- Shopping Bag ( 0 items )
Part of the best-selling How It Works series, How Networks Work is a stunning, full-color illustrated title on networking technology. Each spread provides the reader with the information necessary to understand the fundamentals of ...
Part of the best-selling How It Works series, How Networks Work is a stunning, full-color illustrated title on networking technology. Each spread provides the reader with the information necessary to understand the fundamentals of connectivity, and each detailed illustration is labeled and annotated in easy to comprehend terms, helping the reader cut through the difficult vocabulary of the networking world. In this excursion through the inner-workings of all the network pieces, you'll see the inside of a modem and the purpose of each component, how a wiring hub fits into a network operating system, how data goes in and out of a network interface card (NIC), and much more.
Networks are for sharing. Sharing such things as word processing and spreadsheet files, printers, communication links to distant computers and networks, and electronic mail systems is the function of a network. Every sharing activity, from car pools to bank lines, has its own rules. In networking, we call these rules standards and protocols. Standards describe how things should be; typically they set a minimum performance level. Protocols are sets of rules and agreements; they describe how elements interact. The key to understanding networking is understanding the standards and protocols that make it possible to interoperate without losing or abusing the shared files and devices.
In this section, we'll talk about standards, protocols, and sharing. First, let's spend a little time learning how many of these standards and protocols came about; then we'll talk more about sharing. Although the standards and protocols for computer communications go back to the work of Morse and Bell at the beginning of the 1900s, the standards and protocols for computer interoperation did not emerge until the early 1980s. Three streams fed the computer networking flood: IBM, the U.S. Department of Defense (DoD), and the Xerox Corporation's Palo Alto Research Center. Later, other industry and professional organizations, particularly the Institute of Electrical and Electronic Engineers (the IEEE, pronounced i-triple-e) played an important part in developing standards, but the story starts with a computer system called SAGE.
The Semi-Automatic Ground Environment (SAGE) was developed by IBM for the DoD in the 1960s. SAGE, an air-defense system that operated until the mid-1980s, used vacuumtube computers with memory banks so large that two people could stand inside them. The computers were installed in pairs in blockhouse buildings, and the filaments from the tubes in a pair of SAGE computers supplied all the winter heat for large three-story buildings in places such as Great Falls, Montana, and Duluth, Minnesota. The SAGE program involved the efforts of all the best U.S. communications and computer scientists in the 1960s and resulted in a network of interoperating computers that stretched across the United States. The program was the equivalent of the Golden Spike that linked the railroads in 1869. SAGE proved the practicality of interoperating computer systems and stimulated development efforts, particularly by IBM and the federal government.
In the 1970s, the DoD-faced with an inventory of different computers that could not intemperate-pioneered the development of network software protocols that work on more than one make and model of computer. The major set of protocols established by the DoD is the Transmission Control Protocol/Internet Protocol (TCP/IP). As the name implies, these protocols are agreements on how transmission takes place across networks. Companies, particularly those that want the federal government's business, write software that conforms to those protocols.
At about the same time in the 1970s, IBM began making public the standards and protocols it used for its proprietary computer systems. The standards included detailed descriptions of cabling, and the protocols were designed to ensure accurate communications under heavy loads. This work led others to emulate IBM's techniques and raised the quality of network development in the entire industry. It also led to an uprising by other computer companies that objected to IBM's total control of the most widely used standards and protocols. Eventually, this uprising led to the flexibility and interoperability we enjoy today.
Computer interoperation involves moving a lot of data, but it's difficult to move a lot of anything, including data, over a long distance. So, computer interoperation usually begins with computers in the same office or the same building connected to a local network. The term local area network, or LAN (rhymes with pan), describes a group of computers typically connected by no more than 1,000 feet of cable, which interoperate and allow people to share resources.
In the 1970s, IBM and Digital Equipment Corporation developed ways for a few large computers to intemperate over local networks, but the most important work on LANs for a large number of computers was done at the Xerox Corporation's Palo Alto Research Center (PARC) in the late 1970s and early 1980s. At PARC, an important set of standards and protocols called Ethernet was conceived and developed to the point of becoming a commercial product. At about the same time, people working independently at Datapoint Corporation developed a standard called ARCnet, but Datapoint kept ARCnet as a proprietary set of specifications, so it didn't have the commercial success of Ethernet. Later, IBM developed the third major networking technology we use today, Token-Ring.
The early local area network architectures, such as Ethernet and ARCnet, combined inflexible hardware specifications with strict protocol descriptions. Specific types of copper cable, specific cable connectors, one physical configuration, and certain software functions were bundled together in each LAN definition...
|Pt. 1||Communicating By Wire||1|
|Ch. 1||The Telegraph||4|
|Ch. 2||The Telephone||10|
|Ch. 3||Printing Telegraphs||14|
|Pt. 2||Mixing Computers and Telephones||20|
|Ch. 4||The Early Networks||24|
|Ch. 5||From Keypunches to Terminals to the Carterfone||28|
|Ch. 6||Alphabet Soup: Morse, Baudot, ASCII, and EBCDIC||36|
|Ch. 7||The Bell 103 Modem||40|
|Ch. 8||Dialing for Data||44|
|Ch. 9||The RS-232C Serial Interface||48|
|Ch. 10||The Personal Computer as a Terminal||52|
|Ch. 11||Smart Modems||58|
|Ch. 12||The Fax Modem||62|
|Ch. 13||Computer Telephony Integration||66|
|Pt. 3||Local Area Networks (LANs)||70|
|Ch. 14||A Network Model||76|
|Ch. 15||Network Operating Systems||80|
|Ch. 16||The Network Interface Card||86|
|Ch. 17||Network Cabling||92|
|Ch. 18||Server-Based LANs||116|
|Ch. 19||Peer-to-Peer Networks||120|
|Ch. 20||Enterprise Network Systems||124|
|Ch. 21||Remote LAN Access||130|
|Ch. 22||Network Security||134|
|Pt. 4||Links Between LANs||140|
|Ch. 23||Repeaters, Bridges, Routers, and Switches||144|
|Ch. 24||Metropolitan Area Networks (MANs)||148|
|Ch. 25||Circuit-Switched Digital Services||152|
|Ch. 26||Packet-Switching Networks||158|
|Pt. 5||Workgroup Applications||166|
|Ch. 27||Online Information Services||170|
|Ch. 28||Electronic-Mail Systems||174|
|Ch. 29||Beyond Electronic Mail: Groupware for Productivity||180|
|Ch. 30||The Internet||184|
Computer networking didn't just emerge as a unique and independent technology. Networking depends on many things you've seen or are familiar with already. In fact, modern networks have roots in the early telegraph and telephone systems. In this book, we take advantage of those historical ties to explain and illustrate the underlying technology of networks in a simple graphic format.
Then, we move into modern networking and explain the relationships between the hardware and software in networks. Our illustrations detail packets, network interface cards, servers, routers, management software, and many other aspects of networking. Our constant goal is to provide useful information in an easily understood manner.
The information in this book isn't specific to any particular type of computer or network operating system. We illustrate models of operation and tell you how some popular products fit into the models. Whether your computer is an IBM PC, DEC VAX, or anApple Macintosh; whether your network operating system is NetWare, LANtastic, or UNIX; and whether your cabling is copper or fiber-optic, the information in this book applies to your network.
Posted March 16, 2001
A great book that shows exactly how the networks and how its when it works. tells you exactly how it works the easy but yet the most informative way you can get it.Was this review helpful? Yes NoThank you for your feedback. Report this reviewThank you, this review has been flagged.