x Contents
4GSKXKYUR[ZOUT[YOTM*49
8.8 WINS 149
/TZXUJ[IZOUT
=/49TGSKXKMOYZXGZOUT
=/49TGSKXKYUR[ZOUT
=/49VXU^_GMKTZY
8.9 SNMP (simple network management protocol) 150
9436HGYOIIUSVUTKTZY
9436HGYOIIUSSGTJY
9436SGTGMKSKTZOTLUXSGZOUTHGYK3/(
9436\VXUZUIURUVKXGZOUTY
9436SGTGMKSKTZ
9436YKI[XOZ_
9436OTZKXUVKXGHOROZ_
8.10 SMTP (simple mail transfer protocol) 154
8.11 POP (post office protocol) 155
8.12 BOOTP (bootstrap protocol) 156
8.13 DHCP (dynamic host configuration protocol) 158
*.)6UVKXGZOUT
*.)6SKYYGMKLUXSGZ
9 :)6/6[ZOROZOKY
9.1 Introduction 162
9.2 PING (packet Internet groper) 163
9.3 ARP 166
9.4 NETSTAT 167
9.5 NBTSTAT 167
9.6 IPCONFIG 168
9.7 WINIPCFG 169
9.8 TRACE RouTe 170
9.9 ROUTE 172
9.10 The HOSTS file 173
10 2'4Y_YZKSIUSVUTKTZY
10.1 Introduction 174
10.2 Repeaters 175
6GIQGMOTM
2UIGR+ZNKXTKZXKVKGZKXY
8KSUZKXKVKGZKXY
10.3 Media converters 176
Contents xi
10.4 Bridges 177
/TZKRROMKTZHXOJMKY
9U[XIKXU[ZOTMHXOJMKY
98:GTJZXGTYRGZOUTGRHXOJMKY
2UIGR\YXKSUZKHXOJMKY
10.5 Hubs 179
*KYQZUV\YYZGIQGHRKN[HY
9NGXKJ\YY]OZINKJN[HY
3GTGMKJN[HY
9KMSKTZGHRKN[HY
*[GRYVKKJN[HY
3UJ[RGXN[HY
.[HOTZKXIUTTKIZOUT
10.6 Switches 182
)[ZZNXU[MN\YYZUXKGTJLUX]GXJ
2G_KXY]OZINKY\YRG_KXY]OZINKY
,[RRJ[VRK^Y]OZINKY
9]OZINGVVROIGZOUTY
10.7 Routers 186
:]UVUXZ\YS[RZOVUXZXU[ZKXY
'IIKYYXU[ZKXY
(UXJKXXU[ZKXY
8U[ZOTM\YHXOJMOTM
10.8 Gateways 187
10.9 Print servers 188
10.10 Terminal servers 188
10.11 Thin servers 189
10.12 Remote access servers 189
10.13 Network timeservers 190
11 :NK/TZKXTKZ
11.1 The Internet and internet 191
11.2 The objectives, background and history of TCP/IP 191
:NKUXOMOTUL:)6GTJ/6
:NKNOYZUX_GTJHGIQMXU[TJUL:)6/6
11.3 The Internet organizational structure 192
/))(/'(
/+:,/8:,
:NK/TZKXTKZYUIOKZ_
/'(
11.4 The World Wide Web 193
11.5 An introduction to HTML 194
xii Contents
11.6 HTTP 194
11.7 Java 195
11.8 CGI 196
11.9 Scripting: JavaScript 196
11.10 XML 196
11.11 Server side includes 197
11.12 Perl 197
12 /TZKXTKZGIIKYY
12.1 Connecting a single host to the Internet 198
12.2 Connecting remote hosts to corporate LAN 200
12.3 Connecting multiple hosts to the Internet 200
)UTTKIZOUT\OGVXU^_YKX\KX
)UTTKIZOUT\OG4':YKX\KX/6SGYW[KXGJOTM
)UTTKIZOUT\OG/6YNGXKX
)UTTKIZOUT\OG;4/>UX4:MGZK]G_
)UTTKIZOUT\OGJKJOIGZKJXU[ZKX
13 :NK/TZKXTKZLUXIUSS[TOIGZOUTY
13.1 Introduction 203
13.2 Hardware and software issues 203
13.3 Speed/bandwidth issues 204
13.4 Legal issues 204
13.5 E-mail 205
656GTJ93:6YKX\KXY
+SGORYULZ]GXKXKYOJOTMUTZNKRUIGRNUYZ]UXQYZGZOUT
+SGORYULZ]GXKXKYOJOTMUTGXKSUZKYKX\KX
<UOIKXKZXOK\GRULKSGOR
13.6 Internet telephony 206
/TZXUJ[IZOUT
6)ZU6)
6)ZUVNUTK
6NUTKZUVNUTK
3O^KJ6)VNUTKZUSO^KJ6)VNUTK]OZNOTZXGTKZ6(>
/TIUSOTMIGRRY]OZNIGRR]GOZOTM
5[ZMUOTMIGRRY]OZNXKM[RGXVNUTKZNXU[MN6)
2O\K\UOIKIUSS[TOIGZOUT]OZNI[YZUSKXY\OG]KHVGMK
9KI[XKVNUTKY
13.7 Paging 209
939YNUXZSKYYGMKYKX\OIK
*'0*YUIQ
Contents xiii
13.8 Voice mail 210
6)ZU6)
13.9 Fax 211
,G^SGINOTKKSGORZULG^SGINOTKKSGOR
,G^SGINOTKZULG^SGINOTK
13.10 Video conferencing 211
<OJKUG[JOUJUI[SKTZIUTLKXKTIOTM
<OJKUTKZ]UXQOTM
13.11 News 212
4K]YV[YN
4K]YV[RR
4K]YMXU[VY ;9+4+:
9KGXINGMKTZY
13.12 Additional information 214
/TZKXTKZZKRKVNUT_
<OJKUIUTLKXKTIOTM
6GMOTM
,G^
<UOIKIUSS[TOIGZOUT\OG]KHVGMKROTQ
<UOIKSGOR
4K]YYKX\OIKY
666YKX\KXY
+SGOR
14 9KI[XOZ_IUTYOJKXGZOUTY
14.1 The security problem 216
14.2 Controlling access to the network 218
'[ZNKTZOIGZOUT
8U[ZKXY
,OXK]GRRY
14.3 Intrusion detection systems (IDS) 223
.UYZHGYKJ/*9
4KZ]UXQHGYKJ/*9
14.4 Security management 224
)KXZOLOIGZOUT
/TLUXSGZOUTYKI[XOZ_VUROIOKY
9KI[XOZ_GJ\OYUX_YKX\OIKY
14.5 The public key infrastructure (PKI) 227
/TZXUJ[IZOUTZUIX_VZUMXGVN_
+TIX_VZOUTGTJJOMOZGRYOMTGZ[XKK^VRGOTKJ
61/JKLOTOZOUTV[HROIQK_OTLXGYZX[IZ[XK
61/L[TIZOUTY
14.6 References 232
/TZKXTKZK^ZXGTKZOTZXGTKZYKI[XOZ_
xiv Contents
+TIX_VZOUT
,OXK]GRRYVXU^_YKX\KXYKZI
15 6XUIKYYG[ZUSGZOUT
15.1 Background 234
15.2 Legacy automation architectures 234
15.3 The factory of the future 236
:NKTKZ]UXQOTMVXUZUIURYZGIQ
'VVROIGZOUTRG_KXJGZGYZX[IZ[XKY
+SHKJJKJ]KHYKX\KXY
8U[ZKXYGTJY]OZINKY
4KZ]UXQGIIKYY
:NOTYKX\KXY
4KZ]UXQIGVGHRKGVVROIGZOUTVXUIKYYUXY4)'6Y
+ZNKXTKZIUSVGZOHRK62)Y
+ZNKXTKZIUSVGZOHRK9)'*'Y_YZKSY
15.4 References 241
'[ZUSGZOUTZXKTJY
:)6/6HGYKJLGIZUX_G[ZUSGZOUT
:NOTYKX\KXY
=KHIUSVGZOHRK9)'*'Y_YZKSY
0G\G
16 /TYZGRROTMGTJZXU[HRKYNUUZOTM+ZNKXTKZY_YZKSY
16.1 Network drivers 243
4KZ]UXQJXO\KXY
)USVGZOHOROZ_GTJ[YGMK
16.2 Network card/driver configuration 244
16.3 Network driver interface specification (NDIS) 245
16.4 Open data link interface (ODI) 245
16.5 Packet drivers 246
16.6 Plug and play architecture 246
16.7 PCMCIA interface 246
/TZXUJ[IZOUT
6)3)/'OTZKXLGIK
16.8 Protocol analyzers 247
17 :XU[HRKYNUUZOTM:)6/6
17.1 Maintenance and troubleshooting of real TCP/IP networks 249
17.2 Network troubleshooting 250
/TIXKGYOTMT[SHKXULIURROYOUTYUTZNK+ZNKXTKZTKZ]UXQ
Contents xv
4KZ]UXQ[ZORO`GZOUTRU]H[ZKXXUXYNOMN
.OMNT[SHKXULVGIQKZYH[ZRU]JGZGZXGTYLKXY
17.3 Troubleshooting with TCP/IP utilities 251
+^GSVRKUL[YKULGLK]ULZNK[ZOROZOKYZUMKZNKX
;TXKROGHRKIUTTKIZOUTY
4KZ]UXQIUTMKYZOUT
18 9GZKRROZKYGTJ:)6/6
18.1 Introduction 255
18.2 Overview of satellite communications 255
18.3 Advantages of satellite networks 258
18.4 Applications of satellite systems 259
8KSUZKIUTZXURGTJRUMOT
<OJKUIUTLKXKTIOTM
+RKIZXUTOISGOR
/TLUXSGZOUTXKZXOK\GR
([RQOTLUXSGZOUTHXUGJIGYZOTM
/TZKXGIZO\KMGSOTM
18.5 Review of TCP/IP 261
/TZKXTKZVXUZUIURUX/6VXUZUIUR
:XGTYSOYYOUTIUTZXURVXUZUIURUX:)6
18.6 Weaknesses of TCP/IP in satellite usage 265
=OTJU]YO`KZUUYSGRR
(GTJ]OJZNGJGVZGZOUT
9KRKIZO\KGIQTU]RKJMSKTZ
9RU]YZGXZ
:)6LUXZXGTYGIZOUTY
18.7 Methods of optimizing TCP/IP over satellite channels 266
Appendix A: -RUYYGX_
Appendix B: 6UXZT[SHKXGRRUIGZOUT
/TJK^
Preface
One of the great protocols that has been inherited from the Internet is TCP/IP and this is being used as
the open standard today for all network and communications systems. The reasons for this popularity
are not hard to find. TCP/IP and Ethernet are truly open standards available to competing
manufacturers and providing the user with a common standard for a variety of products from different
vendors. In addition, the cost of TCP/IP and Ethernet is low. Initially TCP/IP was used extensively in
military applications and the purely commercial world such as banking, finance, and general business.
But of great interest has been the strong movement to universal usage by the hitherto disinterested
industrial and manufacturing spheres of activity who have traditionally used their own proprietary
protocols and standards. These proprietary standards have been almost entirely replaced by the usage
of the TCP/IP suite of protocols.
This is a hands-on book that has been structured to cover the main areas of TCP/IP and Ethernet in
detail, while going through the practical implementation of TCP/IP in computer and industrial
applications. Troubleshooting and maintenance of TCP/IP networks and communications systems in
an office and industrial environment will also be covered.
After reading this book we would hope you would be able to:
• Understand the fundamentals of the TCP/IP suite of protocols
• Gain a practical understanding of the application of TCP/IP
• Learn how to construct a robust local area network (LAN)
• Learn the basic skills in troubleshooting TCP/IP and LANs
• Apply the TCP/IP suite of protocols to both an office and industrial
environment
Typical people who will find this book useful include:
• Network technicians
• Data communications managers
• Communication specialists
• IT support managers and personnel
• Network planners
• Programmers
• Design engineers
• Electrical engineers
• Instrumentation and control engineers
• System integrators
• System analysts
• Designers
• IT and MIS managers
• Network support staff
• Systems engineers
You should have a modicum of computer knowledge and know how to use the Microsoft Windows
operating system in order to derive maximum benefit from this book.
xviii Preface
The structure of the book is as follows.
Chapter 1: Overview
. This chapter gives a brief overview of what is covered in the book with an
outline of the essentials of communications systems.
Chapter 2: Networking fundamentals
. An overview of network communication, types of
networks, the OSI model, network topologies and media access methods.
Chapter 3: Ethernet networks
. A description of the operation and performance of Ethernet
networks commencing with the basic principles.
Chapter 4: Fast and gigabit Ethernet Systems
. A minimum speed of 100 Mbps is becoming
de rigeur on most Ethernet networks and this chapter examines the design and installation issues for
fast Ethernet and gigabit Ethernet systems, which go well beyond the traditional 10 Mbps speed of
operation.
Chapter 5: Introduction to TCP/IP.
A brief review of the origins of TCP/IP to lay the
foundation for the following chapters.
Chapter 6: Internet layer protocols.
Perhaps the workhorse of the TCP/IP suite of protocols this
chapter fleshes out the Internet protocol (both Ipv4 and Ipv6) and also examines the operation of ARP,
RARP and ICMP.
Chapter 7: Host-to-host (transport) layer protocols
. The TCP (transmission control protocol)
and UDP (user datagram protocol) are both covered in this chapter.
Chapter 8: Application layer protocols.
A thorough coverage of the most important application
layer protocols such as FTP (file transfer protocol), TFTP (trivial file transfer protocol), TELNET,
Rlogin, network file system, domain name system, WINS, simple network management protocol
(SNMP), SMTP, POP, BOOTP and DHCP.
Chapter 9: TCP/IP utilities
. A coverage focussing on the practical application of the main
utilities such as Ping, ARP, NETSTAT NBTSTAT, IPCONFIG, WINIPCFG, tracert, ROUTE and the
hosts file.
Chapter
10
:
LAN system components
. A discussion on the key components in connecting
networks together such as repeaters, bridges, switches and routers.
Chapter 11: The Internet
. A brief discussion on the origins of the Internet and the various
associated standards organizations.
Chapter 12: Internet access
. The typical methods of connecting to the Internet are outlined here
with a discussion on connecting a single host to the Internet, connecting multiple remote hosts to a
corporate LAN, and in connecting multiple hosts to the Internet.
Chapter 13: The Internet for communications
.
Speed/bandwidth issues, the different options
for E-mail, voice over IP and voice mail will be described in this chapter
.
Preface xix
Chapter 14: Security considerations.
The security problem and methods of controlling access
to a network will be examined in this chapter. This is a growing area of importance due to the
proliferation attacks on computer networks by external parties.
Chapter 15: Process automation.
The legacy architectures and the factory of the future will be
examined here together with an outline of the key elements of the modern Ethernet and TCP/IP
architecture.
Chapter 16: Installing and troubleshooting Ethernet systems
. The functions of the various
types of network driver software together with the parameters to set the network card to match up to
the software for correct operation will be described here.
Chapter 17: Troubleshooting TCP/IP
. Maintenance of a TCP/IP network together with three
typical methods requiring troubleshooting and the use of the utilities such as NETSTAT, Ping, tracert,
and ripquery.
Chapter 18: Satellites and TCP/IP.
An overview of satellites and TCP/IP with satellites.
1
/TZXUJ[IZOUTZU
IUSS[TOIGZOUTY
5HPKIZO\KY
When you have completed study of this chapter you should be able to:
• Understand the main elements of the data communication process
• Understand the difference between analog and digital transmission
• Explain how data transfer is affected by attenuation, bandwidth and noise in
the channel
• Know the importance of synchronization of digital data systems
• Describe the basic synchronization concepts used with asynchronous and
synchronous systems
• Explain the following types of encoding:
• Manchester
• RZ
• NRZ
• MLT-3
• 4B/5B
• Describe the basic error detection principles.
*GZGIUSS[TOIGZOUTY
Communications systems exist to transfer information from one location to another. The
components of the information or message are usually known as data (derived from the
Latin word for items of information). All data are made up of unique code symbols or
other entities on which the sender and receiver of the messages have agreed. For example
binary data is represented by two states ‘0’ and ‘1’. These are referred to as Binary digiTS
or ‘bits’. These bits are represented inside our computers by the level of the electrical