NETWORK CONCEPTS

Introduction
Components
Adapters
Wiring Guide
EIA TIA-568 Standard
Twisted pair
Coax
Fiber
OSI Model
Network Segments
Spanning Tree Algorithm
Repeaters
Bridges
Routers
Hubs
Ethernet Switches
Virtual Networking

 

BASIC NETWORK CONCEPTS
Networks are an interconnection of computers. These computers can be linked together using a wide variety of different cabling types, and for a wide variety of different purposes.

The basic reasons why computers are networked are

Take for example a typical office scenario where a number of users in a small business require access to common information. As long as all user computers are connected via a network, they can share their files, exchange mail, schedule meetings, send faxes and print documents all from any point of the network.

It would not be necessary for users to transfer files via electronic mail or floppy disk, rather, each user could access all the information they require, thus leading to less wasted time and hence greater productivity.

Imagine the benefits of a user being able to directly fax the Word document they are working on, rather than print it out, then feed it into the fax machine, dial the number etc.

Small networks are often called Local Area Networks [LAN]. A LAN is a network allowing easy access to other computers or peripherals. The typical characteristics of a LAN are,

 

 

 

 

 

 

 

 

BASIC NETWORK COMPONENTS
There are a number of components which are used to build networks. An understanding of these is essential in order to support networks. This is a discussion on some of the elements which make up a network [LAN].

Network Adapter Cards
A network adapter card plugs into the workstation, providing the connection to the network. Adapter cards come from many different manufacturers, and support a wide variety of cable media and bus types [ISA, MCA, EISA, PCI, PCMCIA].

New cards are software configurable, using a software program to configure the resources used by the card. Other cards are PNP [plug and Play], which automatically configure their resources when installed in the computer, simplifying installation. With an operating system like Windows 95, auto-detection of new hardware makes network connections simple and quick.

On power-up, the computer detects the new network card, assigns the correct resources to it, and then installs the networking software required for connection to the network. All the user need do is assign the network details like computer name.

For Ethernet or 10BaseT cards, each card is identified by a twelve digit hexadecimal number. This number uniquely identifies the computer. These network card numbers are used in the Medium Access [MAC] Layer to identify the destination for the data. When talking to another computer, the data you send to that computer is prefixed with the number of the card you are sending the data to.

This allows intermediate devices in the network to decide in which direction the data should go, in order to transport the data to its correct destination.

A typical adapter card looks like,

 

A PCMCIA adapter card, suitable for connecting to a portable laptop computer to a network, looks like,

 

Peripheral cards associated with EISA and MCA are normally self configuring.

The major problem arises with cards for the ISA bus (found in the majority of AT type computers and clones). This is because the cards are configured by the user (using either jumpers or a software program).

Users make mistakes, and often configure cards so that they conflict with other cards already present in this system. This causes intermittent or immediate non-operation of the computer system.

For instance, a networking card that is allocated the same resources as a serial communications program may function perfectly, except when the user is logged into the network and then tries to use the serial port, at which time the machine will crash.

Resources Used By Peripheral Cards
We have already mentioned that resources used by ISA peripheral cards must not be shared (two cards cannot use the same). So what are the resources used by peripheral cards? Essentially, there are FOUR resources which are user configurable for peripheral cards. Some cards may only use one (a port location(s)), others may require all four.

The FOUR resources are

  1. Input/Output Port Address
    In the PC, the port numbers used by peripheral cards range from 200h to 3FFh. The I/O port address is used by the PC to communicate with the peripheral card (issue commands, read responses, and perform data transfer).
  2. Interrupt Request Line
    The interrupt request line is used by the card to signal the processor that the card requires the processors attention. ISA peripherals cannot share the same interrupt request line, and IRQ2 in AT/2386/486 computers should not be used (there are others which must also not be used). IRQ2 to IRQ15 appear on the ISA bus.
  3. Direct Memory Request Line
    The DMA request line is used to transfer data between the peripheral card and the computers memory at high speed. DMA channel 0 cannot be used, as it is reserved for system use.
  4. Buffer Memory Address
    Some peripheral cards prefer to use memory space rather than an I/O port address to transfer data to the processor. This memory space occupied by the peripheral card appears in the main system memory RAM area available to the processor (usually between C0000h to EFFFFh). Care must be taken to ensure this space is not being used for other purposes (like shadow RAM, EMS for windows, VBGA BIOS).

This space is also sometimes used by a remote boot Eprom, which is used for diskless workstations which download the operating system from the server at boot time.

So How Do Peripheral Cards Work?
Peripheral cards require a software driver to function. This software driver provides the interface between the card and the operating system, making the services provided by the card available to the user.

The software driver is normally configured to match the resource settings of the card. This is done by a configuration utility, and stored either in the executable file, or a separate file (like .ini or .cfg).

It is obviously important for the configuration settings in the software driver to match those configured on the peripheral card.

The resources used by the card are either set by jumpers (or slide switches). New cards can also be configured using a software program, rather than by manually setting jumpers on the card. Where cards are software configurable, the cards retain their configuration when the power is turned off.

The software driver provides the follow functions

The basic operation looks something like,

The major problem is assigning values of these resources which are already being used by either the system or another peripheral card. It is therefore handy to know what the resources are which are used by common peripheral devices. The following tables identify these.

 

 

 

 

 

 

TopCommon I/O Port Addresses

Port Address

Peripheral

200-207h

Game I/O Adaptor

210-217h

XT Expansion Unit

220h

SoundBlaster

278-27Fh

LPT2

2E8-2EFh

COM4

2F8-2FFh

COM2

300-30Fh

Color Video Adaptor

320-32F

XT Hard Disk

330h

SoundBlaster MIDI

378-37Fh

LPT1

3A0-3A9h

IBM Synchronous Adaptor

3B0-3BFh

Monochrome Video

3E8-3EFh

COM3

3F0-3F7h

Floppy Disk

3F8-3FFh

COM1

Common Interrupts

IRQ Line

Peripheral

2

EGA/VGA

3

COM2

4

COM1

5

LPT2, Bus mouse, Network

6

Floppy Disk

7

LPT1

13

Co-Processor

14

AT Disk Controller

Common Memory Addresses

Address

Peripheral

A0000-BFFFFh

EGA/VGA

B0000-B7FFFh

Monochrome

B8000-BFFFFh

CGA

C8000-CFFFFh

XT Disk

F4000-FFFFFh

AT ROM BIOS

F8000-FFFFFh

PC/XT ROM BIOS

Common DMA Lines

DMA Line

Peripheral

0

Memory Circuitry

1

Spare

2

Floppy Drive

 

 

 

 

 

Installing A Peripheral Card
This section discusses basic techniques for installing peripheral cards. By following standardized procedures, this will help to minimize damage to the system or peripheral card, and reduce the possibility of incorrect installation.

  1. Determine the resources used by the computer
    Use the previous tables to determine the interrupts, memory and port addresses used by the current hardware in the computer.
  2. Read the install manual
    Check the disk for a read.me file (and read it). Read the manual and take note of the jumper switches used by the card. Identify where these are located on the card.
  3. Determine resources to be used by the card
    Allocate resources to the card which do not conflict with existing hardware.
  4. Observe electrostatic protection in handling the card
    Use a wrist strap and ground yourself properly before handling the card. Handle the card by the edges. Do not touch the components or edge connector. Use electrostatic bags or an electrostatic mat.
  5. Configure the card jumpers
    Set the jumpers on the card
  6. Insert the card
    Remove the system base unit cover and insert the card into a spare peripheral bus slot. Observe electrostatic precautions.
  7. Load the software driver
    If the card was provided with a software driver, install the software driver. This might involve running an INSTALL program, or copying the drivers to the hard disk. It might also mean adding the driver name to the config.sys file (DEVICE=xxxxx.sys).
  8. Configure the driver software
    If the driver software needs to be configured (specify which resources the card is using), this information might be stored in a separate file (.ini or .cfg). Often, when installing the software, it will ask for configuration details. These must be the same as the hardware jumpers used by the card.
  9. Test card (run diagnostics where provided)
    If the card was provided with diagnostic software, run that now to test the card and driver. This is a good way to test if the installation was done correctly.
  10. Test the machine
    Test some of the other software packages on the system (like networking, serial communications and printing) to see if they still work. If they don't, this indicates a probable conflict of resources. In Windows 95 or NT, run the diagnostic program to check for interrupt and resource conflicts (MSD or WINMSD).

Summary of Installing Network Cards in Servers and Workstations

 

Brief Guide to BUILDING WIRING
The following is a very brief overview of the components that make up the wiring standards for commercial buildings. The objectives of such standards is to

A building wiring system covers a number of different elements

Horizontal Wiring
The horizontal wiring extends from the wall outlet to the system center (telecommunications closet). It includes the

Some general features of the horizontal wiring scheme are

Backbone Wiring The backbone wiring system interconnects telecommunication closets, equipment rooms and entrance facilities (i.e., the outside world). Some general features are

 

EIA/TIA-568 WIRING STANDARD


This standard defined in July of 1991, specifies a cabling system, which is vendor independent (does not care what is attached to it) and capable of lasting ten years.

The latest version is 568B, which contains some enhancements to the original standard.

The standard specifies SIX subsystem components of the cable system,

  1. Entrance Facility
    This is the area where outside cabling interfaces with the buildings cabling system. This is typically a secure room. Often this area is considered a demarcation area, where the Internet Service Provider (ISP) or Telecommunications provider's responsibility ends and the building owners begin.
  2. Equipment Room
    This room houses the Private Automatic Branch Exchange (PABX a system which implements a local internal telephone system for a company) unit, modems,
    routers, network hubs and sometimes servers. It is possible to also provide the facilities of a telecommunications closet, and also be located in the Entrance Facility. It should be secured, have adequate ventilation, power and space for equipment racks.
  3. BackBone Cabling
    The backbone cable connects the telecommunications closets to the equipment room and entrance facility. This is wired in a star topology. The four media options for backbone cabling are,
  1. Telecommunications Closet (TC)
    This is a room which houses only telecommunications cabling system equipment, such as cross-connect patch panels for the horizontal and backbone wiring system. It may also contain
    hubs or switches. There is often one or more TC's per floor.
  2. Horizontal Cabling
    The horizontal cable extends from the TC to the wall outlet in the users work area. There are FOUR media options for horizontal wiring

All horizontal cabling is implemented using a star topology, and must not exceed 90 meters from the TC to the wall outlet. A minimum of TWO outlets are required per work area, one of which must be wired with four-pair 100-ohm UTP cable.

The color coding of the UTP cable is,

  1. Work Area
    This is where the user is located. Patch cables connect the users equipment (such as phone, fax, computer) to the wall outlet.

The standard also specifies the use of an eight-pin modular RJ-45 jack for wall outlets using Unshielded Twisted Pair (UTP).

Categories of UTP Cabling
The EIA/TIA standard specifies FIVE categories of
UTP cabling

EIA/TIA-568A Connector Specifications

This is gradually being phased out in favour of EIA/TIA-568B

Label

Color Code

Pin Number

T3

White/Green

1

R3

Green/White

2

T2

White/Orange

3

R1

Blue/White

4

T1

White/Blue

5

R2

Orange/White

6

T4

White/Brown

7

R4

Brown/White

8

EIA/TIA-568B and AT&T258A Connector Specifications

Recommended by the IEEE for 100Base-TX and T4 operation

Label

Color Code

Pin Number

T2

White/Orange

1

R2

Orange/White

2

T3

White/Green

3

R1

Blue/White

4

T1

White/Blue

5

R3

Green/White

6

T4

White/Brown

7

R4

Brown/White

8

IEEE 10Base-T Connector Specifications

Label

Color Code

Pin Number

T2

White/Orange

1

R2

Orange/White

2

T3

White/Green

3

R1

 

4

T1

 

5

R3

Green/White

6

T4

 

7

R4

 

8

 

 

EIA/TIA-568 UTP Wiring Standard Specifications

100Base-T Wiring Standard Specifications
Fast Ethernet for Category 5 UTP. This standard is based on CDDI (
FDDI over copper).

100Base-FX Wiring Standard Specifications
Fast Ethernet over Fiber Optic Cable

100Base-T4 Wiring Standard Specifications
Fast Ethernet for Category 3 UTP Cable

 

Cabling
Cable is used to interconnect computers and network components together. There are THREE main cable types used today [twisted pair, coax and fiber optic]. The choice of cable depends upon a number of factors, like

Twisted Pair (Shielded Twisted Pair and Unshielded Twisted Pair)
Becoming the cable of choice for new installations, twisted pair cable is readily accepted as the preferred solution to cabling. It provides support for a range of speeds and configurations, and is widely supported by different vendors.

Shielded twisted pair uses a special braided wire which surrounds all the other wires, which helps to reduce unwanted interference.

The features of twisted pair cable are,

Unshielded Twisted Pair cable used in Category 5 looks like

Category 5 cable uses 8 wires. The various jack connectors used in the wiring closet look like,

 

The patch cord which connects the workstation to the wall jack looks like,

 

Distance limitations exist when cabling. For category 5 cabling at 100Mbps, the limitations effectively limit a workstation to wall outlet of 3 meters, and wall outlet to wiring closet of 90 meters.

All workstations are wired back to a central wiring closet, where they are then patched accordingly. Within an organization, the IT department either performs this work or sub-contracts it to a third party.

 

In 10BaseT, each PC is wired back to a central hub using its own cable. There are limits imposed on the length of drop cable from the PC network card to the wall outlet, the length of the horizontal wiring, and from the wall outlet to the wiring closet.

Patch Cables
Patch cables come in two varieties, straight through or reversed. One application of patch cables is for patching between modular patch panels in system centers. These are the straight through variety. Another application is to connect workstation equipment to the wall jack, and these could be either straight through or reversed depending upon the manufacturer. Reversed cables are normally used for voice systems.

How to determine the type of patch cable
Align the ends of the cable side by side so that the contacts are facing you, then compare the colors from left to right.

 

 

If the colors are in the same order on both plugs, the cable is straight through. If the colors appear in the reverse order, the cable is reversed.

 

Coaxial Cable
Coaxial cable has traditionally been the cable of choice for low cost, small user networks. This has been mainly due to its ease of use and low cost. Persons with mininal network understanding can readily build a LAN using coax components, which can often be purchased in kit ready format.

The general features of coaxial cable are,

Thin coaxial cable [RG-58AU rated at 50 ohms], as used in Ethernet LAN's, looks like

 

The connectors used in thin-net Ethernet LAN's are T connectors (used to join cables together and attach to workstations) and terminators (one at each end of the cable). The T-connectors and terminators look like

 

Fiber Optic
Fiber optic cable is considered the default choice for connections involving high speed [large bandwidth requirements like video, large database systems], long distances and interconnecting networks. It costs more than either twisted pair or coax, and requires special connectors and jointing methods.

The features of fiber-optic cable systems are,

Fiber optic is often used to overcome distance limitations. It can be used to join two hubs together, which normally could not be connected due to distance limitations. In this instance, a UTP to Fiber transceiver [often referred to as a FOT] is necessary. Fiber optic cable looks like

 

 

In addition, fiber optic patch panels are used to interconnect fiber cables. These patch panels look like

 

OSI Model
In 1983, the International Standards Organization (ISO) developed a model which would allow the sending and receiving of data between two computers. It works on a layer approach, where each layer is responsible for performing certain functions.

When we think of how to send data from one computer to another, there are many different things involved. There are network adapters, voltages and signals on the cable, how the data is packaged, error control in case something goes wrong, and many other concerns. By dividing these into separate layers, it makes the task of writing software to perform this much easier.

In the Open Systems Interconnect model, which allows dissimilar computers to transfer data between themselves, there are SEVEN distinct layers.

  1. Application Layer
    Provides Applications with acess to network services.
  2. Presentation Layer
    Determines the format used to exchange data among networked computers.
  3. Session Layer
    Allows two applications to establish, use and disconnect a connection between them called a session. Provides for name recognition and additional functions like security which are needed to allow applications to communicate over the network.
  4. Transport Layer
    Ensures that data is delivered error free, in sequence and with no loss, duplications or corruption. This layer also repackages data by assembling long messages into lots of smaller messages for sending, and repackaging the smaller messages into the original larger message at the receiving end.
  5. Network Layer
    This is responsible for addressing messages and data so they are sent to the correct destination, and for translating logical addresses and names (like a machine name FLAME) into physical addresses. This layer is also responsible for finding a path through the network to the destination computer.
  6. Data-Link Layer
    This layer takes the data frames or messages from the Network Layer and provides for their actual transmission. At the receiving computer, this layer receives the incoming data and sends it to the network layer for handling.
  7. The Data-Link Layer also provides error-free delivery of data between the two computers by using the physical layer. It does this by packaging the data from the Network Layer into a frame which includes error detection information. At the receiving computer, the Data-Link Layer reads the incoming frame, and generates its own error detection information based on the received frames data. After receiving all of the frame, it then compares its error detection value with that of the incoming frames, and if they match, the frame has been received correctly.

    A frame looks like,

     

  8. The Data-Link Layer actually consists of two separate parts, the Medium Access Control (MAC) and Logical Link Control Layer (LLC). Example MAC layers are Ethernet 802.3 and Token Ring 802.5
  9. Bridges are an example of devices which works at the MAC layer.

  10. Physical Layer
    Controls the transmission of the actual data onto the network cable. It defines the electrical signals, line states and encoding of the data and the connector types used. An example is 10BaseT.
    Repeaters are an example of devices that work at the Physical Layer.

For Ethernet 802.3, the Physical Layer can be represented as

 

Sending Data Via the OSI Model
Each layer acts as though it is communicating with its corresponding layer on the other end.

In reality, data is passed from one layer down to the next lower layer at the sending computer, till it's finally transmitted onto the network cable by the Physical Layer. As the data it passed down to a lower layer, it is encapsulated into a larger unit (in effect, each layer adds its own layer information to that which it receives from a higher layer). At the receiving end, the message is passed upwards to the desired layer, and as it passes upwards through each layer, the encapsulation information is stripped off .

 

 

NETWORK SEGMENTS
A network segment

Large networks are made by combining several individual network segments together, using appropriate devices like routers and/or bridges.

In the above diagram, a bridge is used to allow traffic from one network segment to the other. Each network segment is considered unique and has its own limits of distance and the number of connections possible.

When network segments are combined into a single large network, paths exist between the individual network segments. These paths are called routes, and devices like routers and bridges keep tables which define how to get to a particular computer on the network. When a packet arrives, the router/bridge will look at the destination address of the packet, and determine which network segment the packet is to be transmitted on in order to get to its destination.

In the above diagram, a packet arrives whose destination is segment B. The bridge forwards this incoming packet from segment A to the B segment.

 

SPANNING TREE ALGORITHM
Switches and bridges generally learn about the segments they are connected to. As packets arrive, they build up a table which lists the network address used on the various network segments.

Sometimes, a loop would be created which caused the wrong packets to be sent on incorrect segments. These packets could loop around the network, being forwarded on, eventually arriving back, only to be forwarded on, etc. This quickly floods the network. The spanning tree algorithm is a software algorithm which defines how switches and bridges can communicate and avoid network loops.

Packets are exchanged between bridges/switches, and they establish a single path for reaching any particular network segment. This is a continuous process, so that if a bridge/switch fails, the remaining devices can reconfigure the routing tables to allow each segment to be reached.

To be effective, ensure that the bridges/switches in use in your network support this protocol.

REPEATERS
Repeaters EXTEND network segments. They amplify the incoming signal received from one segment and send it on to all other attached segments. This allows the distance limitations of network cabling to be extended. There are limits on the number of repeaters which can be used. The repeater counts as a single node in the maximum node count associated with the Ethernet standard [30 for thin coax].

 

Repeaters also allow isolation of segments in the event of failures or fault conditions. Disconnecting one side of a repeater effectively isolates the associated segments from the network.

Using repeaters simply allows you to extend your network distance limitations. It does not give you any more bandwidth or allow you to transmit data faster.

It should be noted that in the above diagram, the network number assigned to the main network segment and the network number assigned to the other side of the repeater are the same. In addition, the traffic generated on one segment is propagated onto the other segment. This causes a rise in the total amount of traffic, so if the network segments are already heavily loaded, it's not a good idea to use a repeater.

A repeater works at the Physical Layer by simply repeating all data from one segment to another.

 

Summary of Repeater features

BRIDGES
Bridges interconnect Ethernet segments. Most bridges today support filtering and forwarding, as well as Spanning Tree Algorithm. The IEEE 802.1D specification is the standard for bridges.

During initialization, the bridge learns about the network and the routes. Packets are passed onto other network segments based on the MAC layer. Each time the bridge is presented with a frame, the source address is stored. The bridge builds up a table which identifies the segment to which the device is located on. This internal table is then used to determine which segment incoming frames should be forwarded to. The size of this table is important, especially if the network has a large number of workstations/servers.

The advantages of bridges are

The disadvantages of bridges are

Transparent bridges (also known as spanning tree, IEEE 802.1 D) make all routing decisions. The bridge is said to be transparent (invisible) to the workstations. The bridge will automatically initialize itself and configure its own routing information after it has been enabled.

Bridges are ideally used in environments where there a number of well defined workgroups, each operating more or less independent of each other, with occasional access to servers outside of their localized workgroup or network segment. Bridges do not offer performance improvements when used in diverse or scattered workgroups, where the majority of access occurs outside of the local segment.

The diagram below shows two separate network segments connected via a bridge. Note that each segment must have a unique network address number in order for the bridge to be able to forward packets from one segment to the other.

 

 

Ideally, if workstations on network segment A needed access to a server, the best place to locate that server is on the same segment as the workstations, as this minimizes traffic on the other segment, and avoids the delay incurred by the bridge.

A bridge works at the MAC Layer by looking at the destination address and forwarding the frame to the appropriate segment upon which the destination computer resides.

 

Summary of Bridge features

 

ROUTERS
Packets are only passed to the network segment they are destined for. They work similar to bridges and switches in that they filter out unnecessary network traffic and remove it from network segments. Routers generally work at the protocol level.

Routers were devised in order to separate networks logically. For instance, a TCP/IP router can segment the network based on groups of TCP/IP addresses. Filtering at this level (on TCP/IP addresses, also known as level 3 switching) will take longer than that of a bridge or switch which only looks at the MAC layer.

Most routers can also perform bridging functions. A major feature of routers, because they can filter packets at a protocol level, is to act as a firewall. This is essentially a barrier, which prevents unwanted packets either entering or leaving designated areas of the network.

Typically, an organization which connects to the Internet will install a router as the main gateway link between their network and the outside world. By configuring the router with access lists (which define what protocols and what hosts have access) this enforces security by restricted (or allowing) access to either internal or external hosts.

For example, an internal WWW server can be allowed IP access from external networks, but other company servers which contain sensitive data can be protected, so that external hosts outside the company are prevented access (you could even deny internal workstations access if required).

A router works at the Network Layer or higher, by looking at information embedded within the data field, like a TCP/IP address, then forwards the frame to the appropriate segment upon which the destination computer resides.

Summary of Router features

HUBS
There are many types of hubs. Passive hubs are simple splitters or combiners that group workstations into a single segment, whereas active hubs include a repeater function and are thus capable of supporting many more connections.

Nowadays, with the advent of 10BaseT, hub concentrators are being very popular. These are very sophisticated and offer significant features which make them radically different from the older hubs which were available during the 1980's.

These 10BaseT hubs provide each client with exclusive access to the full bandwidth, unlike bus networks where the bandwidth is shared. Each workstation plugs into a separate port, which runs at 10Mbps and is for the exclusive use of that workstation, thus there is no contention to worry about like in Ethernet.

These 10BaseT hubs also include buffering of packets and filtering, so that unwanted packets (or packets which contain errors) are discarded. SNMP management is also a common feature.

 

 

In standard Ethernet, all stations are connected to the same network segment in bus configuration. Traffic on the bus is controlled using the CSMA (Carrier Sense Multiple Access) protocol, and all stations share the available bandwidth.

10BaseT Hubs dedicate the entire bandwidth to each port (workstation). The workstations attach to the hub using UTP. The hub provides a number of ports, which are logically combined using a single backplane, which often runs at a much higher data rate than that of the ports.

Ports can also be buffered, to allow packets to be held in case the hub or port is busy. And, because each workstation has it's own port, it does not contend with other workstations for access, having the entire bandwidth available for it's exclusive use.

The ports on a hub all appear as one Ethernet segment. In addition, hubs can be stacked or cascaded (using master/slave configurations) together, to add more ports per segment. As hubs do not count as repeaters, this is a better option for adding more workstations than the use of a repeater.

Hub options also include an SNMP (Simple Network Management Protocol) agent. This allows the use of network management software to remotely administer and configure the hub. Detailed statistics related to port usage and bandwidth are often available, allowing informed decisions to be made concerning the state of the network.

In summary, the advantages for these newer 10BaseT hubs are,

 

ETHERNET SWITCHES
Ethernet switches increase network performance by decreasing the amount of extraneous traffic on individual network segments attached to the switch. They also filter packets a bit like a router does. In addition, Ethernet switches work and function like bridges at the MAC layer, but instead of reading the entire incoming Ethernet frame before forwarding it to the destination segment, usually only read the destination address in the frame before retransmitting it to the correct segment. In this way, switches forward frames faster than bridges, offering less delays through the network, hence better performance.

When a packet arrives, the header is checked to determine which segment the packet is destined for, and then its forwarded to that segment. If the packet is destined for the same segment that it arrives on, the packet is dropped and not retransmitted. This prevents the packet being "broadcasted" onto unnecessary segments, reducing the traffic.

Nodes which inter-communicate frequently should be placed on the same segment. Switches work at the MAC layer level.

 

Switches divide the network into smaller collision domains [a collison domain is a group of workstations that contend for the same bandwidth]. Each segment into the switch has its own collision domain (where the bandwidth is competed for by workstations in that segment). As packets arrive at the switch, it looks at the MAC address in the header, and decides which segment to forward the packet to. Higher protocols like IPX and TCP/IP are buried deep inside the packet, so are invisible to the switch. Once the destination segment has been determined, the packet is forwarded without delay.

Each segment attached to the switch is considered to be a separate collision domain. However, the segments are still part of the same broadcast domain [a broadcast domain is a group of workstations which share the same network subnet, in TCP/IP this is defined by the subnet mask]. Broadcast packets which originate on any segment will be forwarded to all other segments (unlike a router). On some switches, it is possible to disable this broadcast traffic.

Some vendors implement a broadcast throttle feature, whereby a limit is placed on the number of broadcasts forwarded by the switch over a certain time period. Once a threshold level has been reached, no additional broadcasts are forwarded till the time period has expired and a new time period begins.

Cut-Through Switches

Cut through switches use either a cross-bar or cell-backplane architecture.

Store-Forward Switches

Back Pressure Switches
Switches often employ buffering of packets. This is done so when packets arrive for a busy port, the packet is temporarily stored till the port becomes free. When the buffer becomes fill, packets become lost.

Back pressure switches overcome this problem by sending the overflow packets back to the workstation. This effectively slows the workstation transmission rate, and hence slows the arrival of new packets at the port.

Ethernet Switching: Advantges

Virtual Networking
In virtual networking, workgroups can be created on demand. Users can be located anywhere on the network. Using software management, the network components (switches) are configured to recognize a number of defined workstations (by MAC address) as belonging to their own domain.

Any traffic generated by these workstations can be sent to any other workstation in that domain. Workstations outside that domain are unable to see any packets (including broadcasts) that belong to the secure domain. Obviously, this has enormous implications for developing secure networks. Multiple virtual workgroups can exist, like email and www server. Users can belong to more than one virtual domain, thereby administration is centralized and security is maintained. The use of switch technology makes this possible.