Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
& Networking:
Networking allows one computer to send information to and receive information
from another. We may not always be aware of the numerous times we access
information on computer networks. Certainly the Internet is the most conspicuous
example of computer networking, linking millions of computers around the world,
but smaller networks play a roll in information access on a daily basis. Many
public libraries have replaced their card catalogs with computer terminals that
allow patrons to search for books far more quickly and easily. Airports have
numerous screens displaying information regarding arriving and departing flights.
Many retail stores feature specialized computers that handle point-of-sale
transactions. In each of these cases, networking allows many different devices in
multiple locations to access a shared repository of data.
The Ethernet
In 1973, at Xerox Corporation’s Palo Alto Research Center (more commonly
known as PARC), researcher Bob Metcalfe designed and tested the first
Ethernet network. While working on a way to link Xerox’s "Alto" computer to a
printer, Metcalfe developed the physical method of cabling that connected
devices on the Ethernet as well as the standards that governed communication
on the cable. Ethernet has since become the most popular and most widely
deployed network technology in the world. Many of the issues involved with
Ethernet are common to many network technologies, and understanding how
Ethernet addressed these issues can provide a foundation that will improve your
understanding of networking in general.
The Ethernet standard has grown to encompass new technologies as computer
networking has matured, but the mechanics of operation for every Ethernet
network today stem from Metcalfe’s original design. The original Ethernet
Protocols
Networking Basics
Here are some of the fundamental parts of a network:
• Network Interface Card (NIC) - Every computer (and most other devices)
is connected to a network through an NIC. In most desktop computers,
this is an Ethernet card (normally 10 or 100 Mbps) that is plugged into a
slot on the computer's motherboard.
CSMA/CD
The acronym CSMA/CD signifies Carrier Sense Multiple Access with Collision
Detection and describes how the Ethernet protocol regulates communication
among nodes. While the term may seem intimidating, if we break it apart into its
component concepts we will see that it describes rules very similar to those that
people use in polite conversation. To help illustrate the operation of Ethernet, we
will use an analogy of a dinner table conversation.
Let’s represent our Ethernet segment as a dinner table, and let several people
engaged in polite conversation at the table represent the nodes. The term
Multiple Access covers what we already discussed above: When one Ethernet
station transmits, all the stations on the medium hear the transmission, just as
when one person at the table talks, everyone present is able to hear him or her.
Now let's imagine that you are at the table and you have something you would
like to say. At the moment, however, I am talking. Since this is a polite
conversation, rather than immediately speak up and interrupt, you would wait
until I finished talking before making your statement. This is the same concept
described in the Ethernet protocol as Carrier Sense. Before a station transmits,
it "listens" to the medium to determine if another station is transmitting. If the
medium is quiet, the station recognizes that this is an appropriate time to
transmit.
Carrier Sense Multiple Access gives us a good start in regulating our
conversation, but there is one scenario we still need to address. Let’s go back to
our dinner table analogy and imagine that there is a momentary lull in the
conversation. You and I both have something we would like to add, and we both
"sense the carrier" based on the silence, so we begin speaking at approximately
the same time. In Ethernet terminology, a collision occurs when we both spoke
at once.
In our conversation, we can handle this situation gracefully. We both hear the
other speak at the same time we are speaking, so we can stop to give the other
person a chance to go on. Ethernet nodes also listen to the medium while they
transmit to ensure that they are the only station transmitting at that time. If the
stations hear their own transmission returning in a garbled form, as would
happen if some other station had begun to transmit its own message at the same
time, then they know that a collision occurred. A single Ethernet segment is
sometimes called a collision domain because no two stations on the segment
VDSL
How VDSL Works
The use of fast Internet connections has grown rapidly over the last few years. As
more people buy home computers and create home networks, the demand for
broadband (high-speed) connections steadily increases. Two technologies,
cable modems and Asymmetric Digital Subscriber Line (ADSL), currently
dominate the industry.
While both of these technologies provide Internet connections that are many
times faster than a 56K modem, they still are not fast enough to support the
integration of home services such as digital television and Video-on-Demand.
However, another DSL technology known as very high bit-rate DSL (VDSL) is
seen by many as the next step in providing a complete home-
communications/entertainment package. There are already some companies,
such as U.S. West (part of Qwest now), that offer VDSL service in selected
areas. VDSL provides an incredible amount of bandwidth, with speeds up to
about 52 megabits per second (Mbps). Compare that with a maximum speed of 8
to 10 Mbps for ADSL or cable modem and it's clear that the move from current
broadband technology to VDSL could be as significant as the migration from a
56K modem to broadband. As VDSL becomes more common, you can expect
that integrated packages will be cheaper than the total amount for current
separate services.
DSL Basics
A standard telephone installation in the United States consists of a pair of copper
wires that the phone company installs in your home. A pair of copper wires has
plenty of bandwidth for carrying data in addition to voice conversations. Voice
signals use only a fraction of the available capacity on the wires. DSL exploits
VDSL Speed
VDSL operates over the copper wires in your phone line in much the same way
that ADSL does, but there are a couple of distinctions. VDSL can achieve
incredible speeds, as high as 52 Mbps downstream (to your home) and 16
Mbps upstream (from your home). That is much faster than ADSL, which
provides up to 8 Mbps downstream and 800 Kbps (kilobits per second) upstream.
But VDSL's amazing performance comes at a price: It can only operate over the
copper line for a short distance, about 4,000 feet (1,200 m).
As you can see, VDSL provides a significant performance boost over any other
version. But for VDSL to become widely available, it must be standardized. In the
next section, we'll talk about two potential VDSL standards.
300-bps Modems
We'll use 300-bps modems as a starting point because they are extremely easy
to understand. A 300-bps modem is a device that uses frequency shift keying
(FSK) to transmit digital information over a telephone line. In frequency shift
keying, a different tone (frequency) is used for the different bits (see How Guitars
Work for a discussion of tones and frequencies).
When a terminal's modem dials a computer's modem, the terminal's modem is
called the originate modem. It transmits a 1,070-hertz tone for a 0 and a 1,270-
hertz tone for a 1. The computer's modem is called the answer modem, and it
transmits a 2,025-hertz tone for a 0 and a 2,225-hertz tone for a 1. Because the
originate and answer modems transmit different tones, they can use the line
simultaneously. This is known as full-duplex operation. Modems that can
Faster Modems
In order to create faster modems, modem designers had to use techniques far
more sophisticated than frequency-shift keying. First they moved to phase-shift
keying (PSK), and then quadrature amplitude modulation (QAM). These
techniques allow an incredible amount of information to be crammed into the
3,000 hertz of bandwidth available on a normal voice-grade phone line. 56K
modems, which actually connect at something like 48 Kbps on anything but
absolutely perfect lines, are about the limit of these techniques (see the links at
the end of this article for more information).
Here's a look inside a typical 56K modem:
Point-to-Point Protocol
Today, no one uses dumb terminals or terminal emulators to connect to an
individual computer. Instead, we use our modems to connect to an Internet
service provider (ISP), and the ISP connects us into the Internet. The Internet
lets us connect to any machine in the world (see How Web Servers and the
Internet Work for details). Because of the relationship between your computer,
the ISP and the Internet, it is no longer appropriate to send individual characters.
Instead, your modem is routing TCP/IP packets between you and your ISP.
The standard technique for routing these packets through your modem is called
the Point-to-Point Protocol (PPP). The basic idea is simple -- your computer's
TCP/IP stack forms its TCP/IP datagrams normally, but then the datagrams are
handed to the modem for transmission. The ISP receives each datagram and
routes it appropriately onto the Internet. The same process occurs to get data
from the ISP to your computer. See this page for additional information on PPP.
If you want to know more about modems, protocols, and especially if you wish to
delve into things like PSK and QAM in more detail, check out the links on the
next page!
Transmitter
The transmitter is like the sailor on the deck of the sending ship. It receives and
directs the optical device to turn the light "on" and "off" in the correct sequence,
thereby generating a light signal.
The transmitter is physically close to the optical fiber and may even have a lens
to focus the light into the fiber. Lasers have more power than LEDs, but vary
more with changes in temperature and are more expensive. The most common
wavelengths of light signals are 850 nm, 1,300 nm, and 1,550 nm (infrared, non-
visible portions of the spectrum).
Optical Regenerator
As mentioned above, some signal loss occurs when the light is transmitted
through the fiber, especially over long distances (more than a half mile, or about
Optical Receiver
The optical receiver is like the sailor on the deck of the receiving ship. It takes
the incoming digital light signals, decodes them and sends the electrical signal to
the other user's computer, TV or telephone (receiving ship's captain). The
receiver uses a photocell or photodiode to detect the light.
For a good discussion of lightwave transmission systems, see this page from Bell
Labs.
The operator threads the strand through a series of coating cups (buffer
coatings) and ultraviolet light curing ovens onto a tractor-controlled spool. The
tractor mechanism slowly pulls the fiber from the heated preform blank and is
precisely controlled by using a laser micrometer to measure the diameter of the
fiber and feed the information back to the tractor mechanism. Fibers are pulled
Since its beginning in 1969, the Internet has grown from four host computer
systems to tens of millions. However, just because nobody owns the Internet, it
doesn't mean it is not monitored and maintained in different ways. The Internet
Society, a non-profit group established in 1992, oversees the formation of the
policies and protocols that define how we use and interact with the Internet.
In the image above, each switch has two VLANs. On the first switch, VLAN A and
VLAN B are sent through a single port (trunked) to the router and through
another port to the second switch. VLAN C and VLAN D are trunked from the
second switch to the first switch, and through the first switch to the router. This
trunk can carry traffic from all four VLANs. The trunk link from the first switch to
the router can also carry all four VLANs. In fact, this one connection to the router
allows the router to appear on all four VLANs, as if it had four, different, physical
ports connected to the switch.
The VLANs can communicate with each other via the trunking connection
between the two switches using the router. For example, data from a computer
on VLAN A that needs to get to a computer on VLAN B (or VLAN C or VLAN D)
must travel from the switch to the router and back again to the switch. Because
of the transparent bridging algorithm and trunking, both PCs and the router think
that they are on the same physical segment!
.
The Internet has grown larger than anyone ever imagined it could be. Although
the exact size is unknown, the current estimate is that there are about 100 million
hosts and more than 350 million users actively on the Internet. That is more than
the entire population of the United States! In fact, the rate of growth has been
such that the Internet is effectively doubling in size each year.
So what does the size of the Internet have to do with NAT? Everything! For a
computer to communicate with other computers and Web servers on the Internet,
it must have an IP address. An IP address (IP stands for Internet Protocol) is a
unique 32-bit number that identifies the location of your computer on a network.
Basically, it works like your street address -- as a way to find out exactly where
you are and deliver information to you.
When IP addressing first came out, everyone thought that there were plenty of
addresses to cover any need. Theoretically, you could have 4,294,967,296
unique addresses (232). The actual number of available addresses is smaller
(somewhere between 3.2 and 3.3 billion) because of the way that the addresses
are separated into classes, and because some addresses are set aside for
multicasting, testing or other special uses.
With the explosion of the Internet and the increase in home networks and
business networks, the number of available IP addresses is simply not enough.
The obvious solution is to redesign the address format to allow for more possible
addresses. This is being developed (called IPv6), but will take several years to
implement because it requires modification of the entire infrastructure of the
Internet.
The NAT router translates traffic coming into and leaving the private network.
This is where NAT (RFC 1631) comes to the rescue. Network Address
Translation allows a single device, such as a router, to act as an agent between
the Internet (or "public network") and a local (or "private") network. This means