Token-ring local area network management

Size: px
Start display at page:

Download "Token-ring local area network management"

Transcription

1 Token-ring local area network management by BARBARA J. DON CARLOS IBM Corporation Research Triangle Park, North Carolina ABSTRACT This paper describes an architecture for managing a token-ring local area network, possibly consisting of several token rings joined by MAC-layer bridges in a network containing several communication subsystems. A four-tier network management hierarchy, consisting of stations, management servers, a token-ring LAN manager, and a communications network manager is presented. Stations participate in the management of the LAN by monitoring themselves and their neighboring stations. Management servers collect configuration and error reports from stations on a single ring segment. The LAN manager can coordinate the activities of the different management servers on its local ring and on rings other than its own, but within one local area network. If the token-ring local area network is part of a larger communications network, possibly a wide-area network, another tier, the communications network manager, is required to provide network-wide management capabilities. An example network configuration is presented in this paper and various scenarios involving the management of that network are described. 423

2

3 Token-ring Local Area Network Management 425 INTRODUCTION The management of token-ring local area networks (LANs) involves informing management entities of errors and configuration changes in the network, honoring requests for status, and changing the state of stations attached to the token ring. Information is collected and distributed from centralized entities to allow for a single point of control from which a human operator could monitor and manage the network. A hierarchical management architecture is defined to manage stations and connections in this distributed environment. This hierarchy consists of: token-ring LAN stations, token-ring management servers, a token-ring LAN manager, and, where the token-ring LAN is part of a larger network, a communications network manager. Figure 1 summarizes the management hierarchy for the token ring. The token-ring LAN architecture, a specification of the physical layer and the lower half of the data-link control layer (called the medium access control sublayer) provides sophisticated network management functions. This architecture is defined in the IEEE Standard. 1 The token-ring medium-access-control protocol provides management messages to change the configuration of stations attached to the ring, change the state of those stations, and report errors from those stations. These management activities are directed and coordinated by management servers. Three management servers are defined, each performing a different management activity for stations attached to a single token ring. In a local area network consisting of many token rings connected by bridges, each type of management server can be located on each ring to insure that all aspects of each Figure I-Token-ring management hierarchy ring in the LAN are managed. Control and coordination of the activities of the management servers is provided by a token-ring LAN manager. A token-ring LAN manager's responsibility extends across the token rings monitored by the management servers under its control If the token-ring network exists as a part of a larger communications network, possibly including other types of communication subsystems, management of the token ring is included as part of the communications management hierarchy for the parent communications network. Management funcions specific to the token ring can be provided by the token-ring LAN manager, while configuration and fault information critical to the connectivity within the entire network can be reported to a higher management entity called the communications network manager. The concept of a hierarchical management architecture is very useful when several communication subsystems are to be managed from a central location. That is, each subsystem is managed to the extent possible by its subsystem manager; information about configuration and unresolved errors is forwarded to a centralized management facility. The centralized management facility could provide further fault diagnosis, maintain configuration information, and supply information about the health of the network to an operator. TOKEN-RING LAN ARCHITECTURE OVERVIEW A token-ring LAN consists of stations connected sequentially by a series of point-to-point physical links to form a ring. Each station is provided fair access to the shared transmission media through the use of a special bit pattern, called a token. Only one token is present on the ring at any time and it is passed from station to station around the ring. When a station with data to transmit receives (captures) the token, it sends the data it is holding in a frame. The frame consists of a header, the data, and a trailer. The header of the frame contains control information, including the destination address for the information. All other stations on the ring (not using the token) listen to the traffic on the ring while repeating all frames to their downstream neighbors. When a station recognizes its address in the destination address field of a frame header, it copies the frame from the ring. The station also repeats the frame, which propagates around the ring. The sending station removes its frame from the ring. When it finishes transmitting the frame and receives the header of the frame it sent (from around the ring), the sending station transmits a new token on the ring for use by the first downstream station with data to transmit. In this way, each station obtains fair, deterministic access to the transmission media of the ring.

4 426 National Computer Conference, 1987 Attaching to the Ring When a station attaches to the token ring, it registers addressing information and identifies the product it attaches to the token ring to a management server called the ring parameter server ( described below). The ring parameter server, if present, responds by sending a frame containing the values for operational parameters in use by stations attached to the ring. If the ring parameter server is not attached to the ring, the attaching station uses the default values for its operational parameters. Active Monitor Function One station attached to each ring, called the active monitor, monitors the token on the ring. Any station attached to the token ring can provide the active monitor functions, though only one does so at a time. The token-monitoring functions of the active monitor are necessary to insure that a usable token is always present on the ring. If the active monitor does not recognize a token on the ring for a specified (relatively short) period of time, it purges the ring. During the purge process, all of the stations attached to the ring are reset. The other stations attached to the ring serve as standby monitors that watch the activities of the active monitor and take over in case of failure. Active monitor errors are reported to a management server called the ring error monitor (described below). When a station becomes the active monitor (at initialization time or after a monitor error has occurred), it registers with a management server called the configuration report server ( described below). The active monitor also initiates a periodic poll, called the neighbor-notification process, in which stations identify themselves to their (downstream) neighboring station. The neighbor-notification process enables stations to isolate faults by reporting errors between them and their nearest active upstream neighbor on the ring. It also serves to notify stations that an active monitor is present on the ring. During the neighbor-notification process, the active monitor transmits a special identification frame that identifies itself to its downstream neighbor. The downstream neighbor then identifies itself to its downstream neighbor. This process continues around the ring until it reaches the active monitor again. Then, after a predetermined time, the active monitor initiates the process again. If a station detects a new upstream neighbor during the neighbor-notification process, it reports the new station address to the configuration report server (described below). Note that the upstream station could have changed because a new station attached to the ring or because the old upstream station left the ring. Error Detection and Reporting Two types of errors are detected by token-ring stations: hard errors and soft errors. Hard errors are faults that preclude the operation of a token ring within the normal tokenring LAN protocols. Hard errors detected by token-ring stations include a broken ring and a continually transmitting station. If a station detects a hard error, it broadcasts a special frame, called a "Beacon" frame. The Beacon frame contains the address of the nearest active upstream neighbor of the frame transmitter. All stations attached to the ring receive the Beacon frame; its destination address is defined to be the all-station group address. Upon receiving the Beacon frame, the station identified as the sender's nearest active upstream neighbor removes itself from the ring and executes a test to determine whether it and its attachment to the ring (lobe) are functioning properly. If an error is detected, the station remains out of the ring, thereby bypassing the fault. Otherwise, it reattaches to the ring. After a predetermined amount of time, the Beacon frame transmitter removes itself from the ring and performs the same test that its upstream neighbor did. Again, if this station determines that it or its lobe is not operating correctly, it remains out of the ring and the error will have been bypassed. In this manner, many hard errors can be detected and automatically bypassed without interaction from users of stations attached to the token-ring. However, if the hard error is still present after both stations have had an opportunity to test themselves and their lobes, the token-ring LAN manager is notified and manual intervention is necessary to recover the token ring operation. Soft errors are faults that temporarily degrade the tokenring performance; they are tolerated by the use of errorrecovery procedures. Soft errors detected by token-ring stations include: cyclic redundancy check (CRC) errors in received and repeated frames, and station-congestion errors (a station recognized a frame as being addressed to it, but could not copy it due to insufficient resources). Soft errors are divided into two categories: isolating and non-isolating errors. Isolating errors isolate the location of a fault to a pair of adjacent stations and the transmission medium connecting those stations. Isolating errors detected by stations attached to the token-ring include: an error in a message detected by an error in the CRC appended to that message, a bit in the message that does not represent a zero or a one (see the IEEE Standard! for description of the differential Manchester encoding used on the token ring), and an early detection of signal loss on the transmission media. Non-isolating errors cannot isolate the fault on a token ring. The non-isolating errors detected by token-ring stations include: lost frames, stations too congested to receive a frame, and two stations attached to a single token ring with the same address. Token-ring stations periodically report the counts of isolating and non-isolating- errors they detect to a management server called the ring error monitor (described below). TOKEN-RING LAN MANAGEMENT SERVERS Management servers collect information from, and distribute information to, stations attached to a token ring. Responsibilities of the management servers may also include analyzing reports from stations on the ring and forwarding the results of that analysis to the token-ring LAN manager. Each management server's responsibility extends only to the stations attached to its ring. The management servers defined for

5 Token-ring Local Area Network Management 427 the token-ring LAN are: the ring error monitor (REM), the configuration report server (CRS), and the ring parameter server (RPS). Ring Error Monitor The ring error monitor (REM), collects, analyzes, and may log soft-error reports received from stations attached to its ring. All soft-error reports sent by stations are sent to a wellknown functional address reserved for REM. Therefore, if multiple REMs are present on a ring, they all can receive soft-error reports generated by stations attached to that ring. The function of REM is to determine when a non-random or excessive soft-error condition is present on the ring on which it resides and, if possible, isolate the most probable source of the errors to a fault domain, consisting of two adjacent active stations attached to the ring and the physical medium between them. REM detects excessive soft errors by analyzing soft-error reports sent by stations attached to its ring as they arrive and determining whether soft errors are occurring at a rate that degrades the performance of the token ring. When REM detects such a condition, it may notify the LAN manager, indicating the source of the error. REM maintains a table of weighted error counts for each station attached to its ring from which it has recently received a soft-error report. The weighted error count accumulated for a station is used as an indication of the likelihood that the station is causing excessive errors on the ring. When a softerror report is received, the information contained in the isolating error counters is used to accumulate the weighted error count for the sending station and its nearest active upstream neighbor. When the accumulated error count for a station exceeds a threshold, REM may notify the LAN manager that excessive soft errors have been detected on its ring. REM can provide the addresses of the stations in the fault domain in which it has detected the errors in the notification, thus providing information to allow a human operator to reconfigure the token ring to bypass noisy sections of the ring. Since even random errors may cause the accumulated weighted error count for a station to exceed the threshold eventually, a fixed value is periodically subtracted from the weighted error count for each station for which REM is maintaining a count. As a result of this periodic decrementing of the weighted error counts, only the stations continuously accumulating weighted error counts at a rate faster than the decrement rate will have error counts that grow with time. Configuration Report Server The configuration report server (CRS) collects reports of changes in the order of stations attached to the ring and notifications from a new active monitor on the ring. CRS may also receive commands from the LAN manager to query the stations attached to its ring for certain information, including addressing information, state information, and information about their attached software or hardware, or set the values for operational parameters in stations attached to its ring. The LAN manager can instruct CRS to force a station to remove itself from the ring if, for example, the station were part of a fault domain in which excessive soft errors had been detected (by REM). The information collected and distributed by the configuration report server could be used to maintain a configuration database for the token-ring LAN. Ring Parameter Server The ring parameter server (RPS) is responsible for initializing and maintaining a consistent set of values for operational parameters in use by ring stations attached to its ring. When a station attaches to a ring, it requests the current set of values for the operational parameters being used by stations attached to that ring. The station's request is sent to the well-known functional address reserved for RPS. The request for initialization by an attaching station also contains some registration information pertaining to that station and the product it attaches to the ring. The RPS could forward this information to the LAN manager to notify it that a new station has attached to the ring and to report its characteristics. TOKEN-RING LAN MANAGER A token-ring LAN manager can provide centralized control for all of the management servers in a token-ring LAN. The management servers may be attached to different rings, connected by MAC-layer bridges (see "MAC Layer Interconnection of IEEE of 802 Local Area Networks,,2). Therefore, a centralized LAN manager could provide management function, such as monitoring and controlling stations and physical media for different rings in a multi-ring LAN, from a single point. The token-ring LAN manager coordinates the activities of the management servers in a local area network. It could obtain information about the state of management servers and set the values for operational parameters used by those servers. Examples of operational parameters for which values could be set include counter and counter thresholds maintained in the management servers. Also, for trouble shooting purposes, configuration information and version level information could be made available by management servers. The token-ring LAN manager could also receive unsolicited reports from management servers indicating state changes and errors. For example, when a management server's counter meets its threshold value or the management server detects a configuration change, the token-ring LAN manager would be notified. In this hierarchical management architecture, servers essentially act as surrogates for the token-ring LAN manager on rings other than the one to which the token-ring LAN manager is attached. When the token-ring LAN manager needs to retrieve the status of a station on a remote ring, for example, it would instruct a configuration report server on that ring to obtain the status from the station. The station would then respond to the configuration report server, which returns the requested information to the token-ring LAN manager.

6 428 National Computer Conference, 1987 Therefore, this architecture provides a framework for information to be exchanged between stations and management servers, and between management servers and a token-ring LAN manager. COMMUNICATIONS NETWORK MANAGER The communications network manager receives reports of anomalies in communications subsystems from the communication subsystem managers. The token-ring LAN manager is the communication subsystem manager that is responsible for the token-ring LAN. The token-ring LAN manager notifies the communications network manager about error conditions resulting in a loss of availability of LAN resources to end users. These conditions include: excessive soft errors on a token ring, hard errors that are not automatically bypassed, and the automatic removal of stations to bypass a LAN error. Also, the token-ring LAN manager may report conditions that hinder its ability to detect errors on the token ring to which it is attached. For example, if the token-ring LAN manager detects an error in its attachment to the token-ring, it notifies the communications network manager. A single operator, using the communications network manager, can monitor all of the communications subsystems in the network, thus reducing the cost and increasing the reliability and availability of the entire communications network. AN EXAMPLE The following example illustrates the use of this hierarchical management framework for the token-ring. The configuration on which these example interactions are based is shown below in Figure 2. The figure shows a local area network consisting of three token rings, connected by bridges (depicted by straight lines between the rings), another separate communication subsystem, and a host containing a communications network manager. Stations attached to the token rings are shown as boxes and management servers residing in stations attached to the ring are lableled inside the boxes. Each ring has stations and the management servers described above attached to it, though only a few stations are shown on each ring. The arrow shown inside ring B indicates the direction of LEGEND: RPS: Rlnv Parameter Server CRS: Confipatlon ~ s... REM: Ring Error Monitor RS: Ring Station Figure 2-An example configuration the token and message flows for this example. The token-ring LAN manager for the bridged LAN is shown attached to ring C. The communications network manager has links with both the token-ring LAN manager and the other communication subsystem manager. If a soft error occurs on ring B and is detected by ring station 3, then that station logs the error and will periodically send a soft-error report to the ring error monitor for ring B, REM (B). The isolating error counts in the soft error report are manipulated and added to the weighted error counts for ring stations 3 and 4, since the error may have occurred at either station or on the transmission medium between them. The non-isolating error counts in the soft error report are accumulated in a count of non-isolating errors on ring B. If soft error reports containing isolating error indications are received at a high enough frequency from station 3, then the isolating soft error count will exceed a predetermined threshold value in the ring error monitor. REM (B) could notify the token-ring LAN manager that excessive soft errors are occurring within fault domain of ring stations 3 and 4 and the connecting medium. Similarly, if REM (B)'s counter for non-isolating errors exceeds a threshold, then the token-ring LAN manager would be notified that a non-isolating error threshold has been exceeded. If the source of the error can be isolated, the token-ring LAN manager could take action to bypass or correct the fault. This action might involve re-configuring the ring on which the fault was detected. In the scenario above, the token-ring LAN manager could instruct CRS (B) to remove ring station 1 from the token ring in order to bypass the fault. Otherwise, the token-ring LAN manager could notify the communications network manager that excessive soft errors are occurring on ring B. The sequence of interactions involving the ring parameter server and the configuration report server are similar. For example, when a ring station attaches to ring B, it requests the values for parameters currently in use by the other stations attached to ring B. RPS (B) responds with the appropriate values. RPS (B), since it then has knowledge of a configuration change on ring B, could notify the token-ring LAN manager of the change. The registration information contained in the original request for parameters could also be forwarded to the token-ring LAN manager. If ring station 4 in Figure 2 removes itself from ring B, a configuration change is detected by its nearest active downstream neighbor: ring station 3. Ring station 3 reports this change to the configuration report server on ring B, CRS (B) and CRS (B) could forward the information to the token-ring LAN manager, which, in tum, may update a configuration database or display the information. The token-ring LAN manager may request information about a ring station on ring B, say ring station 1, by instructing CRS (B) to query that ring station. On receipt of such a request, CRS (B) would obtain the information about the ring station and send it to the token-ring LAN manager. Similarly; the token-ring LAN manager could set the values for operational parameters in the ring station such as the ring number for ring B, by instructing CRS (B) to do so. If the station attaching the token-ring LAN manager to ring

7 Token-ring Local Area Network Management 429 C detects signal loss, it may report this condition to the communications network manager. The communications network manager could then notify an operator that it cannot manage the token-ring LAN until the fault is corrected. NOTE: If a problem exists in the token-ring LAN manager's station or attachment to the ring, it may not affect the other stations in the network, because of the automatic bypass and recovery procedures built into the token-ring protocol. All of the servers in the multi-ring network report to the token-ring LAN manager on ring C. It is important to also note that servers on a ring may co-reside within a single station on that ring. This is shown on Ring A, where one node houses both the ring error monitor and configuration report server functions. Also, multiple instances of a management server can be attached to a single ring. This case is also shown on ring A, where two ring error monitors are present. CONCLUSION To efficiently manage a token-ring network, management functions are distributed throughout the token-ring local area network (in each station). Stations participate in the management of the token-ring by monitoring the health of the ring and reporting error conditions to management servers attached to their ring. These distributed management functions are coordinated by management servers, which analyze the reports from stations and may forward the results of this analysis to the token-ring LAN manager. The token-ring LAN manager provides a centralized point of control for management functions in a token ring local area network, and may report to a communications network manager which has responsibility for the management of the entire communications network. REFERENCES 1. IEEE Computer Society. Token Ring Access Method and Physical Layer Specifications, ANSIIIEEE Standard (ISOIDIS 8802/5). New York: IEEE, Bernsten, J. A, J. R. Davin, D. A Pitt, and N. G. Sullivan. "MAC Layer Interconnection of IEEE 802 Local Area Networks." Computer Networks, 10(1985)5.

8

52-20-15 RMON, the New SNMP Remote Monitoring Standard Nathan J. Muller

52-20-15 RMON, the New SNMP Remote Monitoring Standard Nathan J. Muller 52-20-15 RMON, the New SNMP Remote Monitoring Standard Nathan J. Muller Payoff The Remote Monitoring (RMON) Management Information Base (MIB) is a set of object definitions that extend the capabilities

More information

52-20-16 Using RMON to Manage Remote Networks Gilbert Held

52-20-16 Using RMON to Manage Remote Networks Gilbert Held 52-20-16 Using RMON to Manage Remote Networks Gilbert Held Payoff By standardizing the management information base (MIB) for Ethernet and Token Ring LANs, a network administrator can use the management

More information

Ring Local Area Network. Ring LANs

Ring Local Area Network. Ring LANs Ring Local Area Network Ring interface (1-bit buffer) Ring interface To station From station Ring LANs The ring is a series of bit repeaters, each connected by a unidirectional transmission link All arriving

More information

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD Ethernet dominant LAN technology: cheap -- $20 for 100Mbs! first widely used LAN technology Simpler, cheaper than token rings and ATM Kept up with speed race: 10, 100, 1000 Mbps Metcalfe s Etheret sketch

More information

Module 15: Network Structures

Module 15: Network Structures Module 15: Network Structures Background Topology Network Types Communication Communication Protocol Robustness Design Strategies 15.1 A Distributed System 15.2 Motivation Resource sharing sharing and

More information

Chapter 14: Distributed Operating Systems

Chapter 14: Distributed Operating Systems Chapter 14: Distributed Operating Systems Chapter 14: Distributed Operating Systems Motivation Types of Distributed Operating Systems Network Structure Network Topology Communication Structure Communication

More information

Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師

Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師 Lecture 7: Distributed Operating Systems A Distributed System 7.2 Resource sharing Motivation sharing and printing files at remote sites processing information in a distributed database using remote specialized

More information

Controlled Random Access Methods

Controlled Random Access Methods Helsinki University of Technology S-72.333 Postgraduate Seminar on Radio Communications Controlled Random Access Methods Er Liu liuer@cc.hut.fi Communications Laboratory 09.03.2004 Content of Presentation

More information

Chapter 16: Distributed Operating Systems

Chapter 16: Distributed Operating Systems Module 16: Distributed ib System Structure, Silberschatz, Galvin and Gagne 2009 Chapter 16: Distributed Operating Systems Motivation Types of Network-Based Operating Systems Network Structure Network Topology

More information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.

More information

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak Packet Switching and Computer Networks Switching As computer networks became more pervasive, more and more data and also less voice was transmitted over telephone lines. Circuit Switching The telephone

More information

Module 1. Introduction. Version 2 CSE IIT, Kharagpur

Module 1. Introduction. Version 2 CSE IIT, Kharagpur Module 1 Introduction Lesson 2 Layered Network Architecture Specific Functional Objectives On Completion of this lesson, the students will be able to: State the requirement for layered approach Explain

More information

Fiber Distributed Data Interface

Fiber Distributed Data Interface CHPTER 8 Chapter Goals Provide background information about FDDI technology. Explain how FDDI works. Describe the differences between FDDI and Copper Distributed Data Interface (CDDI). Describe how CDDI

More information

Networking Test 4 Study Guide

Networking Test 4 Study Guide Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.

More information

Data Link Layer Overview

Data Link Layer Overview Data Link Layer Overview Date link layer deals with two basic issues: Part I How data frames can be reliably transmitted, and Part II How a shared communication medium can be accessed In many networks,

More information

A DNP3 Protocol Primer

A DNP3 Protocol Primer A Protocol Primer Introduction This is a primer for people who want a quick understanding of without having to comb through the tedious details of a complex specification. The writing style is meant to

More information

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.

More information

Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology

Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology Indian Institute of Technology Kharagpur TCP/IP Part I Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology Kharagpur Lecture 3: TCP/IP Part I On completion, the student

More information

Local-Area Network -LAN

Local-Area Network -LAN Computer Networks A group of two or more computer systems linked together. There are many [types] of computer networks: Peer To Peer (workgroups) The computers are connected by a network, however, there

More information

A Network Monitoring System with a Peer-to-Peer Architecture

A Network Monitoring System with a Peer-to-Peer Architecture A Network Monitoring System with a Peer-to-Peer Architecture Paulo Salvador, Rui Valadas University of Aveiro / Institute of Telecommunications Aveiro E-mail: salvador@av.it.pt; rv@det.ua.pt Abstract The

More information

Introduction to Simple Network Management Protocol (SNMP)

Introduction to Simple Network Management Protocol (SNMP) Introduction to Simple Network Management Protocol (SNMP) Simple Network Management Protocol (SNMP) is an application layer protocol for collecting information about devices on the network. It is part

More information

Protocols and Architecture. Protocol Architecture.

Protocols and Architecture. Protocol Architecture. Protocols and Architecture Protocol Architecture. Layered structure of hardware and software to support exchange of data between systems/distributed applications Set of rules for transmission of data between

More information

The ABCs of Spanning Tree Protocol

The ABCs of Spanning Tree Protocol The ABCs of Spanning Tree Protocol INTRODUCTION In an industrial automation application that relies heavily on the health of the Ethernet network that attaches all the controllers and computers together,

More information

MANAGEMENT INFORMATION SYSTEMS 8/E

MANAGEMENT INFORMATION SYSTEMS 8/E MANAGEMENT INFORMATION SYSTEMS 8/E Raymond McLeod, Jr. and George Schell Chapter 10 Data Communications Copyright 2001 Prentice-Hall, Inc. 10-1 Objectives Understand data communication basics. Know the

More information

COMMUNICATION NETWORKS WITH LAYERED ARCHITECTURES. Gene Robinson E.A.Robinsson Consulting 972 529-6395 ROB1200@aol.com

COMMUNICATION NETWORKS WITH LAYERED ARCHITECTURES. Gene Robinson E.A.Robinsson Consulting 972 529-6395 ROB1200@aol.com COMMUNICATION NETWORKS WITH LAYERED ARCHITECTURES Gene Robinson E.A.Robinsson Consulting 972 529-6395 ROB1200@aol.com 9 March 1999 IEEE802 N-WEST STANDARDS MEETING FOR BROADBAND WIRELESS ACCESS SYSTEMS

More information

Wide Area Networks. Learning Objectives. LAN and WAN. School of Business Eastern Illinois University. (Week 11, Thursday 3/22/2007)

Wide Area Networks. Learning Objectives. LAN and WAN. School of Business Eastern Illinois University. (Week 11, Thursday 3/22/2007) School of Business Eastern Illinois University Wide Area Networks (Week 11, Thursday 3/22/2007) Abdou Illia, Spring 2007 Learning Objectives 2 Distinguish between LAN and WAN Distinguish between Circuit

More information

LAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs

LAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs LAN Switching 15-441 Computer Networking Bridges/Switches, 802.11, PPP Extend reach of a single shared medium Connect two or more segments by copying data frames between them Switches only copy data when

More information

524 Computer Networks

524 Computer Networks 524 Computer Networks Section 1: Introduction to Course Dr. E.C. Kulasekere Sri Lanka Institute of Information Technology - 2005 Course Outline The Aim The course is design to establish the terminology

More information

Region 10 Videoconference Network (R10VN)

Region 10 Videoconference Network (R10VN) Region 10 Videoconference Network (R10VN) Network Considerations & Guidelines 1 What Causes A Poor Video Call? There are several factors that can affect a videoconference call. The two biggest culprits

More information

The OSI model has seven layers. The principles that were applied to arrive at the seven layers can be briefly summarized as follows:

The OSI model has seven layers. The principles that were applied to arrive at the seven layers can be briefly summarized as follows: 1.4 Reference Models Now that we have discussed layered networks in the abstract, it is time to look at some examples. In the next two sections we will discuss two important network architectures, the

More information

R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?

R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol? Chapter 1 Review Questions R1. What is the difference between a host and an end system? List several different types of end systems. Is a Web server an end system? 1. There is no difference. Throughout

More information

MANAGING NETWORK COMPONENTS USING SNMP

MANAGING NETWORK COMPONENTS USING SNMP MANAGING NETWORK COMPONENTS USING SNMP Abubucker Samsudeen Shaffi 1 Mohanned Al-Obaidy 2 Gulf College 1, 2 Sultanate of Oman. Email: abobacker.shaffi@gulfcollegeoman.com mohaned@gulfcollegeoman.com Abstract:

More information

The OSI Model and the TCP/IP Protocol Suite

The OSI Model and the TCP/IP Protocol Suite The OSI Model and the TCP/IP Protocol Suite To discuss the idea of multiple layering in data communication and networking and the interrelationship between layers. To discuss the OSI model and its layer

More information

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various

More information

How To Understand and Configure Your Network for IntraVUE

How To Understand and Configure Your Network for IntraVUE How To Understand and Configure Your Network for IntraVUE Summary This document attempts to standardize the methods used to configure Intrauve in situations where there is little or no understanding of

More information

Level 2 Routing: LAN Bridges and Switches

Level 2 Routing: LAN Bridges and Switches Level 2 Routing: LAN Bridges and Switches Norman Matloff University of California at Davis c 2001, N. Matloff September 6, 2001 1 Overview In a large LAN with consistently heavy traffic, it may make sense

More information

Chapter 3. Enterprise Campus Network Design

Chapter 3. Enterprise Campus Network Design Chapter 3 Enterprise Campus Network Design 1 Overview The network foundation hosting these technologies for an emerging enterprise should be efficient, highly available, scalable, and manageable. This

More information

Computer Networks Vs. Distributed Systems

Computer Networks Vs. Distributed Systems Computer Networks Vs. Distributed Systems Computer Networks: A computer network is an interconnected collection of autonomous computers able to exchange information. A computer network usually require

More information

UG103.5 EMBER APPLICATION DEVELOPMENT FUNDAMENTALS: SECURITY

UG103.5 EMBER APPLICATION DEVELOPMENT FUNDAMENTALS: SECURITY EMBER APPLICATION DEVELOPMENT FUNDAMENTALS: SECURITY This document introduces some basic security concepts, including network layer security, trust centers, and application support layer security features.

More information

What is CSG150 about? Fundamentals of Computer Networking. Course Outline. Lecture 1 Outline. Guevara Noubir noubir@ccs.neu.

What is CSG150 about? Fundamentals of Computer Networking. Course Outline. Lecture 1 Outline. Guevara Noubir noubir@ccs.neu. What is CSG150 about? Fundamentals of Computer Networking Guevara Noubir noubir@ccs.neu.edu CSG150 Understand the basic principles of networking: Description of existing networks, and networking mechanisms

More information

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set

More information

First Semester Examinations 2011/12 INTERNET PRINCIPLES

First Semester Examinations 2011/12 INTERNET PRINCIPLES PAPER CODE NO. EXAMINER : Martin Gairing COMP211 DEPARTMENT : Computer Science Tel. No. 0151 795 4264 First Semester Examinations 2011/12 INTERNET PRINCIPLES TIME ALLOWED : Two Hours INSTRUCTIONS TO CANDIDATES

More information

Module 2: Assigning IP Addresses in a Multiple Subnet Network

Module 2: Assigning IP Addresses in a Multiple Subnet Network Module 2: Assigning IP Addresses in a Multiple Subnet Network Contents Overview 1 Lesson: Assigning IP Addresses 2 Lesson: Creating a Subnet 19 Lesson: Using IP Routing Tables 29 Lesson: Overcoming Limitations

More information

Unit of Learning # 2 The Physical Layer. Sergio Guíñez Molinos sguinez@utalca.cl 2-2009

Unit of Learning # 2 The Physical Layer. Sergio Guíñez Molinos sguinez@utalca.cl 2-2009 Unit of Learning # 2 The Physical Layer Sergio Guíñez Molinos sguinez@utalca.cl 2-2009 Local Area Network (LAN) Redes de Computadores 2 Historic topologies more used in LAN Ethernet Logical Bus and Physical

More information

Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs

Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs As a head of the campus network department in the Deanship of Information Technology at King Abdulaziz University for more

More information

hp ProLiant network adapter teaming

hp ProLiant network adapter teaming hp networking june 2003 hp ProLiant network adapter teaming technical white paper table of contents introduction 2 executive summary 2 overview of network addressing 2 layer 2 vs. layer 3 addressing 2

More information

Communication Networks. MAP-TELE 2011/12 José Ruela

Communication Networks. MAP-TELE 2011/12 José Ruela Communication Networks MAP-TELE 2011/12 José Ruela Network basic mechanisms Introduction to Communications Networks Communications networks Communications networks are used to transport information (data)

More information

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK Contemporary Control Systems, Inc. Understanding Ethernet Switches and Routers This extended article was based on a two-part article that was

More information

G.8032 Ethernet Ring Protection Overview. March, 2008 ITU-T Q9 SG 15

G.8032 Ethernet Ring Protection Overview. March, 2008 ITU-T Q9 SG 15 G.80 Ethernet Ring Protection Overview March, 008 ITU-T Q9 SG 5 genda G.80 Recommendation Introduction G.80 Objectives and Principles G.80 Concepts G.80 Protection Switching G.80 R-PS Messages G.80 Items

More information

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks Computer Networks Lecture 06 Connecting Networks Kuang-hua Chen Department of Library and Information Science National Taiwan University Local Area Networks (LAN) 5 kilometer IEEE 802.3 Ethernet IEEE 802.4

More information

Objectives. The Role of Redundancy in a Switched Network. Layer 2 Loops. Broadcast Storms. More problems with Layer 2 loops

Objectives. The Role of Redundancy in a Switched Network. Layer 2 Loops. Broadcast Storms. More problems with Layer 2 loops ITE I Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Implement Spanning Tree Protocols LAN Switching and Wireless Chapter 5 Explain the role of redundancy in a converged

More information

Network Monitoring. Chu-Sing Yang. Department of Electrical Engineering National Cheng Kung University

Network Monitoring. Chu-Sing Yang. Department of Electrical Engineering National Cheng Kung University Network Monitoring Chu-Sing Yang Department of Electrical Engineering National Cheng Kung University Outline Introduction Network monitoring architecture Performance monitoring Fault monitoring Accounting

More information

Redundant Serial-to-Ethernet Data Connections for Mission-critical Devices

Redundant Serial-to-Ethernet Data Connections for Mission-critical Devices Redundant Serial-to-Ethernet Data Connections for Mission-critical Devices Daniel Lai, Moxa Product Manager daniel.lai@moxa.com The popularity of serial-to-ethernet technology has increased steadily since

More information

Fibre Channel over Ethernet in the Data Center: An Introduction

Fibre Channel over Ethernet in the Data Center: An Introduction Fibre Channel over Ethernet in the Data Center: An Introduction Introduction Fibre Channel over Ethernet (FCoE) is a newly proposed standard that is being developed by INCITS T11. The FCoE protocol specification

More information

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006 CSE331: Introduction to Networks and Security Lecture 6 Fall 2006 Open Systems Interconnection (OSI) End Host Application Reference model not actual implementation. Transmits messages (e.g. FTP or HTTP)

More information

SNMP Monitoring: One Critical Component to Network Management

SNMP Monitoring: One Critical Component to Network Management Network Instruments White Paper SNMP Monitoring: One Critical Component to Network Management Although SNMP agents provide essential information for effective network monitoring and troubleshooting, SNMP

More information

Communications and Computer Networks

Communications and Computer Networks SFWR 4C03: Computer Networks and Computer Security January 5-8 2004 Lecturer: Kartik Krishnan Lectures 1-3 Communications and Computer Networks The fundamental purpose of a communication system is the

More information

Lesson 5-2: Network Maintenance and Management

Lesson 5-2: Network Maintenance and Management Unit 5: Network Operating Systems Lesson 5-2: Network Maintenance and Management At a Glance This lesson presents an overview of network planning and management tasks. It also discusses hardware and software

More information

Channel Bonding in DOCSIS 3.0. Greg White Lead Architect Broadband Access CableLabs

Channel Bonding in DOCSIS 3.0. Greg White Lead Architect Broadband Access CableLabs Channel Bonding in DOCSIS 3.0 Greg White Lead Architect Broadband Access CableLabs Agenda DS Channel Bonding Protocol Receive Channel Profiles US Channel Bonding Protocol HFC Plant Topologies & Resolution

More information

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit

More information

Based on Computer Networking, 4 th Edition by Kurose and Ross

Based on Computer Networking, 4 th Edition by Kurose and Ross Computer Networks Ethernet Hubs and Switches Based on Computer Networking, 4 th Edition by Kurose and Ross Ethernet dominant wired LAN technology: cheap $20 for NIC first widely used LAN technology Simpler,

More information

CONTROL MICROSYSTEMS DNP3. User and Reference Manual

CONTROL MICROSYSTEMS DNP3. User and Reference Manual DNP3 User and Reference Manual CONTROL MICROSYSTEMS SCADA products... for the distance 48 Steacie Drive Telephone: 613-591-1943 Kanata, Ontario Facsimile: 613-591-1022 K2K 2A9 Technical Support: 888-226-6876

More information

Local Area Network By Bhupendra Ratha, Lecturer School of Library and Information Science Devi Ahilya University, Indore Email: bhu261@gmail.com Local Area Network LANs connect computers and peripheral

More information

Overview of Network Hardware and Software. CS158a Chris Pollett Jan 29, 2007.

Overview of Network Hardware and Software. CS158a Chris Pollett Jan 29, 2007. Overview of Network Hardware and Software CS158a Chris Pollett Jan 29, 2007. Outline Scales of Networks Protocol Hierarchies Scales of Networks Last day, we talked about broadcast versus point-to-point

More information

Overview of Routing between Virtual LANs

Overview of Routing between Virtual LANs Overview of Routing between Virtual LANs This chapter provides an overview of virtual LANs (VLANs). It describes the encapsulation protocols used for routing between VLANs and provides some basic information

More information

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages

More information

UC CubeSat Main MCU Software Requirements Specification

UC CubeSat Main MCU Software Requirements Specification UC CubeSat Main MCU Software Requirements Specification 23 November 2012 Adam Goodwin Table of Contents 1. Introduction... 3 2. Problem Statement and Scope... 3 3. Software Sequences... 4 3.1. Overall

More information

11/22/2013 1. komwut@siit

11/22/2013 1. komwut@siit 11/22/2013 1 Week3-4 Point-to-Point, LAN, WAN Review 11/22/2013 2 What will you learn? Representatives for Point-to-Point Network LAN Wired Ethernet Wireless Ethernet WAN ATM (Asynchronous Transfer Mode)

More information

QoS Switching. Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p (GARP/Priorities)

QoS Switching. Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p (GARP/Priorities) QoS Switching H. T. Kung Division of Engineering and Applied Sciences Harvard University November 4, 1998 1of40 Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p

More information

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar

More information

Using High Availability Technologies Lesson 12

Using High Availability Technologies Lesson 12 Using High Availability Technologies Lesson 12 Skills Matrix Technology Skill Objective Domain Objective # Using Virtualization Configure Windows Server Hyper-V and virtual machines 1.3 What Is High Availability?

More information

Instrumentation for Linux Event Log Analysis

Instrumentation for Linux Event Log Analysis Instrumentation for Linux Event Log Analysis Rajarshi Das Linux Technology Center IBM India Software Lab rajarshi@in.ibm.com Hien Q Nguyen Linux Technology Center IBM Beaverton hien@us.ibm.com Abstract

More information

Introduction to Networks

Introduction to Networks www.eazynotes.com Maninder Kaur [Page No. 1] Introduction to Networks Short Answer Type Questions Q-1. Which Technologies of this age had led to the emergence of computer network? Ans: The technologies

More information

Solving complex performance problems in TCP/IP and SNA environments.

Solving complex performance problems in TCP/IP and SNA environments. IBM Global Services Solving complex performance problems in TCP/IP and SNA environments. Key Topics Discusses how performance analysis of networks relates to key issues in today's business environment

More information

Process Control and Automation using Modbus Protocol

Process Control and Automation using Modbus Protocol Process Control and Automation using Modbus Protocol Modbus is the fundamental network protocol used in most industrial applications today. It is universal, open and an easy to use protocol. Modbus has

More information

Systems Integration Track: Network Topology

Systems Integration Track: Network Topology Systems Integration Track: Network Topology Author Jim W. Hammond Technical Consultant, GarrettCom Keywords: Ring, Topology, RSTP, Ethernet, Network, VLAN Industrial networks, like most large networks,

More information

Lecture 6 Types of Computer Networks and their Topologies Three important groups of computer networks: LAN, MAN, WAN

Lecture 6 Types of Computer Networks and their Topologies Three important groups of computer networks: LAN, MAN, WAN Lecture 6 Types of Computer Networks and their Topologies Three important groups of computer networks: LAN, MAN, WAN LAN (Local Area Networks) 10/28/2008 Vasile Dadarlat - Computer Networks 1 MAN (Metropolitan

More information

FOUNDATION Fieldbus High Speed Ethernet Control System

FOUNDATION Fieldbus High Speed Ethernet Control System FOUNDATION Fieldbus High Speed Ethernet Control System Sean J. Vincent Fieldbus Inc. Austin, TX, USA KEYWORDS Fieldbus, High Speed Ethernet, H1, ABSTRACT FOUNDATION fieldbus is described in part by the

More information

802.11 standard. Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale

802.11 standard. Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale 802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data-rate applications Ability to

More information

IBM Network Management

IBM Network Management 54 CHAPTER Chapter Goals Discuss configuration management. Discuss performance and accountant management. Discuss problem management. Discuss operations management. Discuss change management. Background

More information

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls

More information

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer

More information

Virtual LANs. http://www.cis.ohio-state.edu/~jain/cis788-97/ or http://www.netlab.ohio-state.edu/~jain/cis788-97/ Raj Jain

Virtual LANs. http://www.cis.ohio-state.edu/~jain/cis788-97/ or http://www.netlab.ohio-state.edu/~jain/cis788-97/ Raj Jain Virtual LANs Professor of Computer and Information Sciences Please download and print the handouts from: http://www.cis.ohio-state.edu/~jain/cis788-97/ or http://www.netlab.ohio-state.edu/~jain/cis788-97/

More information

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet Basic Networking Concepts 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet 1 1. Introduction -A network can be defined as a group of computers and other devices connected

More information

Tutorial. www.ccontrols.com

Tutorial. www.ccontrols.com Tutorial 1 Tutorial CONTROLLER AREA NETWORK CAN was designed by Bosch and is currently described by ISO 11898 1. In terms of the Open Systems Interconnection model (OSI), CAN partially defines the services

More information

Data Link Protocols. TCP/IP Suite and OSI Reference Model

Data Link Protocols. TCP/IP Suite and OSI Reference Model Data Link Protocols Relates to Lab. This module covers data link layer issues, such as local area networks (LANs) and point-to-point links, Ethernet, and the Point-to-Point Protocol (PPP). 1 TCP/IP Suite

More information

Candidates should attempt FOUR questions. All questions carry 25 marks.

Candidates should attempt FOUR questions. All questions carry 25 marks. UNIVERSITY OF ABERDEEN Exam 2010 Degree Examination in ES 3567 Communications Engineering 1B Xday X Notes: 9.00 a.m. 12 Noon (i) CANDIDATES ARE PERMITTED TO USE APPROVED CALCULATORS (II) CANDIDATES ARE

More information

51-30-10 Selecting a Firewall Gilbert Held

51-30-10 Selecting a Firewall Gilbert Held 51-30-10 Selecting a Firewall Gilbert Held Payoff Although a company may reap significant benefits from connecting to a public network such as the Internet, doing so can sometimes compromise the security

More information

Internetworking and Internet-1. Global Addresses

Internetworking and Internet-1. Global Addresses Internetworking and Internet Global Addresses IP servcie model has two parts Datagram (connectionless) packet delivery model Global addressing scheme awaytoidentifyall H in the internetwork Properties

More information

DATA COMMUNICATION AND NETWORKS

DATA COMMUNICATION AND NETWORKS DATA COMMUNICATION AND NETWORKS 1. Define the term Computer Networks. A Computer network is a number if computers interconnected by one or more transmission paths. The transmission path often is the telephone

More information

Ethernet. Ethernet. Network Devices

Ethernet. Ethernet. Network Devices Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking

More information

Top-Down Network Design

Top-Down Network Design Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer 29 Network Management Design A good design can help an organization achieve

More information

PART OF THE PICTURE: The TCP/IP Communications Architecture

PART OF THE PICTURE: The TCP/IP Communications Architecture PART OF THE PICTURE: The / Communications Architecture 1 PART OF THE PICTURE: The / Communications Architecture BY WILLIAM STALLINGS The key to the success of distributed applications is that all the terminals

More information

Local Area Networks. Guest Instructor Elaine Wong. Elaine_06_I-1

Local Area Networks. Guest Instructor Elaine Wong. Elaine_06_I-1 Local Area Networks Guest Instructor Elaine Wong Elaine_06_I-1 Outline Introduction to Local Area Networks (LANs) Network architecture Geographical area LAN applications LAN Technologies Ethernet Fiber

More information

Fault Tolerant Servers: The Choice for Continuous Availability on Microsoft Windows Server Platform

Fault Tolerant Servers: The Choice for Continuous Availability on Microsoft Windows Server Platform Fault Tolerant Servers: The Choice for Continuous Availability on Microsoft Windows Server Platform Why clustering and redundancy might not be enough This paper discusses today s options for achieving

More information

SAN Conceptual and Design Basics

SAN Conceptual and Design Basics TECHNICAL NOTE VMware Infrastructure 3 SAN Conceptual and Design Basics VMware ESX Server can be used in conjunction with a SAN (storage area network), a specialized high speed network that connects computer

More information

Session Service Architecture

Session Service Architecture Session Service Architecture Open Web Single Sign-On Version 1.0 Please send comments to: opensso@sun.com Author Alan Chu (alan.chu@sun.com) Session Service Architecture, Version 1.0 This document is subject

More information

Chapter 15: Distributed Structures. Topology

Chapter 15: Distributed Structures. Topology 1 1 Chapter 15: Distributed Structures Topology Network Types Operating System Concepts 15.1 Topology Sites in the system can be physically connected in a variety of ways; they are compared with respect

More information

Chapter 18. Network Management Basics

Chapter 18. Network Management Basics Network Management Basics > FCAPS Model Chapter 18. Network Management Basics This chapter covers the following topics: FCAPS Model Network Management Architecture Network Management Protocols An Introduction

More information

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3 SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005 Lecturer: Kartik Krishnan Lecture 1-3 Communications and Computer Networks The fundamental purpose of a communication network is the exchange

More information