Project: a Gigabit Ethernet
Total Page:16
File Type:pdf, Size:1020Kb
Rivier College CS553A Introduction to Networking Technologies Project: A Gigabit Ethernet Author: Faron Ducharm e Author’s E-m ail fducharm [email protected] Due Date: 8th of Decem ber 2005 Professor: Vladim ir V. Riabov, PhD Table of Contents INTRODUCTION ..................................................................................................3 2 Technology Backround .....................................................................................................................4 2.1 Why has the Ethernet been so successful?...................................................................................4 2.2 Evolution of Standards ................................................................................................................5 2.3 Benefits of Gigabit.......................................................................................................................6 3 Network Topology .............................................................................................................................7 3.1 Network Diameter Limitations ....................................................................................................8 3.2 Load Balancing............................................................................................................................8 4 Network Architecture (Layers and Protocols) ........................................................................9 4.1 Physical Layer .............................................................................................................................9 4.2 Data Link Layer.........................................................................................................................10 4.3 Network Layer...........................................................................................................................13 4.4 Transport Layer .........................................................................................................................14 4.5 Application Layer......................................................................................................................16 5 Conclusions ......................................................................................................................................17 REFERENCES ...................................................................................................18 2 Introduction Com pany X is as m edium sized enterprise of 300 people (term inals) running and requiring access to the following: • Enterprise Resource Planning (ERP) Database and Application • E-m ail • Internet browsing • File Transfer Protocol (FTP) • Off-Site Backup • Storage Area Network (SAN) Along with proving the above, security is a param ount concern. The Ethernet operates at layers 1 and 2 of the OSI networking m odel but as an academ ic exercise we will also exam ine the Network, Transport and Application layers. STORAGE AREA NETWORK The ever expanding volum e of data produced by businesses today, is being driven by new technologies, custom er dem and and governm ent regulation: • Publishing com panies m oving towards digital pre-press publication. • Retailers selling to online custom ers. • Healthcare com panies abiding by the Health Insurance Portability and Accountability Act (HIPAA). • Organizations that m andate long-term archiving of everything from e-m ail m essages to corporate records. The Storage Area Network (SAN) was developed in response to this changing clim ate and the requirem ents of High Availability (HA), scalable growth and system perform ance. Som e estim ates project enterprise storage to double every 12-18 m onths. According to the IM EX Research “SANs will eventually be at the core of every enterprise’s data center.” i M ost of today’s SANs relay on Ethernet to transport data via Internet Sm all Com puter System Interface (iSCSI). ISCSI is a block-level storage protocol that lets users create a separate storage network using Ethernet. ISCSI uses Ethernet as a transport for data from servers to storage devices or storage-area networks. Because iSCSI uses Ethernet, it doesn't suffer from som e of the com plexity and distance lim itations that encum ber other storage protocols. Ethernet: A local-area network (LAN) architecture developed by Xerox Corporation in cooperation with DEC and Intel in 1976. Ethernet uses a bus or star topology and supports data transfer rates of 10 M bps. The Ethernet specification served as the basis for the IEEE 802.3 standard, which specifies the physical and lower software layers. Ethernet uses the CSM A/CD access m ethod to handle sim ultaneous dem ands. It is one of the m ost widely im plem ented LAN standards. 3 1 TECHNOLOGY BACKROUND Invented by Robert M etcalfe, during his tim e at Xerox’s Palo Alto Research Center (PARC) the prototype system operated at 3 M bps and connected 100 com puters. W ithin a num ber of years Xerox, Intel Corporation and Digital Equipm ent Corporation had form ed an alliance and published a “Blue Book Standard” for the Ethernet, which subsequently form ed the basis for the IEEE 802.3 standard. Figure 2.1 M etcalfe’s original notes ii Today, the Ethernet is the m ost com m only em ployed LAN technology. According to the International Data Corporation (IDC) m ore than 85% of all network connections are Ethernet. WHY HAS THE ETHERNET BEEN SO SUCCESSFUL? Central to the success of the Ethernet, has been its ability to continue to evolve to m eet the every growing dem and for bandwidth. IT professionals have com e to rely on the Ethernet to be sim ple, easy to use and readily upgradeable. An organization can scale from 10 to 100 (Fast Ethernet) to 1000M bps (Gigabit Ethernet), assured that any new equipm ent will be backwards com patible with legacy equipm ent. This reduces the infrastructure investm ent that an organization m ust m ake. For a history of the Ethernet visit www.com puterhistory.org/. 4 International Data Corporation - is the world's leading provider of technology intelligence, industry analysis, m arket and strategic data. IDC provides global research with local content through m ore than 700 analysts in 43 countries worldwide. IDC is a division of IDG, which was founded in 1964 and has m ore than 12,000 em ployees worldwide. IDG m edia options reach m ore than 120 m illion technology buyers in 85 countries; representing 95% of worldwide IT spending. EVOLUTION OF STANDARDS The role-played by the Ethernet standards has been to provide a straightforward m igration path for com panies as their bandwidth requirem ents have increased. Figure 2.2 ii The Gigabit Ethernet has evolved from the original 10M bps Ethernet standards and a 10-Gigabit Ethernet standard is being ratified, supported by the IEEE and the 10- Gigabit Ethernet Alliance. 5 Figure 2.3 iii In June of 1998, the IEEE adopted a standard for Gigabit Ethernet over fiber optic cabling, IEEE 802.3z, and its im plem entation was widely supported. A year later, in June of 1999 the IEEE standardized IEEE 802.3ab Gigabit Ethernet over copper as 1000Base-T, allowing Gigabit speed to be transm itted over Cat-5 cable (figure 2.3). As a result com panies could rely on an well-understood standards-based approach to im prove traffic 1.1 BENEFITS OF GIGABIT Gigabit Ethernet is 100 tim es faster than regular 10M bps Ethernet and 10 tim es faster than 100M bps Fast Ethernet. The principal benefits of Gigabit Ethernet include: • Increased bandwidth for higher perform ance and elim ination of bottlenecks • Full-duplex capacity, allowing the effective bandwidth to be virtually doubled • Aggregating bandwidth to m ulti-Gigabit speeds using Gigabit server adapters and switches • Quality of Services (QoS) features to help elim inate jittery video or distorted audio • Low cost of acquisition and ownership • Full com patibility with the large installed base of Ethernet and Fast Ethernet nodes • Transferring large am ounts of data across a network quickly 6 2 NETWORK TOPOLOGY Com pany X will em ploy a Bus or Tree topology, all devices on the network connects via one trunk cable. This m akes it easy to install and configure and inexpensive. Figure 3.1 shows the proposed topology; geom etric arrangem ent. Figure 3.1 Com pany X’s Network Topology Other issues that should be considered during developm ent of the network topology are the physical lim itation of such a network and how to avoid any bottlenecks. VLAN: Short for virtual LAN, a network of com puters that behave as if they are connected to the sam e wire even though they m ay actually be physically located on different segm ents of a LAN. VLANs are configured through software rather than hardware, which m akes them extrem ely flexible. VLANs are often nam ed by color. A NETWORK DIAM ETER LIM ITATIONS There are two approaches to calculating the physical lim itations of the network topology. The first is a “cookbook” approach, ensuring the 5-4-3 Rule is adhered to. 5-4-3 Rule: divides the network into two types of physical segm ents: populated (user) segm ents, and unpopulated (link) segm ents. User segm ents have users' system s connected to them . Link segm ents are used to connect the network's repeaters together. The rule m andates that between any two nodes on the network, there can only be a m axim um of five segm ents, connected through four repeaters, or concentrators, and only three of the five segm ents m ay contain user connections. The Ethernet protocol requires that a signal sent out over the LAN reach every part of the network