CHAPTER 3: Network Devices 116 In addition to speed, ISDN supports multiple devices set up in one link. In an analog system, a single line is required for each device attached. For example, a separate phone line is needed for a normal phone, a fax machine, or a computer modem. Because ISDN supports multiple devices, you can use each one of these items on a single line. It will also be clearer due to the fact that the data is being passed in a digital format. Because ISDN uses a separate channel, the D channel for signaling, it removes the administrative overhead required. This means that the data is not hindered by the session setups and the communications required by the devices. The D channel keeps all of this information off the data streams. Because of the separation, the setup and takedown of each session is much faster. In addition, ISDN equipment is able to handle calls more intelligently. CSU/DSU The somewhat lengthy acronym CSU/DSU is short for Channel Service Unit/Data Service Unit. A CSU/DSU is a device that takes a signal from a digital medium and multiplexes it. Although a CSU and a DSU can be sepa- rate components, they are generally packaged as a single unit. The CSU is used to connect a terminal to a digital line, while a DSU performs diagnostic and protective functions. A CSU/DSU terminates the end of a leased T-carrier line, which is a high-speed line that can be used to connect a LAN to a wide area network (WAN). The CSU/DSU is similar to a modem in that it connects to the media that will carry the data, but because the T-carrier transmits the data digitally, there is no need for device to modulate and demodulate between digital and analog formats. The CSU/DSU can be a separate component that attaches to a router and provides an interface between the routers, but many newer routers have more modular capabilities that allow you to purchase what are sometimes referred to as WAN interface cards, or WICs for short. This is a card that incorporates the CSU/DSU into the actual port and cable connection so you do not have an external CSU; it’s built directly into the router itself, thereby easing maintenance and management. A T-carrier line is a leased telephone line that runs over fiber-optic cabling and can provide different speeds depending on the level used. A T1 line con- sists of 24 separate channels called DS0s that are 64 Kbps each. In total, this equals 1.544 Mbps for a full T1 line. Because some companies may not need this amount of bandwidth, it is possible to lease only a portion of the channels. For example, if you rented two channels on a T1 line, you would have a 128 Kbps connection. When only a portion of the T1 line is used, it is referred to as fractional T1. If more than 1.544 Mbps of bandwidth was Network Devices 117 needed, a company could also lease another level of a T-carrier line called a T3 line, which provides speeds of 44.736 Mbps. Network Interface Cards Network interface cards, also referred to as network adapter cards or sim- ply network cards, are the key components that allow computers or other devices to communicate with the rest of the network. Installed on work- stations, servers, printers, and other network devices, it provides an inter- face to the network that allows data to be transmitted and received across the network media. Simply put, the NIC performs the following functions: It translates data from the parallel data bus to a serial bit stream for transmission across the network. It formats packets of data in accordance with protocol. It transmits and receives data based on the hardware address of the card. An NIC works as an interface between a computer’s expansion bus and the medium that’s used to transmit and receive data across the network. In many cases, this means that it attaches to the cable used on a network, but wireless NICs are also available that allow data to be transferred through the air. Although the NIC can be integrated into the system board, it is typically NOTES FROM THE FIELD… Multiplexing Defined Multiplexing is defined as the sending of multiple sig- nals over one communications channel at the same time. The cable television system is a perfect example of multiplexing in action. Cable TV is a simple technol- ogy where your available channels are all sent along a single cable, and you are able to select a channel to view a specific program based on your numbered selection. In the world of data transmission, the tech- nology is very much the same. If you have a T1, for example, and you need to break that 1.544 Mbps of bandwidth down to smaller amount, you can do so with a fractional T1. What about the rest of that bandwidth, is it wasted? Of course not, not with multiplexing. As a service provider, you can designate half of the bandwidth to company A and then the rest to company B. Data is sent along the whole T1, and no bandwidth is wasted. The technology of multi- plexing is used in many ways to conserve bandwidth. There are two different types of multiplexing: time division multiplexing (TDM) and frequency division multiplexing (FDM). In TDM, each signal is broken up into many segments, each having short durations or time slots on the whole of the available bandwidth. FDM does the same thing as TDM except that TDM is based on digital signaling and FDM is based on analog. CHAPTER 3: Network Devices 118 an add-on component for a computer, much like a video card or sound card. The NIC is normally installed as an expansion board by plugging it into a bus slot, and it has a connector that allows the network media to be attached to it. Installing an NIC Installing an NIC is like installing any other interface card in a computer. You have to determine the slot it will go in and have the right tools to remove the expansion slot cover and to remove and insert screws. Newer computers do not require any tools, not even screwdrivers. The ability to work on a com- puter with your hands free of tools is making any technician’s job easier. The Network exam will challenge you to know what to do in certain situations. In this section you will learn several troubleshooting techniques and how to recognize the common issues that you will face with network interface cards. NICs are built for computer bus types such as Industry Standard Architec- ture (ISA), Extended Industry Standard Architecture (EISA), Micro Channel Architecture (MCA), and Peripheral Component Interconnect (PCI). Most of the newer NICs support plug and play features and can be automatically con- figured by the operating system once the physical installation is done. This fea- ture makes installation of the NIC considerably easier than with older cards. Before you begin the physical installation of the NIC, or network adapter, be sure to address the following issues: Ensure that the adapter is compatible with the data bus, the protocol, the media, and the network operating system. In the case of Win- dows network operating systems, the hardware compatibility list (HCL) lists adapters that have been verified for use with a particular operating system (such as NT, 2000, 2003, 2008, Vista, and XP). Ensure that there is an open bus slot on the machine in which you want to install the adapter. Ensure that the adapter includes all items necessary for installa- tion, including external transceivers or adapters, a T-connector for a thinwire Ethernet adapter, and product documentation. Ensure that the software, including the network driver and utilities for testing and configuring the adapter, is included. If a software driver is not provided, a driver may be included with operating system installation media. If not, drivers and driver updates may be available for download from the adapter manufacturer via the Internet or a bulletin board service. Remember that the NIC cannot do any useful work until high-level protocols and network services have also been installed and configured. Network Devices 119 EXERCISE 3.1 Enabling and Disabling a Nic Card with Windows XP Professional In this exercise we will learn how to enable or disable an NIC card for secu- rity reasons. If you are not using an interface, disable it. Make sure that you do not disable interfaces that you may need. To enable or disable an interface, you need to first open the Network Connections dialog box. To do this, double click My Network Places on your desktop. Click View Network Connections, and you will see your cur- rent connections (Figure 3.4). FIGURE 3.4 Viewing Your Network Connections. CHAPTER 3: Network Devices 120 FIGURE 3.5 Enabling a Connection with Windows XP Professional. Note that in Figure 3.4, LAN has an x. This indicates that the connec- tion might have an issue, such as a disconnected RJ-45 connector on the NIC itself. LAN2 is grayed out, indicating that the connection is disabled. To enable it, you only need to right click the connection and select Enable from the shortcut menu (Figure 3.5). The NIC will enable itself barring any other issues, and the icon in the Network Connections window will be shown in full color. NIC Types and Operation Although NICs are all designed to allow computers and devices to access a network, not all NICs are the same. As we discussed in Chapter 2, there are many different types of media and connectors that may be used on a net- work, which is why there are different NICs. Because of this, NICs are often defined by the following criteria: The type of Data Link Protocol they support, such as an Ethernet or Token Ring The type of media they connect to The data bus for which they were designed In using NIC, the computer must have a software driver installed to interact with the NIC, just as it must for any other peripheral device. These drivers enable the operating system and higher level protocols to control the functions of the adapter. The NICs that exist in the various workstations on a network commu- nicate with each other using their own unique addresses. The MAC address, or hardware address, is a 12-digit number consisting of digits 0–9 and letters Network Devices 121 A–F. It is a hexadecimal (base16) number assigned to the card by the manu- facturer. The MAC address consists of two pieces: the first signifies which vendor it comes from, the second is the serial number unique to that manu- facturer. This address must be unique on each network card on a network. You may wonder how a manufacturer can ensure uniqueness among all the network cards in the world. No doubt there are network cards that have the same address, but each manufacturer is assigned a range by the various network standards organizations, and they use only that range. Within the range, a manufacturer may have duplicates, but the duplicates are so spread out over time that it is almost impossible for a network, small or large, to have two devices with the same MAC address. Transceivers As we discussed in Chapter 2, the term transceiver is short for transmitter- receiver, and it is a component of an NIC that transmits and receives electrical signals across the transmission media. Transceivers are also the part of the interface that actually connects to the media. Although transceivers can be external to the network card, they are typically built onto the NIC. A transceiver that’s built onto a card is called an onboard transceiver. Although NICs are generally designed to connect to a particular type of media, they can also connect to multiple media types. A transceiver type setting is required for network adapters that are capable of attach- ing to more than one media type. Typical cards of this nature include Ethernet cards that have both twisted-pair and coaxial connectors. This is one of the more common oversights in configuring a NIC and the card can be rendered nonfunctional if it is configured for the wrong media con- nection. To alleviate this problem, some cards of this type have an auto setting that causes the card to search for the transceiver that has media connected to it. Exam Warning NICs are the most common interface for a computer or device to connect to media on the network. They operate at the data link layer of the OSI model. Exam Warning Transceivers and media converters are similar in some aspects but are not identical. Media converters (primarily used with fiber cabling solutions) are used to allow for connection of different (or dissimilar) connection types or interfaces. CHAPTER 3: Network Devices 122 Media Converters Media converters are used when you have two types of dissimilar media that need to be converged together. Most commonly used when deploying fiber- based networks, media converters come in handy when you need to connect up to multiple different connection types, fiber switches, and storage arrays. These are primarily used and seen on storage area networks (SAN). Modern Network Devices Although many of the devices we’ve discussed so far have been used since the early days of networking, a number of devices either have taken over the roles of these devices or are a predominant part of a modern network envi- ronment. These devices are crucial to a network’s ability to handle data and ensure it reaches its intended destination as its being transmitted. Routers Routers route data packets across a network by opening the packet and making routing decisions based on the contents. On a network that uses Transmission Control Protocol/Internet Protocol (TCP/IP) as its communi- cation protocol, IP addresses are used as a method of identifying computers. This identification is used to ensure that data is sent to the correct computer on the network. For these computers to communicate, however, a device is needed to guide the TCP/IP network traffic to its destination. This is where routers come in. The network layer, or Layer 3, is responsible for addressing messages and translating their logical addresses into an actual physical address. It is important to remember that a router is protocol dependent. That means that a TCP/IP router can connect to a TCP/IP network. In other words, this is the layer of the OSI model that is responsible for determining where to send the TCP/IP packets to their destinations. Routers essentially separate different broadcast domains from one another and route traffic based on the destina- tion, or Layer 3, address (the Layer 2 address is the MAC address). When you want to communicate with another computer network, your computer essentially looks within the local network first before heading out to search for a remote address. For example, when your computer needs to access a file on another computer, your computer first checks its Address Resolution Protocol (ARP) cache to see if that computer has a recognizable MAC address. If it does not, your computer checks the local subnet by either broadcasting or asking a name server for help. If the address is not found on the local subnet or network, your computer checks to see if you have a default gateway or router to send the information Network Devices 123 to. Your computer sends this information to your router and the router routes the message accordingly. The router receives the data with the address infor- mation and checks its routing tables to see where it should send your data. The type of router sometimes affects how quickly your data arrives at its destination. Routers are either static or dynamic. In most cases, you’ll only have to deal with a dynamic router – a router whose routing tables are populated automatically by receiving updates from other routers. Static routers have fixed routing tables that have to be updated manually. These static routers are at a disadvantage because they cannot communicate with any type of router in case a network route changes due to hardware failure or change to the network layout. The main benefit of a dynamic router is that, depending on which type of routing protocol is used, it will attempt to route your network traffic to your destination as quickly as possible, for example, if you have a network that is standardized on Cisco routers (dynamic) that all communicate with one another using the Open Shortest Path First (OSPF) Routing Protocol. All of your routers are communicating with one another via broadcasts that they send whenever there is a change in their routing. This comes in very handy and adds a layer of redundancy so that if a segment of the network fails, your routers will be able to route the network traffic through other paths so that no matter what happens to the network, your data will always arrive at its destination. If you were using a static router and you had a segment fail on your net- work, your network traffic would cease until the segment was repaired or another static route was mapped on the router. This puts static routing at a severe disadvantage in a large, complex network environment. Understanding Static and Dynamic Routing When it comes to routing, there is a huge difference between static and dynamic. Early routers had to be programmed with exactly which networks they could route between which interfaces, especially if there were many network interfaces. This is called static routing, and network administra- tors had to add, maintain, and delete routes of the network routing devices manually. In a small company this may not be much of a chore, but for medium to large networks, this can be nearly impossible. These larger net- works almost always employ many logical subnets, which require you to update the route tables on each routing device. If these remote subnets are connected by routers with static route tables, you have to add the exact static route to communicate between the two subnets. Table 3.3 shows an example of what is contained in the routing table. CHAPTER 3: Network Devices 124 In this simplified table you can see how you only specify the router to be used to reach the destination, not the actual destination itself. The number of hops determines which route is the most efficient. If a route claims it can reach the destination in one fewer hop than the next router, then it is sent to that router. If there are two identical routes to the same destination, the route with the fewest hops will be used. One change to a network address means visiting every routing device that employs static routing and updating the entry. What do we do if our net- work is fairly large and complex? We must then use routing devices capable of dynamically updating the routing tables. Dynamic routing does not require the network administrator to edit complex routing tables to communicate with other networks or segments. These routers communicate with each other using a powerful routing pro- tocol such as Routing Information Protocol (RIP) or OSPF. They can also query other routers for updated route information, which can create more efficient paths for sending packets or locate an alternative route if the origi- nal route fails. The routers can broadcast the routes they have discovered to neighboring routers, and, in turn, accept routes from other neighbor- ing routers. The Internet comprises many dynamic routers, which is an example of why dynamic routing is so important. Could you imagine hav- ing to update a static routing table on thousands of static routers? I don’t think so. These dynamic routers, however, cannot update the route tables of static routers or non-dynamic routers. There are a few situations in which inte- grating static and dynamic routers is acceptable: When you have a router at either end of a slow WAN link: This router will not increase traffic by broadcasting updated route infor- mation to the router on the other end of the link. When you require a packet to travel the same path each time to a remote network, add the path you would like the packet to take to Table 3.3 Information Contained in a Routing Table Destination Adjacent Router Hops Network 1 Router A 1 Network 1 Router B 2 Network 2 Router B 2 Network 2 Router C 3 Network 3 Router D 3 Network Devices 125 reach the destination network. You cannot enter the entire path over several routers, only the path to the first router. When you want to configure a static router to point towards a dynamic router to take advantage of the dynamic router indirectly. This is the next best thing to using a dynamic router. You can hand off the packet to the dynamic router and let this router determine the most efficient path to the destination based on the paths it has learned from neighboring dynamic routers. Switching Routers Switches have the ability to perform the tasks normally associated with other devices. A Layer 3 switch has the ability to open a packet and view the IP address and MAC address of the computer the packet is destined for. The switch can then review routing tables on the switch to determine the best route to send the data. By performing these functions, the switch is able to do the work of a router and get the packet to its intended destination by using the best route. Security Integration As reports of hacking, viruses, worms, and other attacks on networks become commonplace in the news, the need for security in network devices and net- works in general continues to grow. Equipment and software can be added to a network, which can work with existing devices to protect your LAN and its data. Choosing which security measures to implement can be challenging, as there is an increasing number of products available. However, the more protected your network, the less chance there will be of it being damaged from outside sources. Convergence of Security Just as devices are including more and more features in them that make other devices obsolete or unnecessary to a network, devices are also including more security features that historically had to be purchased separately. As demon- strated with routers that are used for DSL or cable Internet, features such as a built-in firewall are now being included with the router. The hardware-based firewall provides a barrier to incoming traffic from the WAN, and thereby pre- vents it from reaching your local computer or LAN. The hardware firewall, how- ever, is limited in restricting and monitoring the incoming and outgoing traffic and should be complemented by a software firewall and antivirus software. Exam Warning Routers operate at the network layer of the OSI model. The exam will deal with questions regarding both routers and the OSI model. . systems, the hardware compatibility list (HCL) lists adapters that have been verified for use with a particular operating system (such as NT, 2000, 2003, 2008, Vista, and XP). Ensure that there is. transmits and receives electrical signals across the transmission media. Transceivers are also the part of the interface that actually connects to the media. Although transceivers can be external. a card is called an onboard transceiver. Although NICs are generally designed to connect to a particular type of media, they can also connect to multiple media types. A transceiver type setting