Network Interface Cards Network interface cards, also referred to as network adapter cards or sim-ply network cards, are the key components that allow computers or other devices to commu
Trang 1In addition to speed, ISDN supports multiple devices set up in one link
In an analog system, a single line is required for each device attached For example, a separate phone line is needed for a normal phone, a fax machine,
or a computer modem Because ISDN supports multiple devices, you can use each one of these items on a single line It will also be clearer due to the fact that the data is being passed in a digital format
Because ISDN uses a separate channel, the D channel for signaling, it removes the administrative overhead required This means that the data
is not hindered by the session setups and the communications required
by the devices The D channel keeps all of this information off the data streams Because of the separation, the setup and takedown of each session
is much faster In addition, ISDN equipment is able to handle calls more intelligently
CSU/DSU
The somewhat lengthy acronym CSU/DSU is short for Channel Service Unit/Data Service Unit A CSU/DSU is a device that takes a signal from a
digital medium and multiplexes it Although a CSU and a DSU can be sepa-rate components, they are generally packaged as a single unit The CSU is used to connect a terminal to a digital line, while a DSU performs diagnostic and protective functions
A CSU/DSU terminates the end of a leased T-carrier line, which is a high-speed line that can be used to connect a LAN to a wide area network (WAN) The CSU/DSU is similar to a modem in that it connects to the media that will carry the data, but because the T-carrier transmits the data digitally, there is no need for device to modulate and demodulate between digital and analog formats The CSU/DSU can be a separate component that attaches to a router and provides an interface between the routers, but many newer routers have more modular capabilities that allow you to purchase what are sometimes referred to as WAN interface cards, or WICs for short This is a card that incorporates the CSU/DSU into the actual port and cable connection so you do not have an external CSU; it’s built directly into the router itself, thereby easing maintenance and management
A T-carrier line is a leased telephone line that runs over fiber-optic cabling and can provide different speeds depending on the level used A T1 line con-sists of 24 separate channels called DS0s that are 64 Kbps each In total, this equals 1.544 Mbps for a full T1 line Because some companies may not need this amount of bandwidth, it is possible to lease only a portion of the channels For example, if you rented two channels on a T1 line, you would have a 128 Kbps connection When only a portion of the T1 line is used, it
is referred to as fractional T1 If more than 1.544 Mbps of bandwidth was
Trang 2needed, a company could also lease another level of a T-carrier line called a
T3 line, which provides speeds of 44.736 Mbps
Network Interface Cards
Network interface cards, also referred to as network adapter cards or
sim-ply network cards, are the key components that allow computers or other
devices to communicate with the rest of the network Installed on
work-stations, servers, printers, and other network devices, it provides an
inter-face to the network that allows data to be transmitted and received across
the network media
Simply put, the NIC performs the following functions:
It translates data from the parallel data bus to a serial bit stream for
■
■
transmission across the network
It formats packets of data in accordance with protocol
■
■
It transmits and receives data based on the hardware address of the
■
■
card
An NIC works as an interface between a computer’s expansion bus and
the medium that’s used to transmit and receive data across the network In
many cases, this means that it attaches to the cable used on a network, but
wireless NICs are also available that allow data to be transferred through the
air Although the NIC can be integrated into the system board, it is typically
NoTES FroM ThE FIEld…
Multiplexing defined
Multiplexing is defined as the sending of multiple
sig-nals over one communications channel at the same
time The cable television system is a perfect example
of multiplexing in action Cable TV is a simple
technol-ogy where your available channels are all sent along
a single cable, and you are able to select a channel
to view a specific program based on your numbered
selection In the world of data transmission, the
tech-nology is very much the same If you have a T1, for
example, and you need to break that 1.544 Mbps of
bandwidth down to smaller amount, you can do so with
a fractional T1.
What about the rest of that bandwidth, is it wasted?
Of course not, not with multiplexing As a service provider, you can designate half of the bandwidth to company A and then the rest to company B Data is sent along the whole T1, and no bandwidth is wasted The technology of multi-plexing is used in many ways to conserve bandwidth.
There are two different types of multiplexing: time division multiplexing (TDM) and frequency division multiplexing (FDM) In TDM, each signal is broken up into many segments, each having short durations or time slots on the whole of the available bandwidth FDM does the same thing as TDM except that TDM is based
on digital signaling and FDM is based on analog.
Trang 3an add-on component for a computer, much like a video card or sound card The NIC is normally installed as an expansion board by plugging it into a bus slot, and it has a connector that allows the network media to be attached to it
Installing an NIC
Installing an NIC is like installing any other interface card in a computer You have to determine the slot it will go in and have the right tools to remove the expansion slot cover and to remove and insert screws Newer computers do not require any tools, not even screwdrivers The ability to work on a com-puter with your hands free of tools is making any technician’s job easier The Network exam will challenge you to know what to do in certain situations
In this section you will learn several troubleshooting techniques and how to recognize the common issues that you will face with network interface cards NICs are built for computer bus types such as Industry Standard Architec-ture (ISA), Extended Industry Standard ArchitecArchitec-ture (EISA), Micro Channel Architecture (MCA), and Peripheral Component Interconnect (PCI) Most of the newer NICs support plug and play features and can be automatically con-figured by the operating system once the physical installation is done This fea-ture makes installation of the NIC considerably easier than with older cards Before you begin the physical installation of the NIC, or network adapter,
be sure to address the following issues:
Ensure that the adapter is compatible with the data bus, the protocol,
■
■
the media, and the network operating system In the case of Win-dows network operating systems, the hardware compatibility list (HCL) lists adapters that have been verified for use with a particular operating system (such as NT, 2000, 2003, 2008, Vista, and XP) Ensure that there is an open bus slot on the machine in which you
■
■
want to install the adapter
Ensure that the adapter includes all items necessary for
installa-■
■
tion, including external transceivers or adapters, a T-connector for a thinwire Ethernet adapter, and product documentation
Ensure that the software, including the network driver and utilities
■
■
for testing and configuring the adapter, is included If a software driver is not provided, a driver may be included with operating system installation media If not, drivers and driver updates may
be available for download from the adapter manufacturer via the Internet or a bulletin board service
Remember that the NIC cannot do any useful work until high-level
■
■
protocols and network services have also been installed and configured
Trang 4ExErcisE 3.1 Enabling and Disabling a Nic card with Windows xP
Professional
In this exercise we will learn how to enable or disable an NIC card for
secu-rity reasons If you are not using an interface, disable it Make sure that you
do not disable interfaces that you may need
To enable or disable an interface, you need to first open the Network
Connections dialog box To do this, double click My Network Places on
your desktop Click View Network Connections, and you will see your
cur-rent connections (Figure 3.4)
FIGurE 3.4
Viewing Your Network Connections.
Trang 5FIGurE 3.5
Enabling a Connection
with Windows XP
Professional.
Note that in Figure 3.4, LAN has an x This indicates that the connec-tion might have an issue, such as a disconnected RJ-45 connector on the NIC itself LAN2 is grayed out, indicating that the connection is disabled To
enable it, you only need to right click the connection and select Enable from
the shortcut menu (Figure 3.5) The NIC will enable itself barring any other issues, and the icon in the Network Connections window will be shown in full color
NIC Types and Operation
Although NICs are all designed to allow computers and devices to access a network, not all NICs are the same As we discussed in Chapter 2, there are many different types of media and connectors that may be used on a net-work, which is why there are different NICs Because of this, NICs are often defined by the following criteria:
The type of Data Link Protocol they support, such as an Ethernet or
■
■
Token Ring The type of media they connect to
■
■
The data bus for which they were designed
■
■
In using NIC, the computer must have a software driver installed to interact with the NIC, just as it must for any other peripheral device These drivers enable the operating system and higher level protocols to control the functions of the adapter
The NICs that exist in the various workstations on a network commu-nicate with each other using their own unique addresses The MAC address,
or hardware address, is a 12-digit number consisting of digits 0–9 and letters
Trang 6A–F It is a hexadecimal (base16) number assigned to the card by the
manu-facturer The MAC address consists of two pieces: the first signifies which
vendor it comes from, the second is the serial number unique to that
manu-facturer This address must be unique on each network card on a network
You may wonder how a manufacturer can ensure uniqueness among all the
network cards in the world No doubt there are network cards that have
the same address, but each manufacturer is assigned a range by the various
network standards organizations, and they use only that range Within the
range, a manufacturer may have duplicates, but the duplicates are so spread
out over time that it is almost impossible for a network, small or large, to
have two devices with the same MAC address
Transceivers
As we discussed in Chapter 2, the term transceiver is short for transmitter-
receiver, and it is a component of an NIC that transmits and receives
electrical signals across the transmission media Transceivers are also
the part of the interface that actually connects to the media Although
transceivers can be external to the network card, they are typically built
onto the NIC A transceiver that’s built onto a card is called an onboard
transceiver.
Although NICs are generally designed to connect to a particular type
of media, they can also connect to multiple media types A transceiver
type setting is required for network adapters that are capable of
attach-ing to more than one media type Typical cards of this nature include
Ethernet cards that have both twisted-pair and coaxial connectors This
is one of the more common oversights in configuring a NIC and the card
can be rendered nonfunctional if it is configured for the wrong media
con-nection To alleviate this problem, some cards of this type have an auto
setting that causes the card to search for the transceiver that has media
connected to it
Exam warning
NICs are the most common interface for a computer or device to connect to media on
the network They operate at the data link layer of the OSI model.
Exam warning
Transceivers and media converters are similar in some aspects but are not identical
Media converters (primarily used with fiber cabling solutions) are used to allow for
connection of different (or dissimilar) connection types or interfaces.
Trang 7Media Converters
Media converters are used when you have two types of dissimilar media that need to be converged together Most commonly used when deploying fiber-based networks, media converters come in handy when you need to connect
up to multiple different connection types, fiber switches, and storage arrays These are primarily used and seen on storage area networks (SAN)
Modern Network devices
Although many of the devices we’ve discussed so far have been used since the early days of networking, a number of devices either have taken over the roles of these devices or are a predominant part of a modern network envi-ronment These devices are crucial to a network’s ability to handle data and ensure it reaches its intended destination as its being transmitted
Routers
Routers route data packets across a network by opening the packet and
making routing decisions based on the contents On a network that uses Transmission Control Protocol/Internet Protocol (TCP/IP) as its communi-cation protocol, IP addresses are used as a method of identifying computers This identification is used to ensure that data is sent to the correct computer
on the network For these computers to communicate, however, a device is needed to guide the TCP/IP network traffic to its destination This is where routers come in
The network layer, or Layer 3, is responsible for addressing messages and translating their logical addresses into an actual physical address It is important to remember that a router is protocol dependent That means that
a TCP/IP router can connect to a TCP/IP network In other words, this is the layer of the OSI model that is responsible for determining where to send the TCP/IP packets to their destinations Routers essentially separate different broadcast domains from one another and route traffic based on the destina-tion, or Layer 3, address (the Layer 2 address is the MAC address)
When you want to communicate with another computer network, your computer essentially looks within the local network first before heading out
to search for a remote address For example, when your computer needs to access a file on another computer, your computer first checks its Address Resolution Protocol (ARP) cache to see if that computer has a recognizable MAC address If it does not, your computer checks the local subnet by either broadcasting or asking a name server for help
If the address is not found on the local subnet or network, your computer checks to see if you have a default gateway or router to send the information
Trang 8to Your computer sends this information to your router and the router routes
the message accordingly The router receives the data with the address
infor-mation and checks its routing tables to see where it should send your data
The type of router sometimes affects how quickly your data arrives at its
destination
Routers are either static or dynamic In most cases, you’ll only have to
deal with a dynamic router – a router whose routing tables are populated
automatically by receiving updates from other routers Static routers have
fixed routing tables that have to be updated manually These static routers
are at a disadvantage because they cannot communicate with any type of
router in case a network route changes due to hardware failure or change to
the network layout
The main benefit of a dynamic router is that, depending on which type
of routing protocol is used, it will attempt to route your network traffic to
your destination as quickly as possible, for example, if you have a network
that is standardized on Cisco routers (dynamic) that all communicate with
one another using the Open Shortest Path First (OSPF) Routing Protocol
All of your routers are communicating with one another via broadcasts that
they send whenever there is a change in their routing This comes in very
handy and adds a layer of redundancy so that if a segment of the network
fails, your routers will be able to route the network traffic through other paths
so that no matter what happens to the network, your data will always arrive
at its destination
If you were using a static router and you had a segment fail on your
net-work, your network traffic would cease until the segment was repaired or
another static route was mapped on the router This puts static routing at a
severe disadvantage in a large, complex network environment
understanding static and Dynamic routing
When it comes to routing, there is a huge difference between static and
dynamic Early routers had to be programmed with exactly which networks
they could route between which interfaces, especially if there were many
network interfaces This is called static routing, and network
administra-tors had to add, maintain, and delete routes of the network routing devices
manually In a small company this may not be much of a chore, but for
medium to large networks, this can be nearly impossible These larger
net-works almost always employ many logical subnets, which require you to
update the route tables on each routing device If these remote subnets are
connected by routers with static route tables, you have to add the exact static
route to communicate between the two subnets Table 3.3 shows an example
of what is contained in the routing table
Trang 9In this simplified table you can see how you only specify the router to be used to reach the destination, not the actual destination itself The number
of hops determines which route is the most efficient If a route claims it can reach the destination in one fewer hop than the next router, then it is sent
to that router If there are two identical routes to the same destination, the route with the fewest hops will be used
One change to a network address means visiting every routing device that employs static routing and updating the entry What do we do if our net-work is fairly large and complex? We must then use routing devices capable
of dynamically updating the routing tables
Dynamic routing does not require the network administrator to edit complex routing tables to communicate with other networks or segments These routers communicate with each other using a powerful routing pro-tocol such as Routing Information Propro-tocol (RIP) or OSPF They can also query other routers for updated route information, which can create more efficient paths for sending packets or locate an alternative route if the origi-nal route fails The routers can broadcast the routes they have discovered
to neighboring routers, and, in turn, accept routes from other neighbor-ing routers The Internet comprises many dynamic routers, which is an example of why dynamic routing is so important Could you imagine hav-ing to update a static routhav-ing table on thousands of static routers? I don’t think so
These dynamic routers, however, cannot update the route tables of static routers or non-dynamic routers There are a few situations in which inte-grating static and dynamic routers is acceptable:
When you have a router at either end of a slow WAN link: This
■
■
router will not increase traffic by broadcasting updated route infor-mation to the router on the other end of the link
When you require a packet to travel the same path each time to a
■
■
remote network, add the path you would like the packet to take to
Table 3.3 Information Contained in a Routing Table
destination Adjacent router hops
Trang 10reach the destination network You cannot enter the entire path
over several routers, only the path to the first router
When you want to configure a static router to point towards a
■
■
dynamic router to take advantage of the dynamic router indirectly
This is the next best thing to using a dynamic router You can hand
off the packet to the dynamic router and let this router determine
the most efficient path to the destination based on the paths it has
learned from neighboring dynamic routers
switching routers
Switches have the ability to perform the tasks normally associated with other
devices A Layer 3 switch has the ability to open a packet and view the IP address
and MAC address of the computer the packet is destined for The switch can
then review routing tables on the switch to determine the best route to send
the data By performing these functions, the switch is able to do the work of a
router and get the packet to its intended destination by using the best route
Security Integration
As reports of hacking, viruses, worms, and other attacks on networks become
commonplace in the news, the need for security in network devices and
net-works in general continues to grow Equipment and software can be added to
a network, which can work with existing devices to protect your LAN and its
data Choosing which security measures to implement can be challenging,
as there is an increasing number of products available However, the more
protected your network, the less chance there will be of it being damaged
from outside sources
Convergence of security
Just as devices are including more and more features in them that make other
devices obsolete or unnecessary to a network, devices are also including more
security features that historically had to be purchased separately As
demon-strated with routers that are used for DSL or cable Internet, features such as a
built-in firewall are now being included with the router The hardware-based
firewall provides a barrier to incoming traffic from the WAN, and thereby
pre-vents it from reaching your local computer or LAN The hardware firewall,
how-ever, is limited in restricting and monitoring the incoming and outgoing traffic
and should be complemented by a software firewall and antivirus software
Exam warning
Routers operate at the network layer of the OSI model The exam will deal with questions
regarding both routers and the OSI model.