Data net Vs Network
The network is the computer’s most apposite portrayal of client/server configuring
where the users would like to feel that somewhere on the network, the services
they need are available and are accessible based on a criteria and right of
access, without regard to the technologies involved. When ready to move beyond
personal productivity stand-alone applications and into client/server
applications, organizations must address the issues of connectivity. Initially,
most users discover their need to access a printer that is not physically
connected to their client workstation. It is observed that sharing data files
among non-networked individuals in the same office can be handled by
hand-carrying diskettes, but printing is more awkward. The first LANs installed
are usually basic networking services to support this printer-sharing
requirement. Now a printer anywhere in the local area can be authorized for
shared use. The physical medium to accomplish this connection is the LAN
cabling. Each workstation is connected to a cable that routes the transmission
either directly to the next workstation on the LAN or to a hub point that
routes the transmission to the appropriate destination. There are two primary
LAN topologies that use Ethernet (bus) and Token Ring (ring).
Ethernet
and Token Ring are put into practice on well-defined Institute of Electrical
and Electronic Engineers (IEEE) industry principles. These principles identify
the product requirement detail and afford a pledge to a fixed measurement. This
standardization has encouraged hundreds of vendors to develop competitive
products and in turn has caused the functionality, performance, and cost of
these LAN connectivity products to improve spectacularly over the last five
years. Older LAN installations that use nonstandard topologies will eventually
require replacement. There is a basic functional difference in the way Ethernet
and Token Ring topologies placed data on the cable. With the Ethernet protocol,
the processor attempts to unload data onto the cable whenever it requires
service. Workstations vie for the bandwidth with these attempts, and the
Ethernet protocol includes the appropriate logic to resolve collisions when
they occur. On the other hand, with the Token Ring protocol, the processor only
attempts to put data onto the cable when there is capacity on the cable to
accept the transmission. Workstations pass along a token that one after the other gives each workstation the right
to put data on the network.
Latest
developments in the capabilities of intelligent hubs have changed the way we
design LANs. Hubs owe their success to the efficiency and robustness of the
10BaseT protocol, which enables the implementation of Ethernet in a star
fashion over Unshielded Twisted Pair (UTP) wiring. Now commonly used, hubs
provide integrated support for the different standard topologies such as
Ethernet, Token Ring, and Fiber (specifically, the FDDI protocol) over
different types of cabling. By repeating or amplifying signals where necessary,
they enable the use of high quality UTP cabling in virtually every situation.
Hubs have evolved to provide tremendous flexibility for the design of the
physical LAN topologies in large office buildings or plants. Various design
strategies are now available. They are also an effective vehicle to put
management intelligence throughout the LANs in a corporation, allowing control
and monitoring capabilities from a network management center. Newer
token-passing protocols, such as Fiber Distributed Data Interface (FDDI) and
Copper Distributed Data Interface (CDDI), will increase in use as higher performances
LANs (particularly backbone LANs) are required. CDDI can be implemented on the
same LAN cable as Ethernet and Token Ring if the original selection and
installation are done carefully according to industry recommendations. FDDI
usually appears first as the LAN-to-LAN
Bridge between floors in
large buildings. Wireless LANs offer an substitute to wiring. Instead of
cabling, these LANs use the airwaves as the communications medium. Motorola
provides a system—Altair—that supports standard Ethernet transmission protocols
and cards. The Motorola implementation cables workstations together into micro
cells using standard Ethernet cabling. These micro cells communicate over the
airwaves to similarly configured servers. Communications on this frequency do
not pass through outside walls, so there is little problem with interference
from other users. Wireless LANs are attractive when the cost of installing cabling
is high. Costs tend to be high for cabling in old buildings, in temporary
installations, or where workstations move frequently. NCR provides another
implementation of wireless LAN technology using publicly accessible frequencies
in the 902-MHz to 928-MHz band. NCR provides proprietary cards to provide the
communications protocol. This supports lower-speed communications that are
subject to some interference, because so many other devices, such as remote
control electronic controllers and antitheft devices use this same frequency.
It
is now a well-accepted fact that LANs are the preferred vehicle to provide
overall connectivity to all local and distant servers. WAN connectivity should
be provided through the interconnection of the LANs. Router and bridges are
devices that perform that task. Routers are the preferred technology for
complex network topologies, generating efficient routing of data packets
between two systems by locating and using the optimal path. They also limit the
amount of traffic on the WAN by efficiently filtering and by providing support
for multiple protocols across the single network. WAN bandwidth for data
communications is a critical issue. In terminal-to-host networks, traffic
generated by applications could be modeled, and the network would then be sized
accordingly, allowing for effective use of the bandwidth. With LAN
interconnections, and applications that enable users to transfer large files
(such as through e-mail attachments) and images, this modeling is much harder
to perform. WAN services that have recently emerged, such as Frame Relay, SMDS
(Switched Multimegabit Data Service), and imminent ATM (Asynchronous Transfer
Mode) services, enable the appropriate flexibility inherently required for
these applications. Frame Relay uses efficient statistical multiplexing to
provide shared network resources to users. Each access line is shared by
traffic destined for multiple locations. The access line speed is typically
sized much higher than the average throughput each user is paying for. This
enables peak transmissions (such as when a user transmits a large file) that
are much faster because they use all available bandwidth. SMDS is a high-speed
service that uses cell relay technology, which enables data, voice, and video
to share the same network fabric. Available from selected RBOCs as a wide-area
service, it supports high speeds well over 1.5 Mbps. ATM is an emerging
standard and set of communication technologies that span both the LAN and the
WAN to create a seamless network. It provides the appropriate capabilities to
support all types of voice, data, and video traffic. Its speed is defined to be
155 Mbps, with variations and technologies that may enable it to run on lower
speed circuits when economically appropriate. It will operate both as a LAN and
a WAN technology, providing full and transparent integration of both
environments. ATM will be the most significant connectivity technology after
1995. ATM provides the set of services and capabilities that will truly enable
the "computing anywhere" concept, in which the physical location of
systems and data is made irrelevant to the user. It also provides the network
managers with the required flexibility to respond promptly to business change
and new applications. Interoperability between distributed systems is not
guaranteed by just providing network-based connectivity. Systems need to agree
on the end-to-end handshakes that take place while exchanging data, on session
management to set up and break conversations, and on resource access
strategies. Network Management is an integral part of every network. The Simple
Network Management Protocol (SNMP) is a well-accepted standard used to manage
LANs and WANs through the management capabilities of hubs, routers, and
bridges. It can be extended to provide basic monitoring performance
measurements of servers and workstations. Full systems management needs much
more functionality than SNMP can offer. The OSI management protocol, the Common
Management Information Protocol (CMIP), which has the flexibility and
capability to fully support such management requirements, will likely compete
with an improved version of SNMP, SNMP V2. The existence of heterogeneous LAN
environments in large organizations makes interoperability a practical reality.
Organizations need and expect to view their various workgroup LANs as an
integrated corporate-wide network. Citicorp, for example, is working to
integrate its 100 independent networks into a single global net.1 The OSI model
provides the framework definition for developers attempting to create
interoperable products.2 Because many products are not yet OSI-compliant, there
often is no direct correspondence between the OSI model and reality. The OSI
model defines seven protocol layers and specifies that each layer be insulated
from the other by a well-defined interface.
In
view of the above it is evident that the physical layer is the lowest level of
the OSI model and defines the physical and electrical characteristics of the
connections that make up the network. It includes such things as interface
specifications as well as detailed specifications for the use of twisted-pair,
fiber-optic, and coaxial cables. Standards of interest at this layer for
client/server applications are IEEE 802.3 (Ethernet), and IEEE 802.5 (Token
Ring) that define the requirements for the network interface card (NIC) and the
software requirements for the media access control (MAC) layer. Other standards
here include the serial interfaces EIA232 and X.21. The data link layer defines
the basic packets of data expected to enter or leave the physical network. Bit
patterns, encoding methods, and tokens are known to this layer. The data link
layer detects errors and corrects them by requesting retransmission of
corrupted packets or messages. This layer is actually divided into two sub
layers: the media access control (MAC) and the logical link control (LLC). The
MAC sublayer has network access responsibility for token passing, collision
sensing, and network control. The LLC sublayer operates above the MAC and sends
and receives data packets and messages. Ethernet, Token Ring, and FDDI define
the record format of the packets (frames) being communicated between the MAC
layer and Network layer. The internal formats are different and without conversion
workstations cannot interoperate with workstations that operate with another
definition. And in this connection the network layer is responsible for
switching and routing messages to their proper destinations. It coordinates the
means for addressing and delivering messages. It provides for each system a
unique network address, determines a route to transmit data to its destination,
segments large blocks of data into smaller packets of data, and performs flow
control. When a message contains more than one packet, the transport layer
sequences the message packets and regulates inbound traffic flow. The transport
layer is responsible for ensuring end-to-end error-free transmission of data.
The transport layer maintains its own addresses that get mapped onto network
addresses. Because the transport layer services process on systems, multiple
transport addresses can share a single network address. Indeed, the session
layer provides the services that enable applications running at two processors
to coordinate their communication into a single session. A session is an
exchange of messages—a dialog between two processors. This layer helps create
the session, inform one workstation if the other drops out of the session, and
terminate the session on request. The presentation layer is responsible for
translating data from the internal machine form of one processor in the session
to that of the other. The application layer is the layer to which the
application on the processor directly talks. The programmer codes to an API
defined at this layer. Messages enter the OSI protocol stack at this level,
travel through the layers to the physical layer, across the network to the
physical layer of the other processor, and up through the layers into the other
processor application layer and program.
Connectivity
and interoperability between the client workstation and the server are achieved
through a combination of physical cables and devices, and software that
implements communication protocols. One of the most important and most unnoticed
parts of LAN implementation today is the physical cabling plant. A
corporation's investment in cabling is significant. For most though, it is
viewed strictly as a tactical operation, a necessary expense. Implementation
costs are too high, and maintenance is a no budgeted, nonexistent process. The
results of this shortsightedness will be seen in real dollars through the life
of the technology. Studies have shown that over 65 percent of all LAN downtime
occurs at the physical layer. It is important to provide a platform to support
robust LAN implementation, as well as a system flexible enough to incorporate
rapid changes in technology. The trend is to standardize LAN cabling design by
implementing distributed star topologies around wiring closets, with fiber
between wiring closets. Desktop bandwidth requirements can be handled by copper
(including CDDI) for several years to come; however, fiber between wiring
closets will handle the additional bandwidth requirements of a backbone or
switch-to-switch configuration. Obviously, fiber to the desktop will provide
extensive long-term capabilities; however, because of the electronics required
to support various access methods in use today, the initial cost is
significant. As recommended, the design will provide support for Ethernet, 4M
and 16M Token Ring, FDDI, and future ATM LANs. Wiring standards include RG-58
A/U coaxial cable (thin-wire 10Base2 Ethernet), IBM Type 1 (shielded, twisted
pair for Token Ring), unshielded twisted pair (UTP for 10BaseT Ethernet or
Token Ring) and Fiber Distributed Data Interface (FDDI for 10BaseT or Token
Ring). Motorola has developed a wireless Ethernet LAN product—Altair—that uses
18-GHz frequencies. NCR's Wave LAN provides low-speed wireless LAN support.
Wireless LAN technology is useful and cost-effective when the cost of cable
installation is high. In old buildings or locations where equipment is
frequently moved, the cost of running cables may be excessive. In these
instances wireless technology can provide an attractive alternative. Motorola
provides an implementation that uses standard Ethernet NICs connecting a group
of closely located workstations together with a transmitter.
The
transmitter communicates with a receiver across the room to provide the
workstation server connection. Recent reductions in the cost of this technology
make it attractive for those applications where the cost of cabling is more
than $250 per workstation. Wireless communication is somewhat slower than wired
communication. Industry tests indicate a performance level approximately
one-half that of wired 10-Mbps UTP Ethernet. NCR's alternative wireless
technology, Wave LAN, is a slow-speed implementation using proprietary
communications protocols and hardware. It also is subject to interference by other
transmitters, such as remote control electronics, antitheft equipment, and
point-of-sale devices. Ethernet is the most widely installed network topology
today. Ethernet networks have a maximum throughput of 10 Mbps. The first
network interface cards (NICs) developed for Ethernet were much cheaper than
corresponding NICs developed by IBM for Token Ring. Until recently,
organizations who used non-IBM minicomputer and workstations equipment had few
options other than Ethernet. Even today in a heterogeneous environment, there
are computers for which only Ethernet NICs are available. The large market for
Ethernet NICs and the complete definition of the specification have allowed
over 100 companies to produce these cards.3 Competition has reduced the price to
little more than $100 per unit. 10BaseT Ethernet is a standard that enables the
implementation of the Ethernet protocol over telephone wires in a physical star
configuration (compatible with phone wire installations). Its robustness, ease
of use, and low cost driven by hard competition have made 10BaseT the most
popular standards-based network topology. Its pervasiveness is unrivaled: In
1994, new laptop computers will start to ship with 10BaseT built in. IBM is now
fully committed to support Ethernet across its product line. IBM uses the Token
Ring LAN protocol as the standard for connectivity in its products. In an
environment that is primarily IBM hardware and SNA connectivity, Token Ring is
the preferred LAN topology option. IBM's Token Ring implementation is a
modified ring configuration that provides a high degree of reliability since
failure of a node does not affect any other node. Only failure of the hub can
affect more than one node. The hub isn't electric and doesn't have moving parts
to break; it is usually stored in a locked closet or other physically secure
area. Token Ring networks implement a wire transmission speed of 4 or 16 Mbps.
Older NICs will support only the 4-Mbps speed, but the newer ones support both
speeds. IBM and Hewlett-Packard have announced a technical alliance to
establish a single 100Mbps standard for both Token Ring and Ethernet networks.
This technology, called 100VG-AnyLAN, will result in low-cost, high-speed
network adapter cards that can be used in PCs and servers running on either
Token Ring or Ethernet LANs. The first Any LAN products are expected in early
1994 and will cost between $250 and $350 per port. IBM will be submitting a
proposal to make the 100VG-AnyLAN technology a part of IEEE's 802.12 (or
100Base-VG) standard, which currently includes only Ethernet.
The
Ethernet technique mechanism may function well when the cable is lightly loaded
but, because of rear-ender that occur when an attempt is made to put data onto
a busy cable, the technique provides poor performance when the LAN utilization
exceeds 50 percent. To recover from the collisions, the sender retries, which
puts additional load on the network. Ethernet users avoid this problem by
creating subnets that divide the LAN users into smaller groups, thus keeping a
low utilization level. In spite of the prevalent
implementation of Ethernet, Token Ring installations are mounting at a fast
rate for client/server applications. IBM's commitment to Ethernet may slow this
success, because Token-Ring will always cost more than Ethernet. Figure 5.3
presents the results of a recent study of installation plans for Ethernet,
Token Ring, and FDDI. The analysis predicts a steady increase in planned Token
Ring installations from 1988 until the installed base is equivalent in 1996.
However, this analysis does not account for the emergence of a powerful new
technology which has entered the marketplace in 1993, Asynchronous Mode, or
ATM. It is likely that by 1996 ATM will dominate all new installations and will
gradually replace existing installations by degrees.
Comments
Post a Comment