`
`
`
`Computer Networking
`Essentials
`
`An essential guide to understanding networking
`theory, implementation, and interoperability
`
`001
`
`Apple Inc.
`APL1014
`
`US. Patent No. 8,724,622
`
`Apple Inc.
`APL1014
`U.S. Patent No. 8,724,622
`
`001
`
`
`
`Computer Networking Essentials
`
`DEbfakyL‘ittiejohn Shinder
`
`Cisco: Press
`
`r
`Cisco Press L
`201 West 103rd Street
`
`Indianapolis, IN 46290 USA
`
`002
`
`002
`
`
`
`
`
`Computer Networking Essentials
`Debra Littlejohn Shinder
`
`Copyright © 2002 Cisco Systems, Inc.
`Published by:
`Cisco Press
`201 West 103rd Street
`
`Indianapolis, IN 46290 USA
`All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means, electronic
`or mechanical, including photocopying, recording, or by any information storage and retrieval system, without
`written permission from the publisher, except for the inclusion of brief quotations in a review.
`Printed in the United States of America 3 4 5 6 7 8 9 0
`
`Third Printing
`January 2002
`Library of Congress Cataloging—in-Publication Number: 2001090429
`ISBN: l-587l3~038—6
`
`Trademark Acknowledgments
`All terms mentioned in this book that are known to be trademarks or service marks have been appropriately capita1~
`ized. Cisco Press or Cisco Systems, Inc., cannot attest to the accuracy of this information. Use of a term in this book
`should not be regarded as affecting the validity of any trademark or service mark.
`
`Warning and Disclaimer
`This book is designed to provide information about basic networking and operating system technologies. Every
`effort has been made to make this book as complete and as accurate as possible, but no warranty or fitness is
`implied.
`The information is provided on an “as is” basis. The author, Cisco Press, and Cisco Systems, Inc., shall have neither
`liability nor responsibility to any person or entity with respect to any loss or damages arising from the information
`contained in this book or from the use of the discs or programs that may accompany it.
`The opinions expressed in this book belong to the author and are not necessarily those of Cisco Systems, Inc.
`
`Feedback Information
`At Cisco Press, our goal is to create in-depth technical books of the highest quality and value. Each book is crafted
`with care and precision, undergoing rigorous development that involves the unique expertise of members from the
`professional technical community.
`Readers’ feedback is a natural continuation of this process. If you have any comments regarding how we could
`improve the quality of this book or otherwise alter it to better suit your needs, you can contact us through e—mail at
`feedback@ciscopress.com. Please make sure to include the book title and ISBN in your message.
`
`We greatly appreciate your assistance.
`
`003
`
`003
`
`
`
`
`
`Publisher
`Editor-in-Chief
`Executive Editor
`Cisco Systems Management
`
`Production Manager
`Development Editor
`Senior Editor
`Copy Editor
`Technical Editor
`Reviewers
`
`Associate Editor
`Cover Designer
`Composition
`Indexer
`
`John Wait
`John Kane
`Carl Lindholm
`Michael Hakkert
`Tom Geitner
`William Warren
`
`Patrick Kanouse
`Kitty Wilson Jairett
`Jennifer Chisholm
`Jill Batistick
`Dr. Thomas W. Shinder
`Lynn Bloomer
`Wayne Jarvimaki
`Michael R. Hanson
`
`Shannon Gross
`Louisa Klucznik
`Steve Gifford
`Tim Wright
`
`CISCO SYSTEMS
`
`Corporate Headquarters
`Cisco Systems, Inc.
`170 West Tasman Drive
`San Jose, CA 95134—1706
`USA
`http://www.cisco.com
`Tel: 408 526-4000
`800 553—NETS (6387)
`Fax: 408 526—4100
`
`M®
`European Headquarters
`Americas Headquarters
`Cisco Systems Europe
`Cisco Systems, Inc.
`11 Rue Camille Desmoulins
`170 West Tasman Drive
`92782 Issy-les-Moulineaux
`San Jose, CA 95134-1706
`Cedex 9
`USA
`France
`http://www.cisco.com
`http://www-europe.cisco.com
`Tel: 408 526—7660
`Tel:
`33 l 58 04 6O 00
`Fax: 408 527-0883
`Fax: 33 l 58 04 61 00
`
`Asia Pacific Headquarters
`Cisco Systems Australia, Pty.,
`Ltd
`Level 17, 99 Walker Street
`North Sydney
`NSW 2059 Australia
`http://www.cisco.com
`Tel: +61 2 8448 7100
`Fax: +61 2 9957 4350
`
`Cisco Systems has more than 200 offices in the following countries. Addresses, phone numbers, and fax numbers are listed on the
`Cisco Web site at www.cisco.com/go/oftices
`
`- Bulgaria - Canada - Chile - China - Colombia - Costa Rica -
`Argentina - Australia - Austria - Belgium - Brazil
`Croatia ' Czech Republic - Denmark - Dubai, UAE ' Finland - France
`- Germany - Greece - Hong Kong - Hungary 0
`India - Indonesia - Ireland - Israel
`- Italy - Japan - Korea ' Luxembourg - Malaysia - Mexico - The Netherlands - New
`Zealand - Norway - Peru - Philippines - Poland - Portugal
`‘ Puerto Rico - Romania - Russia - Saudi Arabia - Scotland
`~ Singapore ' Slovakia - Slovenia - South Africa - Spain ' Sweden - Switzerland - Taiwan - Thailand - Turkey - Ukraine
`- United Kingdom - United States 0 Venezuela . Vietnam - Zimbabwe
`
`Copyright © 2001, Cisco Systems, Inc, All rights reserved. Access Registrar, AccessPath, Are You Ready, ATM Director, Browse with Me, CCDA, CCDE, CCDP, CCIE, CCNA,
`CCNP, CCSI, CD~PAC, CiscoLink, the Cisco NetWorks logo, the Cisco Powered Network logo, Cisco Systems Networking Academy. Fast Step, FireRunner, Follow Me Browsing,
`FormShare, GigaStack, IGX, Intelligence in the Optical Core, Internet Quotient, lP/VC, iQ Breakthrough, iQ Expertise, iQ Fast'l‘rack, iQuick Study. iQ Readiness Scorecard, The
`iQ Logo, Kernel Proxy. MGX, Natural Network Viewer, Network Registrar, the Networkers logo, Packel, P1X, Point and Click lntcrnetworking, Policy Builder, RateMUXv
`ReyMaster, ReyView, ScriptSharc. Secure Script, Shop with Me, SlideCast, SMARTnet, SVX, TrafficDirector, TransPath, VlanDirector, Voice LAN, Wavelength Router,
`Workgroup Director, and Workgroup Stack are trademarks of Cisco Systems, Inc: Changing the Way We Work, Live, Play. and Learn, Empowering the Internet Generation, are
`service marks of Cisco Systems, Inc.: and Aironet. ASIST, BPX, Catalyst, Cisco, the Cisco Certified lnternetwork Expert Logo. Cisco 108, the Cisco IOS logo, Cisco Press, Cisco
`Systems, Cisco Systems Capital, the Cisco Systems logo. Collision Free. Enterprise/Solver, EtherChannel, EtherSwitch, FastHub. FastLink, FttstPAD, IOS, lP/TV, IPX, LightStream,
`LightSwitch. MICA, NetRanger, PoshRouting, Pro—Routing, Registrar, Stratthew Plus, Stratm. S\vitchProbe, TeleRouter, are registered trademarks of Cisco Systems, Inc, or its
`affiliates in the US. and certain other countries.
`
`All other brands, names, or trademarks mentioned in this document or Web site are the property of their respective owrters. The use of the word partner does not imply a partnership
`relationship between Cisco and any other company. (OOlOR)
`
`004
`
`004
`
`
`
`xxii
`
`
`Introduction
`Computer Networking Essentials helps you understand the fundamentals of computer networking concepts and
`implementation and introduces you to the client and server operating systems that run on networked PCs.
`Concepts covered in this book include the history of networking, networking terminology, networking theory and
`established standards, and implementation of local—area and wide-area networks. Special emphasis is placed on
`understanding network protocols and how they operate at all layers of the networking model. Emphasis also is
`placed on the interoperability of networks that run on multiple protocols, platforms, and operating systems.
`Specialty areas such as security, remote access, virtual private networking, thin client networking, monitoring, man~
`agement, and troubleshooting are covered thoroughly. Emerging technologies that are expected to impact the future
`of networking are also introduced.
`
`Who Should Read This Book
`This book’s primary audience is professionals who are beginning training in the networking industry and those who
`need a review of basic concepts.
`
`The secondary audience includes corporate training faculties and staff and members of the business world who
`work with information technology personnel and require a broad overview of the concepts involved in networking
`from the small business to the enterprise—level corporation.
`
`A third target audience is the general user who wants to know more about how computers communicate over net-
`works. The book’s approach is designed to be user—friendly and accessible to the non-technical reader who is
`overwhelmed by the jargon found in vendor documentation and technical manuals.
`
`This Book’s Organization
`This book is organized into four parts and includes 19 chapters, an appendix, and a glossary. The following sections
`describe the contents of each part of the book.
`
`Part I: Introduction to Networking Concepts
`
`Chapter 1, “Introduction to PC Networking,” introduces you to the basic concepts of PC networking by providing a
`brief history of electronic communications and networking and a summary of where PC networking is today.
`Chapter 2, “Categorizing Networks,” discusses the categorization of networks according to physical scope, admin—
`istrative model, network operating system, protocols in use, topology, and architecture.
`Chapter 3, “Networking Concepts, Models, and Standards,” provides an overview of binary communications and
`introduces two popular networking models: the Department of Defense (DOD) model on which the TCP/IP proto-
`cols are based and the Open Systems Interconnection (081) model, which was developed by the International Orga—
`nization for Standardization (ISO). Specifications set forth by the Institute of Electrical and Electronics Engineers
`(IEEE) and vendor—specific models are also covered.
`Chapter 4, “Networking Communications Methods,” discusses signaling methods and provides an understanding of
`analog, digital, broadband, baseband, asynchronous, synchronous, simplex, duplex, and multiplexed signaling.
`Media access methods are described, including CSMA/CD, CSMA/CA, token passing, and demand priority.
`Chapter 5, “LAN Links,” discusses popular LAN types, including Ethernet, Token Ring, FDDI, AppleTalk, and
`ARCnet.
`
`Chapter 6, “WAN Links,” provides an overview of WAN connections such as PSTN, ISDN, t—carriers, Frame Relay,
`X25, and CATV network, as well as high—speed connectivity solutions such as ATM, SONET, and SMDS. This
`
`005
`
`005
`
`
`
`xxiii
`
`
`chapter also covers LAN—to-WAN connection solutions, including Internet Connection Sharing (ICS), Network
`Address Translation (NAT), proxy servers, and routed connections.
`
`Part 11: Networking Hardware and Software
`
`Chapter 7, “Physical Components of the Network,” introduces students to the many types of networking media,
`including coax, twisted—pair cable, and fiber—optic cable, as well as to wireless technologies such as laser, infrared,
`radio, and satellite/microwave communications. Connectivity devices such as repeaters, hubs, bridges, routers, and
`switches are also discussed.
`
`Chapter 8, “Networking Protocols and Services,” describes common LAN protocols—TCP/IP, NetBEUI, IPX/
`SPX—and discusses the OSI protocol suite. PPP and SLIP, which are WAN link protocols, and PPTP and LZTP,
`which are common tunneling protocols, are also presented.
`
`Chapter 9, “The Widest Area Network: The Global Internet,” discusses the evolution of the Internet, the protocols
`used for Internet communicationsmHTTP, FTP, NNTP, SMTP, and POP—and the TCP/IP protocol suite.
`
`Chapter 10, “Network Operating Systems,” discusses general network administration practices and then looks at the
`specifics of common server operating systems, including Windows NT, Windows 2000, NetWare, UNIX, and Linux.
`
`Chapter 11, “Directory Services,” describes the Directory Services Protocol (DAP) and the Lightweight Directory
`Access Protocol (LDAP), as well as the X500 standards developed by the ISO to promote directory services com-
`patibility and interoperability. Novell’s NDS, Microsoft’s Active Directory, and Banyan VINES’ StreetTalk direc-
`tory services are covered in some depth.
`
`Chapter 12, “Desktop Operating Systems,” looks at the client side of the client/server network and discusses the
`advantages and disadvantages of common desktop clients, such as DOS, Windows, Linux, Macintosh, and 05/2,
`and how each can be integrated into popular NOS environments.
`
`Chapter 13, “Hybrid Networks,” provides information about interoperability solutions and protocol gateways that
`allow PCs running different operating systems, protocols, and platforms to communicate with one another. This
`chapter also looks at PC—to—mainfrarne communications using Systems Network Architecture (SNA) solutions.
`
`Part III: Network Specialty Areas
`
`Chapter 14, “Protecting the Network,” addresses security issues and provides an overview of basic cryptography
`concepts, public and private key encryption, certificate services, firewalls and proxies, and internal security mea-
`sures such as “smart cards” and advanced authentication technologies. It also provides guidance for developing
`security policies for your network. The second half of the chapter discusses disaster recovery plans, including
`implementation of disk fault tolerance (or RAID), regular scheduled backups, and server
`clustering.
`
`Chapter 15, “Remote Access,” discusses methods of connecting to a server from a remote location using remote
`connectivity devices such as modems, ISDN terminal adapters, and customer premises equipment (CPE) for dedi—
`cated lines. Dial-in server configuration and special security considerations are also covered.
`
`Chapter 16, “Virtual Private Networking,” provides an overview of VPN concepts and discusses the tunneling pro—
`tocols used to provide VPN security.
`
`Chapter 17, “Thin Client Networking,” discusses Network Computers, Net PCs, and Windows-based terminals.
`Windows terminal services, Citrix Metaframe, web-based computing, the X Window system and Java virtual
`machines—and the role each plays in thin client networking—are also discussed.
`
`Chapter 18, “Monitoring, Management, and Troubleshooting Tools,” presents an introduction to the TCP/IP utilities
`and other tools built into the various operating systems. This chapter also examines commercial products such as
`Sniffer Pro, LANanalzyer, Microsoft’s Systems Management Server, Novell’s ManageWise, and IBM’s Tivoli.
`
`006
`
`006
`
`
`
`xxiv
`
`
`Part IV: The Future of Networking
`Chapter 19, “Tomorrow’s Technologies,” takes a look into the future of PC networking. It discusses ways of over-
`coming the current limits of IP, including the new version of IP——-1Pv6. The goal of universal connectivity is
`addressed, and more exotic possibilities such as artificial intelligence, quantum computing, and cybernetic life
`forms are presented as possible components of tomorrow’s networks.
`
`This Book’s Features
`This book contains several elements that help you learn about operating systems and networking:
`Figures, listings, and tables—This book contains figures, listings, and tables that help to
`explain concepts, commands, and procedural sequences. Diagrams illustrate network layouts
`and processes, and screenshots assist students in visualization configuration procedures. In addi-
`tion, listings and tables provide summaries and comparisons of features and characteristics.
`Author’s notes, tips, sidebars, and cautionsflThese elements are included to provide you
`with extra information on a subject. You will probably find these asides to be very beneficial in
`real—world implementations.
`Chapter summaries—At the end of each chapter is a summary of the concepts covered in the
`chapter, which provides a synopsis of the chapter and can serve as a study aid.
`Further Reading-Each chapter includes a list of resources for additional information about
`the topics covered in the chapter, including website URLs and books and articles that cover the
`topic in more detail.
`Review questions——After the Further Reading section in each chapter are 10 review questions
`that serve as an end—of—chapter assessment. The questions are designed to reinforce the con-
`cepts introduced in the chapter and to help students evaluate their understanding before moving
`on to the next chapter.
`The conventions used to present command syntax in this book are the same conventions used in the Cisco IOS
`Command Reference, as follows:
`Boldface indicates commands and keywords that are entered literally as shown. In examples
`(not syntax), boldface indicates user input (for example, a show command).
`Italics indicates arguments for which you supply values.
`
`Square brackets [] indicate optional elements.
`Vertical bars (I) separate alternative, mutually exclusive elements.
`Braces and vertical bars Within square bracketswfor example, [x {y | z}]-——indicate a required
`choice within an optional element. You do not need to enter what is in the brackets, but if you
`do, you have some required choices in the braces.
`
`007
`
`007
`
`
`
`
`
`>==cHAp+En
`
`
`
`VWAhthwks
`
`
`The technologies, media, and equipment that work well for the short distances spanned by
`a LAN or MAN are generally not suitable for long-distance wide-area networks (WANs).
`In today’s very mobile world, high-performance, cost—effective WAN technologies are a
`necessity for many reasons:
`
`' Executives and other employees need access to their corporate networks while on the
`road or at home.
`
`' Companies with branch offices in widely dispersed geographic locations need
`network connectivity between locations.
`
`' Organizations want to share information with other organizations physically
`separated by long distances.
`
`' Commercial, governmental, and educational bodies and individuals need access to the
`resources available on the global Internet.
`
`It is obviously impossible to string Ethernet cable from the home office in Denver to the
`branch office in Houston. Even if cabling distance limitations did not apply, this would not
`be a viable solution for connecting international sites.
`
`WANs require a whole new set of technologies and rules of implementation. In this chapter,
`we discuss the concept of networking over long distances and the technologies commonly
`used to connect computers that are located in different states, countries, or even different
`continents. These range from the Public Switched Telephone Network (PSTN) already in
`place in most of the world to modern high—tech solutions such as satellite communications
`technologies that enable us to “talk” to computers in space.
`
`Wide-area networking presents many challenges not encountered in implementing a
`network that is confined to one geographic area. A WAN is not just a really big LAN.
`Rather, it is a collection of many separate LANs, connected by links that are different in
`many ways from LAN links. WANs that span international boundaries require
`consideration of even more factors, including time zones and language differences.
`
`008
`
`008
`
`
`
`160 Chapter 6: WAN Links
`
`Designing a WAN is a complex task. Choosing the appropriate technology involves
`analyzing the purpose(s) the WAN will serve, the number of users, the bandwidth
`requirements, and the patterns of use. We can categorize these considerations as follows:
`° WAN hardware
`
`' WAN topologies
`
`° Network switching types
`
`’ New and emerging WAN technologies
`
`’ LAN/WAN connectivity
`
`We look at each issue in the sections that follow.
`
`WAN Hardware
`
`The hardware necessary to implement a WAN link can be as simple and inexpensive as a
`telephone line and a modem at each end. On the other hand, it can be complex and costly.
`In general, equipment cost and complexity increases with increased speed and reliability.
`
`In the following sections, we discuss common WAN devices, including modems, ISDN and
`digital subscriber line (DSL) terminal adapters, and customer premises equipment (CPE)
`used with dedicated links such as T—carrier connections and X.25.
`
`Modems
`
`To establish a network connection (to an Internet service provider or to a dial-up server on
`a private network) over public telephone lines, you use a device called a modem.
`
`
`
`TIP
`
`' The word “modem” is derived from the actions it performs; a modem modulates and
`demodulates a signal. In other words, it converts the sending computer’s digital signal to
`analog for transmission over the analog line and then converts it back to digital for
`processing by the receiving computer.
`
`Modems come in two physical types: internal and external. Each has advantages and
`disadvantages, and configuration is slightly different depending on the type. Either way,
`modems are serial devices, which means bits are sent one at a time. This can be contrasted
`with parallel devices, such as printers, to which multiple bits can be sent simultaneously.
`A serial transmission is analogous to a group of people marching in a straight line, and a
`parallel transmission is like having the same group marching in rows of three across.
`
`009
`
`009
`
`
`
`161
`WAN Hardware
`
`
`internal Modems
`
`One advantage of the internal modem is compactness. It is a circuit board card that fits in
`an ISA (Industry Standard Architecture) or PCI (Peripheral Component Interconnect) slot
`inside the computer, as shown in Figure 6-1. This means that you don’t have to find room
`for an extra device on your desk. In addition, you are not required to buy a serial cable,
`which you might be forced to do if you use an external model that doesn’t include one in
`the box.
`
`Figure 6-1
`
`An internal modem is a circuit board thatfits inside the computer
`
`Jumpered pins
`
`
`
`
`
`
`
`
`
`‘ ' ‘
`‘
`
`
`
`
`
`
`IIE
`
`
`
`
`
`
`
`Typical
`internal modem card
`
`
`
`
`
`RJ-11 jack
`for attaching
`phone line
`
`Internal Modem Configuration Parameters
`Internal modems are traditionally more difficult to configure than external modems. You
`must set the IRQ, the input/output addresses, and the virtual com ports to ensure that they
`don’t conflict with the settings of some other device in your computer. Let’s look more
`closely at each setting and how it is used:
`
`'
`
`'
`
`Interrupt Request (IRQ)——This is an assigned location that designates where the
`system expects the device to interrupt it when the device sends a signal. Signals from
`different devices that go to the processor on the same interrupt line would interfere
`with each other, so a separate IRQ must be assigned to each device.
`
`Input/Output (I/O) address—~This is the location where data sent from the device is
`stored before it is processed by the CPU. As with the IRQ, if multiple devices attempt
`to use the same I/O address, one or both devices might not work properly.
`
`‘ Virtual com port—This is a logical port number, by which the operating system
`identifies a serial port. You must set each serial device to use a different com port.
`
`010
`
`010
`
`
`
`162
`Chapter 6: WAN Links
`
`All popular operating systems provide a means by which you can view how resources are
`being used, and which ones are not in use, so that you can choose free resources to assign
`to your new device.
`
`Changing the Internal Modem Settings
`
`Internal modems generally provide a way to change the configuration settings. Depending
`on the manufacturer and model, you can change IRQ, I/O, and com port settings with the
`following:
`
`° Dip switches—These are small switches on the circuit board that can be moved to a
`different position. The position of the switch designates which setting is to be used.
`
`°
`
`Jumpers—Pairs of metal pins built into the circuit board, these represent an electrical
`contact point. Jumpers are configured by placing a small plug on the pins to complete
`the circuit. The instructions that come with your internal modem tell you how the
`jumpers should be set to use a specific IRQ, I/O address, or com port.
`
`' Software—Some modems do not have physical switches or jumpers, but do come
`with a software program that is run to change the configuration.
`
`Plug and Play
`
`Many modern modems support Plug and Play (PnP) technology, which enables the
`operating system to detect the device, install the necessary software drivers, detect what
`resources are free on the computer, and assign those resources to the device automatically.
`Little or no intervention is required from the user.
`
`PnP is great—when it works and when you are aware of a few caveats. If you buy a modem
`or other device that is advertised as Plug and Play, it is automatically configured only if the
`following is true:
`
`' Your computer’s BIOS (Basic Input/Output System) supports PnP.
`
`' You are running a PnP operating system.
`
`Both criteria must be met. Computer motherboards produced after 1995 usually support
`PnP. Operating systems that support PnP include Windows 95, 98, ME, and 2000.
`
`
`
`NOTE
`
`Windows NT is not a PnP operating system. However, it does have limited PnP
`functionality and detects some modem types.
`
`011
`
`011
`
`
`
`WAN Hardware
`
`
`163
`
`External Modems
`
`External modems have a couple advantages over the internal variety:
`
`' Most external modems provide status lights, which indicate when the modem is
`powered on, connected, or transferring data. See Figure 6-2.
`
`' External modems are generally easier to install and configure. There are no switches
`or jumpers to set, and you don’t have to open the computer case.
`
`Figure 6-2
`
`External modems provide status indicator lights.
`
`RJ~11 jacks to connect
`phone line
`.
`Typical external modem
`
`MOTOROLA
`
`RD
`SD
`
` Serial cable
`
`Power cord
`connector
`
`Status indicater
`lights
`
`connector
`
`External modems require power cords to plug into an electrical outlet, but internal modems
`run off the computer’s power. A serial cable connects the modem to one of the serial ports
`on the back of the computer.
`
`Serial Port Considerations
`
`To use an external modem, you need a free serial port. Most computers have two built—in
`serial ports, labeled COM 1 and COM 2, with connectors on the back of the computer.
`
`Many devices, such as scanners, digital cameras, and serial pointing devices, also use serial
`ports. If your computer does not have a free serial port, you have a few options:
`
`' Use an internal modem.
`
`'
`
`'
`
`Install an expansion card in your computer, which enables you to add serial port
`connections.
`
`If your computer’s motherboard supports universal serial bus (USB), you can chain
`multiple serial devices, such as modems, off a single serial port. You might have to
`add a card to provide a USB connector, and you need a USB modem.
`
`UART Chips
`
`Serial ports use a chip called a UART (Universal Asynchronous Receiver/Transmitter) to
`handle serial communications. This chip comes in different types, and the type used
`determines how fast data can be transferred over that serial port.
`
`012
`
`012
`
`
`
`
`164 Chapter 6: WAN Links
`
`The first PCs had 8250 UART chips. The top speed for this chip is 9600 bps, which means
`that even if you attach a high speed (56 kbps) modem to one of these ports, your speed
`would be limited by the UART.
`
`Modern computers have UART chips in the 16450 or 16550 series. These serial ports can
`support transfer speeds of up to 115,200 bps.
`’
`
`16650 and 16750 UART chips are also available as add-on “enhanced serial port” cards.
`Internal modems have their own UART chips built into the card, so the speed of the
`computer’s com port is irrelevant.
`
`
`
`NOTE
`
`If you have a high-speed modem and a modern computer, but are able to connect only at
`low speeds, check the com port configuration settings. Some operating systems set the com
`ports to 9600 bps by default; you need to change this setting to realize the port’s full
`capacity.
`
`Modem Drivers
`
`Drivers are software programs that act as a liaison between the hardware device and the
`operating system. Driver software is usually supplied by the modem manufacturer with the
`device, or it can be downloaded from the manufacturer’s Web site.
`
`You must install the correct driver software for your device because if operating system
`code included support for all hardware devices that could possibly be used with it, the
`operating system would require significantly more disk space—wmuch of it wasted on driver
`software that would never be used.
`
`Modem Configuration
`
`In addition to installing the driver software that enables the operating system to recognize
`the modem, and setting the IRQ, I/O address, and com port that the modem will use, you
`have to configure the modem to dial and maintain a connection. Modern operating systems
`have built-in support for dialup networking. You might have to install the remote access
`services if the modern was not present when the operating system was installed.
`
`Modem Banks
`
`A computer can be configured as a dialup server (also called a remote access server) to
`enable other computers to dial into it and connect to it over the phone lines. Computers
`running powerful server software can support many incoming remote access connections
`simultaneously; for instance, Windows NT Server supports up to 256 connections.
`
`013
`
`013
`
`
`
`
`
`WAN Hardware 165
`
`How can you connect 256 modems to a remote server? When you have many simultaneous
`dial-in connections (for example, when the server belongs to a company with many
`telecommuters who need to connect to the corporate network from home), you can use a
`modem bank. Modem banks are also called modem nests or modem pools.
`
`A modern bank enables you to use a group of modems (usually mounted together in a rack)
`with a single server, and host multiple remote connections. The rack of modem cards is
`controlled by an interface that connects to the server, to a router, or directly to the local
`network. Of course, you need a phone line for each separate connection.
`
`ISDN and DSL Adapters
`The device used to connect a computer to an Integrated Services Digital Network (ISDN)
`or DSL telephone line is often referred to as a modem. It is more accurately called a
`terminal adapter because it does not modulate and demodulate signals because ISDN lines
`are digital, unlike the analog PSTN lines.
`
`ISDN Adapters
`
`ISDN adapters, such as modems, come in both internal and external varieties. They are
`configured similarly to modems, but the typical 128-kbps ISDN service consists of two data
`channels that each run at 64 kbps. The two channels are commonly used in a multilink
`configuration to provide the 128—kbps bandwidth. We discuss ISDN technology later in this
`chapter in the section, “ISDN.”
`
`The two data channels have separate telephone numbers in most cases. ISDN adapters are
`configured with information about the service profile identifier (SPID) for each channel,
`which consists of the telephone number, a two-digit sharing terminal identifier, and a two-
`digit terminal identifier (TID). Some modern ISDN adapters support automated SPID
`selection and do not require you to enter this information.
`
`DSL Adapters
`
`Both ends of a DSL connection require a device called an endpoint (and often referred to
`as a DSL modem), which connects to an Ethernet NIC installed in the computer. In some
`cases, the endpoint/modem is external. In others, the endpoint and the NIC are placed
`together on the same card.
`
`Customer Premises Equipment
`
`Customer premises equipment (CPE) is a general term that encompasses several different
`devices. The customer’s site requires this hardware to process incoming transmissions from
`WAN links such as T-carrier lines, X25 connections, and Frame Relay links.
`
`014
`
`014
`
`
`
`
`
`166 ChapterG: WAN Links
`
`Common types of CPE include the following:
`
`' A channel service unit/digital service unit (CSU/DSU), used with circuit—switched
`connections such as a T—l line. The CSU receives and transmits signals to and from
`
`the WAN line. The DSU manages line control, timing errors, and signal regeneration.
`
`‘ A packet assembler/disassembler (PAD), used with packet-switched connections such
`as X25. The PAD is an asynchronous device that enables multiple terminals to share
`a network line. Users dial into PADS through modems.
`
`WAN Topologies
`We discussed LAN topologies in Chapter 2, “Categorizing Networks,” and some of those
`same concepts apply to WANs. In the context of WANs, however, the topology describes
`the arrangement of the transmission facilities.
`
`The simplest WAN topology is a simple point-to—point connection. The WAN, like the
`LAN, also can use traditional networking topologies such as a ring or star.
`
`The Point-to-Point WAN
`
`A p0int—to~point WAN is similar to the LAN topology referred to as a linear bus. A remote
`access link, which can be anything from a 56-kbps dial—up modem connection to a
`dedicated T—l line, connects each point on the WAN to the next. See Figure 63 for an
`illustration of this.
`
`Figure 6-3 A point-to-point WAN directly connects two endpoints.
`
`
`
`San Francisco
`
`
`
`015
`
`015
`
`
`
`
`
`WAN Topologies 167
`
`This is a relatively inexpensive way to connect a small number of WAN sites. However, it
`is not fault tolerant. For example, in Figure 6—3, if the equipment at the Dallas office fails,
`San Francisco and Boston cannot communicate with one another. Limited scalability (the
`
`capability to “grow gracefully,” that is, to continue to function efficiently as the network
`grows larger) is another