登陆注册
23770800000041

第41章 Computer Networks and Internet(4)

To help you understand the next technological advancement, the development of local-area networks (LANs), consider the following problem. Somewhere in the world, multiple computers wanted to communicate with each other. To do so, they need some kind of device that could talk to the computers and to the media (the NIC), and some way for the messages to travel (the medium). Suppose also, that computers wanted to communicate with other computers that were a great distance away. The answer to this problem came in the form of repeaters and hubs. The repeater was introduced to enable computer data signals to travel further. The multi-port repeater, or hub, was introduced to enable a group of users to share files, servers, and peripherals. You might call this a workgroup network.

Soon, workgroups wanted to communicate with other workgroups. Because of the functions of hubs (they broadcast all messages to all ports, regardless of destination), as the number of hosts and the number of workgroups grew, there were large and large traffic jams. The bridge was invented to segment the network into multiple collision domains to introduce some traffic control.

The best feature of the hub—concentration/connectivity—and the best feature of tile bridges—segmentation—were combined to produce a switch. It has many ports, but allows each port to pretend it has a connection to the other side of the switch, thus allowing more users and lots of communications.

In the mid-1980s, special-purpose computers, originally called gateways (and then routers), were developed. These devices allowed the interconnection of separate LANs. Internet works were created. The DoD already had an extensive internet work, but the commercial availability of routers, which carded out best path selections and switching for data from many protocols, allowed the explosive growth of networks that we are experiencing today. The cloud represents that growth.

With the arrival of the new century, the next step is the convergence of computer and communications technology (specially, the convergence of voice, video, and data, which traditionally have traveled via different systems) into one information stream. Now that you have an understanding of the evolution of the networking devices, the next section explains how networking devices operate within the OSI model.

Evolution of Networking Devices and the OSI Layers

Hosts and servers operate at Layers 1 through 7; they perform the encapsulation process. Transceivers, repeaters, and hubs sue all considered active Layer 1 devices because they act only on bits and require energy. Patch cables, patch panels, and other interconnection components are considered passive Layer 1 components because they simply provide some sort of conducting path.

NICs are considered Layer 2 devices because they are the location of the MAC address; but because they often handle signaling and encoding, they are also Layer 1 devices. Bridges and switches are considered layer 2 devices because they use Layer 2 (MAC address) information to make decisions about whether to forward packets. They also operate on layer 1 to allow bits to interact with the media.

Routers are considered Layer 3 devices because they use Layer 3 (network) addresses to choose best paths and to switch packets to the proper route. Router interfaces operate at Layers 2 and 1, as well as Layer 3. Clouds, which might include routers, switches, servers, and many devices not yet introduced, involved Layers 1 through 7.

Basics of Data Flow through LANs

For reliable communications to take place over a network, data to be sent must be put in manageable traceable packages. This is done through the process of encapsulation. A brief review of the process states that the top three layers—application, presentation, and session—prepare the data for transmission by creating a common format for transmission.

The transport layer breaks up the data into manageable size units called segments. It also assigns sequence numbers to the segments to make sure the receiving host puts the data back together in file proper order. The network layer then encapsulates the segment creating a packet. It adds a destination and a source network address, usually IP, to the packet.

The data link layer further encapsulates the packet and creates a frame. It adds the source and destination local (MAC) addresses to the frame. The data link layer then transmits the binary bits of the frame over the physical layer media.

When the data is transmitted on just a LAN, we talk about the data units as frames because the MAC address is all that is necessary to get from source to destination host. But if we need to send the data to another host over an intranet or die Internet, packets or data grams become the data unit that is referred to. This is because the network address in the packet contains the final destination address of the host to which the data (packet) is being sent, whereas the data link layer information is local. That is, it changes as it passes through each network. The bottom three layers (network, data link, physical) of the OSI model are primary movers of data across an intranet or Internet.

Packet Flow through Layer 1~7 Devices

Some devices (such as your PC) are Layer 1 — 7 devices. In other words, they perform processes that can be associated with every layer of the OSI model. Encapsulation and de-encapsulation are two examples of this. A device called a gateway (essentially a computer, which converts information from one protocol to another) can operate on a single layer or multiple layers. An example of a gateway would be a computer on a LAN that allows the network to connect to an IBM mainframe computer or to a network-wide facsimile (fax) system. In both of these examples, the data would have to go all the way up the OSI model stack to be converted into a data format the receiving device, either the mainframe or the fax unit, could use.

同类推荐
热门推荐
  • 冰月城之恋

    冰月城之恋

    罗琳和她的闺蜜朱丽来到了全国最高学院,在这里她们遇见了丁文和辛诺,后来,罗琳和丁文日久生情,朱丽和辛诺一见钟情却不敢说出口,就在这繁华的冰月城内,展开了一段爱情故事。
  • 我愿朝着太阳生长

    我愿朝着太阳生长

    有些人似乎什么都不必做,好运气就会伴随终生。而有些人卖艺的时候必须专心卖艺,才会随着岁月的沉淀变得越发有底气。这本书记录着这样一些人:一个不需要照顾,女汉子性格的白领;执着并拧巴的女推销员;死心眼的BJ男和他的十个姑娘;长得好看的拉面师傅;乐此不疲的“喜当爹”……看着他们的故事,你会想:有些好运气,还没有来找你,不是说他们永远不会来了,只是为了让你多走一些路,再遇到属于自己的甜。
  • 2056

    2056

    公元2056年,平静的一年。科学与人文迅速发展,火星登陆者刚刚发回第一批照片,利益竞争继续在暗处运作。2056年6月21日,载入地球史册的一天。8时21分53秒,太阳耀斑大爆发,波及至火星。地球的白天暴露在80度高温中。死伤数亿。是年冬,太阳耀斑消失,全球的天空降下鹅毛大雪。人们从地下钻出来,仰望阳光下的天空,阴霾却充满希望。清点损失时,人类惊恐发现,世界各地出现很多变异的超能力的人。他们可能是身边朋友、亲人、邻居……
  • 维度纪元

    维度纪元

    乱世出豪杰,时势造英雄。在这个大变革的时代,人类的进化从渐变式进入到了爆发式,人人得到进化,在强有力的武力之下,政权和规则都变得不堪一击,人类将何去何从?进化的极致究竟是什么?神?进化的系统究竟是什么?身体?域外文明的冲击,自身内部的暴乱,究竟会向哪个方向发展?这不是一个人的壮歌,这是整个人类的崛起,从此以后,宇宙之中,必定有我地球人族的一席之地。
  • 辛希娅

    辛希娅

    2010年,由美国基因遗传学顶尖科学家克莱格主持的人造生命专题取得成功,人类史上第一个人造生命诞生。代表了人类科学已经打破了大自然的规律。是福是祸?是生物史上的突破?还是人类自己打开了潘多拉宝盒?随着社会批判的呼声越来越高,科学家们被迫放弃了继续研究。没想到,20年后,这项技术再次被人开发出来。
  • 原来我们还会相爱

    原来我们还会相爱

    楚依我爱你,但我的不是自私而又不讲理的爱。你若是想飞那我一定放你飞,我绝对不会勉强于你——陆洋。陆洋你凭什么认为我想飞,我爱你但我决不会向一个不相信我的人低头既然你认为我想飞那么我便飞给你看——楚依。离开,是放手还是倔强又或者是痛苦。离开对陆洋来说是放手也是痛苦。离开对楚依来说是倔强也是痛苦。而重逢对于俩人来说是什么呢?
  • 无价雇佣

    无价雇佣

    十年一剑,冰瀚者首发作品无价雇佣将给大家带来不一样的体验
  • 武斗机铠

    武斗机铠

    漆黑的世界中究竟有些什么呢?谁能够看清这片黑色所隐藏的秘密呢?“哒!哒!”他身着黑色的铠甲,戴着头盔,腰间配着一把暗红色的剑,手持长枪,枪头系着一条长巾,鲜红欲滴。突然,他停了下来,看着前方,目光雷裂。“轰!轰!”震天巨响,一个庞然大物正缓步前行着,每一步落下都能让大地剧烈震动。突然,它停了下来,猩红色的眼珠盯着前方,大吼一声,猛地向前冲去。......
  • 妒杀红芍生冷玉

    妒杀红芍生冷玉

    辰若:孔圣人在上,学生可真是要疯了!辰钰:你心里是有我的,对不对?情节虚构,切勿模仿
  • 无悔至尊

    无悔至尊

    在这残酷的世界里,谁又有办法独善其身,且看少年在这吃人的世界演绎自己的人生。