2. OUTLINE
ā¢ Ethernet
ā¢ Performance considerations
ā¢ Segmentation
ā¢ Network operating systems or Ethernets
ā¢ Token ring
ā¢ Apple talk and arcnet
3. Network Architecture - Protocols
ā¢ Physical: Actual signal transmission
ā¢ Data-Link: Framing / Error Detection
ā¢ Network: Routing / Addressing
ā¢ Transport: Congestion / Flow Control
ā¢ Application: Specific to user needs
5. Data Link Layer - Ethernet
ā¢ Invented in 1973 @ Xerox. (IEEE 802.3)
ā¢ Originally a LAN technology ā extended to MAN / WAN.
ā¢ Same frame format, different wiring schemes, data rates across generations.
ā¢ Most common version (10BaseT) ā 1990.
6. Ethernet Generations
ā¢ Original Ethernet:
ā¢ Coaxial cable (10Base5)
ā¢ Thicknet.
ā¢ Next Generation:
ā¢ Thin coax cable (10Base2)
ā¢ Thinnet.
ā¢ Modern Ethernet:
ā¢ Twisted pair ethernet
(10BaseT)
ā¢ Uses hub: physical star but
logical bus.
7. Ethernet Components
ā¢ NIC ā Network Interface Card
ā¢ Integrated Tx/Rx ā direct interface to medium.
ā¢ MAU ā Media Attachment Unit
ā¢ Attaches network interface to the medium (integrated into NIC).
ā¢ AUI ā Attachment Unit Interface
ā¢ Decouple physical layer -reuse MAC design with different media.
ā¢ MII ā Media Independent Interface
ā¢ Like AUI for gigabit / faster ethernets.
8. Ethernet Addressing
ā¢ 48-bit address
ā¢ Address assigned when NIC card is manufactured.
ā¢ Packets can be sent to
ā¢ Single address ā Unicast
ā¢ All stations on network ā Broadcast (address = all 1s.)
ā¢ Subset of stations ā Multicast
ā¢ Broadcast (address = all 1s.)
ā¢ All receivers accepts unicast / broadcats.
ā¢ Half addresses reserved for multicast (247)
ā¢ NIC can accepts zero or more multicasts.
9. Ethernet Frame
Sender adds:
ā¢ Senders address is source
ā¢ Recipients address in destination
ā¢ Type of data in frame type
ā¢ Error check data (CRC)
Receiver NIC:
ā¢ Gets transmitted frame.
ā¢ Examines address and either accepts or rejects.
ā¢ Passes frame to system software.
10. Media Access Control - MAC
ā¢ Shared medium ā stations take turns at sharing the medium.
ā¢ Media access control ensures fairness.
CSMA / CD
ā¢ Carrier Sense: wait till medium is idle before sending frame.
ā¢ Multiple Access: multiple computers use the same shared media.
Each uses same access algorithm.
ā¢ Collision Detection: Listen to medium ā detect if another stationās
signal interferes ā back off and try again later.
11. CSMA / CD
ā¢ If collision occurs: wait a random time t1 - 0< t1<d.
ā¢ D depends on transmission speed ā time for frame width or 512 bits.
ā¢ If second collision occurs, wait a random time t2 - 0< t2<2d.
ā¢ Double range for each succesive collision.
ā¢ Exponential backoff
ā¢ No acknowledgement like TCP.
ā¢ CSMA/CA used in wireless networks where not all stations receive message.
ā¢ Both sides send small message followed by data:
ā¢ X is about to send to Y
ā¢ Y is about to receive from X
ā¢ Data frame sent from X to Y.
12. Recent Developments
ā¢ 100Base-FX
ā¢ LED light source / MMF / 2 km max distance.
ā¢ Modal dispersion ā limited bandwidth
ā¢ 100Base-SX (IEEE 802.3z)
ā¢ Short wavelength laser (850 nm)
ā¢ Max distance = 5 km.
ā¢ 100Base-LX
ā¢ Long wavelength laser (1310 nm)
ā¢ Max distance = 5 km.
13. Beyond Gigabit Ethernet
ā¢ 10 Gb/s Ethernet
ā¢ No CSMS/CD, same frame format.
ā¢ Applications
ā¢ Upgrade LANs / Backbone.
ā¢ MAN applications.
14. Segmentation
ā¢ Segmentation divides a computer network into smaller parts. The
purpose is to improve network performance and security.
ā¢ Other terms that often mean the same thing are network
segregation, network partitioning, and network isolation.
15. How does segmentation work?
ā¢ Segmentation works by controlling how traffic flows among the parts.
ā¢ You could choose to stop all traffic in one part from reaching another,
or you can limit the flow by traffic type, source, destination, and
many other options.
ā¢ How you decide to segment your network is called a segmentation
policy.
16. What is an example of segmentation?
ā¢ Imagine a large bank with several branch offices.
ā¢ The bank's security policy restricts branch employees from accessing
its financial reporting system.
ā¢ Network segmentation can enforce the security policy by preventing
all branch traffic from reaching the financial system.
ā¢ And by reducing overall network traffic, the financial system will work
better for the financial analysts who use it.
17. What enforces segmentation policy?
ā¢ Some traditional technologies for segmentation included:
ā¢ internal firewalls, and Access Control List (ACL) and Virtual Local Area
Network (VLAN) configurations on networking equipment. However, these
approaches are costly and difficult.
ā¢ Today, software-defined access technology simplifies segmentation by
grouping and tagging network traffic.
ā¢ It then uses traffic tags to enforce segmentation policy directly on the
network equipment, yet without the complexity of traditional approaches.
18. Firewall segmentation
ā¢ Firewalls are deployed inside a network or data center to create
internal zones to segment functional areas from each other in order
to limit attack surfaces, thereby preventing threats from spreading
beyond a zone.
19. Segmentation with SDN
ā¢ Software-defined networking (SDN) is relied on for greater network
automation and programmability through centralized controllers that
are abstracted from the physical hardware of the network.
21. Micro-segmentationā¦
ā¢ Micro-segmentation creates secure zones across cloud and data
center environments to isolate application workloads from one
another and secure them individually.
ā¢ Micro-segmentation, firewall policies limit east-west traffic between
workloads based on a zero-trust security approach to reduce attack
surfaces, prevent the lateral movement of threats to contain
breaches, and strengthen regulatory compliance.
ā¢ Micro-segmentation is also referred to as application segmentation or
east-west segmentation in a multicloud data center.
22. Benefits of network segmentation
ā¢ Improve operational performance
ā¢ Segmentation reduces network congestion. For example, a hospital's medical devices can be
segmented from its visitor network so that medical devices are unaffected by web browsing.
ā¢ Limit cyberattack damage
ā¢ Segmentation improves cybersecurity by limiting how far an attack can spread. For example,
segmentation keeps a malware outbreak in one section from affecting systems in another.
ā¢ Protect vulnerable devices
ā¢ Segmentation can stop harmful traffic from reaching devices that are unable to protect
themselves from attack. For example, a hospital's connected infusion pumps may not be
designed with advanced security defences. Network segmentation can stop harmful Internet
traffic from ever reaching them.
ā¢ Reduce the scope of compliance
ā¢ Segmentation reduces the costs associated with regulatory compliance by limiting the
number of in-scope systems. For example, segmentation separates the systems that process
payments from those that don't. That way, the expensive compliance requirements and audit
processes apply only to the in-scope systems, not the entire network.
25. Overview
ā¢ A network operating system (NOS) provides services to
clients over a network.
ā¢ Both the client/server and peer-to-peer networking
models use network operating systems
ā¢ NOSs must be able to handle typical network duties.
25
26. Major Tools of NOS
1. Providing access to remote printers, managing which
users are using which printers when, managing how
print jobs are queued, and recognizing when devices
aren't available to the network
2. Enabling and managing access to files on remote
systems, and determining who can access whatāand
who can't
3. Granting access to remote applications and resources,
such as the Internet, and making those resources seem
like local resources to the user (the network is ideally
transparent to the user)
26
27. Major Tools of NOS
3. Providing routing services, including support for major
networking protocols, so that the operating system
knows what data to send where
4. Monitoring the system and security, so as to provide
proper security against viruses, hackers, and data
corruption.
5. Providing basic network administration utilities (such as
SNMP, or Simple Network Management Protocol),
enabling an administrator to perform tasks involving
managing network resources and users.
27
28. UNIX / Linux
ā¢ UNIX, created originally by Bell Labs (under AT and T), is a
powerful server operating system that can be used in
peer-to-peer or client/server networks.
ā¢ UNIX was the first operating system written in the C
programming language.
ā¢ Linux was first developed in the late 1980s by a young
student at the University of Helsinki in Finland
named Linus Torvalds.
28
29. UNIX / Linux Features
ā¢ UNIX (and Linux by extension) systems offer the
following features:
ā¢ Fully protected multitasking: This means that UNIX can
easily switch between tasks without the operating system
crashing, because all UNIX processes are separate from
those of the operating system. Even if an application
crashes, unless it somehow manages to take down the X
Windows system with it (which does happen), the
operating system just keeps right on humming.
29
30. UNIX / Linux Features
ā¢ High performance and stability : Many servers running UNIX or
Linux have run for years without crashing once. The multitasking
capabilities of UNIX, along with the rapid rate at which the operating
system matures (especially with Linux, which is free and can be
changed by anyone), make UNIX or Linux a powerful solution,
especially for server systems.
ā¢ Multiuser capabilities : True multiuser systems enable different
users to be logged in to the same system simultaneously. In UNIX
and Linux, not only can a user log in to the same system at the same
time as other users, that user can log in multiple times on the same
system as the same user without the operating system batting an
eyelash (such things are often necessary when administrating a
network, particularly when managing users).
ā¢
30
31. UNIX / Linux Features
ā¢ Tons of high-quality software : From Apache Server (a Web server thatās
used on a whopping 6 in 10 major Web servers on the Internet) to the long-
awaited Mozilla.org Mozilla 1.0 open source Web browser/e-mail software
(Mozilla is an open source version of the venerated Netscape Communicator)
to the powerful free Gimp graphics manipulation software, Linux is packed
with tons of free, high-quality software. The trick is that, with UNIX/Linux,
you give up compatibility with commercial software thatās available only for
Windows and/or Macintosh, currently.
ā¢ Easy customization : While other operating systems seem to offer less and
less choice to the user about which applications to install with the operating
system (Windows XP is this way), UNIX and especially Linux are the exact
counterpoint to that model. With UNIX or Linux, you can actually customize
your operating system kernel, stripping it down to just drivers and
networking or installing everything possible.
31
32. UNIX / Linux Features
ā¢ Modular architecture : The modular architecture of UNIX (and especially Linux) is
directly responsible for how customizable UNIX is. Modular really means just what
it sounds like: The operating system is built with a kernel that attaches modules to
itself based on what the user needs.
ā¢ POSIX compliance: With a free operating system like UNIX, the different
distributions (or flavors) of UNIX quickly became difficult to manage. Currently,
hundreds of different implementations of UNIX are available. To enable
programmers to have some idea of how to code their software such that it would
run on any version of UNIX, the Institute of Electrical and Electronics Engineers,
Inc. (IEEE) defined the Portable Operating System Interface (POSIX).
ā¢ Use of TCP/IP as the standard protocol stack: UNIX overwhelmingly uses TCP/IP as
the protocol stack of choice. If you consider that the vast majority of the servers
that help make up the Internet are UNIX computers of one form or another, you
start to get the idea why TCP/IP is so popular.
ā¢
32
33. UNIX / Linux Features
ā¢ A shell interface: All versions of UNIX include a shell interface of some sort. If you
have ever seen your computer use a completely black screen with white words
written on it, thatās a shell interface. You simply type in commands at the prompt
and hit Enter to execute those commands. The hard part in using these interfaces
is simply the effort it takes to learn all of those rather cryptic commands. Making
life even more difficult, UNIX is ultimately customizable and can use different
shells. The bash shell (likely the most popular shell in use today) and the tcsh
shell, for example, have different commands for the same action.
ā¢ A graphical user interface: Although most versions of UNIX (such as Red Hat
Linux) include a graphical user interface (GUI) these days, this has not always been
the case. Historically, UNIX has been derided for its cryptic interface, and the
advent of the GUI into popular UNIX systems was a direct result of this. Popular
UNIX GUIs include KDE and GNOME. KDE is mostly used with Linux, but GNOME
has versions for the Sun Solaris operating system, and therefore crosses the
border from Linux into UNIX proper.
33
34. UNIX / Linux Features
ā¢ Support for dumb terminals:
ā¢ Traditionally, UNIX was used for dumb terminals, and just about all versions of
UNIX still include this capability. The traditional dumb terminal model involves one
central UNIX server that is used by remote terminals to execute applications.
Basically, a user logs in to a UNIX system via Telnet or some other remote
connectivity application and uses UNIX commands to tell the remote system what
functions to perform. In this way, users can download and check e-mail via a text-
based e-mail client such as Pine. The dumb terminal in this form isnāt used much
anymore; Web browsers are definitely more than just dumb terminalsā and Web
browsers are now the clients most often seen by UNIX servers (at least those that
make up the Internet). However, wireless devices such as cell phones and mobile
Internet e-mail clients such as AOLās Mobile Communicator device are good
examples of modern dumb terminals. The devices have nearly no storage at all,
and donāt carry large e-mail clients on the device; the message is simply
transferred as text from one end to the other.
34
35. UNIX / Linux Features
ā¢ Interoperability
Open source software such as SAMBA is used to provide Windows users with
Server Message Block (SMB) file sharing.
ā¢ Authentication:-Centralized login authentication
ā¢ File and Print Services
Network File System (NFS) is a distributed file system that allows users to access
files and directories located on remote computers and treat those files and
directories as if they were local.
LPR/LPD is the primary UNIX printing protocol used to submit jobs to the printer.
The LPR component initiates commands such as "print waiting jobs," "receive
job," and "send queue state," and the LPD component in the print server responds
to them.
ā¢ Security
With most Unix operating systems, the network services can be individually
controlled to increase security.
ā¢
35
36. MAC OS X Server
ā¢ OS X Server, formerly Mac OS X Server, was a
separately sold Unix server operating
system from Apple Inc.
ā¢ It is architecturally identical to its desktop
counterpart OS Xāwith additional server programs
and management and administration tools.
36
37. MAC OS X Server
ā¢ Client Support
TCP/IP file sharing with Macintosh clients using
Network File System (NFS), and File Transfer Apple
File Protocol 3.0
ā¢ Interoperability
Mac OS X Server uses the Open Source SAMBA to
provide Windows users with Server Message Block
(SMB) file sharing. Network File System (NFS) lets you
make folders available to UNIX and Linux users.
37
38. MAC OS X Server
ā¢ File and Print Services
Mac OS X Server provides support for native Macintosh, Windows, UNIX, and Linux
file sharing. Protocols supported include:
ā¢ Apple file services (AFP 3.0) from any AppleShare client over TCP/IP
ā¢ Windows (SMB/CIFS) file sharing using Samba
ā¢ Network File System (NFS) for UNIX and Linux file access
ā¢ Internet (FTP)
ā¢ Built-in print services can spool files to any PostScript-capable printer over TCP/IP,
AppleTalk, or USB. Macintosh customers can use the LPR support in Print Center or
the Desktop Printer utility to connect to a shared printer. Windows users can use
their native SMB/CIFS protocol to connect to a shared printer.
ā¢ Print services for OS X Server
ā¢ Macintosh and UNIX (LPR/LPD)
ā¢ Windows (SMB/CIFS)
38
39. MAC OS X Server
ā¢ Security
ā¢ Multiple-user architecture and user-level access
privileges.
ā¢ Secure Sockets Layer (SSL) support provides
encrypted and authenticated client/server
communications.
ā¢ Secure Shell (SSH) provides encryption and
authentication for secure remote administration.
ā¢ Kerberos support for centralized login authentication.
39
40. NetWare
ā¢ NetWare is a computer network operating
system developed by Novell, Inc. It initially
used cooperative multitasking to run various services
on a personal computer, using the IPX network
protocol.
ā¢ NetWare has been a great LAN operating system for
years, but only recently (with NetWare 5.x has
NetWare moved beyond the LAN to where it can
easily be a part of larger networks. Until quite
recently, Novell NetWare used to be the single most-
used network operating system (NOS).
40
41. NetWare
ā¢ However, first Windows NT, and Windows 2000 and
Linux, have steadily eaten into the NetWare market
share for network operating systems.
ā¢ Currently, all three operating systems have a roughly
equal share of the network operating system market,
which means that NetWare is still used in at least one-
third of all server systems.
41
42. Netware Feature
ā¢ NetWare offers the following features :
ā¢ Multiprocessor kernel: This feature enables one NetWare
operating system to utilize multiple processors. This
process is called symmetric multiprocessing (SMP).
ā¢ SMP enables processors to share memory and bus paths,
even coordinating the processing of a single application in
parallel.
ā¢ NLMs: Where UNIX uses daemons and Windows uses
services, NetWare uses NetWare Loadable Modules (or
NLMs) to provide services from the server. NLMs are
programs that run in the background on the server to
provide consistent services to the network.
42
43. Netware Feature
ā¢ PCI Hot Plug: This feature enables administrators to
dynamically configure PCI network components while the
system is running. You can replace, upgrade, or add new
cards with the Hot replace, Hot upgrade, and Hot
expansion features, respectively.
ā¢ Client Support
NetWare 5 comes with Novell Client software for three client
platforms: DOS and Windows 3.1x, Windows 95/98, and
Windows NT.
ā¢ Interoperability
You can set the Novell Clients for Windows 95/98 and
Windows NT to work with one of three network protocol
options: IP only, IP and IPX, or IPX only.
43
44. Netware Feature
ā¢ Authentication
Centralized login authentication
ā¢ File and Print Services
File Services NetWare offers two choices of mutually compatible file
services: Novell Storage Services (NSS) and the traditional NetWare File
System. Both kinds of file services let you store, organize, manage, access,
and retrieve data on the network. NSS gathers all unpartitioned free space
that exists on all the hard drives connected to your server, together with
any unused space in NetWare volumes, and places it into a storage pool.
You create NSS volumes from this storage pool during server installation or
later through NWCONFIG. Novell Distributed Print Services (NDPS) is the
default and preferred print system in NetWare. NDPS supports IP-based as
well as IPX-based printing.
ā¢ Security
Novell has support for a public key infrastructure built into NetWare 5 using
a public certificate, developed by RSA Security.
44
45. Windows
ā¢ Directory Services
A directory service is a database of user accounts and
other information that network administrators use to
control access to shared network resources. When users
connect to a network, they have to be authenticated
before they can access network resources. Authentication
is the process of checking the user's credentials (usually a
user name and a password) against the directory. Users
that supply the proper credentials are permitted access
according to the permissions specified by the network
administrator.
ā¢
45
46. Windows
ā¢ Client Support
Windows 3.x, Windows 95, Windows 98, and
Windows NT Workstation 4.0 Windows 2000
Professional, Xp Pro. Vista Ultimate, Vista Business.
ā¢ Interoperability
Windows 2000,2003,2008 Server supports UNIX,
Novell NetWare, Windows NT Server 4.0, and
Macintosh.
46
47. Windows
ā¢ Authentication
Successful user authentication in a Windows 2000,2003,2008
computing environment consists of separate processes:
interactive logon, which confirms the user's identification to
either a domain account or a local computer, and network
authentication, which confirms the user's identification to any
network service that the user attempts to access.
ā¢ Types of authentication
Kerberos V5 is used with either a password or a smart card for
interactive logon. It is also the default method of network
authentication for services.The Kerberos V5 protocol verifies
both the identity of the user and network services Secure
Socket Layer/Transport Layer Security (SSL/TLS) authentication,
is used when a user attempts to access a secure Web server.
47
48. Windows
ā¢ File and Print Services
You can add and maintain printers in Windows server using the
print administration wizard, and you can add file shares using
Active Directory management tools. Windows server also
offers Distributed File Services, which let you combine files on
more than one server into a single share.
48
49. Windows
ā¢ Active Directory
After many years of anticipation, Microsoft introduced an
enterprise directory service in the Windows 2000 Server
product line, called Active Directory. It uses a hierarchical tree
design comprised of container and leaf objects. The
fundamental unit of organization in Active Directory directory
service is the domain, but; you can group domains together
into a tree, and even group multiple trees together into
a forest. Domains that are in the same tree automatically have
bidirectional trust relationships established between them,
which eliminates the need for administrators to create them
manually. The trust relationships are also transitive , meaning
that if Domain A trusts Domain B and Domain B trusts Domain
C, then Domain A trusts Domain C.
49
50. Windows
ā¢ Security
User-level security protects shared network resources by requiring that a
security provider authenticate a userās request to access resources. The
domain controller , grants access to the shared resource by verifying that
the user name and password are the same as those on the user account list
stored on the network security provider. Because the security provider
maintains a network-wide list of user accounts and passwords, each client
computer does not have to store a list of accounts. Share-level security
protects shared network resources on the computer with individually
assigned passwords. For example, you can assign a password to a folder or
a locally attached printer. If other users want to access it, they need to type
in the appropriate password. If you do not assign a password to a shared
resource, every user with access to the network can access that resource.
50
51. Token Ring
ā¢ Token Ring protocol is a communication protocol used in Local Area
Network (LAN).
ā¢ In a token ring protocol, the topology of the network is used to define
the order in which stations send.
ā¢ The stations are connected to one another in a single ring. It uses a
special three-byte frame called a ātokenā that travels around a ring.
ā¢ It makes use of Token Passing controlled access mechanism.
ā¢ Frames are also transmitted in the direction of the token.
ā¢ This way they will circulate around the ring and reach the station
which is the destination.
53. How Does A Token Ring Work?
ā¢ The frame or packet reaches the next station according to the
sequence of the ring.
ā¢ Whether the frame contains a message addressed to them is
determined by the current node. If yes, then the message is removed
by the node from the frame. If not, then there is an empty frame(an
empty frame is called the token frame).
ā¢ A Station that has the token frame, only has the access to transfer the
data. If it has data then insert that data into the token frame
otherwise release that token for the next station.
ā¢ The next station picks up that token frame for further transmission.
54. Networks: Token Ring and FDDI
54
IEEE 802.5 and Token Ring
ā¢ Proposed in 1969 and initially referred to as a
Newhall ring.
Token ring :: a number of stations connected by
transmission links in a ring topology. Information
flows in one direction along the ring from source
to destination and back to source.
Medium access control is provided by a small frame,
the token, that circulates around the ring when all
stations are idle. Only the station possessing the
token is allowed to transmit at any given time.
55. Advantages of token rings
ā¢ Token rings reduce the chances of data collision.
ā¢ Token passing performs better than bus topology under heavy traffic.
ā¢ A server is not needed to control connectivity among the nodes.
56. Disadvantages of token rings
ā¢ Data packets must pass through all the nodes, slowing routing.
ā¢ It is susceptible to failures that may occur in the network.
ā¢ Due to a fault in the ring, all network operation ceases.
57. AppleTalk
ā¢ AppleTalk is a network operating system designed to connect Apple
computers. Its components are built on Macintosh operating systems.
ā¢ The network topology is a bus or tree.
58. AppleTalkā¦
ā¢ AppleTalk is a network operating system designed to
connect Apple computers. Its components are built on
Macintosh operating systems. There are two main
versions of AppleTalk depending on how many years in
the past the network was implemented, Phase 1 and
Phase 2.
59. History
ā¢ Just prior to its release in early 1985,AppleBus
was renamed AppleTalk.
ā¢ The system had a number of limitations, including
a speed of only 230.4 Kbit/s ,a maximum distance
of 1000 feet from end to end , and only 32 nodes
per LAN.
60. Design
AppleTalk was designed with a transparent network interface
-that is, the interaction between Client computers and
network servers requires little interaction from the user.
Two versions of AppleTalk exist :
AppleTalk Phase 1 and AppleTalk Phase 2.
62. Sockets
ā¢ An AppleTalk socket is a unique, addressable location in
an AppleTalk node. It is the logical point at which
upper-layer AppleTalk software processes and the
network layer Datagram Delivery Protocol (DDP)
interact.
Socket Clients Use Socket to Send and Receive Datagrams
63. Nodes
ā¢ An AppleTalk node is a device that is
connected to an AppleTalk network.
ā¢ This device might be a Macintosh computer,
a printer, an IBM PC, a router, or some other
similar device.
64. Networks
ā¢ It consists of a single logical cable and multiple
attached nodes.
ā¢ A single physical cable or multiple physical
cables interconnected by using bridges or
routers may be found.
65. Networksā¦
ā¢ Non extended Networks
It is a physical network segment that is assigned
only a single network number, which can range
between 1 and 1024.
ā¢ Extended Networks
Also known as a cable range. It is a physical network
segment that can be assigned multiple network
numbers.
66. Zones
ā¢ An AppleTalk zone is a logical group of nodes or
networks that is defined when the network
administrator configures the network.
ā¢ The nodes or networks need not be physically
contiguous to belong to the same AppleTalk
zone.
67. Addressing in AppleTalk
ā¢ Network Number :- 16 bit number.
ā¢ Node Id :- 8 bit number identifies node on an AppleTalk network.
ā¢ Socket Number :- unique 8 bit number that identifies a socket. A
maximum of 254 different socket number can be assigned in a
node.
ā¢ Zone Name :- A name assigned to an arbitrary subset of node
within an AppleTalk Internet.
68. AppleTalk Manager
ļ§ Our Application accesses the Services of the AppleTalk
protocol through the AppleTalk manager.
ļ§ It is a collection of Application Programming Interface
to AppleTalk protocol.
69. Security
ā¢ AppleTalk, like many network protocols, makes no
provisions for network security. The design of the
AppleTalk protocol architecture requires that security
measures be implemented at higher application levels.
Cisco supports AppleTalk distribution lists, allowing
control of routing updates on a per-interface basis.
This security feature is similar to those that Cisco
provides for other protocols.
70. Advantages
ā¢ Apple automatically includes AppleTalk in the
Macintosh operating system.
ā¢ Easy to implement and configure.
ā¢ Setting up a small workgroup is simple and
inexpensive.
71. Disadvantages
ā¢ It is not suitable for very large networks.
ā¢ It is very slow compared to other LAN links at 230.4
Kbps.
ā¢ It is unsuitable for bandwidth intensive
applications.
72. ā¦ Attached Resource Computer NETwork
ā¦ Token-Passing Local Area Network (LAN)
ā¦ Originally 2.5 Mbps data rate
ā¦ 255 Nodes or Stations
ā¦ Variable Packet Length
ā¦ Bus or Distributed Star Wiring
ā¦ Unicast or Broadcast Messages
ā¦ One to one or one to all
What is ARCNET?
73. ā¦ Coaxial, Fiber Optic, Twisted-pair Cabling
ā¦ Over 11 Million Installed Nodes
ā¦ Originally developed by Datapoint Corporation as an
office network
ā¦ Chip sets available from SMSC
ā¦ ANSI/ATA 878.1-1999 Standard
ā¦ Ideally suited for an industrial network
What is ARCNET?
74. ā¦ Broad Acceptance
ā¦ Large Installed Base
ā¦ Deterministic Performance
ā¦ Simple to Install
ā¦ Low Cost per Node
ā¦ Robust Design
ā¦ Multiple Cable Media Support
ā¦ Multi-master Communication
What are ARCNETās Benefits?
75. ā¦ HVAC
ā¦ Motor Drives
ā¦ Power Generation
ā¦ Data Acquisition and Control
ā¦ Manufacturing Information Systems
ā¦ OfficeAutomation
ā¦ Shipboard Automation
Where is ARCNET Used?
76. ā¦ Printing Press Controls
ā¦ Telecommunications
ā¦ Gaming Machines
ā¦ Vehicular Navigation
ā¦ Security Systems
Where is ARCNET Used?
Any application where real-time performance, high
security and robust design is important.
77. ā¦ Distributed Star topology requires the use of hubs
How Does ARCNET Work?
NODE
NODE
NODE
NODE
NODE
NODE
NODE
NODE
NODE
HUB
HUB
HUB
79. ā¦ Only Five Simple Commands
ā¦ ITT - Invitation to transmit
ā¦ FBE - Free buffer enquiry
ā¦ PAC - Packet
ā¦ ACK - Acknowledgement
ā¦ NAK - Negative acknowledgement
ARCNET Protocol
80. ā¦ Deterministic Token Passing
ā¦ Packet Flow Control
ā¦ Error Detection
ā¦ Auto Reconfiguration
ā¦ Variable Packet Size
ā¦ Supports Various Transceivers & Media
ā¦ Supports Various Software Drivers
ā¦ Up to 255 Nodes Per Network
ARCNET Protocol Features
81. ā¦ Token Passing - Transmitting on the network is only
permitted when a node has the token
ā¦ Every node can transmit once during each token rotation
āÆBenefits:
ā¦ Every node has a guaranteed response time to transmit
ā¦ Deterministic behavior
ARCNET Protocol Features
82. ā¦ Auto-Reconfiguration - Network is automatically
reconfigured when a node joins or leaves the network
ā¦ Token pass is automatically reconfigured
ā¦ Typical time 20 - 30 ms
ā¦ Supports live node insertion and deletion
ā¦ Variable Packet Size
ā¦ From 1 to 507 bytes per packet
ARCNET Protocol Features
83. ā¦ Packet Flow Control - Transmitter checks receiver to
make sure it is ready to receive a packet
ā¦ Reduced software overhead
ā¦ Increased bandwidth
ā¦ No lost packets due to input buffer overruns
ARCNET Protocol Features
84. ā¦ Error Detection - 16 bit CRC checks each packet
ā¦ Corrupted packets automatically rejected
ā¦ Transmitter is aware of the error
ā¦ Reduced software overhead
ā¦ Better CPU utilization
ARCNET Protocol Features
85. ā¦ Token passes from low to high address
ARCNET Logical Ring
109
122
255
6
86. PAC = ALERT SOH SID DID DID CP DATA ... DATA CRC CRC
ARCNET Frames
Only PAC has a variable length frame
ITT =
FBE =
ALERT EOT DID DID
ALERT ENQ DID DID
ACK= ALERT ACK
NAK= ALERT NAK
94. ā¦ Coaxial Cable In a Star Topology
ā¦ Either a star or distributed star topology
ā¦ Utilize active or passive hubs
Traditional ARCNET
NODE NODE
NODE
NODE
NODE
NODE
NODE
NODE
NODE
HUB
HUB
HUB
95. ā¦ Coaxial Star
ā¦ Original method of communication
ā¦ RG-62/u coaxial cable
ā¦ BNC connectors
ā¦ Only two transceivers per segment
ā¦ Segment length up to 2,000 feet
ā¦ Requires the use of a hub to go beyond two stations
Traditional ARCNET
We call this āCXS.
96. ā¦ Coaxial Bus
ā¦ Lower cost hub-less network
ā¦ RG-62/u coaxial cable
ā¦ Up to eight NIMs per bus segment
ā¦ Segment length limited to 1,000 feet
ā¦ BNC connectors and Tees
ā¦ Requires end of line terminators
Traditional ARCNET
We call this āCXB.
97. ā¦ Twisted-Pair Star
ā¦ Requires active hubs for network expansion
ā¦ Only 328 foot segment length
ā¦ RJ-11 connectors
ā¦ Utilizes BALUNās to convert from coaxial cable to twisted-pair
Traditional ARCNET
We call this āTPS.
98. ā¦ Twisted-Pair Bus
ā¦ Modified circuitry of coaxial bus implementation
ā¦ Supports eight nodes
ā¦ Reduction in segment length to 400 feet
ā¦ RJ-11 or RJ-45 connectors
ā¦ Requires end of line terminators
Traditional ARCNET
We call this āTPB when using RJ-11 connectors
and āTB5 when using RJ-45 connectors.
99. ā¦ Fiber Optics
ā¦ 850 nm wavelength with ST connectors
ā¦ 62.5/125 duplex multimode fiber cable
ā¦ 6000 foot segment length
ā¦ Large networks can be achieved by cascading hubs
ā¦ ARCNET controller chips may need to be set to extended timeouts
Traditional ARCNET
We call this āFOG.
100. ā¦ Fiber Optics
ā¦ 1300 nm wavelength with ST connectors
ā¦ 62.5/125 duplex multimode or duplex single-mode fiber cable
ā¦ 10,000 m multimode and 14,000 m single-mode
Traditional ARCNET
We call this āFG3.
Editor's Notes
Short forĀ lineĀ printerĀ daemon/lineĀ printerĀ remote, a printerĀ protocolthat usesĀ TCP/IPĀ to establish connections between printers andworkstationsĀ on aĀ network. The technology was developed originally for BSDĀ UNIXĀ and has since become theĀ de factoĀ cross-platformprinting protocol.
IPX (Internetwork Packet Exchange) is a networking protocol from Novell that interconnects networks that use Novell's NetWare clients and servers.