Lesson 1: Connectivity Devices: Ing. José L. Simancas García, MG
Lesson 1: Connectivity Devices: Ing. José L. Simancas García, MG
Devices
Ing. José L. Simancas García, Mg.
Modem Technology
A modem is a device that makes it possible for computers to communicate over a telephone line. When computers are too far
apart to be joined by a standard computer cable, a modem can enable communication between them.
In a network environment, modems serve as a means of communication between networks and as a way to connect to the world
beyond the local network.
Computers cannot simply be connected to
each other over a telephone line, because
computers communicate by sending digital
electronic pulses (electronic signals), and a
telephone line can send only analog waves
(sound). Figure 7.1 shows the difference
between digital computer communication
and analog telephone communication.
International Standards
Since the late 1980s, the International Telecommunications Union (ITU) has developed standards for modems. These
specifications, known as the V series, include a number that indicates the standard. As a reference point, the V.22bis modem at
2400 bps would take 18 seconds to send a 1000-word letter. The V.34 modem at 9600 bps would take only four seconds to send
the same letter, and the V.42bis compression standard in a 14,400 bps modem can send the same letter in only three seconds.
The chart in Table 7.1 presents the compression standards and their parameters since 1984. The compression standard and the
bps are not necessarily related. The standard could be used with any speed of modem.
Modem Performance
Initially, a modem's speed was measured in either bps or something called the "baud rate," and most people mistakenly
assumed the two were identical.
"Baud" refers to the speed at which the sound wave that carries a bit of data over the telephone lines oscillates. The term
derives from the name of French telegrapher and engineer Jean-Maurice-Emile Baudot. In the early 1980s, the baud rate did
equal the transmission speed of modems. At that time, 300 baud equaled 300 bits per second.
Eventually, communications engineers learned to compress and encode data so that each modulation of sound could carry more
than one bit of data. This development means that the rate of bps can be greater than the baud rate. For example, a modem
that modulates at 28,800 baud can actually send at 115,200 bps. Therefore, the current parameter to look for in modem speed is
bps.
Several of the newer modems feature industry standards, such as V.42bis/MNP5 data compression, and have transmission
speeds of 57,600 bps; and some modems go up to 76,800 bps.
Types of Modems
There are different types of modems because different types of communication environments require different methods of
sending data. These environments can be divided roughly into two areas related to the timing of communications:
•Asynchronous
•Synchronous
The type of modem a network uses depends on whether the environment is asynchronous or synchronous.
Asynchronous Communication (Async)
Asynchronous communication, known as "async," is possibly the most widespread form of connectivity in the world. This is
because async was developed in order to make use of common telephone lines. Figure 7.5 shows an asynchronous environment,
in which data is transmitted in a serial stream.
Each character—letter, number, or symbol—is turned into a string of bits. Each of these strings is separated from the other
strings by a start-of-character bit and a stop bit. Both the sending and receiving devices must agree on the start and stop bit
sequence. The receiving computer uses the start and stop bit markers to schedule its timing functions so it is ready to receive the
next byte of data.
Communication is not synchronized. There is no clocking device or method to coordinate transmission between the sender and
the receiver. The sending computer just sends data, and the receiving computer just receives data. The receiving computer then
checks to make sure that the received data matches what was sent. Between 20 and 27 percent of the data traffic in async
communication consists of data traffic control and coordination. The actual amount depends on the type of the transmission—
for example, whether parity (a form of error checking, discussed in the section that follows) is being used.
Asynchronous transmission over telephone lines can happen at up to 28,800 bps. However, the latest data compression methods
can boost the 28,800 bps rate to 115,200 bps over directly connected systems.
Error Control Because of the potential for error, async can include a special bit, called a parity bit, which is used in an error-
checking and correction scheme called parity checking. In parity checking, the number of bits sent must match exactly the
number of bits received.
The original V.32 modem standard did not provide error control. To help avoid generating errors during data transmission, a
company called Microcom developed its own standard for asynchronous data-error control, the Microcom Networking Protocol
(MNP). The method worked so well that other companies adopted not only the initial version of the protocol but later versions,
called classes, as well. Currently, several modem manufacturers incorporate MNP Classes 2, 3, and 4 standards.
In 1989, the Comité Consultatif Internationale de Télégraphie et Téléphonie (CCITT) published an asynchronous error-control
scheme called V.42. This hardware-implemented standard featured two error-control protocols. The primary error-control
scheme is link access procedure for modems (LAPM), but the scheme also uses MNP Class 4. The LAPM protocol is used in
communications between two modems that are V.42-compliant. If only one, but not both, of the modems is MNP 4compliant,
the correct protocol to use would be MNP 4.
Improving Transmission Performance Communication performance depends on two elements:
•Signaling or channel speed describes how fast the bits are encoded onto the communications channel.
•Throughput measures the amount of useful information going across the channel.
By removing redundant elements or empty sections, compression improves the time required to send data. Microcom's MNP
Class 5 Data Compression Protocol is an example of one current data compression standard. You can improve performance, often
doubling the throughput, by using data compression. When both ends of a communication link use the MNP Class 5 protocol,
data transmission time can be cut in half.
The V.42bis standard, because it describes how to implement impressive data compression in hardware, makes even greater
performance possible. For example, a 56.6Kbps modem using V.90 can achieve a throughput of 100Kbps.
Coordinating the Standards Asynchronous, or serial, modems are less expensive than synchronous modems because the
asynchronous modem does not need the circuitry and the components to handle the timing involved in synchronous
transmission that synchronous modems require.
Synchronous Communication
Synchronous communication relies on a timing scheme coordinated between two devices to separate groups of bits and transmit
them in blocks known as "frames." Special characters are used to begin the synchronization and check its accuracy periodically.
Because the bits are sent and received in a timed, controlled (synchronized) process, start and stop bits are not required.
Transmission stops at the end of one frame and starts again with a new one. This start-and-stop approach is much more efficient
than asynchronous transmission, especially when large packets of data are being transferred. When small packets are sent, this
increase in efficiency is less noticeable. Figure 7.6 shows a comparison of asynchronous and synchronous data streams.
If there is an error, the synchronous error-detection and correction scheme implements a retransmission.
Synchronous protocols perform a number of jobs that Synchronous communication is used in almost all digital and
asynchronous protocols do not. Principally, they: network communications. For example, if you were using digital
•Format data into blocks. lines to connect remote computers, you would use synchronous
•Add control information. modems rather than asynchronous modems to connect the
•Check the information to provide error control. computer to the digital line. Generally, their higher cost and
The primary protocols in synchronous communication are: complexity have kept synchronous modems out of the home
•Synchronous Data Link Control (SDLC). market.
•High-level Data Link Control (HDLC)
•Binary Synchronous Communications Protocol (bisync)
Asymmetric Digital Subscriber Line (ADSL)
The latest modem technology to become available is asymmetric digital subscriber line (ADSL). This technology converts existing
twisted-pair telephone lines into access paths for multimedia and high-speed data communications. These new connections can
transmit more than 8 Mbps to the subscriber and up to 1 Mbps from the subscriber.
ADSL is not without drawbacks. The technology requires special hardware, including an ADSL modem on each end of the
connection. It also requires broadband cabling, which is currently only available in a few locations, and there is a limit to the
connection length.
ADSL is recognized as a physical layer transmission protocol for unshielded twisted-pair media.
•Segment existing LANs so that each segment becomes its own LAN.
•Join two separate LANs.
•Connect to other LANs and computing environments to join them into a larger comprehensive WAN.
The components that enable engineers to accomplish these goals are:
•Hubs.
•Repeaters.
•Bridges.
•Routers.
•Brouters.
•Gateways.
Hubs
Hubs can also be used to expand the size of a LAN. Although using hubs won't convert a LAN into a WAN, connecting or adding
hubs to a LAN can effectively increase the number of workstations. This method of growing a LAN is popular but does come with
many design limitations. Figure 7.7 shows how several 10BaseT hubs can be connected to expand a network.
Figure 7.8 shows how several token-ring hubs can be connected to expand a network.
NOTE: It is important to be careful when connecting hubs. Crossover cables are wired differently than standard patch cables, and
one will not work correctly in place of the other. Check with the manufacturers to determine whether you need a standard patch
cable or a crossover cable.
Repeaters
As signals travel along a cable, they degrade and become distorted in a process called "attenuation." If a cable is long enough,
attenuation will finally make a signal unrecognizable. Installing a repeater enables signals to travel farther.
How Repeaters Work
A repeater works at the physical layer of the OSI Reference Model to regenerate the network's signals and resend them out on
other segments. Figure 7.9 shows how repeaters regenerate weak signals.
The repeater takes a weak signal from one segment, regenerates it, and passes it to the next segment. To pass data through the
repeater from one segment to the next, the packets and the Logical Link Control (LLC) protocols must be identical on each
segment. A repeater will not enable communication, for example, between an 802.3 LAN (Ethernet) and an 802.5 LAN (Token
Ring).
Repeaters do not translate or filter signals. For a repeater to work, both segments that the repeater joins must use the same
access method. The two most common access methods are carrier-sense multiple-access with collision detection (CSMA/CD) and
token passing. A repeater cannot connect a segment using CSMA/CD to a segment using the token-passing access method. That
is, a repeater cannot translate an Ethernet packet into a Token Ring packet.
As shown in Figure 7.10, repeaters can move packets from one kind of physical media to another. They can take an Ethernet
packet coming from a thinnet coaxial-cable segment and pass it on to a fiber-optic segment, provided the repeater is capable of
accepting the physical connections.
NOTE Repeaters improve performance by dividing the network into segments, thus reducing the number of computers per
segment. When using repeaters to expand a network, don't forget about the 5-4-3 rule.
Do not use a repeater when:
•There is heavy network traffic.
•Segments are using different access methods.
•Data filtering is needed.
Bridges
Like a repeater, a bridge can join segments or workgroup LANs. Figure 7.11 shows a bridge connecting two network segments.
However, a bridge can also divide a network to isolate traffic or problems. For example, if the volume of traffic from one or two
computers or a single department is flooding the network with data and slowing down the entire operation, a bridge could
isolate those computers or that department.
NOTE Remember that routing tables were also discussed in the context of bridges. The routing table maintained by a bridge
contains MAC-sublayer addresses for each node, whereas the routing table maintained by a router contains network numbers.
Although manufacturers of both types of equipment have chosen to use the term "routing table," it has a different meaning for
bridges than it does for routers.
When routers receive packets destined for a remote network, Because routers must perform complex functions on each
they send them to the router that manages the destination packet, routers are slower than most bridges. As packets are
network. In some ways this is an advantage because it means passed from router to router, data-link layer source and
routers can: destination addresses are stripped off and then re-created. This
•Segment large networks into smaller ones. enables a router to route a packet from a TCP/IP Ethernet
•Act as safety barriers between segments. network to a server on a TCP/IP Token Ring network.
•Prohibit broadcast storms, because broadcasts are not Because routers read only addressed network packets, they do
forwarded. not allow corrupted data to get passed onto the network.
Routable Protocols Not all protocols are routable. Protocols Because they do not pass corrupted data or broadcast data
that are routable include: storms, routers put little stress on networks.
•DECnet. Routers do not look at the destination node address; they look
•Internet Protocol (IP). only at the network address. Routers will pass information only
•Internetwork Packet Exchange (IPX). if the network address is known. This ability to control the data
•OSI. passing through the router reduces the amount of traffic
•Xerox Network System (XNS). between networks and allows routers to use these links more
•DDP (AppleTalk). efficiently than bridges.
Protocols that are not routable include: Using the router-addressing scheme, administrators can break
•Local Area Transport Protocol (LAT), a protocol from Digital one large network into many separate networks, and because
Equipment Corporation. routers do not pass or even handle every packet, they act as a
•NetBEUI (NetBIOS Extended User Interface). safety barrier between network segments. This can greatly
Routers are available that can accommodate multiple protocols reduce the amount of traffic on the network and the wait time
such as IP and DECnet in the same network. experienced by users.
Choosing Paths Unlike bridges, routers can accommodate multiple active paths between LAN segments and choose among
redundant paths. Because routers can link segments that use completely different data packaging and media-access schemes,
there are often several paths available for the router to use. This means that if one router does not function, the data can still be
passed over alternate routes.
A router can listen to a network and identify which parts are busiest. It uses this information to determine which path to send
data over. If one path is very busy, the router identifies an alternative path and sends data over that one.
A router decides the path the data packet will follow by determining the number of hops between internetwork segments. Like
bridges, routers build routing tables and use these in routing algorithms such as the following:
•OSPF ("open shortest path first") is a link-state routing algorithm. Link-state algorithms control the routing process and allow
routers to respond quickly to changes in the network.
•RIP (Routing Information Protocol) uses distance-vector algorithms to determine routes. Transmission Control Protocol/Internet
Protocol (TCP/IP) and IPX support RIP.
•NetWare Link Services Protocol (NLSP) is a link-state algorithm to be used with IPX.
Types of Routers
The two major types of routers are:
•Static.
•Static routers require an administrator to manually set up and configure the routing table and to specify each route.
•Dynamic.
•Dynamic routers are designed to discover routes automatically and therefore require a minimal amount of setup and
configuration. More sophisticated than static routers, they examine information from other routers and make packet-by-packet
decisions about how to send data across the network.
Table 7.2 compares and contrasts the characteristics of static and dynamic routers.
Brouters
A brouter, as the name implies, combines the qualities of both a bridge and a router. A brouter can act as a router for one
protocol and as a bridge for all the others.
Brouters can:
•Route selected routable protocols.
•Bridge nonroutable protocols.
•Deliver more cost-effective and more manageable internetworking than separate bridges and routers.
Gateways
Gateways enable communication between different architectures and environments. They repackage and convert data going
from one environment to another so that each environment can understand the other environment's data. A gateway repackages
information to match the requirements of the destination system. Gateways can change the format of a message so that it
conforms to the application program at the receiving end of the transfer. For example, electronic-mail gateways, such as the
X.400 gateway, receive messages in one format, translate it, and forward it in X.400 format used by the receiver, and vice versa.
A gateway links two systems that do not use the same:
•Communication protocols.
•Data-formatting structures.
•Languages.
•Architecture.
Gateways interconnect heterogeneous networks; for example, they can connect Microsoft Windows NT Server to IBM's Systems
Network Architecture (SNA). Gateways change the format of the data to make it conform to the application program at the
receiving end.
How Gateways Work
Gateways are task-specific, which means that they are dedicated to a particular type of transfer. They are often referred to by
their task name (Windows NT Server to SNA gateway).
As shown in Figure 7.18, a gateway takes the data from one environment, strips off its old protocol stack, and repackages it in the
protocol stack from the destination network.
To process the data, the gateway:
•Disassembles incoming data through the network's complete protocol stack.
•Encapsulates the outgoing data in the complete protocol stack of the other network to allow transmission.
Some gateways use all seven layers of the OSI reference model,
but gateways typically perform protocol conversion at the
application layer. However, the level of functionality varies
widely between types of gateways.
Mainframe Gateways
One common use for gateways is to act as translators between personal computers and minicomputer or mainframe
environments. A host gateway connects LAN computers with mainframe and minicomputer systems that do not recognize
intelligent computers attached to LANs.
In a LAN environment, as shown in Figure 7.19, one computer is usually designated as the gateway computer. Special application
programs in the desktop computers access the mainframe by communicating with the mainframe environment through the
gateway computer. Users can access resources on the mainframe just as if these resources were on their own desktop
computers.
Gateway Considerations
Typically, gateways are dedicated servers on a network. They can use a significant percentage of a server's available bandwidth
because they are carrying out resource-intensive tasks such as protocol conversion. If a gateway server is used for multiple tasks,
adequate RAM and CPU bandwidth needs to be allocated or performance of the server functions will be degraded.
Gateways are considered as choices for implementation because they do not put a heavy load on internetwork communication
circuits, and they perform specific tasks efficiently.
Lesson Summary
The following points summarize the main elements of this lesson:
•Modems make it possible to communicate over telephone lines.
•There are two types of modems: synchronous and asynchronous.
•It is important to choose the right cable when connecting hubs; crossover cables will not work in place of standard patch cables.
•Asymmetric digital subscriber line (ADSL) is a technology for increasing the speed of transmission on telephone lines.
•Repeaters are used to connect two segments of similar or dissimilar media and to regenerate a signal to increase the distance
transmitted.
•Repeaters should not be used where network traffic is heavy, segments are using different access methods, or filtering is
needed.
•Bridges have all the features of repeaters.
•Bridges are used to connect two segments to expand the length or number of nodes on the network, to reduce traffic by
segmenting the network, or to connect dissimilar networks.
•Routers are used to connect two networks, limit unnecessary traffic, and to separate administrative networks.
•Brouters combine the features of bridges and routers; a brouter can act as a router for one protocol and as a bridge for all the
others.
•Gateways perform protocol and data conversion.
•Gateways are limited in several ways: they are task-specific, expensive, and can be slow.