throbber
Clsco SYSTEMS
`
`
`
`Computer Networking
`Essentials
`
`An essential guide to understanding networking
`theory, implementation, and interoperability
`
`001
`
`US. Patent No. 8,724,622
`
`Apple Inc.
`APLl 1 14
`
`Apple Inc.
`APL1114
`U.S. Patent No. 8,724,622
`
`001
`
`

`

`Computer Networking Essentials
`
`DEbfakyL‘ittiejohn Shinder
`
`Cisco: Press
`
`r
`Cisco Press L
`201 West 103rd Street
`
`Indianapolis, IN 46290 USA
`
`002
`
`002
`
`

`

`
`
`Computer Networking Essentials
`Debra Littlejohn Shinder
`
`Copyright © 2002 Cisco Systems, Inc.
`Published by:
`Cisco Press
`201 West 103rd Street
`
`Indianapolis, IN 46290 USA
`All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means, electronic
`or mechanical, including photocopying, recording, or by any information storage and retrieval system, without
`written permission from the publisher, except for the inclusion of brief quotations in a review.
`Printed in the United States of America 3 4 5 6 7 8 9 0
`
`Third Printing
`January 2002
`Library of Congress Cataloging—in-Publication Number: 2001090429
`ISBN: l-587l3~038—6
`
`Trademark Acknowledgments
`All terms mentioned in this book that are known to be trademarks or service marks have been appropriately capita1~
`ized. Cisco Press or Cisco Systems, Inc., cannot attest to the accuracy of this information. Use of a term in this book
`should not be regarded as affecting the validity of any trademark or service mark.
`
`Warning and Disclaimer
`This book is designed to provide information about basic networking and operating system technologies. Every
`effort has been made to make this book as complete and as accurate as possible, but no warranty or fitness is
`implied.
`The information is provided on an “as is” basis. The author, Cisco Press, and Cisco Systems, Inc., shall have neither
`liability nor responsibility to any person or entity with respect to any loss or damages arising from the information
`contained in this book or from the use of the discs or programs that may accompany it.
`The opinions expressed in this book belong to the author and are not necessarily those of Cisco Systems, Inc.
`
`Feedback Information
`At Cisco Press, our goal is to create in-depth technical books of the highest quality and value. Each book is crafted
`with care and precision, undergoing rigorous development that involves the unique expertise of members from the
`professional technical community.
`Readers’ feedback is a natural continuation of this process. If you have any comments regarding how we could
`improve the quality of this book or otherwise alter it to better suit your needs, you can contact us through e—mail at
`feedback@ciscopress.com. Please make sure to include the book title and ISBN in your message.
`
`We greatly appreciate your assistance.
`
`003
`
`003
`
`

`

`
`
`Publisher
`Editor-in-Chief
`Executive Editor
`Cisco Systems Management
`
`Production Manager
`Development Editor
`Senior Editor
`Copy Editor
`Technical Editor
`Reviewers
`
`Associate Editor
`Cover Designer
`Composition
`Indexer
`
`John Wait
`John Kane
`Carl Lindholm
`Michael Hakkert
`Tom Geitner
`William Warren
`
`Patrick Kanouse
`Kitty Wilson Jairett
`Jennifer Chisholm
`Jill Batistick
`Dr. Thomas W. Shinder
`Lynn Bloomer
`Wayne Jarvimaki
`Michael R. Hanson
`
`Shannon Gross
`Louisa Klucznik
`Steve Gifford
`Tim Wright
`
`CISCO SYSTEMS
`
`Corporate Headquarters
`Cisco Systems, Inc.
`170 West Tasman Drive
`San Jose, CA 95134—1706
`USA
`http://www.cisco.com
`Tel: 408 526-4000
`800 553—NETS (6387)
`Fax: 408 526—4100
`
`M®
`European Headquarters
`Americas Headquarters
`Cisco Systems Europe
`Cisco Systems, Inc.
`11 Rue Camille Desmoulins
`170 West Tasman Drive
`92782 Issy-les-Moulineaux
`San Jose, CA 95134-1706
`Cedex 9
`USA
`France
`http://www.cisco.com
`http://www-europe.cisco.com
`Tel: 408 526—7660
`Tel:
`33 l 58 04 6O 00
`Fax: 408 527-0883
`Fax: 33 l 58 04 61 00
`
`Asia Pacific Headquarters
`Cisco Systems Australia, Pty.,
`Ltd
`Level 17, 99 Walker Street
`North Sydney
`NSW 2059 Australia
`http://www.cisco.com
`Tel: +61 2 8448 7100
`Fax: +61 2 9957 4350
`
`Cisco Systems has more than 200 offices in the following countries. Addresses, phone numbers, and fax numbers are listed on the
`Cisco Web site at www.cisco.com/go/oftices
`
`- Bulgaria - Canada - Chile - China - Colombia - Costa Rica -
`Argentina - Australia - Austria - Belgium - Brazil
`Croatia ' Czech Republic - Denmark - Dubai, UAE ' Finland - France
`- Germany - Greece - Hong Kong - Hungary 0
`India - Indonesia - Ireland - Israel
`- Italy - Japan - Korea ' Luxembourg - Malaysia - Mexico - The Netherlands - New
`Zealand - Norway - Peru - Philippines - Poland - Portugal
`‘ Puerto Rico - Romania - Russia - Saudi Arabia - Scotland
`~ Singapore ' Slovakia - Slovenia - South Africa - Spain ' Sweden - Switzerland - Taiwan - Thailand - Turkey - Ukraine
`- United Kingdom - United States 0 Venezuela . Vietnam - Zimbabwe
`
`Copyright © 2001, Cisco Systems, Inc, All rights reserved. Access Registrar, AccessPath, Are You Ready, ATM Director, Browse with Me, CCDA, CCDE, CCDP, CCIE, CCNA,
`CCNP, CCSI, CD~PAC, CiscoLink, the Cisco NetWorks logo, the Cisco Powered Network logo, Cisco Systems Networking Academy. Fast Step, FireRunner, Follow Me Browsing,
`FormShare, GigaStack, IGX, Intelligence in the Optical Core, Internet Quotient, lP/VC, iQ Breakthrough, iQ Expertise, iQ Fast'l‘rack, iQuick Study. iQ Readiness Scorecard, The
`iQ Logo, Kernel Proxy. MGX, Natural Network Viewer, Network Registrar, the Networkers logo, Packel, P1X, Point and Click lntcrnetworking, Policy Builder, RateMUXv
`ReyMaster, ReyView, ScriptSharc. Secure Script, Shop with Me, SlideCast, SMARTnet, SVX, TrafficDirector, TransPath, VlanDirector, Voice LAN, Wavelength Router,
`Workgroup Director, and Workgroup Stack are trademarks of Cisco Systems, Inc: Changing the Way We Work, Live, Play. and Learn, Empowering the Internet Generation, are
`service marks of Cisco Systems, Inc.: and Aironet. ASIST, BPX, Catalyst, Cisco, the Cisco Certified lnternetwork Expert Logo. Cisco 108, the Cisco IOS logo, Cisco Press, Cisco
`Systems, Cisco Systems Capital, the Cisco Systems logo. Collision Free. Enterprise/Solver, EtherChannel, EtherSwitch, FastHub. FastLink, FttstPAD, IOS, lP/TV, IPX, LightStream,
`LightSwitch. MICA, NetRanger, PoshRouting, Pro—Routing, Registrar, Stratthew Plus, Stratm. S\vitchProbe, TeleRouter, are registered trademarks of Cisco Systems, Inc, or its
`affiliates in the US. and certain other countries.
`
`All other brands, names, or trademarks mentioned in this document or Web site are the property of their respective owrters. The use of the word partner does not imply a partnership
`relationship between Cisco and any other company. (OOlOR)
`
`004
`
`004
`
`

`

`xxii
`
`
`Introduction
`Computer Networking Essentials helps you understand the fundamentals of computer networking concepts and
`implementation and introduces you to the client and server operating systems that run on networked PCs.
`Concepts covered in this book include the history of networking, networking terminology, networking theory and
`established standards, and implementation of local—area and wide-area networks. Special emphasis is placed on
`understanding network protocols and how they operate at all layers of the networking model. Emphasis also is
`placed on the interoperability of networks that run on multiple protocols, platforms, and operating systems.
`Specialty areas such as security, remote access, virtual private networking, thin client networking, monitoring, man~
`agement, and troubleshooting are covered thoroughly. Emerging technologies that are expected to impact the future
`of networking are also introduced.
`
`Who Should Read This Book
`This book’s primary audience is professionals who are beginning training in the networking industry and those who
`need a review of basic concepts.
`
`The secondary audience includes corporate training faculties and staff and members of the business world who
`work with information technology personnel and require a broad overview of the concepts involved in networking
`from the small business to the enterprise—level corporation.
`
`A third target audience is the general user who wants to know more about how computers communicate over net-
`works. The book’s approach is designed to be user—friendly and accessible to the non-technical reader who is
`overwhelmed by the jargon found in vendor documentation and technical manuals.
`
`This Book’s Organization
`This book is organized into four parts and includes 19 chapters, an appendix, and a glossary. The following sections
`describe the contents of each part of the book.
`
`Part I: Introduction to Networking Concepts
`
`Chapter 1, “Introduction to PC Networking,” introduces you to the basic concepts of PC networking by providing a
`brief history of electronic communications and networking and a summary of where PC networking is today.
`Chapter 2, “Categorizing Networks,” discusses the categorization of networks according to physical scope, admin—
`istrative model, network operating system, protocols in use, topology, and architecture.
`Chapter 3, “Networking Concepts, Models, and Standards,” provides an overview of binary communications and
`introduces two popular networking models: the Department of Defense (DOD) model on which the TCP/IP proto-
`cols are based and the Open Systems Interconnection (081) model, which was developed by the International Orga—
`nization for Standardization (ISO). Specifications set forth by the Institute of Electrical and Electronics Engineers
`(IEEE) and vendor—specific models are also covered.
`Chapter 4, “Networking Communications Methods,” discusses signaling methods and provides an understanding of
`analog, digital, broadband, baseband, asynchronous, synchronous, simplex, duplex, and multiplexed signaling.
`Media access methods are described, including CSMA/CD, CSMA/CA, token passing, and demand priority.
`Chapter 5, “LAN Links,” discusses popular LAN types, including Ethernet, Token Ring, FDDI, AppleTalk, and
`ARCnet.
`
`Chapter 6, “WAN Links,” provides an overview of WAN connections such as PSTN, ISDN, t—carriers, Frame Relay,
`X25, and CATV network, as well as high—speed connectivity solutions such as ATM, SONET, and SMDS. This
`
`005
`
`005
`
`

`

`xxiii
`
`
`chapter also covers LAN—to-WAN connection solutions, including Internet Connection Sharing (ICS), Network
`Address Translation (NAT), proxy servers, and routed connections.
`
`Part 11: Networking Hardware and Software
`
`Chapter 7, “Physical Components of the Network,” introduces students to the many types of networking media,
`including coax, twisted—pair cable, and fiber—optic cable, as well as to wireless technologies such as laser, infrared,
`radio, and satellite/microwave communications. Connectivity devices such as repeaters, hubs, bridges, routers, and
`switches are also discussed.
`
`Chapter 8, “Networking Protocols and Services,” describes common LAN protocols—TCP/IP, NetBEUI, IPX/
`SPX—and discusses the OSI protocol suite. PPP and SLIP, which are WAN link protocols, and PPTP and LZTP,
`which are common tunneling protocols, are also presented.
`
`Chapter 9, “The Widest Area Network: The Global Internet,” discusses the evolution of the Internet, the protocols
`used for Internet communicationsmHTTP, FTP, NNTP, SMTP, and POP—and the TCP/IP protocol suite.
`
`Chapter 10, “Network Operating Systems,” discusses general network administration practices and then looks at the
`specifics of common server operating systems, including Windows NT, Windows 2000, NetWare, UNIX, and Linux.
`
`Chapter 11, “Directory Services,” describes the Directory Services Protocol (DAP) and the Lightweight Directory
`Access Protocol (LDAP), as well as the X500 standards developed by the ISO to promote directory services com-
`patibility and interoperability. Novell’s NDS, Microsoft’s Active Directory, and Banyan VINES’ StreetTalk direc-
`tory services are covered in some depth.
`
`Chapter 12, “Desktop Operating Systems,” looks at the client side of the client/server network and discusses the
`advantages and disadvantages of common desktop clients, such as DOS, Windows, Linux, Macintosh, and 05/2,
`and how each can be integrated into popular NOS environments.
`
`Chapter 13, “Hybrid Networks,” provides information about interoperability solutions and protocol gateways that
`allow PCs running different operating systems, protocols, and platforms to communicate with one another. This
`chapter also looks at PC—to—mainfrarne communications using Systems Network Architecture (SNA) solutions.
`
`Part III: Network Specialty Areas
`
`Chapter 14, “Protecting the Network,” addresses security issues and provides an overview of basic cryptography
`concepts, public and private key encryption, certificate services, firewalls and proxies, and internal security mea-
`sures such as “smart cards” and advanced authentication technologies. It also provides guidance for developing
`security policies for your network. The second half of the chapter discusses disaster recovery plans, including
`implementation of disk fault tolerance (or RAID), regular scheduled backups, and server
`clustering.
`
`Chapter 15, “Remote Access,” discusses methods of connecting to a server from a remote location using remote
`connectivity devices such as modems, ISDN terminal adapters, and customer premises equipment (CPE) for dedi—
`cated lines. Dial-in server configuration and special security considerations are also covered.
`
`Chapter 16, “Virtual Private Networking,” provides an overview of VPN concepts and discusses the tunneling pro—
`tocols used to provide VPN security.
`
`Chapter 17, “Thin Client Networking,” discusses Network Computers, Net PCs, and Windows-based terminals.
`Windows terminal services, Citrix Metaframe, web-based computing, the X Window system and Java virtual
`machines—and the role each plays in thin client networking—are also discussed.
`
`Chapter 18, “Monitoring, Management, and Troubleshooting Tools,” presents an introduction to the TCP/IP utilities
`and other tools built into the various operating systems. This chapter also examines commercial products such as
`Sniffer Pro, LANanalzyer, Microsoft’s Systems Management Server, Novell’s ManageWise, and IBM’s Tivoli.
`
`006
`
`006
`
`

`

`xxiv
`
`
`Part IV: The Future of Networking
`Chapter 19, “Tomorrow’s Technologies,” takes a look into the future of PC networking. It discusses ways of over-
`coming the current limits of IP, including the new version of IP——-1Pv6. The goal of universal connectivity is
`addressed, and more exotic possibilities such as artificial intelligence, quantum computing, and cybernetic life
`forms are presented as possible components of tomorrow’s networks.
`
`This Book’s Features
`This book contains several elements that help you learn about operating systems and networking:
`Figures, listings, and tables—This book contains figures, listings, and tables that help to
`explain concepts, commands, and procedural sequences. Diagrams illustrate network layouts
`and processes, and screenshots assist students in visualization configuration procedures. In addi-
`tion, listings and tables provide summaries and comparisons of features and characteristics.
`Author’s notes, tips, sidebars, and cautionsflThese elements are included to provide you
`with extra information on a subject. You will probably find these asides to be very beneficial in
`real—world implementations.
`Chapter summaries—At the end of each chapter is a summary of the concepts covered in the
`chapter, which provides a synopsis of the chapter and can serve as a study aid.
`Further Reading-Each chapter includes a list of resources for additional information about
`the topics covered in the chapter, including website URLs and books and articles that cover the
`topic in more detail.
`Review questions——After the Further Reading section in each chapter are 10 review questions
`that serve as an end—of—chapter assessment. The questions are designed to reinforce the con-
`cepts introduced in the chapter and to help students evaluate their understanding before moving
`on to the next chapter.
`The conventions used to present command syntax in this book are the same conventions used in the Cisco IOS
`Command Reference, as follows:
`Boldface indicates commands and keywords that are entered literally as shown. In examples
`(not syntax), boldface indicates user input (for example, a show command).
`Italics indicates arguments for which you supply values.
`
`Square brackets [] indicate optional elements.
`Vertical bars (I) separate alternative, mutually exclusive elements.
`Braces and vertical bars Within square bracketswfor example, [x {y | z}]-——indicate a required
`choice within an optional element. You do not need to enter what is in the brackets, but if you
`do, you have some required choices in the braces.
`
`007
`
`007
`
`

`

`
`
`>==cHAp+En
`
`
`
`VWAhthwks
`
`
`The technologies, media, and equipment that work well for the short distances spanned by
`a LAN or MAN are generally not suitable for long-distance wide-area networks (WANs).
`In today’s very mobile world, high-performance, cost—effective WAN technologies are a
`necessity for many reasons:
`
`' Executives and other employees need access to their corporate networks while on the
`road or at home.
`
`' Companies with branch offices in widely dispersed geographic locations need
`network connectivity between locations.
`
`' Organizations want to share information with other organizations physically
`separated by long distances.
`
`' Commercial, governmental, and educational bodies and individuals need access to the
`resources available on the global Internet.
`
`It is obviously impossible to string Ethernet cable from the home office in Denver to the
`branch office in Houston. Even if cabling distance limitations did not apply, this would not
`be a viable solution for connecting international sites.
`
`WANs require a whole new set of technologies and rules of implementation. In this chapter,
`we discuss the concept of networking over long distances and the technologies commonly
`used to connect computers that are located in different states, countries, or even different
`continents. These range from the Public Switched Telephone Network (PSTN) already in
`place in most of the world to modern high—tech solutions such as satellite communications
`technologies that enable us to “talk” to computers in space.
`
`Wide-area networking presents many challenges not encountered in implementing a
`network that is confined to one geographic area. A WAN is not just a really big LAN.
`Rather, it is a collection of many separate LANs, connected by links that are different in
`many ways from LAN links. WANs that span international boundaries require
`consideration of even more factors, including time zones and language differences.
`
`008
`
`008
`
`

`

`160 Chapter 6: WAN Links
`
`Designing a WAN is a complex task. Choosing the appropriate technology involves
`analyzing the purpose(s) the WAN will serve, the number of users, the bandwidth
`requirements, and the patterns of use. We can categorize these considerations as follows:
`° WAN hardware
`
`' WAN topologies
`
`° Network switching types
`
`’ New and emerging WAN technologies
`
`’ LAN/WAN connectivity
`
`We look at each issue in the sections that follow.
`
`WAN Hardware
`
`The hardware necessary to implement a WAN link can be as simple and inexpensive as a
`telephone line and a modem at each end. On the other hand, it can be complex and costly.
`In general, equipment cost and complexity increases with increased speed and reliability.
`
`In the following sections, we discuss common WAN devices, including modems, ISDN and
`digital subscriber line (DSL) terminal adapters, and customer premises equipment (CPE)
`used with dedicated links such as T—carrier connections and X.25.
`
`Modems
`
`To establish a network connection (to an Internet service provider or to a dial-up server on
`a private network) over public telephone lines, you use a device called a modem.
`
`
`
`TIP
`
`' The word “modem” is derived from the actions it performs; a modem modulates and
`demodulates a signal. In other words, it converts the sending computer’s digital signal to
`analog for transmission over the analog line and then converts it back to digital for
`processing by the receiving computer.
`
`Modems come in two physical types: internal and external. Each has advantages and
`disadvantages, and configuration is slightly different depending on the type. Either way,
`modems are serial devices, which means bits are sent one at a time. This can be contrasted
`with parallel devices, such as printers, to which multiple bits can be sent simultaneously.
`A serial transmission is analogous to a group of people marching in a straight line, and a
`parallel transmission is like having the same group marching in rows of three across.
`
`009
`
`009
`
`

`

`161
`WAN Hardware
`
`
`internal Modems
`
`One advantage of the internal modem is compactness. It is a circuit board card that fits in
`an ISA (Industry Standard Architecture) or PCI (Peripheral Component Interconnect) slot
`inside the computer, as shown in Figure 6-1. This means that you don’t have to find room
`for an extra device on your desk. In addition, you are not required to buy a serial cable,
`which you might be forced to do if you use an external model that doesn’t include one in
`the box.
`
`Figure 6-1
`
`An internal modem is a circuit board thatfits inside the computer
`
`Jumpered pins
`
`
`
`
`
`
`
`
`
`‘ ' ‘
`‘
`
`
`
`
`
`
`IIE
`
`
`
`
`
`
`
`Typical
`internal modem card
`
`
`
`
`
`RJ-11 jack
`for attaching
`phone line
`
`Internal Modem Configuration Parameters
`Internal modems are traditionally more difficult to configure than external modems. You
`must set the IRQ, the input/output addresses, and the virtual com ports to ensure that they
`don’t conflict with the settings of some other device in your computer. Let’s look more
`closely at each setting and how it is used:
`
`'
`
`'
`
`Interrupt Request (IRQ)——This is an assigned location that designates where the
`system expects the device to interrupt it when the device sends a signal. Signals from
`different devices that go to the processor on the same interrupt line would interfere
`with each other, so a separate IRQ must be assigned to each device.
`
`Input/Output (I/O) address—~This is the location where data sent from the device is
`stored before it is processed by the CPU. As with the IRQ, if multiple devices attempt
`to use the same I/O address, one or both devices might not work properly.
`
`‘ Virtual com port—This is a logical port number, by which the operating system
`identifies a serial port. You must set each serial device to use a different com port.
`
`010
`
`010
`
`

`

`162
`Chapter 6: WAN Links
`
`All popular operating systems provide a means by which you can view how resources are
`being used, and which ones are not in use, so that you can choose free resources to assign
`to your new device.
`
`Changing the Internal Modem Settings
`
`Internal modems generally provide a way to change the configuration settings. Depending
`on the manufacturer and model, you can change IRQ, I/O, and com port settings with the
`following:
`
`° Dip switches—These are small switches on the circuit board that can be moved to a
`different position. The position of the switch designates which setting is to be used.
`

`
`Jumpers—Pairs of metal pins built into the circuit board, these represent an electrical
`contact point. Jumpers are configured by placing a small plug on the pins to complete
`the circuit. The instructions that come with your internal modem tell you how the
`jumpers should be set to use a specific IRQ, I/O address, or com port.
`
`' Software—Some modems do not have physical switches or jumpers, but do come
`with a software program that is run to change the configuration.
`
`Plug and Play
`
`Many modern modems support Plug and Play (PnP) technology, which enables the
`operating system to detect the device, install the necessary software drivers, detect what
`resources are free on the computer, and assign those resources to the device automatically.
`Little or no intervention is required from the user.
`
`PnP is great—when it works and when you are aware of a few caveats. If you buy a modem
`or other device that is advertised as Plug and Play, it is automatically configured only if the
`following is true:
`
`' Your computer’s BIOS (Basic Input/Output System) supports PnP.
`
`' You are running a PnP operating system.
`
`Both criteria must be met. Computer motherboards produced after 1995 usually support
`PnP. Operating systems that support PnP include Windows 95, 98, ME, and 2000.
`
`
`
`NOTE
`
`Windows NT is not a PnP operating system. However, it does have limited PnP
`functionality and detects some modem types.
`
`011
`
`011
`
`

`

`WAN Hardware
`
`
`163
`
`External Modems
`
`External modems have a couple advantages over the internal variety:
`
`' Most external modems provide status lights, which indicate when the modem is
`powered on, connected, or transferring data. See Figure 6-2.
`
`' External modems are generally easier to install and configure. There are no switches
`or jumpers to set, and you don’t have to open the computer case.
`
`Figure 6-2
`
`External modems provide status indicator lights.
`
`RJ~11 jacks to connect
`phone line
`.
`Typical external modem
`
`MOTOROLA
`
`RD
`SD
`
` Serial cable
`
`Power cord
`connector
`
`Status indicater
`lights
`
`connector
`
`External modems require power cords to plug into an electrical outlet, but internal modems
`run off the computer’s power. A serial cable connects the modem to one of the serial ports
`on the back of the computer.
`
`Serial Port Considerations
`
`To use an external modem, you need a free serial port. Most computers have two built—in
`serial ports, labeled COM 1 and COM 2, with connectors on the back of the computer.
`
`Many devices, such as scanners, digital cameras, and serial pointing devices, also use serial
`ports. If your computer does not have a free serial port, you have a few options:
`
`' Use an internal modem.
`
`'
`
`'
`
`Install an expansion card in your computer, which enables you to add serial port
`connections.
`
`If your computer’s motherboard supports universal serial bus (USB), you can chain
`multiple serial devices, such as modems, off a single serial port. You might have to
`add a card to provide a USB connector, and you need a USB modem.
`
`UART Chips
`
`Serial ports use a chip called a UART (Universal Asynchronous Receiver/Transmitter) to
`handle serial communications. This chip comes in different types, and the type used
`determines how fast data can be transferred over that serial port.
`
`012
`
`012
`
`

`

`
`164 Chapter 6: WAN Links
`
`The first PCs had 8250 UART chips. The top speed for this chip is 9600 bps, which means
`that even if you attach a high speed (56 kbps) modem to one of these ports, your speed
`would be limited by the UART.
`
`Modern computers have UART chips in the 16450 or 16550 series. These serial ports can
`support transfer speeds of up to 115,200 bps.
`’
`
`16650 and 16750 UART chips are also available as add-on “enhanced serial port” cards.
`Internal modems have their own UART chips built into the card, so the speed of the
`computer’s com port is irrelevant.
`
`
`
`NOTE
`
`If you have a high-speed modem and a modern computer, but are able to connect only at
`low speeds, check the com port configuration settings. Some operating systems set the com
`ports to 9600 bps by default; you need to change this setting to realize the port’s full
`capacity.
`
`Modem Drivers
`
`Drivers are software programs that act as a liaison between the hardware device and the
`operating system. Driver software is usually supplied by the modem manufacturer with the
`device, or it can be downloaded from the manufacturer’s Web site.
`
`You must install the correct driver software for your device because if operating system
`code included support for all hardware devices that could possibly be used with it, the
`operating system would require significantly more disk space—wmuch of it wasted on driver
`software that would never be used.
`
`Modem Configuration
`
`In addition to installing the driver software that enables the operating system to recognize
`the modem, and setting the IRQ, I/O address, and com port that the modem will use, you
`have to configure the modem to dial and maintain a connection. Modern operating systems
`have built-in support for dialup networking. You might have to install the remote access
`services if the modern was not present when the operating system was installed.
`
`Modem Banks
`
`A computer can be configured as a dialup server (also called a remote access server) to
`enable other computers to dial into it and connect to it over the phone lines. Computers
`running powerful server software can support many incoming remote access connections
`simultaneously; for instance, Windows NT Server supports up to 256 connections.
`
`013
`
`013
`
`

`

`
`
`WAN Hardware 165
`
`How can you connect 256 modems to a remote server? When you have many simultaneous
`dial-in connections (for example, when the server belongs to a company with many
`telecommuters who need to connect to the corporate network from home), you can use a
`modem bank. Modem banks are also called modem nests or modem pools.
`
`A modern bank enables you to use a group of modems (usually mounted together in a rack)
`with a single server, and host multiple remote connections. The rack of modem cards is
`controlled by an interface that connects to the server, to a router, or directly to the local
`network. Of course, you need a phone line for each separate connection.
`
`ISDN and DSL Adapters
`The device used to connect a computer to an Integrated Services Digital Network (ISDN)
`or DSL telephone line is often referred to as a modem. It is more accurately called a
`terminal adapter because it does not modulate and demodulate signals because ISDN lines
`are digital, unlike the analog PSTN lines.
`
`ISDN Adapters
`
`ISDN adapters, such as modems, come in both internal and external varieties. They are
`configured similarly to modems, but the typical 128-kbps ISDN service consists of two data
`channels that each run at 64 kbps. The two channels are commonly used in a multilink
`configuration to provide the 128—kbps bandwidth. We discuss ISDN technology later in this
`chapter in the section, “ISDN.”
`
`The two data channels have separate telephone numbers in most cases. ISDN adapters are
`configured with information about the service profile identifier (SPID) for each channel,
`which consists of the telephone number, a two-digit sharing terminal identifier, and a two-
`digit terminal identifier (TID). Some modern ISDN adapters support automated SPID
`selection and do not require you to enter this information.
`
`DSL Adapters
`
`Both ends of a DSL connection require a device called an endpoint (and often referred to
`as a DSL modem), which connects to an Ethernet NIC installed in the computer. In some
`cases, the endpoint/modem is external. In others, the endpoint and the NIC are placed
`together on the same card.
`
`Customer Premises Equipment
`
`Customer premises equipment (CPE) is a general term that encompasses several different
`devices. The customer’s site requires this hardware to process incoming transmissions from
`WAN links such as T-carrier lines, X25 connections, and Frame Relay links.
`
`014
`
`014
`
`

`

`
`
`166 ChapterG: WAN Links
`
`Common types of CPE include the following:
`
`' A channel service unit/digital service unit (CSU/DSU), used with circuit—switched
`connections such as a T—l line. The CSU receives and transmits signals to and from
`
`the WAN line. The DSU manages line control, timing errors, and signal regeneration.
`
`‘ A packet assembler/disassembler (PAD), used with packet-switched connections such
`as X25. The PAD is an asynchronous device that enables multiple terminals to share
`a network line. Users dial into PADS through modems.
`
`WAN Topologies
`We discussed LAN topologies in Chapter 2, “Categorizing Networks,” and some of those
`same concepts apply to WANs. In the context of WANs, however, the topology describes
`the arrangement of the transmission facilities.
`
`The simplest WAN topology is a simple point-to—point connection. The WAN, like the
`LAN, also can use traditional networking topologies such as a ring or star.
`
`The Point-to-Point WAN
`
`A p0int—to~point WAN is similar to the LAN topology referred to as a linear bus. A remote
`access link, which can be anything from a 56-kbps dial—up modem connection to a
`dedicated T—l line, connects each point on the WAN to the next. See Figure 63 for an
`illustration of this.
`
`Figure 6-3 A point-to-point WAN directly connects two endpoints.
`
`
`
`San Francisco
`
`
`
`015
`
`015
`
`

`

`
`
`WAN Topologies 167
`
`This is a relatively inexpensive way to connect a small number of WAN sites. However, it
`is not fault tolerant. For example, in Figure 6—3, if the equipment at the Dallas office fails,
`San Francisco and Boston cannot communicate with one another. Limited scalability (the
`
`capability to “grow gracefully,” that is, to continue to function efficiently as the network
`grows larger) is anothe

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket