登陆注册
27082000000041

第41章 Computer Networks and Internet(4)

To help you understand the next technological advancement, the development of local-area networks (LANs), consider the following problem. Somewhere in the world, multiple computers wanted to communicate with each other. To do so, they need some kind of device that could talk to the computers and to the media (the NIC), and some way for the messages to travel (the medium). Suppose also, that computers wanted to communicate with other computers that were a great distance away. The answer to this problem came in the form of repeaters and hubs. The repeater was introduced to enable computer data signals to travel further. The multi-port repeater, or hub, was introduced to enable a group of users to share files, servers, and peripherals. You might call this a workgroup network.

Soon, workgroups wanted to communicate with other workgroups. Because of the functions of hubs (they broadcast all messages to all ports, regardless of destination), as the number of hosts and the number of workgroups grew, there were large and large traffic jams. The bridge was invented to segment the network into multiple collision domains to introduce some traffic control.

The best feature of the hub—concentration/connectivity—and the best feature of tile bridges—segmentation—were combined to produce a switch. It has many ports, but allows each port to pretend it has a connection to the other side of the switch, thus allowing more users and lots of communications.

In the mid-1980s, special-purpose computers, originally called gateways (and then routers), were developed. These devices allowed the interconnection of separate LANs. Internet works were created. The DoD already had an extensive internet work, but the commercial availability of routers, which carded out best path selections and switching for data from many protocols, allowed the explosive growth of networks that we are experiencing today. The cloud represents that growth.

With the arrival of the new century, the next step is the convergence of computer and communications technology (specially, the convergence of voice, video, and data, which traditionally have traveled via different systems) into one information stream. Now that you have an understanding of the evolution of the networking devices, the next section explains how networking devices operate within the OSI model.

Evolution of Networking Devices and the OSI Layers

Hosts and servers operate at Layers 1 through 7; they perform the encapsulation process. Transceivers, repeaters, and hubs sue all considered active Layer 1 devices because they act only on bits and require energy. Patch cables, patch panels, and other interconnection components are considered passive Layer 1 components because they simply provide some sort of conducting path.

NICs are considered Layer 2 devices because they are the location of the MAC address; but because they often handle signaling and encoding, they are also Layer 1 devices. Bridges and switches are considered layer 2 devices because they use Layer 2 (MAC address) information to make decisions about whether to forward packets. They also operate on layer 1 to allow bits to interact with the media.

Routers are considered Layer 3 devices because they use Layer 3 (network) addresses to choose best paths and to switch packets to the proper route. Router interfaces operate at Layers 2 and 1, as well as Layer 3. Clouds, which might include routers, switches, servers, and many devices not yet introduced, involved Layers 1 through 7.

Basics of Data Flow through LANs

For reliable communications to take place over a network, data to be sent must be put in manageable traceable packages. This is done through the process of encapsulation. A brief review of the process states that the top three layers—application, presentation, and session—prepare the data for transmission by creating a common format for transmission.

The transport layer breaks up the data into manageable size units called segments. It also assigns sequence numbers to the segments to make sure the receiving host puts the data back together in file proper order. The network layer then encapsulates the segment creating a packet. It adds a destination and a source network address, usually IP, to the packet.

The data link layer further encapsulates the packet and creates a frame. It adds the source and destination local (MAC) addresses to the frame. The data link layer then transmits the binary bits of the frame over the physical layer media.

When the data is transmitted on just a LAN, we talk about the data units as frames because the MAC address is all that is necessary to get from source to destination host. But if we need to send the data to another host over an intranet or die Internet, packets or data grams become the data unit that is referred to. This is because the network address in the packet contains the final destination address of the host to which the data (packet) is being sent, whereas the data link layer information is local. That is, it changes as it passes through each network. The bottom three layers (network, data link, physical) of the OSI model are primary movers of data across an intranet or Internet.

Packet Flow through Layer 1~7 Devices

Some devices (such as your PC) are Layer 1 — 7 devices. In other words, they perform processes that can be associated with every layer of the OSI model. Encapsulation and de-encapsulation are two examples of this. A device called a gateway (essentially a computer, which converts information from one protocol to another) can operate on a single layer or multiple layers. An example of a gateway would be a computer on a LAN that allows the network to connect to an IBM mainframe computer or to a network-wide facsimile (fax) system. In both of these examples, the data would have to go all the way up the OSI model stack to be converted into a data format the receiving device, either the mainframe or the fax unit, could use.

同类推荐
  • 当英语也成为时尚——生活全由你创造

    当英语也成为时尚——生活全由你创造

    本书摘取了若干耐人寻味、震撼人心的哲理美文和励志故事,包括:“成功永远不会太晚”、“假如我又回到童年”、“循序渐进”等。
  • 1984(英文原版)

    1984(英文原版)

    本书是英国左翼作家乔治·奥威尔于1949年出版的政治小说。小说刻画了一个令人感到窒息和恐怖的、以追逐力为很终目标的假想极主义社会。这部小说与英国作家赫胥黎著作的《美丽新世界》,以及俄国作家扎米亚京著作的《我们》并称反乌托邦的三部代表作。小说至今已被翻译成62种语言,优选销量超过3000万册,是20世纪影响力优选的英语小说之一。
  • 天使吻过那片海

    天使吻过那片海

    《天使吻过那片海》既是英语学习爱好者、文学爱好者的必备读物,也是忙碌现代人的一片憩息心灵的家园,让读者在欣赏原法原味和凝练生动的英文时,还能多角度、深层次地品读语言特色与艺术之美,再配合文章后附加的多功能、全方位巩固题型,更有助于理解并学习英……
  • 美国流行俚语

    美国流行俚语

    本书收录了约1500条美国流行俚语,例句选自现代英语报纸杂志、电影、电视、文学作品、网络等主流媒体。
  • 老人与海(有声双语经典)

    老人与海(有声双语经典)

    《老人与海》塑造了人类文学史上一个平民英雄的形象。古巴老渔夫圣地亚哥出海八十四天都一无所获,但他却并未绝望,最终钓上了一条大鱼。他和大鱼在海上搏斗了三天,才将鱼杀死,并将其绑在小船的一侧。归程中大鱼一再遭到鲨鱼的袭击,回港时就只剩下了脊骨和尾巴。
热门推荐
  • 额三年

    额三年

    高中补录女生的高中三年生活,枯燥乏味之中又会发生什么呢?
  • 武道之摇一摇系统

    武道之摇一摇系统

    主角意外穿越,并获得了摇一摇系统,每日可摇出一定数量的修炼道具。比如:“淬体丹、治愈丹、平底锅、浴缸、手榴弹,时间停止器……”各种各样奇葩的道具,玩转武道世界。当然,这些都不是普通的道具,都是有特殊功能的。
  • 在错的时间遇上对的你

    在错的时间遇上对的你

    美丽的东西总是来去匆匆,绚丽的彩虹总是易消散,美好的设想依旧最易成泡影。留下一段不可言说的凄婉;留下一段不可言说的爱恋,自坠入越挣扎越迷恋的虚幻世界里。于是两颗寂寞的心碰撞出爱的火花、引起一段缘起缘灭的感情、一个曲终人散的故事、一个始乱终弃的爱人、一条扑朔迷离的网恋不归路。
  • 红警之末世指挥官

    红警之末世指挥官

    末世到处都是危机,苏晨表示不用担心,有红警系统,就是这么自信。你说你有很多武器?抱歉,我这里的武器多的用不完,天气控制仪了解一下。你说变异兽很强大?刚好我的超级兵种诞生,还没有开荤呢。苏晨的目光看向上空:“地球从来不是我的目标,我的目标是那星辰大海!”
  • 蓬莱长生殿

    蓬莱长生殿

    这本书很烂,作者自己都看不下去,建议你们也别看了。推荐我另外一本书《死亡Wifi》,那本还不错。
  • 嫡妃傲世:一揽天下

    嫡妃傲世:一揽天下

    一日败落,朝朝败落。我云浅愔不会让此事发生,一朝痴女变狂妃。
  • 逆天重来:学霸千金要上天!

    逆天重来:学霸千金要上天!

    前世苏昔以为自己有慈爱的继母,纵容她的爸爸,善良温柔的好妹妹,专情的未婚父!原来一切都是假象!一切都是为了财富和权势的而编造的谎言!重活一世,绝对不会再被所谓的亲情蒙骗,这一世,她要绽放独属于自己的光芒!可是身旁的这个男人是谁?苏昔:你表过来,我要报警.....还没说完,唇就被封上了........宝贝,我们床上说。
  • 贪恋红尘三千尺

    贪恋红尘三千尺

    本是青灯不归客,却因浊酒恋红尘。人有生老三千疾,唯有相思不可医。佛曰:缘来缘去,皆是天意;缘深缘浅,皆是宿命。她本是出家女,一心只想着远离凡尘逍遥自在。不曾想有朝一日唯一的一次下山随手救下一人竟是改变自己的一生。而她与他的相识,不过是为了印证,相识只是孽缘一场。
  • EXO之我们恰好

    EXO之我们恰好

    她来到异国,机缘巧合下结识了他们,原本以为不会再有瓜葛,怎奈缘分作怪。
  • 老婆带我打爆世界

    老婆带我打爆世界

    新婚妻子是现任勇者!这是什么体验?杜风揉揉耳垂,瞟了眼趴倒的魔王。“呵~,老婆,蜜月就在这魔王城将就将就好了。”