network must be created or an existing one
expanded, this guide deals with several of the most common networking
situations.
Chapter 1
If you are unfamiliar with the basics of the Ethernet, Token Ring, and Fiber
Distributed Data Interface (FDDI) networking technologies, read the chapters in
order. Pay particular attention to Chapters 3 through 7. These chapters should
provide you with the basic information necessary to generate a relatively
straightforward network design.
If you have experience with the design or operation of Cabletron networking
products, you may wish to refer mainly to the chapters dealing with the
expansion of existing networks, Chapters 8 through 10.
Organization of Document
In the interests of making this document accessible to as many customers of
differing levels of experience as possible, this Networking Guide begins with a
discussion of the various reasons for networking and a short overview of Local
Area Networks (LANs). Following this brief overview, a series of short,
introductory level training documents is provided. These documents provide
general information on Ethernet, Token Ring and Fiber Distributed Data Interface
networking, including examples of needs analysis and initial network designs
utilizing Cabletron equipment. A short treatment of other networking
technologies follows these individual subsections.
1-1
Introduction
Following the discussions of the major networking technologies supported, this
guide shows how networks, based on the examples from the training sections, can
be expanded.
The remainder of this guide contains brief descriptions of Cabletron Systems
modular chassis products, charts and tables which supply much of the
information that the network design process requires, and an extensive glossary
of the terms used within this guide and in other Cabletron Systems publications.
The following summarizes the organization of this manual:
Chapter 1, Introduction, discusses the use and contents of this guide.
Chapter 2, Overview of Networking, explains the fundamentals of Local
Area Networks (LANs), including the reasons to utilize a network, and
discussions of factors such as standards-compliance and interoperability.
Chapter 3, Technology Basics, provides some introductory training into the
LAN technologies which are treated in this Networking Guide.
Chapter 4, Network Design, discusses the procedures and steps involved in
planning out a network, including the selection of a LAN technology and its
organization.
Chapter 5, Ethernet, offers training in greater depth for the Ethernet LAN
technology. This training includes the creation of example network
configurations based on the concepts introduced.
Chapter 6, Token Ring, provides training and configuration instruction for
the Token Ring LAN technology, including example configurations.
Chapter 7, FDDI, is a training chapter which details the operation of the Fiber
Distributed Data Interface (FDDI) technology and the creation of FDDI
networks using Cabletron products.
Chapter 8, Expansion - Ethernet, shows how an existing Ethernet network
can be expanded to include new users or capabilities.
Chapter 9, Expansion - Token Ring, provides instructions and guidelines for
expanding existing Cabletron Token Ring network configurations.
Chapter 10, Expansion - FDDI, describes the means by which FDDI
configurations which use Cabletron products may be expanded to include
new users or stations.
Chapter 11, Product Descriptions, provides short descriptions of many
Cabletron products referred to in this Networking Guide.
Following Chapter 11, Appendix A, Charts & Tables, provides
quickly-accessible tables and flowcharts for network design.
Following Appendix A, the Cabletron Systems Glossary of Terms may be
found.
1-2Organization of Document
Conventions of This Document
Warnings and Notifications
Introduction
NOTE
CAUTION
TIP
Note symbol. Used to provide additional information
concerning subsequent steps or actions that enhance the
operator’s knowledge of the step or action.
Caution symbol. Used to caution against an action that could
result in damage to equipment or poor equipment performance.
!
Tip symbol. Used to convey helpful hints concerning
procedures or actions which would assist the operator in
performing the task in a more timely manner in the future.
Warning symbol. Used to warn against an action that could
result in personal injury or death and equipment damage.
Formats and Measures
Figures throughout the document are identified by chapter and illustration
number. Many figures contain small numbers at the lower right-hand corner of
the illustration. These are Cabletron Systems document control numbers and are
not essential to understanding of the document.
When measurements are given in the text, they will be presented in both metric
and U.S. Customary units. The metric unit will precede the U.S. Customary unit,
and the latter will be contained in parentheses.
References to chapters or sections within this document will be printed in
boldface type.
References to other publications or documents will be printed in italic type.
Conventions of This Document1-3
Introduction
Additional Assistance
This publication describes many possible network configurations and designs.
Due to the nearly limitless possibilities involved in network design, there are
some aspects of the design process which are not addressed in this guide. If you
have any doubts about your configuration or expansion plans, Cabletron Systems
maintains a staff of network design personnel and a sizable team of
highly-trained cabling and hardware installation technicians. The services of the
Networking Services group are available to customers at any time. If you are
interested in obtaining design assistance or a network installation plan from the
Networking Services group, contact your Cabletron Systems sales representative.
In addition to the availability of Networking Services, The Cabletron Systems
Technical Support department is available to answer customer questions
regarding existing Cabletron Systems networks or planned expansion issues.
Contact Cabletron Systems at (603) 335-9400 to reach the Technical Support
department with any specific product-related questions you may have.
Associated Documentation
The following publications may be of assistance to you in the design process.
Several of these documents treat concepts raised in this Networking Guide in
greater detail than they are presented here.
•The Cabletron Systems Product Catalog
1-4Additional Assistance
Chapter 2
Overview of Networking
This chapter introduces and discusses several basic concepts and definitions essential to the
understanding of local area networking.
Discussion of Networking
Why Network?
In this day and age, all companies and agencies have two resources in common,
information and ability. No matter what a company may produce, market, offer or
observe, the final result is one that comes from a combination of ability and
information. Every company with more than one employee is in the business of
sharing information abilities. Information and ability may take many forms: stock
reports and market prediction; manufacturing processes and skilled quality
assurance; accounting information and efficiency examination.
Information is naturally separated from ability. It is the nature of information to
accumulate beyond the point that every person has all the information required to
perform productively. This separation is a factor that has been part of the business
world for centuries. The rise of printing, a postal service, and the telephone can be
viewed as ways that businesses and agencies have created and adopted means of
providing information to those with ability.
While the separation of these factors has always existed and will always exist, the
limiting factor for businesses is not the presence of the separation, but its
magnitude. The more difficult it is to bridge the gap between information and
expertise, the less efficiently both factors are used.
A Local Area Network (LAN) allows for the rapid and direct sharing of critical
information. This sharing enables employees to act more rapidly and with more
complete access to information and resources than may have been possible with a
system of filing cabinets and interoffice mail.
2-1
Overview of Networking
The basis of the LAN is sharing. The LAN allows users to transfer information
and completed documents without the overhead and delay introduced by
hardcopy information. In addition, the LAN increases the utility of expensive
resources such as printers, disk arrays, and plotters. For example, a high-speed
printer on every desktop is an expensive and wasteful proposition, but allowing
20 users to share access to one high-speed printer reduces the overall cost of each
document printed.
As very few users create things for only their own use, the LAN allows employees
to discover means to speed the process of work or increase its efficiency. For
example, a document that was once developed, printed, carried to the Order
Entry department, signed, photocopied, sent to the Records department, updated,
and filed can now be printed in all three locations at once, freeing up each
department to perform the tasks it is intended to.
If a LAN is used on a scale that encompasses the entirety of a facility, company, or
corporation, the benefits can be enormous. The nearly instantaneous sharing of
information between several worldwide sites greatly improves the consistency of
company documents and products, provides for the rapid integration of new
policies, and supplies a system for seamless worldwide collaboration on projects.
By reducing the delay inherent in the operations of business, a LAN increases
productivity.
By providing users, management, sales, and production alike, with rapid and
monitored access to the information base on which a corporation is built, a
network empowers employees on a company-wide scale, giving them a chance to
increase their own abilities and use their talents more fully in the corporation. The
LAN is a means of bridging the chasm between information and expertise,
enabling the flow of essential information between workers, departments, offices,
and corporate partners.
The LAN is a means of bringing things together: information and ability,
customers and producers, employees and equipment. In an age where
combination leads to security and strength for corporations, streamlining the
combinations of information and ability helps erase the borders that have
traditionally slowed the business process. By reducing the overhead related in
doing business, a LAN allows your current employees to do more, improving
efficiency and effectiveness to attain greater levels of productivity.
2-2Discussion of Networking
What Is a Network?
Simply put, a Local Area Network, or LAN, is a number of related computers and
electronic devices which share information over a transmission media. This can
be as simple as a series of electronic cash registers which send updates of
products sold during the course of the day to an inventory computer or as
complex as a network spanning an entire corporate facility or University campus,
providing high-powered communication services for hundreds of applications
and the swapping of thousands of files each day.
The Classification of Networks
While all networks are different, they all have a number of common defining
characteristics which serve to illustrate the type of network being discussed or
examined. The most important characteristics for the purposes of this guide are
topology, technology, media, and devices.
For the purposes of explanation, this chapter of the Networking Guide uses one
cohesive metaphor to describe the portions of a network, the “meeting
metaphor.” In the sections which follow, the topologies, technologies, and devices
of networks will be viewed as aspects of a business or public meeting. By viewing
the various facets of a network as parts of one common process, we can describe
the distinct concepts as parts of a larger overall system.
Overview of Networking
What Is a Network?2-3
Overview of Networking
Network T opology
The topology of a network refers to its physical layout or “shape.” The topology
characteristic describes how components and cabling are interconnected. Using
the meeting metaphor, the topology of a network can be seen as the
organizational structure of the meeting itself; will the meeting consist of several
committees making reports to each other when necessary? Will pre-determined
representatives speak for the members of their group? Will an intermediary or
moderator determine who has the “floor,” or will the opportunity to speak pass
from participant to participant in a particular order?
Although the growing complexity and scale of networks has caused some
topologies to bleed over into others, the topologies can be useful starting points
for describing the overall layout of a network or network segment. There are a
number of widely used topology descriptions for the most common topologies
(see Figure 2-1).
Tree
Bus
Ring
Figure 2-1. Network Topologies
Star
Hub
1706n01
2-4The Classification of Networks
Bus
Tree
Overview of Networking
The bus topology uses a single common cable or link (coaxial cable, broadcast
radio frequency) to connect the stations of the network to one another. The bus
topology is strictly an Ethernet phenomenon, and is frequently encountered in
existing Ethernet environments. Stations connect to the common media through a
series of taps, located a specified distance from one another along the common
cable, and only one station may successfully transmit onto the common media at
any one time. Bus topologies are noted for their simplicity, but are notoriously
difficult to troubleshoot. In addition, a failure of the bus media itself, due to
disruption or poor configuration, causes the network to cease functioning.
The tree topology arranges links and stations into distinct hierarchies in order to
allow greater control and troubleshooting. In order to function well, networks
using tree topologies must incorporate some form of “traffic control,”
determining when traffic is allowed to travel up and down the branches of the
tree. Similar to a well-defined chain of command, the tree topology shields
disparate network groups from affecting each other.
Ring
The tree topology also facilitates much more straightforward troubleshooting
procedures. The main downfall of the tree topology is its own organization. If
there is a failure on one of the branches of the tree, every branch that forks from
that point of failure becomes unable to communicate with the rest of the network.
The ring topology connects every station on the network to every other station in
the network in a contiguous circle. Most common in the Token Ring and FDDI
network technologies (discussed later), ring topologies rely on well-defined rules
of transmission and reception in order to function. Stations are connected in a
definite series, with information going from one station to the next in a
pre-defined order. Since each station is expecting transmissions from the station
before it and sending transmissions only to the station following it, ring
topologies can be made to incorporate automatic fault location and recovery
procedures.
The Classification of Networks2-5
Overview of Networking
Star
The star topology consists of a number of individual stations which communicate
through a common central point. Similar to the bus topology, star topology
network stations all share a single common interface. In place of a section of cable,
however, the common central point in star topology networks is often a
concentrator device, or “hub.” Each station connects to the hub through its own
physical interface, and many concentrators incorporate their own troubleshooting
and monitoring functions, allowing network managers to determine faulty
stations and remove them from the concentrator without disrupting the
remaining network. Unfortunately, a failure of the concentrator can lead to the
same disabling of the network that can occur in bus topologies.
Hybrid
Any network topology that incorporates elements of two or more of the
previously discussed topologies is a hybrid. For example, a tree that led down to a
series of buses (the ‘leaves’) would be a hybrid called a “tree of buses.” A ring
topology network with a series of concentrators acting as stations on the ring
would be called a “ring of stars.” As networks grow to encompass more and more
of a facility’s needs, topologies tend to hybridize in order to fulfill the individual
needs of workgroups and departments.
Network Technologies
While a topology describes the way a network is physically laid out, the network
technology defines how the devices that make up the network receive and
transmit information, deal with faults and problems, and control the actual
operation of the network. The technology of the network can be seen as the Rules
of Order that will be followed at the meeting. These concrete and binding rules
will determine who may speak, at what time, for how long, to whom, in what
language, and so on. The technology determines how problems are identified and
what methods may be used to resolve them. If arm wrestling is going to be
considered a valid means of breaking a deadlock between two sides in a vote, the
rules of order must clearly state that, as well as provide the rules for arm
wrestling.
There are several commonly-encountered technologies in networking. Among the
most common of the ‘client-server’ (non mainframe-terminals) technologies are
Ethernet, Token Ring, and the Fiber Distributed Data Interface (FDDI). These
network technologies and their operation are individually described in their own
chapters later in this document.
2-6The Classification of Networks
Media
Overview of Networking
The term media has come to mean several different things in today’s English
language. For the purposes of networking, media always refers to the physical
entity that is used for the purposes of transmitting and receiving the impulses
that make up data exchange. While in some networks, radio frequencies and
nationwide telephone service providers are considered to be media, the term
most commonly refers to the physical chunks of cable that connect one network
device to another. In the meeting metaphor, media is simply the communications
system that is to be used, be it speech, writing, or tin-can telephone.
While media can conceivably be any system of physically transmitting the
impulses indicating the zeroes and ones of electronic data, there are a number of
media common to most networks. Unshielded Twisted Pair cabling, or UTP, is a
commonly-used media in networks. UTP is small-gauge, inexpensive cabling
made up of a series of copper strands which are twisted together inside the
insulating jacket, in the same manner as many telephone cables are. Several
Ethernet networks use telephone-grade UTP as their primary media. Other
common media include coaxial cable, fiber optics (both Light Emitting Diode and
Laser driven), Shielded Twisted Pair (STP), and specific technology-related cable
types such as the Attachment Unit Interface (AUI) cable defined in the Ethernet
technology specification.
It is important to note that some media are not supported by some technologies.
For example; neither the Token Ring nor FDDI standards support the use of
coaxial cables. Each technology will define what media it supports, and to what
extent. Some technologies are very demanding of certain types of media, and all
technologies place limitations on the extent to which a particular media may be
used. These limitations, for the purposes of designing networks, are discussed in
greater detail within the chapters providing individual descriptions of the major
networking technologies, as well as in the Charts and Tables section at the end of
this Networking Guide.
This guide does not intend to describe in detail the procedures for cable
installation and testing. Characteristic properties of the individual media and any
special installation-related information that should be kept in mind during
planning will be presented. This information should be used to assist the selection
of a media based on the needs of a specific location to be networked.
To provide a rough footing, a brief description of each of the cabling media to be
referred to within this Networking Guide follows.
Do not run electrically conductive cabling (cable media with
metal strands or shielding) between buildings. Exposed
conductive cabling is susceptible to lightning strikes.
The Classification of Networks2-7
Overview of Networking
Thick Coaxial Cable
Thick coaxial cable (also known as thick Ethernet cable, “thicknet”, or 10BASE5
cable) is a cable constructed with a single solid core, which carries the network
signals, and a series of layers of shielding and insulator material. The shielding of
thick coaxial cable consists of four stages. The outermost shield is a braided metal
screen. Working inward, the second stage shield is usually a metal foil, but in
some brands of coaxial cable may be made up of a second screen. The third stage
consists of a second braided shield followed by the fourth stage, a second foil
shield. The various shields are separated by non-conductive insulator materials.
Foil Shield
Solid Core
Outer
Jacket
Insulator
Braided Shield
1706n02
Figure 2-2. Thick Coaxial Cable Cross-Section
Thick coaxial cable is a media used exclusively in Ethernet installations,
commonly as a backbone media. Transceivers (devices designed to TRANSmit
and reCIEVE network signals) are connected to the cable at specified distances
from one another, and standard transceiver (AUI) cables connect these
transceivers to the network devices.
Due to the extensive shielding, thick coaxial cable is highly resistant to electrical
interference by outside sources such as lighting, machinery, etc. Because of the
bulkiness and limited flexibility of the cable (typically 0.405 inch in diameter or
thicker), thick coaxial cable is primarily used as a backbone media and is placed in
cable runways or laid above ceiling tiles to keep it out of the way. The 10BASE5
standard, which standardizes minimum and maximum characteristics for
Ethernet networks using thick coaxial cable, specifies a maximum cable length of
500meters (1,640 ft).
Thick coaxial cable is designed to be accessed as a shared media. Multiple
transceivers can be attached to the thick coaxial cable at multiple points along the
cable itself.
2-8The Classification of Networks
Thin Coaxial Cable
Overview of Networking
Thin coaxial cable (also known as thin Ethernet cable, “thinnet,” “cheapernet,”
RG58 A/U, BNC or 10BASE2 cable) is a less shielded, and thus less expensive,
type of coaxial cabling. Also used exclusively for Ethernet networks, thin coaxial
cable is smaller, lighter, and more flexible than thick coaxial cable. The cable itself
resembles (but is not identical to) television coaxial cable.
Thin coaxial cable is made up of a single outer copper shield, which may be
braided or foil, a layer beneath that of non-conductive dielectric material, and a
stranded center conductor. This shielding makes thin coaxial cable resistant to
electromagnetic interference as the shielding of thick coaxial cable does, but does
not provide the same extent of protection. Thin coaxial cable can be run to a
maximum length of 185 meters (606.7 ft.).
As with thick coaxial cable, thin coaxial cable allows multiple devices to connect
to a single cable. Up to 30 transceivers may be connected to a single length of thin
coaxial cable, spaced a minimum of 0.5 meter from one another. Connections to
the cable are typically made using T-connectors, which provide taps for
additional runs of coaxial cable to workstations or network devices. T-connectors,
as shown in Figure 2-3, below, provide three RG58 connections, two of which
attach to RG58 female connectors on the cable itself and one of which is used for
connection to the male RG58 connection of a transceiver or Desktop Network
Interface Card on a workstation.
Front
Side
Bottom
1706n03
Figure 2-3. Thin Coaxial Cable T-Connector
The Classification of Networks2-9
Overview of Networking
Attachment Unit Interface (AUI)
Attachment Unit Interface cable (referred to hereafter as AUI cable, but which
may also be called office transceiver cable or standard transceiver cable in other
publications) is a shielded, multistranded cable that is used to connect Ethernet
network devices to Ethernet transceivers. AUI cable should be used for no other
purpose.
AUI cable is made up of four individually shielded pairs of wire surrounded by
an overall cable shielding sheath. The gauge of the internal cables determines the
thickness and relative flexibility of the AUI cable. Heavy-gauge AUI cable
(containing pairs of wire of 20 or 22 AWG wire) is capable of reaching a maximum
distance of 50 meters (164 ft.) between transceivers and the network device, but is
thick, and somewhat inflexible. The lighter-gauge AUI cable (consisting of 28
AWG wire) is thinner and much more flexible, but can only be run to a maximum
distance of 16.5 meters (54.1 ft.).
Unshielded Twisted Pair (UTP)
Unshielded Twisted Pair cabling (referred to here as UTP, but also may be termed
copper wire, 10BASE-T wire, Category 3, 4, or 5 Ethernet wire, telephone cable, or
twisted pair without shielded or unshielded qualifier) is commonly made up of
two or, ideally, four pairs of 22, 24 or 26 AWG unshielded copper solid or stranded
wires. These pairs of wires are twisted together throughout the length of the
cable. The twisting of associated pairs helps to reduce the interference of the other
strands of wire throughout the cable. UTP cable used in network installations is
the same type of cable used in the installation of telephone lines within buildings.
Tx+
Tx-
RxRx+
1706n04
Figure 2-4. UTP Pair Association
As UTP cabling already exists in many facilities, and as it is inexpensive, available
in bulk and easy to install, the use of twisted pair cabling is often a significant
savings over the use of other media in a networking installation. As UTP cabling
is an accepted media in all common network technologies, it is considered a
somewhat ‘future-proof’ media. In opposition to a length of thin coaxial cable,
which can only be used for Ethernet communications between devices, UTP
cabling could initially be used for Ethernet, then be used to support Token Ring
and FDDI network equipment as the network grew.
2-10The Classification of Networks
UTP cabling is differentiated by the quality of the cable. UTP is divided into
Categories, which indicate the relative quality of the materials used and the
processes used to manufacture the cables. The categories used in LANs range
from Category 3 to Category 5, with Category 5 being the highest quality.
Shielded Twisted Pair (STP)
Shielded Twisted Pair cabling (referred to in this document as STP, but also seen
as “IBM-type” cable or “shielded copper”) is a cable type which is constructed in
much the same fashion as UTP cabling (see Figure 2-4) but incorporates more
elaborate shielding methods. These cables are most commonly used in Token
Ring networks.
As with UTP cable, STP cable consists of two or more pairs of wire. Each wire is
shielded with a layer of insulation, twisted together with a related wire, then
bundled with the other pairs and wrapped in a metal foil. The metal foil provides
additional resistance to the effects of external electrical fields produced by
electrical equipment or other cabling.
STP cabling, like UTP cabling, is divided into groups based on fitness for a
particular purpose. Where UTP referred to Categories of cable, STP cabling is
divided into “types.” These types are based on the IBM Cabling System, and are
often labeled “IBM Type 1 STP.” IBM Type 1 cable is usually the highest quality,
incorporating several layers of shielding and made with heavy-gauge wire, while
Types 6 and 9 STP are usually best suited for use as short jumper cables in
low-interference areas.
Overview of Networking
Fiber Optics
Fiber optic cable is a high performance media constructed of glass or plastic
which uses pulses of light as a transmission method. Because fiber optics do not
use electrical charges to pass data, they are free from the possibility of interference
due to proximity to electrical fields. This, combined with the extremely low rate of
signal degradation and dB loss makes fiber optics able to traverse extremely long
distances. The actual maximums are dependant upon the technology being used,
but distances upwards of 2 kilometers (1.2 miles) are not uncommon.
The Classification of Networks2-11
Overview of Networking
Fiber optic cabling is made up of a glass strand, the core, which allows for the
easy transmission of light; the cladding, a glass layer around the core which helps
keep the light within the core; and a plastic buffer which protects the cable.
Cladding
There are two basic types of fiber optics: multimode and single mode. The names
come from the types of light used in the transmission process.
Multimode Fiber Optics
Multimode fiber optic cabling uses inexpensive Light Emitting Diodes (LEDs) to
produce the signals that travel through the core of the cable. Due to the nature of
the LED, the signal produced is made up of a number of differing wavelengths of
light, fired outward from the center of the LED. Not all the rays of light enter the
fiber, and those that do often do so at an angle, which reduces the amount of
distance the signal can effectively cover.
Single Mode Fiber Optics
Single mode fiber optics, driven by the concentrated beams of light which can
only be produced by lasers, are constructed in the same fashion as multimode
fiber optics, but may use a narrower core strand. The use of lasers to drive the
signal greatly increases the expense involved in producing single mode fiber optic
devices as opposed to multimode fiber optic devices. The expense involved in
single mode fiber optic equipment often causes it to be reserved for applications
requiring its ability to traverse much greater distances than multimode fiber
optics.
Transmissive Core
PVC Buffer (Jacketing)
Figure 2-5. Fiber Optic Cable Cross-Section
1706n05
Single mode fiber optics and their hardware can transmit and receive signals at
distances of 3 kilometers (1.8 miles) or more. As such, it is often best reserved for
extremely long-distance LAN communications.
NOTE
2-12The Classification of Networks
While the media is capable of supporting these distances, the
technology being used may not be able to function with a link of
that distance. Be sure to remain within the maximum distances and
limitations imposed on any network technology by the appropriate
IEEE or ANSI standard.
Interoperability and Standards Bodies
Interoperability, the Ideal of Networking
Ideally, all devices placed on any network should be able to transfer information
in a usable fashion and understandable format to any other station. For some
time, however, this was not always the case. Different companies, even within the
same industry, have different ways of designing, developing, and constructing
their products. Different views of how a network should operate led to radically
different products and methods of networking. These early networking
implementations were specific to one particular vendor, and would often only
work in homogenous environments, where all components used in the network
were produced by that single vendor. This method of networking locked
customers into relying on a single vendor for all of their networking needs,
current and future, which could lead to problems if the network implementation
was unsatisfactory. Ripping out all of your present networking equipment in
order to use the proprietary solution of another vendor can become an extremely
costly proposition.
Overview of Networking
To combat this, the idea of interoperability grew in popularity. Ideally,
interoperability means that the networking devices of Vendor X can
communicate, problem-free, with the networking devices of Vendor Y.
Standards and Compliance
Interoperability requires the following of standards, distinct rules and finite
margins within which network operation and performance must be kept. If a
network does not meet the minimums, or exceeds the maximums of the
networking standard that the industry uses, it is said to be “out of specifications,”
and may not operate at an acceptable level. For example, the Token Ring network
standard specifies the maximum number of stations that may be placed on one
network, or “ring.” If this number of stations is exceeded, the network will suffer
erratic performance and may cease to function correctly. By providing a single
definition for the maximum number of stations per ring, the Token Ring standard
allows devices from multiple vendors to operate in the same fashion.
Standards are defined by committee, through the operation of standards
institutes. Standards institutes are made up of personnel from several firms in the
industry who volunteer their time and effort. These volunteers work to compose
and ratify an acceptable standard, which, when accepted and ratified, will need to
at least be met by any product that refers to itself as “standards-compliant.”
Products that are not standards-compliant may cause or experience
interoperability problems when operating in a standards-based network. Of
course, even in a fully standards-based network, there may still be problems.
Most vendors in the industry, realizing the importance of providing a flexible and
open network to all customers, seek to eliminate any interoperability problems
they notice.
Interoperability and Standards Bodies2-13
Overview of Networking
The most common Local Area Networking technologies (Ethernet, Token Ring,
and FDDI) have standards ratified and in place for their operation and
configuration. ATM, still in the draft stages in some aspects, is operating under a
working interim standard, which is intended to allow ATM equipment to be
produced which will be compatible with future ATM standards. The standards
bodies that this document is concerned with and the standards they oversee are
listed below:
Standards CommitteeTechnologyStandard Code
Table 2-1. Networking Standards Bodies
Institute of Electrical and
Electronic Engineers (IEEE)
American National Standards
Institute
ATM ForumAsynchronous Transfer ModeUNI V3.0
EthernetIEEE 802.3
Token Ring IEEE 802.5
Fiber Distributed Data Interface (FDDI)ANSI X3T9.5
The OSI Model, Basis of Standards
The International Organization for Standardization (ISO) Open Systems
Interconnect (OSI) Model provides a framework for the development of system
connection standards by defining a consistent hierarchy of rules. The OSI model
defines where the needed tasks of system interconnection are performed but not
how they are performed. How tasks are performed on a given layer is determined
by the protocols, or rules, written for that particular network based on the OSI
model. The layers may be implemented in hardware, software, or both. Each layer
in a network based on the OSI model performs specific types of functions
required for proper system interconnection.
2-14Interoperability and Standards Bodies
Overview of Networking
There are seven layers in the OSI Model (see Figure 2-6). They begin with the
Physical Layer and end with the Application Layer. Each layer provides services
to the layer above it. As the seventh layer is the ‘topmost’ layer, it servers the user
directly, and is considered the top of the OSI model.
Application
7.
Presentation
6.
Session
5.
Transport
4.
Network
3.
Data Link
2.
Physical
1.
1706n06
Figure 2-6. OSI Model
Layer Seven: Application
The Application Layer is the user’s interface with the network. This layer directly
interacts with user application programs to provide access to the network. All
other layers exist to support the requirements of the Application layer. The
Application layer is usually involved with network-oriented end-user tasks such
as electronic mail, network file transfers, and collaborative document preparation.
Layer Six: Presentation
The Presentation Layer deals with data translation and code conversion between
devices with different data formats (i.e. ASCII to EBCDIC). This layer also handles
translation between differing device types and file formats, as well as data
encryption and decryption services. In the transmit mode, the presentation layer
passes information from the application layer to the Session layer after it has
appropriately modified or converted the data. In the receive mode, the
Presentation layer works in reverse passing information from the Session layer to
the Application layer.
Layer Five: Session
The Session layer manages the communications dialogue between two
communicating devices. The Session layer establishes rules for initiating and
terminating communications between devices and can provide error recovery.
Interoperability and Standards Bodies2-15
Overview of Networking
Layer Four: Transport
The Transport layer deals with the optimization of data transfer from source to
destination by managing network data flow and implementing the quality of
service requested by the Session layer. The Transport layer determines the packet
size requirements for transmission based on the amount of data to be sent and the
maximum packet size allowed by the network architecture. If the data to be sent is
larger than the maximum packet size allowed on the network, the Transport layer
is responsible for dividing the data into acceptable sizes and sequencing each
packet for transmission.
When receiving data from the Network layer, the Transport layer ensures that the
data is received in order and checks for duplicate and lost packets. If data is
received out of order, the Transport layer correctly orders the data and passes the
data up to the Session layer for additional processing.
Layer Three: Network
The Network layer accepts data from the Transport layer and adds the
appropriate information to the packet to provide proper network routing and
some level of error control. Data is formatted by this layer for the appropriate
communications method, such as IP, IPX, or X.25.
Layer Two: Data Link
The Data Link layer is involved with transmission, error detection, and flow
control of the data. The major function of the Data Link layer is to act as a shield
for the higher layers of the OSI model, controlling the actual processes of
transmission and reception. Error detection and control of the Physical layer are
the primary functions of this layer, ensuring that data received by the upper
layers is error-free. For purposes of understanding networking, it is useful to
divide the Data Link layer into two sub-layers; the Logical Link Control layer and
the Media Access Control layer (see Figure 2-7).
Application
7.
Presentation
6.
Session
5.
Transport
4.
Network
3.
Data Link
2.
Physical
1.
Figure 2-7. Data Link Layer
Logical Link Control
Media Access Control
1706n07
2-16Interoperability and Standards Bodies
Loading...
+ 238 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.