ActionScripting in Flash MX

1.6 Building block 4: Hardware

In this section we briefly explore some of the key hardware devices you will encounter when designing networks. In order to place these devices in context, it is useful to position them using the ISO OSI seven-layer model, as shown in Figure 1.10.

Figure 1.10: Network devices in context.

Since the mid-1980s, we have seen a gradual shift in the presentation of networked devices from largely discrete units (such as standalone bridges, standalone repeaters, etc.) to highly integrated devices with many hybrid functions (such as multimedia hubs with repeater, bridge, and multiprotocol router interface cards). This is largely the result of functionality becoming a commodity, a general trend toward increased miniaturization, and the need to improve functionality to remain competitive. As these tools have matured and improved in performance there has also been a shift in network design from the use of simple bridged and repeated networks to more sophisticated router-switch networks capable of optimizing traffic flows with much greater accuracy and granularity. Scalability, convergence, and traffic optimization are now key driving forces behind today's large-scale network designs. We will now examine some of these devices in more detail.

Figure 1.11 is a somewhat simplified network design illustrating where you would typically expect to find these devices in a real network today. It shows discrete devices, although it is common to see much of the functionality integrated into a single device. The Head Office site uses a firewall to prevent unauthorized internal access and offers a Demilitarized Zone (DMZ) for shared hosts at lower security levels. A gateway is used to convert IBM SNA into TCP/IP protocol for wide area transport. Campus 1 has a number of LANs, segregated either via repeaters (LAN extension) or bridges and routers. Line drivers (LD) are used to extend the campus to a remote office in Building 9. Building 5 is a multistory building with Layer 2 and Layer 3 switches to provide Virtual LAN (VLAN) traffic domains. Note that the Layer 3 switch includes wide area support for access to the meshed WAN.

Figure 1.11: Simplified network design illustrating the typical locations for key hardware devices.

1.6.1 Media Attachment Units (MAUs)

MAUs, or transceivers, provide the means of encoding data (framed bits) into purely electrical or light signals ready for transmission onto the physical media, typically a piece of cable. An MAU is also responsible for decoding electrical or light signals and converting them back into data for receiving stations. Note that MAU should not be confused with the Token Ring concentrator Multiple Access Unit. All devices attached to a network will typically have either a built-in transceiver interface (such as an onboard 10 Base T interface provided on a PC network adapter) or will provide a standard AUI interface, which can be mated to a discrete transceiver via a drop cable. MAUs come in various guises, depending on the media technology to be used to carry data and the media access control (MAC) technology used to frame the data (e.g., Token Ring, Ethernet, FDDI, etc.). MAUs may be small, single-port discrete units or multiport LAN-in-a-box units. MAUs provide a physical connection to LAN. They may also include features that protect against misuse of the LAN (e.g., Ethernet Jabber Protect) and diagnostic tests (SQE on Ethernet).

1.6.2 Repeaters

Repeaters are used to extend LAN segments, either due to the standard distance limitations on the length of a segment or to expand a network because the number of devices attached to a segment is at the recommended limit (e.g., four repeater hops for CSMA/CD). There are various types of repeater, ranging from single-port unmanaged units to multiport devices with full network management support. Repeaters may present a range of interfaces and physical connectors; typical examples are as follows:

A repeater must regenerate incoming frames to its other port(s) as a frame is received. A typical dumb repeater copies any incoming frames on any port to all other ports, so there is no traffic management capability. The standards documentation also specifies maximum acceptable delays (called bit-budget delays) between the receipt and retransmission of bits in a frame. If these delay thresholds are exceeded, then the device is considered non-compliant and may cause problems in networks where repeaters are chained off in sequence. One special type of repeater, a buffered repeater, not often seen nowadays, is really a hybrid between a bridge and a repeater. This device stores incoming frames temporarily in a memory buffer, prior to regeneration on its other port(s). In this scenario the bit-budget delays do not apply. Furthermore, buffered repeaters can be used in the same way as bridges to segment two or more networks where multiple nonbuffered repeaters are used in series. Buffered repeaters also inhibit the regeneration of error frames and collision frames between segments. Repeaters are a commodity item and are widely available from electrical retailers. They are simple, reliable, and easy to install but are otherwise of little interest from the network designer's perspective.

1.6.3 Line drivers, modems, and CSU/DSUs

Line drivers

Line drivers (sometimes referred to as limited distance modems—LDMs) are used to extend physical circuits over longer distances. Line drivers are typically used in designs where point-to-point links between two devices would exceed the maximum distance supported by the underlying media and protocols. They are a form of signal amplifier.

Modems

Modulator/Demodulators (modems) are typically used between a CPU and a telephone line. This device modulates an outgoing binary bit stream onto the analog carrier, and demodulates an incoming binary bit stream from an analog carrier. Modem standards are defined by the International Telecommunications Union (ITU) and include the following:

CSU/DSUs

The terms Channel Service Unit (CSU) and Data Service Unit (DSU) are often used synonymously, although they perform different functions. CSU and DSU functionality is often combined in a single device called a Digital Data Set (DDS). A DSU is a low-speed device used to terminate digital circuits, providing protocol translation and signal formatting. There are several categories of DSU, as follows:

A CSU terminates digital circuits at higher speeds but provides additional features such as filtering, line equalization and conditioning, signal regeneration, circuit testing, and error control protocol conversion (e.g., B8ZS). Some combined CSU/DSUs can also support Extended Super Frame (ESF) monitoring and testing, together with the ability to multiplex traffic from multiple interfaces into a single point-to-point or multidrop circuit. Standard CSUs offer a T1/E1 circuit interface. Many combined CSU/DSUs can now offer T3/E3 support via the High-Speed Serial Interface (HSSI). Some combined CSU/DSUs support SMDS via the Data Exchange Interface (DXI) and include many functions beyond the scope of a traditional DDS (including segmentation, protocol conversion, etc.).

1.6.4 Bridges

Bridges provide Layer 2 Data Link Layer functionality and are protocol independent of Layer 3 protocols and higher. They can, therefore, transparently connect multiple 802.x-compliant networks (either locally or remotely). The Data Link Layer uses physical addressing schemes and is responsible for line discipline, topology reporting, error notification, flow control, and ordered delivery of data frames. Since bridges operate at the Data Link Layer, they do not examine protocol information that occurs at the upper layers. This means that there is minimal processing overhead relative to devices such as routers or gateways, and bridges may forward different types of protocol traffic (e.g., DECnet, IP, or Novell IPX) between two or more networks. The IEEE committee defines four key standards for bridges, as follows:

Transparent Bridging is synonymous with the Ethernet world, and Source Routing is synonymous with Token Ring. There is a de facto standard called Adaptive Source Routing, or Translation Bridging. This allows mixed Translation and Source Routing environments to coexist effectively via an internal kludge using address-mapping tables. Note that Source Routing bridges are not considered completely transparent [1].

Bridges offer filtering and forwarding capabilities based on Layer 2 fields, which are used to create discrete traffic domains to optimize backbone efficiency. Bridges may have filters configured to accept and forward only frames of a certain type or frames that originate from a particular subnet. This filtering capability is extremely useful for controlling traffic flows. Filters may be static (configured by the system or user) or dynamic (learned). In general, bridges offer at least some traffic management capability by associating node MAC addresses with particular interfaces and forwarding (at the Data Link level) semi-intelligently. Bridges are also typically responsible for preserving topology integrity by stopping the formation of network loops using protocols such as Spanning Tree, or proprietary variations [1].

1.6.5 Switches

The increasing power of desktop PCs and the growth of client/server and multimedia applications have driven the need for higher-bandwidth, shared-access LANs. Consequently, network designers are replacing older repeaters and bridges in their wiring closets with intelligent LAN switches to increase network performance and protect their existing wiring investments. Switches are basically high-speed bridges, usually with significant hardware assist to ensure low latency and high throughput. Switches can be functionally divided into two main categories: LAN switches (Layer 2/multilayer devices that provide Layer 2 and Layer 3 switching capabilities) and ATM switches. LAN switches can reduce congestion in existing shared-media hubs while using new backbone technologies, such as Fast Ethernet and ATM. Gigabit Ethernet and ATM switches and routers offer greater backbone bandwidth required by high-throughput data services.

1.6.6 Routers

WAN operations were historically performed by hosts. However, in the early 1980s these tasks started to migrate into dedicated Layer 3 devices called routers. The first routers were single protocol only, and did not offer any concurrent bridge operations. As both memory and CPU power increased and became much less expensive, more functionality was added until we arrive at the situation today, with routers being the ubiquitous general-purpose, multiprotocol network tool. Routers form discrete broadcast domains and are used to connect different networks. Routers forward traffic based on the destination Network Layer address rather than the MAC address. Routers can provide transparent connectivity over mixed technology subnetworks and are commonly used to extend LANs (both locally and remotely). Routers typically communicate with one another, learning neighbors, routes, costs and addresses, and selecting the best path routes for individual packets.

Multiprotocol bridge routers have become the preferred tool used to create large scalable internetworks. They offer all the benefits of protocol transparency traditionally provided by bridges, together with effective bandwidth utilization and the security advantages of routers. Router networks are functionally more robust than those provided by bridges; they do not suffer issues such as LLC timeouts, susceptibility to broadcast storms, and poor congestion control. Routers are much more scalable and can support very large internetworks in terms of both load and addressing; they do, however, require more skilled support and maintenance staff. The basic operation of a multiprotocol bridge router is as follows:

The conceptual architecture of hybrid multiprotocol bridge routers is illustrated in Figure 1.12. It is important to understand that this hybrid integrated product provides more functionality than a discrete bridge and router pair, either in parallel or in series. In fact, it performs a unique function that cannot be emulated with discrete devices. In Figure 1.13 we can see that the closest we can get to emulate the operation of the integrated device is via two bridges and a router. However, the configuration shown on the right still fails to provide the same functionality and will drop bridged packets at the router interface if they are nonroutable, so protocols such as DEC LAT will be passed through both bridges but are blocked at the router. The single-protocol router will always discard nontransparent protocols.

Figure 1.12: Architecture of a multiprotocol bridge router.

Figure 1.13: Integrated bridge router and discrete bridge routers in parallel.

In Figure 1.14 we see an alternate way to emulate this functionality. On the surface this also looks promising; however, now we immediately run the risk of having duplicate packets circulating around the network. The bridge on the far right will blindly copy all nonlocal traffic regardless of whether or not the single protocol router (running in parallel) is already dealing with some of the traffic. As a result, the top and bottom networks are in effect joined, as if we were running multiple IP addresses on the same physical LAN. This will potentially confuse the router, since it will see packets of identical network source addresses on both interfaces. Strictly speaking, this configuration is not legal. Of course, one could consider setting up some fancy filtering scheme on the bridge to discard all routable packets, but frankly this would be a management nightmare and is strongly discouraged.

Figure 1.14: Integrated bridge router and discrete bridge and routers in parallel.

Hybrid integrated devices exhibit behavior that is often quite unique. Here, all of the routing and bridging decisions are handled internally, and the device always handles forwarding or routing decisions consistently, which greatly simplifies the design rules. We discuss the use of routers in network design in Chapter 3. In Chapter 5 we discuss the emergence of a new breed of hybrid device called the router firewall.

1.6.7 Gateways

The term gateway is used as a generic term in networking; the only thing that defines it is that there is some functional or protocol conversion or translation implied. In this broad sense we will also include devices such as transport relays, since, as far as we are concerned, these are all gateways. Examples of gateways include the following:

You should be aware that many of the older IP standards documents (RFCs) use the term gateway to mean a router, which can lead to further confusion. In this book router means router, and gateway means some form of protocol translator.

1.6.8 Firewalls

Firewalls are hybrid security devices that are built using packet-filter routers, application proxies, or stateful packet forwarding systems. Their primary purpose is to intercept traffic flows and police the content of these flows, allowing only sessions that comply with policy rules through the firewall. Firewalls are widely deployed at perimeter interfaces to enable organizations to interface with untrusted wide area networks (such as the Internet). They are increasingly being deployed within internal networks to police traffic between groups of users.

1.6.9 End systems and intermediate systems

The terms end system and intermediate system are frequently used in networking texts. We define these terms as follows:

In an internetwork environment end systems communicate over a backbone of intermediate systems. Although they do not actively participate in routing, end systems require basic reachability information in order to talk to a router. This is achieved by running a router discovery protocol (such as a limited form of RIP) or via static hard-coded entries. Note that it is important not to confuse the physical appearance of a device with its logical function; it is not unusual, for example, to equip a high-performance workstation with full routing capability.

1.6.10 Comparing bridges, switches, and routers

It is useful to briefly summarize the various issues and benefits of using these three complementary technologies in a network design.

Bridge benefits

The key advantages of using bridges in designs are as follows (note that most of these features also apply to switches):

Bridge issues

Bridge issues include the following:

Router benefits

Because routers use Layer 3 addresses, which are typically hierarchical, routers can use techniques such as address summarization to build networks that maintain performance and efficiency as they grow in size. Routers can use redundant paths and determine optimal routes even in a dynamically changing network. Routers are necessary to ensure scalability as the network grows and expands. They provide the following capabilities, which are vital in network designs:

Since routers operate at Layer 3, they can enforce a hierarchical addressing structure. Therefore, a routed network can tie a logical addressing structure to a physical infrastructure—for example, through IP subnets for each segment. Traffic flow in a bridged or switched (flat) network is, therefore, inherently different from traffic flow in a routed (hierarchical) network. Hierarchical networks offer more efficient traffic flows than flat networks because they can use the network hierarchy to determine optimal paths and contain broadcast domains. Routers offer several advantages over bridges and switches, as follows:

Router issues

Router issues include the following:

Категории