`
`Your introduction
`to the concepts of
`networking
`
`JoAnne Woodcock
`
`Page 1 of 15
`
`GOOGLE EXHIBIT 1026
`
`
`
`Step Up
`to Networking
`
`"!!·
`
`JoAnne Woodcock
`
`Page 2 of 15
`
`
`
`PUBLISHED BY
`Microsoft Press
`A Division of Microsoft Corporation
`One Microsoft Way
`Redmond,Washington 98052-6399
`
`Copyright © 1999 by Microsoft Corporation
`
`All rights reserved. No part of the contents of this book may be reproduced or transmitted in any form
`or by any means without the written permission of the publisher.
`
`Library of Congress Cataloging-in-Publication Data
`Woodcock, JoAnne.
`Step Up to Networking I JoAnne Woodcock.
`p. em.
`ISBN 0-7356-0572-6
`1. Computer networks.
`TK5105.5.W65 1999
`004.6--dc21
`
`I. Title.
`
`Printed and bound in the United States of America.
`
`1 2 3 4 5 6 7 8 9 MLML
`
`4 3 2 1 0 9
`
`98-55330
`CIP
`
`.;.
`
`Distributed in Canada by ITP Nelson, a division of Thomson Canada Limited .
`
`A CIP catalogue record for this book is available from the British Library.
`
`Microsoft Press books are available through booksellers and distributors worldwide. For further informa(cid:173)
`tion about international editions, contact your local Microsoft Corporation office or contact Microsoft
`Press International directly at fax (425) 936-7329. Visit our Web site at m press.microsoft.com.
`
`Macintosh is a registered trademark of Apple Computer, Inc. used under license. Active X, BackOffice,
`Microsoft, Microsoft Network, Microsoft Press, MS, MS-DOS, Outlook, Windows, and Windows NT
`are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other
`countries. Other product and company names mentioned herein may be the trademarks of their respective
`owners.
`
`The example companies, organizations, products, people, and events depicted herein are fictitious. No
`association with any real company, organization, product, person, or event is intended or should be
`inferred.
`
`Acquisitions Editor: Juliana Aldous
`Project Editor: Lynn Finnel
`
`Page 3 of 15
`
`
`
`1:
`
`·•
`
`..
`
`...
`
`·.
`
`• ,·.
`
`'
`
`.
`
`.
`CoNTENTS a.{ a· Glance· . ..
`
`~~..:_·---..... _
`
`..:...~·.&..=:-__:_:_:.~~~~-=:..:.,~.-~-; ___ •
`
`-· --
`
`.
`
`.
`
`.
`
`·
`
`·
`
`.... : -
`
`,.-~ ........ !_.....r.--•_._,. __
`
`.
`
`·
`
`•
`
`1
`
`_./
`
`'
`
`.·
`
`:
`
`•
`
`. •
`
`Chapter 1
`Chapter 2
`Chapter 3
`Chapter 4
`Chapter 5
`Chapter 6
`Chapter 7
`Chapter 8
`Chapter 9
`Chapter 10
`
`Introduction
`
`Networks: Past, Present, and Future
`A Network Does ...
`Networks, NetWorks Everywhere
`Standardizing Networks
`LANs
`LAN Hardware and Software
`Larger LANs and WANs
`WAN Technologies
`The Internet and the Web
`The Basic Web
`
`Glossary
`
`Index
`
`xiii
`
`3
`21
`39
`65
`91
`127
`159
`193
`221
`243
`
`267
`
`299
`
`,;.
`
`Page 4 of 15
`
`
`
`·
`
`TABLE oF CoNTENTS
`
`Introduction
`
`What You Will Find Here
`
`About You
`
`What's Next?
`
`Skills 2000
`
`What to Do Next
`
`Chapter 1
`
`Networks: Past, Present, and Future
`
`The Idea of a Network
`
`The Road Behind
`The 1960s
`
`Dumb Terminals and Timesharing
`
`Long-Distance Timesharing
`
`ARPANET
`
`The PC Revolution
`
`Going Global
`
`The Future
`
`Chapter 2
`
`A Network Does ...
`
`Communication First
`
`Networking in RealTime
`
`Networking Asynchronously
`
`Sharing and Distribution
`
`How Communication Needs Affect a Network
`
`Reliability
`
`Scalability
`
`Security
`Speed
`
`Chapter 3
`
`Networks, Networks Everywhere
`
`Networks As a Whole
`
`Types of Networks
`
`xiii
`
`xiii
`
`xiv
`
`XV
`
`XV
`
`xvi
`
`3
`
`4
`
`6
`6
`
`7
`9
`
`10
`
`11
`14
`
`17
`
`21
`
`21
`22
`23
`
`24
`
`27
`
`28
`
`30
`
`31
`
`35
`
`39
`
`39
`
`40
`
`~
`
`v
`
`Page 5 of 15
`
`
`
`TABLE OF CONTENTS
`
`•
`
`.
`
`.
`
`.
`
`.
`
`lANs vs. WANs
`
`Everything Starts with Computers
`
`The Shape of a Network
`
`Bus
`
`Ring
`Star
`
`How Network Traffic Gets from Here to There
`Data Packets
`
`Transmissions
`
`Chapter 4
`
`Standardizing Networks
`
`Network Models
`
`What Open Systems Interconnection Means
`
`Other Networking Models
`
`Network Models and Protocols
`
`Protocol Stacks and Suites
`
`A Quick Look at a Protocol Stack
`Where Standards Come From
`
`ANSI
`EIA
`
`IEEE
`
`IETF
`ISO
`
`ITU
`
`W3C
`
`Chapter 5
`
`LANs
`
`Variations on a LAN
`
`IEEE 802.x
`
`LLC and MAC
`
`The Standards Themselves
`
`vi
`
`45
`
`46
`
`51
`
`52
`
`53
`
`54
`55
`
`56
`
`59
`
`65
`
`65
`
`66
`
`76
`
`81
`
`82
`
`83
`
`85
`86
`
`86
`
`87
`87
`
`88
`
`88
`
`89
`
`91
`
`93
`
`94
`
`94
`
`95
`
`Page 6 of 15
`
`
`
`IEEE 802.3: Ethernet
`
`CSMA/CD.
`
`Features Common to Ethernet Networks
`
`Variations on the Ethernet Theme
`
`Buses, Rings, and Tokens
`
`Tokens and Token Passing
`
`IEEE 802.5: Token Ring
`IEEE 802.4: Token Bus
`
`ARCnet: Token Bus for LANs
`
`Other IEEE LAN Specifications
`
`IEEE 802.9: Isochronous LANs
`
`IEEE 802.11: Wireless Networks
`Leading LAN Protocols
`
`Binding
`
`TCP/IP
`
`NetBEUI
`
`DLC
`
`XNS
`
`IPX/SPX
`
`APPC
`
`Apple Talk
`
`OSI
`
`DECnet
`
`Chapter 6
`
`LAN Hardware and Software
`
`Hardware
`
`Clients and Servers
`
`Adapters
`
`Adapter Drivers
`
`NDIS and ODI
`
`Connectors
`
`.
`
`TABLE oF CoNTENTS
`
`96
`
`97
`99
`
`99
`
`104
`105
`106
`
`108
`110
`
`111
`111
`
`113
`
`115
`
`116
`116
`
`118
`
`119
`
`119
`
`121
`
`122
`
`122
`
`123
`
`124
`
`127
`
`127
`
`128
`
`128
`
`131
`
`131
`
`132
`
`-
`
`vii
`
`Page 7 of 15
`
`
`
`TABLE OF CONTENTS
`
`Cables
`
`Collection Centers and Shuttle Services
`
`Wireless Transmissions
`Software
`
`Network Operating Systems
`
`Administrative Tools
`
`Other Server Software
`
`Client Software
`
`Chapter 7
`
`Larger LANs and WANs
`
`Larger LANs
`
`Repeaters
`
`Bridges
`
`Routers
`
`Brouters
`
`Gateways
`
`~
`
`On toWANs
`
`WANs and Enterprise Networks
`Communications
`
`Modems
`
`Transmission Types
`
`Communications Carriers
`
`POTS
`
`Digital
`
`DDS
`
`ISDN
`
`T1/T3
`
`xDSL
`
`Chapter 8
`
`WAN Technologies
`
`The Way of a WAN
`
`viii
`
`136
`142
`146
`147
`148
`151
`155
`155
`
`159
`
`159
`160
`161
`163
`165
`165
`167
`168
`168
`169
`179
`184
`184
`185
`186
`186
`188
`190
`
`193
`
`193
`
`Page 8 of 15
`
`
`
`Circuit Switching
`
`Message Switching
`
`Packet Switching
`
`Connectionless and Connection-Oriented Services
`
`Types of Packet-Switching Networks
`
`Developing Technologies
`FDDI
`SO NET
`
`SMDS
`
`Chapter 9
`
`The Internet and the Web
`
`Structure of the Internet
`
`Regional and Other Networks
`
`Internet Providers
`
`Internet and Web Commonalities
`
`Domains
`
`DNS Databases and I P Addresses
`
`NSI, lANA, ICANN, and the Future
`
`Organizations and Standards Groups
`
`Internet Connections
`ppp
`
`SUP
`
`CSLIP
`
`Internet and Web Protocols and Services
`
`Search Engines and Services
`
`
`News
`
`Tel net
`
`MUDs, Chats, and Other Forms of Play
`
`195
`195
`196
`197
`198
`208
`209
`213
`216
`
`221
`
`222
`223
`223
`224
`224
`227
`230
`231
`232
`233
`234
`235
`235
`236
`238
`239
`240
`241
`
`-
`
`ix
`
`Page 9 of 15
`
`
`
`.
`
`.
`TABLE OF CONTENTS
`
`Chapter 10
`
`The Basic Web
`
`.
`
`.
`
`.
`
`.
`
`The Internet and the World Wide Web
`
`Web Sites
`
`Web Addresses and URls
`
`Web Browsers
`
`HTML: The Language of the Web
`
`HTTP: The Web Transport Service
`Businesses and the Web
`
`lntranets and Extranets
`
`Electronic Commerce
`
`Summing Up
`
`Glossary
`
`Index
`
`.
`· •
`
`243
`
`244
`244
`247
`248
`249
`252
`254
`254
`255
`263
`
`267
`
`299
`
`X
`
`Page 10 of 15
`
`
`
`3: Networks, Networks Everywhere
`
`which is usually installed in one of the expansion slots inside the ma(cid:173)
`chine. The network adapter card is responsible for both sending messages
`and for monitoring-"listening" to-the network for incoming messages
`addressed to the client. To actually connect the client to the network ca(cid:173)
`bling, the network adapter includes a port that accepts a cable ending in
`one of several types of connectors. Depending on the type of network, the
`connector can be a round plug known as a BNC (British Naval Connector);
`it can be a 15-pin c:ttachment unit interface (AUI) connector-a typical
`"computer"-looking connector; or it can be an Rf-45 jack similar to, but
`larger than, the connector on a telephone wire.
`
`BNC connector
`
`RJ connector
`
`AUI connector
`
`Servers
`Network servers are the behind-the-scenes workhorses that provide ser(cid:173)
`vices requested by the client computers (desktop machines and worksta(cid:173)
`tions). The servers themselves can be categorized in different ways,
`depending on the type of work they do.
`
`Dedicated and nondedicated servers First of all, servers can be classified
`as either dedicated servers or nondedicated servers.
`Dedicated servers are the (usually) quite powerful machines that power the
`network and provide resources but are never used for the tasks performed
`
`47
`
`Page 11 of 15
`
`
`
`Step Up to Networking
`
`by the client desktop PCs and workstations that request their services.
`These machines must be fast enough and powerful enough to handle mul(cid:173)
`tiple simultaneous user requests and to run a network operating system
`that provides for network security, administration, and management.
`
`Nondedicated servers, typical of peer-to-peer networks, are machines that
`are set up so they can both provide (serve) resources and do the work re(cid:173)
`quired of a client machine. These machines can, in fact, be normal desk(cid:173)
`top PCs in their day-to-day lives, as long as they run an operating system,
`such as Windows 98 or Windows NT Workstation, that gives them the
`ability to share files and resources. Specialized services, such as high(cid:173)
`level security and centralized administration and management, are notre(cid:173)
`quired on a nondedicated server.
`
`As for the actual hardware .... A nondedicated server requires less process(cid:173)
`ing power, memory, and disk storage than a dedicated server so, typically,
`it can be a machine along the lines of a Pentium-class desktop computer
`with, say, a standard serving of 32 to 64MB of RAM and a hard disk of 3GB
`or more. In contrast, a dedicated server, such as one running Windows NT
`Server, can be (and in large enterp~ises usually is) a much more powerful
`machine. In high-demand situations, as when such a server hosts a popu(cid:173)
`lar Web site or provides database access to a large number of people, the
`server might even contain eight or more Pentium II processors, or it might
`be based on a RISC (Reduced Instruction Set Computing) chip such as the
`Sun SPARC (Scalable Processor Architecture). It almost surely has large
`quantities of RAM-128 MB or more-and it might have multiple disk
`drives. It is also certain to be protected by some type of backup power sup(cid:173)
`ply and to be carefully monitored both in terms of performance and stability.
`
`Specialized servers Dedicated servers can further be classified by the
`type of work that they do. Although it's tempting to picture servers as
`simply sitting in the middle of the network somewhere, dishing up
`whatever flavor of data their clients request, such a picture would be more
`than just a little oversimplified. It's far better to think of these servers as
`specialized "chefs" in a blue-ribbon kitchen. Instead of concentrating on
`sauces, desserts, and main courses, however, these servers are equipped
`with specialized software services (often, though confusingly, also called
`
`..
`
`48
`
`Page 12 of 15
`
`
`
`3: Networks, Networks Everywhere
`
`servers) that enable them to concentrate on serving up access to: files,
`printers, applications, mail, faxes, communications, and even backup
`services to guard the network's invaluable data stores. Here's a closer look
`at these jobs and what they entail:
`
`• File servers store whole files. When a client requests a particular
`file from a file server, the server transfers the entire document to the
`client. Note that the server does no processing of its own; all the
`processing is done by an application rurining on the computer that
`requests the file. In other words, processing is done at the front end
`(the desktop), rather than the back end (the server). As shown in
`Figure 3-1, the file server in effect serves as a document library, one
`that "checks out" files to its clients when asked to do so.
`
`• Print servers provide access to one or more attached printers.
`Sometimes, the same server acts as both a file server and a print
`server. In other situations, which may be based on the networking
`software that oversees these services, the print server is a machine
`dedicated solely to printing.
`
`• Application servers have a somewhat misleading name. Although
`it sounds as though they're dedicated to handing out applications to
`clients, in fact they are not. Their job is to store information, such as
`databases, and to perform back-end processing on that information
`
`File
`server
`
`Figure 3-1.
`
`A file server delivers whole documents to its clients.
`
`49
`
`Page 13 of 15
`
`
`
`Step Up to Networking
`
`in order to deliver only the portion of data the client requests. In
`other words, the application server runs an application to sift
`through the entire mass of data it holds and find what the client
`wants. The server then delivers just that portion of the data to the
`client's desktop. As shown in Figure 3-2, the fact that an application
`server processes information before delivery to the desktop distin(cid:173)
`guishes it from a file server.
`
`• Mail servers operate as the network postal service. They provide a
`centralized post office for message handling and storage, and they
`work to deliver mail messages to network users, either immediately
`or, as in the case of remote users, on a "when I ask for it" basis. De(cid:173)
`pending on the size of the installation, a mail server can be dedi(cid:173)
`cated only to messaging or (in smaller environments) it can perform
`other duties as well.
`
`• Fax servers are computers equipped with fax/modem boards. As
`you would imagine, they handle incoming and outgoing faxes for
`the organization.
`
`• Communication servers coordinate traffic. Although their name
`suggests some type of messaging service, communication servers ac(cid:173)
`tually handle traffic between the network they serve and other locations,
`including other networks, mainframe computers, and users dialing
`
`Application
`server
`
`Figure 3-2.
`
`An application server delivers requested portions of its data to its clients.
`
`50
`
`Page 14 of 15
`
`
`
`-
`
`3: Networks, Networks Everywhere
`
`into or out of the organization. Gateways, which you'll meet later,
`are a type of communication server.
`
`• Backup servers concentrate on preserving data. With the help of
`backup software and storage media, such as disk or tape, they have
`the ability to perform regularly scheduled backups to archive data
`and thus safeguard the network's store of information.
`
`The Shape of a Network
`The shape, or more technically the topology, of a network refers to the way
`the computers are cabled together. There are three basic designs that net(cid:173)
`works follow, known as bus (essentially a straight line), ring, and star. Al(cid:173)
`though the actual, physical shape of the network might not bear much, if
`any, resemblance to a line, a ring, or a star if you could peer down on them
`from above, the actual connections logically, if not physically, correspond
`to these shapes. That is, network traffic does, indeed, travel in a line, a
`loop, or outward in a starlike pattern. To help you see how this works, the
`following illustration shows a network based on a ring topology in which
`computers are connected one to the other in a closed loop. If you imagine
`these computers as being in different offices or even on different floors of
`a building, you can see that the network might not physically resemble a
`ring, but the logical connections do, indeed, form a closed circle.
`
`~
`
`51
`
`Page 15 of 15
`
`



