|
Home | Switchboard | Unix Administration | Red Hat | TCP/IP Networks | Neoliberalism | Toxic Managers |
(slightly skeptical) Educational society promoting "Back to basics" movement against IT overcomplexity and bastardization of classic Unix |
|
|
A local area network (LAN) is generally defined as a communication network used by a single organization over a limited distance, which permits users to share information and resources. This general definition, while stating the basic nature and purpose of a local area network, is incomplete because LANs can span very large areas through gateways and routers, and because advanced applications are increasingly available that not only permit but encourage interdepartmental usage of the same
The PC LAN (local area network) emerged in the mid-1980’s as a requirement to meet the need of sharing local resources and information on personal computers, which had begun to complement the centralized computing facilities of companies. A network consists of multiple computers connected using some type of interface, each having one or more interface devices such as a Network Interface Card (NIC) and/or a serial device for PPP networking. Each computer is supported by network software that provides the server or client functionality. The hardware used to transmit data across the network is called the media. It may include copper cable, fiber optic, or wireless transmission. The most popular cabling is 100Base-TX category 5 Ethernet cable. This is twisted copper cabling which looks similar to TV coaxial cable. Like 10BASE-T, the proper pairs are the orange and green pairs (canonical second and third pairs). It is terminated on each end by a connector that looks like enlarged phone connector. Its maximum segment length is 100 meters. With all 100BASE-T Ethernet (including 100BASE-TX), the raw bits of a packet to be transmitted -- a series of 0 and 1 bits at 100 Mbit/s -- are typically transferred 4 bits at a time clocked at 25 MHz to the Ethernet hardware. In its typical configuration, 100BASE-TX uses one pair of twisted wires in each direction, providing 100 Mbit/s of throughput in each direction (full-duplex). See IEEE 802.3 for more details.
The configuration of 100BASE-TX networks is very similar to 10BASE-T. When used to build a local area network, the devices on the network (computers, printers etc.) are typically connected to a hub or switch, creating a star network. Alternatively it is possible to connect two devices directly using a crossover cable.
The network topology describes the method used to do the physical wiring of the network. The main ones are:
The dominant LAN topology is star topology since that is what Ethernet networks use.
Many different types of physical connectors between networking nodes are used. Most popular options include twisted pairs and fiber. Initially coaxial capable were used and now coaxial cables with dual wires might stage a return as a media for ten gigabit networking. IEEE identifies for media consist of three parts:
IEEE 802.3 is a collection of IEEE standards defining the physical layer and the media access control (MAC) sublayer of the data link layer of wired Ethernet. This is generally a LAN technology with some WAN applications. Physical connections are made between nodes and/or infrastructure devices (hubs, switches, routers) by various types of copper or fiber cable.
802.3 is a technology that can support the IEEE 802.1 network architecture.
The maximum packet size is 1518 bytes, although to allow the Q-tag for Virtual LAN and priority data in 802.3ac it is extended to 1522 bytes. If the upper layer protocol submits a PDU (Protocol data unit) less than 64 bytes, 802.3 will pad the data field to achieve the minimum 64 bytes.
Although it is not technically correct, the terms "packet" and "frame" are used interchangeably. The ISO/IEC 8802-3 ANSI/IEEE 802.3 Standards refer to MAC sub-layer frames consisting of the Destination Address, Source Address, Length/Type, data, and FCS fields. The Preamble and SFD are (usually) considered a header to the MAC Frame. This header plus the MAC Frame constitute a "Packet".
The original Ethernet is called "Experimental Ethernet" today. It was developed by Robert Metcalfe in 1972 (patented in 1978) and was based in part on the wireless ALOHAnet protocol. It is not in use anywhere, but is thought to be the only Ethernet by some purists. The first "Ethernet" that was generally used outside Xerox was the DIX Ethernet. However, as DIX Ethernet was derived from Experimental Ethernet, and as many standards have been developed that are based on DIX Ethernet, the technical community has accepted the term Ethernet for all of them. Therefore, the term "Ethernet" can be used to name networks using any of the following standardized media and functions:
Ethernet Standard Date Description Experimental
Ethernet1972 2.94 Mbit/s (367 kB/s) over coaxial cable (coax) cable bus Ethernet II
(DIX v2.0)1982 10 Mbit/s (1.25 MB/s) over thin coax (thinnet) - Frames have a Type field. This frame format is used on all forms of Ethernet by protocols in the Internet protocol suite. IEEE 802.3 1983 10BASE5 10 Mbit/s (1.25MB/s) over thick coax - same as DIX except Type field is replaced by Length, and an 802.2 LLC header follows the 802.3 header 802.3a 1985 10BASE2 10 Mbit/s (1.25 MB/s) over thin Coax (thinnet or cheapernet) 802.3b 1985 10BROAD36 802.3c 1985 10 Mbit/s (1.25 MB/s) repeater specs 802.3d 1987 FOIRL (Fiber-Optic Inter-Repeater Link) 802.3e 1987 1BASE5 or StarLAN 802.3i 1990 10BASE-T 10 Mbit/s (1.25 MB/s) over twisted pair 802.3j 1993 10BASE-F 10 Mbit/s (1.25 MB/s) over Fiber-Optic 802.3u 1995 100BASE-TX, 100BASE-T4, 100BASE-FX Fast Ethernet at 100 Mbit/s (12.5 MB/s) w/autonegotiation 802.3x 1997 Full Duplex and flow control; also incorporates DIX framing, so there's no longer a DIX/802.3 split 802.3y 1998 100BASE-T2 100 Mbit/s (12.5 MB/s) over low quality twisted pair 802.3z 1998 1000BASE-X Gbit/s Ethernet over Fiber-Optic at 1 Gbit/s (125 MB/s) 802.3-1998 1998 A revision of base standard incorporating the above amendments and errata 802.3ab 1999 1000BASE-T Gbit/s Ethernet over twisted pair at 1 Gbit/s (125 MB/s) 802.3ac 1998 Max frame size extended to 1522 bytes (to allow "Q-tag") The Q-tag includes 802.1Q VLAN information and 802.1p priority information. 802.3ad 2000 Link aggregation for parallel links 802.3-2002 2002 A revision of base standard incorporating the three prior amendments and errata 802.3ae 2003 10 Gbit/s (1,250 MB/s) Ethernet over fiber; 10GBASE-SR, 10GBASE-LR, 10GBASE-ER, 10GBASE-SW, 10GBASE-LW, 10GBASE-EW 802.3af 2003 Power over Ethernet 802.3ah 2004 Ethernet in the First Mile 802.3ak 2004 10GBASE-CX4 10 Gbit/s (1,250 MB/s) Ethernet over twin-axial cable 802.3-2005 2005 A revision of base standard incorporating the four prior amendments and errata. 802.3an 2006 10GBASE-T 10 Gbit/s (1,250 MB/s) Ethernet over unshielded twisted pair(UTP) 802.3ap exp. 2007 Backplane Ethernet (1 and 10 Gbit/s (125 and 1,250 MB/s) over printed circuit boards) 802.3aq 2006 10GBASE-LRM 10 Gbit/s (1,250 MB/s) Ethernet over multimode fiber 802.3ar exp. 2007 Congestion management 802.3as exp. 2006 Frame expansion 802.3at in work group Power over Ethernet enhancements 802.3au 2006 Isolation requirements for Power Over Ethernet (802.3-2005/Cor 1) 802.3av in study group 10 Gbit/s EPON 802.3 HSSG 2009 Higher Speed Study Group. 100 Gb/s up to 100 m or 10 km using MMF or SMF optical fiber respectively What is defined in earlier IEEE 802.3 standards is often confused for what is used in practice: most network frames you will find on an Ethernet will be DIX frames, since the Internet protocol suite will use this format, with the type field set to the corresponding IETF protocol type. IEEE 802.3x-1997 allows the 16-bit field after the MAC addresses to be used as a type field or a length field, so that DIX frames are also valid 802.3 frames in 802.3x-1997 and later versions of the IEEE 802.3 Ethernet standard.
Hub, switch look similar: There is a row of RJ-45 jacks, sometimes called "ports." (What's a "jack"? It looks like the hole in the wall where you'd plug in a telephone, only bigger.) There may be some lights to tell you it's working. There will be some way to provide electric power to it.
A network switch (or just switch) is a networking device that performs transparent bridging (connection of multiple network segments with forwarding based on MAC addresses) at up to the speed of the hardware. Common hardware includes switches, which can connect at 10,100, or 1000 megabits per second, at half or full duplex. Half duplex means that the device can only send or receive any given time, whereas full duplex can send and receive, at the same time. The use of specially designed expansion also makes it possible to have large numbers of connections utilizing different mediums of networking, including Ethernet, Fibre Channel, ATM, 802.11, to name frequently used technologies. A switch can connect Ethernet, token ring, Fibre Channel or other types of packet switched network segments together to form a Internetwork.If a network has only switches and no hubs then the collision domains are either reduced to a single link or, if both ends support full duplex, eliminated altogether. The principle of a fast hardware forwarding device with many ports can be extended to higher layers giving the multilayer switch.
There are two main types of network categories which are:
In a server based network, there are computers set up to be primary providers of services such as file service or mail service. The computers providing the service are are called servers and the computers that request and use the service are called client computers.
In a peer-to-peer network, various computers on the network can act both as clients and servers. For instance, many versions of Microsoft Windows allow file and print sharing. These computers can act both as a client and a server and are also referred to as peers. Many networks are combination peer-to-peer and server based networks. The network operating system uses a network data protocol to communicate on the network to other computers. The network operating system supports the applications on that computer. A Network Operating System (NOS) includes Windows NT, Novell Netware, Linux, Unix and others.
Peer-to-peer communication is also the way adjacent layers of TCP/IP model communicate with each other. It occurs when one layer on a system communicates with the corresponding layer of another system. For example application layer of one system communicates with application layer on the other system.
Each TCP/IP layer on the sender encapsulates the data and adds header information about the corresponding protocol layer. The header information helps the receiving host decapsulate the data and direct the message to the appropriate application.
Data encapsulation occurs when:
Data decapsulation occurs when:
Society
Groupthink : Two Party System as Polyarchy : Corruption of Regulators : Bureaucracies : Understanding Micromanagers and Control Freaks : Toxic Managers : Harvard Mafia : Diplomatic Communication : Surviving a Bad Performance Review : Insufficient Retirement Funds as Immanent Problem of Neoliberal Regime : PseudoScience : Who Rules America : Neoliberalism : The Iron Law of Oligarchy : Libertarian Philosophy
Quotes
War and Peace : Skeptical Finance : John Kenneth Galbraith :Talleyrand : Oscar Wilde : Otto Von Bismarck : Keynes : George Carlin : Skeptics : Propaganda : SE quotes : Language Design and Programming Quotes : Random IT-related quotes : Somerset Maugham : Marcus Aurelius : Kurt Vonnegut : Eric Hoffer : Winston Churchill : Napoleon Bonaparte : Ambrose Bierce : Bernard Shaw : Mark Twain Quotes
Bulletin:
Vol 25, No.12 (December, 2013) Rational Fools vs. Efficient Crooks The efficient markets hypothesis : Political Skeptic Bulletin, 2013 : Unemployment Bulletin, 2010 : Vol 23, No.10 (October, 2011) An observation about corporate security departments : Slightly Skeptical Euromaydan Chronicles, June 2014 : Greenspan legacy bulletin, 2008 : Vol 25, No.10 (October, 2013) Cryptolocker Trojan (Win32/Crilock.A) : Vol 25, No.08 (August, 2013) Cloud providers as intelligence collection hubs : Financial Humor Bulletin, 2010 : Inequality Bulletin, 2009 : Financial Humor Bulletin, 2008 : Copyleft Problems Bulletin, 2004 : Financial Humor Bulletin, 2011 : Energy Bulletin, 2010 : Malware Protection Bulletin, 2010 : Vol 26, No.1 (January, 2013) Object-Oriented Cult : Political Skeptic Bulletin, 2011 : Vol 23, No.11 (November, 2011) Softpanorama classification of sysadmin horror stories : Vol 25, No.05 (May, 2013) Corporate bullshit as a communication method : Vol 25, No.06 (June, 2013) A Note on the Relationship of Brooks Law and Conway Law
History:
Fifty glorious years (1950-2000): the triumph of the US computer engineering : Donald Knuth : TAoCP and its Influence of Computer Science : Richard Stallman : Linus Torvalds : Larry Wall : John K. Ousterhout : CTSS : Multix OS Unix History : Unix shell history : VI editor : History of pipes concept : Solaris : MS DOS : Programming Languages History : PL/1 : Simula 67 : C : History of GCC development : Scripting Languages : Perl history : OS History : Mail : DNS : SSH : CPU Instruction Sets : SPARC systems 1987-2006 : Norton Commander : Norton Utilities : Norton Ghost : Frontpage history : Malware Defense History : GNU Screen : OSS early history
Classic books:
The Peter Principle : Parkinson Law : 1984 : The Mythical Man-Month : How to Solve It by George Polya : The Art of Computer Programming : The Elements of Programming Style : The Unix Hater’s Handbook : The Jargon file : The True Believer : Programming Pearls : The Good Soldier Svejk : The Power Elite
Most popular humor pages:
Manifest of the Softpanorama IT Slacker Society : Ten Commandments of the IT Slackers Society : Computer Humor Collection : BSD Logo Story : The Cuckoo's Egg : IT Slang : C++ Humor : ARE YOU A BBS ADDICT? : The Perl Purity Test : Object oriented programmers of all nations : Financial Humor : Financial Humor Bulletin, 2008 : Financial Humor Bulletin, 2010 : The Most Comprehensive Collection of Editor-related Humor : Programming Language Humor : Goldman Sachs related humor : Greenspan humor : C Humor : Scripting Humor : Real Programmers Humor : Web Humor : GPL-related Humor : OFM Humor : Politically Incorrect Humor : IDS Humor : "Linux Sucks" Humor : Russian Musical Humor : Best Russian Programmer Humor : Microsoft plans to buy Catholic Church : Richard Stallman Related Humor : Admin Humor : Perl-related Humor : Linus Torvalds Related humor : PseudoScience Related Humor : Networking Humor : Shell Humor : Financial Humor Bulletin, 2011 : Financial Humor Bulletin, 2012 : Financial Humor Bulletin, 2013 : Java Humor : Software Engineering Humor : Sun Solaris Related Humor : Education Humor : IBM Humor : Assembler-related Humor : VIM Humor : Computer Viruses Humor : Bright tomorrow is rescheduled to a day after tomorrow : Classic Computer Humor
The Last but not Least Technology is dominated by two types of people: those who understand what they do not manage and those who manage what they do not understand ~Archibald Putt. Ph.D
Copyright © 1996-2021 by Softpanorama Society. www.softpanorama.org was initially created as a service to the (now defunct) UN Sustainable Development Networking Programme (SDNP) without any remuneration. This document is an industrial compilation designed and created exclusively for educational use and is distributed under the Softpanorama Content License. Original materials copyright belong to respective owners. Quotes are made for educational purposes only in compliance with the fair use doctrine.
FAIR USE NOTICE This site contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available to advance understanding of computer science, IT technology, economic, scientific, and social issues. We believe this constitutes a 'fair use' of any such copyrighted material as provided by section 107 of the US Copyright Law according to which such material can be distributed without profit exclusively for research and educational purposes.
This is a Spartan WHYFF (We Help You For Free) site written by people for whom English is not a native language. Grammar and spelling errors should be expected. The site contain some broken links as it develops like a living tree...
|
You can use PayPal to to buy a cup of coffee for authors of this site |
Disclaimer:
The statements, views and opinions presented on this web page are those of the author (or referenced source) and are not endorsed by, nor do they necessarily reflect, the opinions of the Softpanorama society. We do not warrant the correctness of the information provided or its fitness for any purpose. The site uses AdSense so you need to be aware of Google privacy policy. You you do not want to be tracked by Google please disable Javascript for this site. This site is perfectly usable without Javascript.
Last modified: March 12, 2019